Patents by Inventor Naveen Narayan

Naveen Narayan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8144855
    Abstract: A method of and system for optimizing interactive voice response (IVR) unit port utilization starts each call of a plurality of calls on a separate IVR unit port. The method launches an IVR call flow for each call. Each IVR call flow includes a section that is common to all of the call flows. The method conferences together on a single IVR unit port at least some of the plurality of calls for the common section of the call flow by transferring calls to the single IVR unit port when each transferred call reaches the common section. The method synchronizes the calls conferenced together on the single port by inserting into the call flow on the single IVR unit port an on-hold treatment. The method starts the common section of the call flow when all calls have been transferred to the single IVR unit port.
    Type: Grant
    Filed: August 6, 2007
    Date of Patent: March 27, 2012
    Assignee: International Business Machines Corporation
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Patent number: 8139734
    Abstract: A method, system and computer-readable medium are disclosed for adjusting port usage and call duration in an interactive voice response (IVR) system based on changes in call volume. In one embodiment, the method comprises monitoring usage of one or more ports within an IVR system. A determination is made whether the usage of the ports exceeds a predetermined threshold for port usage. In response to determining port usage exceeds the predetermined threshold, the method adjusts one or more call flows within the IVR system to reduce call duration within the IVR system.
    Type: Grant
    Filed: September 24, 2007
    Date of Patent: March 20, 2012
    Assignee: International Business Machines Corporation
    Inventors: Sheri G. Daye, Peeyush Jaiswal, Naveen Narayan, Fang Wang
  • Patent number: 8073112
    Abstract: A method includes storing a profile associated with a user of a telephone and, based upon the profile, presenting the user with an option to search, browse, subscribe to, or bookmark content provided by a plurality of IVR content providers.
    Type: Grant
    Filed: July 2, 2008
    Date of Patent: December 6, 2011
    Assignee: International Business Machines Corporation
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Patent number: 8050930
    Abstract: An administration method and system. The method includes receiving by a computing system, a telephone call from an administrator. The computing system presents an audible menu associated with a plurality of computers to the administrator. The computing system receives from the administrator, an audible selection for a computer from the audible menu. The computing system receives from the administrator, an audible verbal command for performing a maintenance operation on the computer. The computing system executes the maintenance operation on the computer. The computing system receives from the computer, confirmation data indicating that the maintenance operation has been completed. The computing system converts the confirmation data into an audible verbal message. The computing system transmits the second audible verbal message to the administrator.
    Type: Grant
    Filed: May 1, 2008
    Date of Patent: November 1, 2011
    Assignee: International Business Machines Corporation
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Patent number: 7996885
    Abstract: Methods, systems, and program products for a client application provide child passwords mapped to a parent password authorized for login to a secure network resource server. A child user logs in to the client application by entering the child password. When a child user properly requests a secure resource from the secure network resource server, the client application uses the authorized parent password to login to the secure server and retrieve a secure resource without communicating the child password to the secure server. The child user login session is administered by the local application pursuant to access rules or limitation parameters associated with the child password. Child passwords may be set to expire. The client application may also monitor secure server access by a child user; monitored use may also be reported, and an access rule or password limitation parameter may be revised in response to monitoring and use reporting.
    Type: Grant
    Filed: April 19, 2007
    Date of Patent: August 9, 2011
    Assignee: International Business Machines Corporation
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Publication number: 20110125300
    Abstract: A method, computer program product, and a computer system are provided for acoustic monitoring and fault reporting. A computer identifies a sound from a consumer device. Responsive to identifying the sound from a consumer device, the computer converts the sound to an acoustic signal. Responsive to converting the sound to an acoustic signal, the computer generates a current acoustic fingerprint from the acoustic signal. Responsive to generating the acoustic fingerprint, the computer identifies whether the current acoustic fingerprint contains an ideal acoustic fingerprint. Responsive to identifying that the current acoustic fingerprint does not contain the ideal acoustic fingerprint, the computer provides notification that the current acoustic fingerprint does not contain the ideal acoustic fingerprint.
