H04M2203/60

System and method for establishing communications over a plurality of communications platforms

A system and method for establishing communications enables an outbound communication to be made simultaneously across a plurality of different communications platforms. The system is configured to perform the following: receive from a user, a first request to establish an electronic communication with a contact; identify via the details of contacts stored in a storage device, a contact identifier of the contact for each of a plurality of the different electronic communications platforms; receive at a processor from the user, selected devices of the user with which to establish the electronic communication with the contact; transmit via one of the selected devices of the user, a second request to establish an electronic communication comprising real time audio data with the contact simultaneously via each of the plurality of the different electronic communications platforms using each respective contact identifier; receive via the communications device, an acceptance of the second request to establish an electronic communication with the contact via one of the plurality of different electronic communications platforms; and establish an electronic communication comprising real time audio data between the contact and the one of the selected devices of the user via the one of the plurality of different electronic communications platforms.

Devices and methods for multipath communications
10868908 · 2020-12-15 ·

The broadband network-edge router is a broadband communications device that receives broadband packetized data and then wirelessly communicates to and from a router located in a typical residence or small business or other device. The broadband network-edge router can be for example, a Wi-Fi device or a cellular device or tower, and routes data to the data-requesting devices during multipath or multilink connections.

Method and system for a scalable computer-telephony integration system

When an incoming call is received from a customer, various aspects may include receiving an indication of availability from several call agents within the computer-telephony integration system and presenting the indications of availability and identification information for each of the call agents on a display. A user control for searching the call agents may also be presented on the display for use by a first call agent to view an indication of availability for a particular call agent. The customer call may then be transferred from the first call agent to the particular call agent in response to the indication of availability identifying the particular call agent as available.

System and method for replacing hold-time with a call back in a contact center environment
10819853 · 2020-10-27 · ·

System and method for handling a transaction between a waiting party and queuing party include an independent communication system (ICS) managing calls between the waiting party and calling party and handles sensitive data as well as call-attached data. The ICS manages the transaction in different stages and with different levels of sensitivity. Either party is allowed to modify the call or call preferences during the transaction. The ICS works independently from the queuing party calling system.

SYSTEM AND METHOD FOR THIRD PARTY MONITORING OF VOICE AND VIDEO CALLS
20200314157 · 2020-10-01 · ·

A system is described herein that facilitates the monitoring of inmate communications. The system provides a remotely-accessible means for a reviewer to monitor a call between an inmate and another person. The system includes a monitoring server and a monitoring station. The monitoring server is configured to receive a call and call information from a communication center and process the call for monitoring, schedule a review of the call; and store the call, the call information, and scheduling data. The monitoring station is configured to receive the call and the call information from the monitoring server based on the scheduling data, and to display the identifying information and facilitate the review of the call.

Computer-implemented system and method for storing and retrieving sensitive information
10754978 · 2020-08-25 · ·

A computer-implemented system and method for storing and retrieving sensitive information is provided. Segments of sensitive data each encrypted via a single use encryption key and associated with a reference code are maintained. The reference code is received for at least one of the segments of encrypted sensitive data and the encryption key is recreated based on the received reference code. The encrypted sensitive data segment is decrypted using the recreated encryption key and the decrypted sensitive data segment populates a field in a display.

Method and system for a scalable computer-telephony integration system

Methods, systems, apparatus, and non-transitory computer readable media are described for a scalable computer-telephony integration system. Various aspects may include storing sets of call agent login information for several call agents within the computer-telephony integration system and across several independent computing systems in a contact center login database. Additionally, various aspects may include generating several contact center service categories and sets of contact information for each contact center service category, which may be stored in a contact center directory database. When an incoming call is received from a customer, various aspects may include obtaining customer call information from the customer and generating a customer call key, which may be stored as a reference to the customer call information in a contact center customer call information database. The call key may be used to reduce an amount of data electronically transferred between call agents during telephone call transfers.

Systems and methods for authenticating a caller at a call center

A system for authenticating the identity of a caller (i) receives a phone call from a caller, where the phone call is initiated through an application on a remote computer device associated with the caller, and where the phone call includes one or more phone authentication credentials; (ii) determines a preliminary identity of the caller based upon the one or more phone authentication credentials; (iii) receives online authentication credentials from the application on the remote computer device; (iv) determines a confirmed identity of the caller based, at least in part, upon the one or more online credentials and the preliminary identity of the caller; and (v) displays the confirmed identity of the caller to a user answering the phone call. As a result, the user and/or the system do not need to perform additional authentication before providing service to the caller.

System and method for third party monitoring of voice and video calls
10715565 · 2020-07-14 · ·

A system is described herein that facilitates the monitoring of inmate communications. The system provides a remotely-accessible means for a reviewer to monitor a call between an inmate and another person. The system includes a monitoring server and a monitoring station. The monitoring server is configured to receive a call and call information from a communication center and process the call for monitoring, schedule a review of the call; and store the call, the call information, and scheduling data. The monitoring station is configured to receive the call and the call information from the monitoring server based on the scheduling data, and to display the identifying information and facilitate the review of the call.

Mitigating attacks on emergency telephone services

The disclosed system provides a Real-time Telephony (or Call) Monitor, Analyzer and Decision SIP Server (RTMADS) for mitigating attacks on emergency telephone systems. The RTMADS works in conjunction with an ingress node to fork incoming calls to an IMS network and the RTMADS. Within the RTMADS, forked telephone calls undergo data collection and mining, and parametric analysis. A decision matrix in the RTMADS uses the results of the data collection, mining, and parametric analysis, and other information, to make a decision with respect to incoming calls. For example, the RTMADS may decide to perform call setup on an incoming call using a dedicated or backup Public Safety Answering Point (PSAP), alert an Operations and Management (OAM) team regarding the incoming call, or accept and then terminate the incoming call.