H04L65/1076

CONTEXT-AWARE SOUND IDENTIFICATION FOR MONITORING A CLIENT USER

A monitoring system can provide a sound profile to a network device. The monitoring system can identify a type of location associated with the network device that is located in a network. The monitoring system can determine a sound profile based on the type of location. The monitoring system can provide the sound profile to the network device. The sound profile relates to one or more sounds associated with the location so that the network device need not store and/or process all sounds but rather only those sounds that would typically be received or made at the location. The sound profile can be based or updated based on user sensor data received from the network device. In this way, the network device, the monitoring system, any other network resource, or any combination thereof uses context-aware sound identification to monitor a client user.

Managing spoofed calls to mobile devices

Methods and apparatuses for managing spoofed calls to a mobile device are described, in which the mobile device receives a call transmitted over a cellular or mobile network. The call may include a set of information associated with the network, such as a geological location of a device that generated the call, a hardware device identifier corresponding to the device, an internet protocol (IP) address associated with the device, or a combination thereof. The mobile device may determine whether the call is spoofed or genuine based on the set of information. Subsequently, the mobile device may assist a user of the mobile device to manage the call, such as blocking the call from reaching the user, informing the user that the call is spoofed, facilitating the user to report the call as spoofed to an authority and/or a service provider of the network.

USER INTERFACE FOR FRAUD ALERT MANAGEMENT
20230224403 · 2023-07-13 ·

A system for a graphical user interface for fraud detection for a call center system includes a processor and a visual display in communication with the processor. The processor causes the visual display to present an identifier corresponding to a communication received; a graphical representation of a threat risk associated with the identifier; a numeric score associated with the threat risk, wherein the numeric score is a weighted score based on a plurality of predetermined factors updated substantially continuously.

Communication system and method of using the same

A communication system can include terminal devices that communicate with a social network or a computer server device for scheduling use of conference resources and/or for using conference appliances that may be located in a conference room being used for a video conference or teleconference. The communication system can be configured to permit a user to use such resources without having to have a user's device be physically and directly connected by wiring to a conference appliance or communication device. The communication system can also be configured to validate participants to help ensure that only authorized personnel are properly attending a scheduled conference based on audio and/or video input received for the different participants and can also be configured to allow screen sharing to be performed during a video conference or teleconference.

Communication system and method of using the same

A communication system can include terminal devices that communicate with a social network or a computer server device for scheduling use of conference resources and/or for using conference appliances that may be located in a conference room being used for a video conference or teleconference. The communication system can be configured to permit a user to use such resources without having to have a user's device be physically and directly connected by wiring to a conference appliance or communication device. The communication system can also be configured to validate participants to help ensure that only authorized personnel are properly attending a scheduled conference based on audio and/or video input received for the different participants and can also be configured to allow screen sharing to be performed during a video conference or teleconference.

Relaying device and method of recording voice communication
11546462 · 2023-01-03 · ·

[Problem] Provided is a relaying device that can track and record a communicated voice of a specific communication terminal using a mixing function of the relaying device. [Solution] When a communication terminal has made a call, a communication session in which the communication terminal that has made a call and a communication terminal that has been called are participating terminals is established. When a voice signal is transmitted from one participating terminal of the established communication session, this voice signal is transmitted to the other participating terminal(s) of the same communication session along with session information. A virtual device is associated with a communication terminal, and is registered in a communication session in which the communication terminal participates as a participating terminal together with the communication terminal. A communication monitoring unit records a voice signal transmitted to the virtual device from the communication session.

Peer-supervised video conference based account recovery
11546390 · 2023-01-03 · ·

Disclosed herein are systems and methods for recovering online services user accounts of users based on verification of the users in video conferences, comprising receiving a request for recovering an account of a user of an online service, establishing one or more video conference sessions between a client device used by the user, client devices used by one or more trustees associated with the user and a bot agent initiated for the video conference session(s), operating the bot agent during the one or more video conference sessions to guide the one or more trustees to verify an identity of the user, and initiating an account recovery process for the account of the user in response to receiving a positive verification verdict from the one or more trustees.

Peer-supervised video conference based account recovery
11546390 · 2023-01-03 · ·

Disclosed herein are systems and methods for recovering online services user accounts of users based on verification of the users in video conferences, comprising receiving a request for recovering an account of a user of an online service, establishing one or more video conference sessions between a client device used by the user, client devices used by one or more trustees associated with the user and a bot agent initiated for the video conference session(s), operating the bot agent during the one or more video conference sessions to guide the one or more trustees to verify an identity of the user, and initiating an account recovery process for the account of the user in response to receiving a positive verification verdict from the one or more trustees.

User interface for fraud alert management
11538128 · 2022-12-27 · ·

A user interface for a fraud detection application includes a visual display; a plurality of panes displayed on the visual display, each pane including an identifier corresponding to a communication received; a graphical representation of a threat risk associated with the identifier; a numeric score associated with the threat risk, wherein the numeric score is a weighted score based on a plurality of predetermined factors updated substantially continuously. The graphical representation may include a status bar indicative of a threat risk associated with the identifier, the threat risk provided by the fraud detection algorithm and based on a weighted score. Each pane may include additional information about the identifier, such as a number of accounts accessed or attempted to be accessed associated with the identifier; a number of days the identifier has been active; a type of channel associated with the identifier; and a number of communications initiated by the identifier over a predetermined period of time. A user may access further information by activating a portion of the visual display to access additional information related to the threat risk. The communication may be a phone call, a chat, a web interaction or the like.

Communication and action approval system and method
11528609 · 2022-12-13 ·

A computer-based method for real-time communication authorization includes receiving, from a first communication device, a communication request, verifying, with a verification engine, a pre-approval status of the communication request, storing the communication request in an approval queue if the communication authorization the pre-approval status is set to false, issuing an alert to the authorization device, and receiving one or more authorization parameters from an authorization device.