Patent classifications
H04M1/56
Systems and methods for authenticating a caller at a call center
A system for authenticating the identity of a caller (i) receives a phone call from a caller, where the phone call is initiated through an application on a remote computer device associated with the caller, and where the phone call includes one or more phone authentication credentials; (ii) determines a preliminary identity of the caller based upon the one or more phone authentication credentials; (iii) receives online authentication credentials from the application on the remote computer device; (iv) determines a confirmed identity of the caller based, at least in part, upon the one or more online credentials and the preliminary identity of the caller; and (v) displays the confirmed identity of the caller to a user answering the phone call. As a result, the user and/or the system do not need to perform additional authentication before providing service to the caller.
Systems and methods for identification and action on attempted controlled-environment facility resident communications with internet-protocol phone numbers
A controlled-environment facility communications management system, and/or the like, receives an indication of an electronic communication request with a telephone number initiated by, or to, a resident of a controlled environment facility. The controlled-environment facility communications management system, and/or the like, accesses a line information database and determines, based on the contents of the line information database, whether the telephone number is an Internet Protocol (IP) telephone number. The controlled-environment facility communications management system, and/or the like, takes action with respect to the electronic communication in response to identification of the telephone number as an IP telephone number.
System and method for identifying unwanted communications using communication fingerprinting
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
Automatically unsubscribing from automated calls based on call audio patterns
The disclosure herein describes automatically unsubscribing from automated calls based on automated call audio patterns. Audio data of an incoming call is accessed and an incoming call audio pattern is generated based on the audio data of the incoming call. The incoming call audio pattern is compared to an automated call audio pattern set by a call screening engine. Based on the comparison, the user is prompted for a call response instruction. Based on the call response instruction from the user, the call screening engine identifies an unsubscribe operation indication in the incoming call audio pattern, performs an unsubscribe operation associated with the identified unsubscribe operation indication, and updates the automated call audio pattern set based on the incoming call audio pattern. The disclosure enables efficient handling of automated calls and reduces user interaction necessary to unsubscribe from associated call lists.
Additional information on a caller
To provide a called one with information on the caller, a reference to a resource containing real-time or near-real-time information relating to the caller, or information deduced using the real-time or near-real-time information, or the real-time or near-real-time information, or the information deduced using the real-time or near-real-time information, is transmitted with a connection establishment request, and the information in the resource or the received information is displayed to the called one before the requested connection is established so that the called one can make a decision whether or not to answer the call.
Participant identification for teleconferencing
Techniques and examples pertaining to identifying a participant of a teleconference using a telephone number or an Internet protocol (IP) address are described. A method for teleconferencing participant identification may involve receiving an IP-based telephone call that includes a telephone number or an IP address. The method may also involve querying databases with the telephone number or the IP address to obtain identifications associated with the telephone number or the IP address. The method may also involve determining a display name for the IP-based telephone call based on the identifications, as well as connecting the IP-based telephone call as a participant to a teleconference that includes other participants. The method may further involve transmitting the display name to a device associated with at least one of the other participants of the teleconference.
Communication information hiding realization method and realization system
Disclosed are a communication information hiding realization method and realization system. The method comprises: monitoring a communication information database for storing communication information in real time, and judging whether there is newly added communication information in the communication information database; when there is newly added communication information in the communication information database, acquiring a communication number of the newly added communication information, and comparing the communication number to a pre-set communication number set needing to be hidden; and when the communication number exists in the communication number set needing to be hidden, deleting or hiding the communication information corresponding to the communication number in the communication information database. In the present invention, by monitoring a communication information database in real time to judge whether communication information needing to be hidden is automatically deleted or hidden, communication information security is improved.
Systems and methods for authenticating a caller at a call center
A system for authenticating the identity of a caller (i) receiving one or more online credentials of a caller initiating a phone call, where the one or more online credentials include one or more pieces of biometric information associated with the caller, and the one or more online credentials are received from a mobile device associated with the caller; (ii) requesting one or more additional online credentials associated with the mobile device; (iii) receiving the one or more additional online credentials; (iv) receiving telephone authentication information associated with the phone call; (v) authenticating the caller based, at least in part upon, the one or more online credentials, the one or more additional credentials, and the telephone authentication information; (vi) generating authentication status information based on the authentication of the caller; and (vii) transferring the authentication status information and the phone call to a call recipient.
Authentication and control of incoming communication
An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.
COMMUNICATION INFORMATION HIDING REALIZATION METHOD AND REALIZATION SYSTEM
Disclosed are a communication information hiding realization method and realization system. The method comprises: monitoring a communication information database for storing communication information in real time, and judging whether there is newly added communication information in the communication information database; when there is newly added communication information in the communication information database, acquiring a communication number of the newly added communication information, and comparing the communication number to a pre-set communication number set needing to be hidden; and when the communication number exists in the communication number set needing to be hidden, deleting or hiding the communication information corresponding to the communication number in the communication information database. In the present invention, by monitoring a communication information database in real time to judge whether communication information needing to be hidden is automatically deleted or hidden, communication information security is improved.