H04M2203/60

DEVICES AND METHODS FOR MULTIPATH COMMUNICATIONS
20220394124 · 2022-12-08 · ·

Broadband communications devices and methods operate with at least two separate communication paths between the devices and the network, such as the Internet. The broadband devices and methods receive data concurrently over the communication paths or separately. The bandwidth is increased when the separate communication paths are combined. The broadband devices employ packetized data with Voice over Internet Protocol (VoIP) technologies combined with RF communications technologies.

SYSTEMS AND METHODS FOR AUTHENTICATING A CALLER AT A CALL CENTER

A system for authenticating the identity of a caller (i) receiving one or more online credentials of a caller initiating a phone call, where the one or more online credentials include one or more pieces of biometric information associated with the caller, and the one or more online credentials are received from a mobile device associated with the caller; (ii) requesting one or more additional online credentials associated with the mobile device; (iii) receiving the one or more additional online credentials; (iv) receiving telephone authentication information associated with the phone call; (v) authenticating the caller based, at least in part upon, the one or more online credentials, the one or more additional credentials, and the telephone authentication information; (vi) generating authentication status information based on the authentication of the caller; and (vii) transferring the authentication status information and the phone call to a call recipient.

SPOOFED TELEPHONE CALL IDENTIFIER
20230362300 · 2023-11-09 ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spoofed telephone call identifier are disclosed. In one aspect, a method includes the actions of receiving, by a first computing device, data indicating a placement of a telephone call from a second computing device to a third computing device, wherein the data includes a phone number of the second computing device. The actions further include determining characteristics of the phone number of the second computing device. The actions further include, based on the characteristics of the phone number of the second computing device, determining a likelihood that the phone number of the second computing device is spoofed. The actions further include, based on the likelihood that the phone number of the second computing device is spoofed, determining whether to transmit a notification of the telephone call to the third computing device.

SYSTEMS AND METHODS FOR DETECTING AND/OR PREVENTING VISHING ATTACKS USING USER-GENERATED AUTHENTICATION INFORMATION

A computer-implemented method for authenticating a source of a telephone call to a recipient of the telephone call may include receiving, prior to receiving the telephone call, a request to input first authentication information. The first authentication information may include a passcode or a selection of a security question. The method may include receiving input of the first authentication information and sending, by the user device, the first authentication information to a computing device associated with the source of the telephone call. The method may include receiving the telephone call from the source and receiving input from the recipient of the telephone call to answer the telephone call. The method may include receiving second authentication information from the computing device, where the second authentication information may include the passcode or an answer to the security question. The method may include outputting the second authentication information.

Alert generator for adaptive closed loop communication system
11715459 · 2023-08-01 · ·

An alert generator in a communication system for processing a call includes at least one machine learning model generating call classifiers from outputs of an audio signal processor and a natural language processor configure to operate on the call. Heuristic logic is configured to transform the call classifiers into a plurality of weighted sub-metrics for the call, and aggregate normalized Gaussian logic is configured to transform the weighted sub-metrics into a metric control. A threshold analyzer is configured to generate an alert signal to the communication system based on the metric control meeting a condition.

Communication routing based on user characteristics and behavior

An enhanced routing system determines a service provider best suited to fulfill a user's request to interact and establishes a communication session between the user's client device and a device of the service provider. The enhanced routing system may use user characteristics and behavior to select the service provider. For example, the enhanced routing system receives a request to connect to a customer service system from a user who has recently started a new job and has been accessing a banking application on his mobile phone. The enhanced routing system may determine that a payroll service provider is best suited to fulfill the user's request. For example, the enhanced routing system uses a machine learning model that has been trained on previously fulfilled requests. In this way, the enhanced routing system improves upon systems that continuously prompt the user for information by selecting a service provider without overburdening the user.

CALL CLASSIFICATION THROUGH ANALYSIS OF DTMF EVENTS

Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.

SYSTEM AND METHOD FOR THIRD PARTY MONITORING OF VOICE AND VIDEO CALLS
20220263875 · 2022-08-18 · ·

A system is described herein that facilitates the monitoring of inmate communications. The system provides a remotely-accessible means for a reviewer to monitor a call between an inmate and another person. The system includes a monitoring server and a monitoring station. The monitoring server is configured to receive a call and call information from a communication center and process the call for monitoring, schedule a review of the call; and store the call, the call information, and scheduling data. The monitoring station is configured to receive the call and the call information from the monitoring server based on the scheduling data, and to display the identifying information and facilitate the review of the call.

Systems and methods for authenticating a caller at a call center

A system for authenticating the identity of a caller (i) receiving one or more online credentials of a caller initiating a phone call, where the one or more online credentials include one or more pieces of biometric information associated with the caller, and the one or more online credentials are received from a mobile device associated with the caller; (ii) requesting one or more additional online credentials associated with the mobile device; (iii) receiving the one or more additional online credentials; (iv) receiving telephone authentication information associated with the phone call; (v) authenticating the caller based, at least in part upon, the one or more online credentials, the one or more additional credentials, and the telephone authentication information; (vi) generating authentication status information based on the authentication of the caller; and (vii) transferring the authentication status information and the phone call to a call recipient.

Devices and methods for multipath communications
11418641 · 2022-08-16 · ·

Broadband communications devices and methods operate with at least two separate communication paths between the devices and the network, such as the Internet. The broadband devices and methods receive data concurrently over the communication paths or separately. The bandwidth is increased when the separate communication paths are combined. The broadband devices employ packetized data with Voice over Internet Protocol (VoIP) technologies combined with RF communications technologies.