SOCIAL MEDIA IDENTITY DISCOVERY AND MAPPING
First Claim
1. A non-transitory computer readable medium having stored thereon computer-executable instructions, the computer executable instructions causing a processor to execute a method for analyzing an interaction between a social media networking site and a contact center, the computer executable instructions comprising:
- instructions to receive a communication from the social networking site, the communication including an alias;
instructions to receive private user data from a private user data source, the private user data including an identity for a user;
instructions to correlate the communication with the private user data; and
based on a correlation, instructions to match the alias to the identity of the user.
18 Assignments
0 Petitions
Accused Products
Abstract
A server executing a social media identity and discovery application and method are provided that scan social networking sites for communications. The target content is found with content indicators when communications are put on a social networking site. The content is recorded and evaluated. If the identified content is contextually significant, the alias and the private user data are correlated based on events, and a notification of the correlation is sent to an agent or a contact center system. The agent may verify that the identity of a poster has been accurately correlated with a customer record in the database. The agent or the system has the opportunity to respond to the communication, despite the anonymity of the poster on the social networking site.
101 Citations
20 Claims
-
1. A non-transitory computer readable medium having stored thereon computer-executable instructions, the computer executable instructions causing a processor to execute a method for analyzing an interaction between a social media networking site and a contact center, the computer executable instructions comprising:
-
instructions to receive a communication from the social networking site, the communication including an alias; instructions to receive private user data from a private user data source, the private user data including an identity for a user; instructions to correlate the communication with the private user data; and
based on a correlation, instructions to match the alias to the identity of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A communication system comprising:
an identity discovery and mapping application executed by a server in a contact center, the identity discovery and mapping application operable to receive a communication from a social networking site, wherein the identity discovery and mapping application comprises; a communication receipt module operable to receive the communication from the social media networking site; a customer data receipt module operable to receive user data from a private user data source; an evaluation module in communication with the communication receipt module and the customer data receipt module that determines a correlation between the communication and private user data; a data matching module in communication with the evaluation module that matches a user identity from the private user data with an alias associated with the communication; and a validation and forwarding module that checks the validity of correlations determined by the data matching module. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A method for matching an alias with a user in a database, the method comprising:
-
receiving by a processor a communication from a social networking site; receiving by the processor private user data from a private user data source; identifying by the processor at least one of a content indicator in the communication and a content indicator associated with the private user data; in response to the identifying step, correlating by the processor an alias in the communication to a user associated with the private user data; validating by the processor the correlation by comparing the private user data with at least one other communication having the alias; storing by the processor a validated alias in a user profile database; comparing the validated alias to a stored alias; correlating the validated alias to the stored alias; and responding by the processor to a third communication associated with the alias, wherein the response includes the private user data. - View Dependent Claims (17, 18, 19, 20)
-
Specification