    Type: Application
    Filed: January 31, 2011
    Publication date: May 26, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Patent number: 7809564
    Abstract: A search algorithm utilizing confidence levels of keywords spoken by a caller to identify keyword indexed search items which best match the spoken keywords. In response to receiving a spoken search request from a caller, keywords are identified in the spoken search request. A list of candidates is created comprising a match to at least one of the keywords, wherein each candidate in the list is assigned a level of confidence in the match. Keyword indexed search items having at least one of the keywords as an index and an original matching score are then located. The original matching score of each keyword indexed search item is weighted with the level of confidence in the list of candidates to form weighted matching scores. The keyword indexed search items are sorted based on weighted matching score. A list of the sorted keyword indexed search items is then created.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: October 5, 2010
    Assignee: International Business Machines Corporation
    Inventors: Peeyush Jaiswal, Naveen Narayan, Fang Wang
  • Publication number: 20100105426
    Abstract: A method, a system and a computer program product for determining one or more characteristics of a caller, such as the mood, gender, age, and urgency of the caller, utilizing the biometric characteristics of the caller. One or more biometric characteristics are detected when a request to place an outgoing call to one or more destinations is received at a first telecommunication device. When the request to place an outgoing call is a verbal request, one or more biometric voice samples are obtained. The biometric voice samples comprise the biometric characteristics of the caller. The biometric characteristics are extracted from the biometric voice samples, encoded into a datagram, and transmitted from the first telecommunication device to the outgoing call destination (i.e. a second telecommunication device).
    Type: Application
    Filed: October 24, 2008
    Publication date: April 29, 2010
    Applicant: International Buisness Machines Corporation
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Patent number: 7697666
    Abstract: A method, system and computer-usable medium for optimizing retrieval of customer data needed to handle a call are presented. The method includes the steps of receiving a call at a data center; initiating a query for a business data related to the call; creating a key that identifies the business data related to the call; pre-fetching the business data using the key with a lookup table; caching the pre-fetched business data; attaching the key to the call; routing the call with the attached key to a desktop agent; receiving a request from the desktop agent for the pre-fetched business data; retrieving the cached pre-fetched business data; and transmitting the cached pre-fetched business data to the desktop agent.
    Type: Grant
    Filed: March 30, 2006
    Date of Patent: April 13, 2010
    Assignee: International Business Machines Corporation
    Inventors: Shailesh Gandhi, Peeyush Jaiswal, Yu-Cheng Liu, Naveen Narayan
  • Publication number: 20100086108
    Abstract: A method implemented in a computer infrastructure having computer executable code having programming instructions tangibly embodied on a computer readable storage medium. The programming instructions are operable to receive an audio stream of a communication between a plurality of participants. Additionally, the programming instructions are operable to filter the audio stream of the communication into separate audio streams, one for each of the plurality of participants, wherein each of the separate audio streams contains portions of the communication attributable to a respective participant of the plurality of participants. Furthermore, the programming instructions are operable to output the separate audio streams to a storage system.
    Type: Application
    Filed: October 6, 2008
    Publication date: April 8, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Publication number: 20100054431
    Abstract: A system and method to select and retrieve contact center transactions from a set of transactions stored in a queuing mechanism. The system includes an interactive voice response system configured to accept at least one call and dynamically populate a web form with call data associated with the at least one call. The system also includes a queuing engine configured to allow a call agent to access the call data prior to the at least one call being connected to the call agent.
    Type: Application
    Filed: August 29, 2008
    Publication date: March 4, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peeyush JAISWAL, Naveen NARAYAN
  • Publication number: 20100048227
    Abstract: A computer implemented method, a computer program product, and a data processing system use short messaging service for extending customer service deliver channels. A message utilizing a short messaging service protocol is received from a sender. Responsive to receiving the message utilizing the short messaging service protocol, the message is parsed into a voice extensible markup language document. A virtual service request is then created from the voice extensible markup language document. Responsive to creating the virtual service request from the voice extensible markup language document, a service is requested from a message recipient, facilitated by using the virtual service request. A non-textual response is then provided to the message sender.
    Type: Application
    Filed: August 25, 2008
    Publication date: February 25, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Publication number: 20100049343
    Abstract: A computer implemented method, a computer program product, and a data processing system provide acoustic monitoring and fault reporting. A sound is identified from a consumer device. The sound to an acoustic signal. An acoustic fingerprint is generated from the acoustic signal. The acoustic fingerprint is then compared to a threshold value to determine whether the acoustic fingerprint deviates from a threshold value by more than a defined statistical variance. If the acoustic fingerprint deviates from a threshold value by more than a defined statistical variance, notification is provided that the acoustic fingerprint deviates from the threshold value by more than the defined statistical variance.
    Type: Application
    Filed: August 25, 2008
    Publication date: February 25, 2010
    Applicant: International Business Machines Corporation
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Publication number: 20100002850
    Abstract: A method includes storing a profile associated with a user of a telephone and, based upon the profile, presenting the user with an option to search, browse, subscribe to, or bookmark content provided by a plurality of IVR content providers.
    Type: Application
    Filed: July 2, 2008
    Publication date: January 7, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: PEEYUSH JAISWAL, NAVEEN NARAYAN
  • Publication number: 20090323906
    Abstract: A security method and system. The method includes receiving by a computing system, a telephone call from a user. The computing system comprises an existing password/passphrase and a pre-recorded voice sample associated with the user. The computing system prompts the user to enter a password/passphrase using speech. The computing system receives speech data comprising a first password/passphrase from the user. The computing system converts the speech data to text data. The computing system first compares the text data to the first password/passphrase and determines a match. The computing system compares the speech data to the pre-recorded voice sample to determine a result indicating whether a frequency spectrum associated with the speech data matches a frequency spectrum associated with the pre-recorded voice sample. The computing system transmits the result to the user.
    Type: Application
    Filed: April 29, 2008
    Publication date: December 31, 2009
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Publication number: 20090319541
    Abstract: A method, system, and computer program product for efficiently comparing multiple columns of a row of a relational database to an incoming record. A computer creates a cryptographic sum for columns of a row of the relational database. The cryptographic sum is stored as a hidden column in the relational database. Logic may compare the cryptographic sum with an incoming cryptographic sum of entries in an incoming record. Logic may then determine if the incoming cryptographic sums differ from the corresponding cryptographic sums of rows of data of the relational database. When the two cryptographic sums are identical, the data of the incoming record is disregarded as an identical record that already exists. An entry of the incoming record may be added to the target table or updated within an existing record of the relational database when the cryptographic sum and the incoming cryptographic sum of that entry differ.
    Type: Application
    Filed: June 19, 2008
    Publication date: December 24, 2009
    Inventors: Peeyush Jaiswal, Vikram S. Khatri, Naveen Narayan, Burt L. Vialpando
  • Publication number: 20090306979
    Abstract: A method, system, and computer program product for autonomously transcribing and building tagging data of a conversation. A corpus processing agent monitors a conversation and utilizes a speech recognition agent to identify the spoken languages, speakers, and emotional patterns of speakers of the conversation. While monitoring the conversation, the corpus processing agent determines emotional patterns by monitoring voice modulation of the speakers and evaluating the context of the conversation. When the conversation is complete, the corpus processing agent determines synonyms and paraphrases of spoken words and phrases of the conversation taking into consideration any localized dialect of the speakers. Additionally, metadata of the conversation is created and stored in a link database, for comparison with other processed conversations. A corpus, a transcription of the conversation containing metadata links, is then created.
    Type: Application
    Filed: June 10, 2008
    Publication date: December 10, 2009
    Inventors: Peeyush Jaiswal, Vikram S. Khatri, Naveen Narayan, Burt Vialpando
  • Publication number: 20090276223
    Abstract: An administration method and system. The method includes receiving by a computing system, a telephone call from an administrator. The computing system presents an audible menu associated with a plurality of computers to the administrator. The computing system receives from the administrator, an audible selection for a computer from the audible menu. The computing system receives from the administrator, an audible verbal command for performing a maintenance operation on the computer. The computing system executes the maintenance operation on the computer. The computing system receives from the computer, confirmation data indicating that the maintenance operation has been completed. The computing system converts the confirmation data into an audible verbal message. The computing system transmits the second audible verbal message to the administrator.
    Type: Application
    Filed: May 1, 2008
    Publication date: November 5, 2009
    Inventors: Peeyush Jaiswal, Naveen Narayan
  • Publication number: 20090248418
    Abstract: A method of call route determination based upon a statistics-based business intelligence engine (BEI) queried by an IVR subsystem with caller parameters descriptive of the caller to determine a next best route for a received call, when the default or best route for the call exceeds a threshold time. A call is received at a contact center from a caller. Content and identity information of the caller is extracted from the received call. IVR determines a first estimated wait time associated with a default route of the received call. If the first estimated wait time is greater than a threshold time, and thus unacceptable, then the IVR queries a business intelligence engine (BIE) with caller parameters descriptive of the caller to determine a next best route of the received call, with the next best route having a second estimated wait time less than the first estimated wait time of the default route. The caller is then routed to the next best route.
    Type: Application
    Filed: March 31, 2008
    Publication date: October 1, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peeyush Jaiswal, Naveen Narayan, Sheri Gayle Daye
  • Publication number: 20090232127
    Abstract: A supervisor computer directly communicates, via User Datagram Protocol (UDP) packets, with a call control application software in a soft phone. The UDP packets provide real-time information, from a desktop of the soft phone, describing call activity and usage status of the soft phone. The supervisor computer is able to remotely control usage of the soft phone according to information provided by the UDP packets.
    Type: Application
    Filed: March 14, 2008
    Publication date: September 17, 2009
    Inventors: Peeyush Jaiswal, Naveen Narayan