H04M3/2218

SPECIAL FRAUD COUNTERMEASURE APPARATUS, SPECIAL FRAUD COUNTERMEASURE METHOD, AND SPECIAL FRAUD COUNTERMEASURE PROGRAM
20230095897 · 2023-03-30 ·

An anti-communications fraud apparatus 1 includes: an analysis unit 13 that analyzes a voiceprint of a communication voice of a calling party; a determination unit 14 that acquires, from a database 17 in which the voiceprint and a degree of fraud risk are stored in association with each other, the degree of fraud risk corresponding to the voiceprint of the calling party, and determines whether the degree of fraud risk exceeds a predetermined threshold; and a notification unit 15 that notifies that the calling party is dangerous when the degree of fraud risk exceeds the threshold.

SYSTEMS AND METHODS FOR DETERMINING THE SHAREABILITY OF VALUES OF NODE PROFILES
20230031801 · 2023-02-02 · ·

The present disclosure relates to determining the shareability of values of node profiles. Record objects and electronic activities of a system of record corresponding to a data source provider may be accessed. Each record object may correspond to a record object type and have one or more object field-value pairs. Node profiles may be maintained. Values of fields corresponding to a predetermined type of field including fewer than a predetermined threshold number of data source providers may be identified. A restriction tag used to restrict populating other node profiles may be generated. Provision of the value with a second data source provider may be restricted.

MULTI-MODAL APPROACH TO A SECURE AND CLOSED SOLUTION MONITORING AND CONTROL OF USER DATA
20230032499 · 2023-02-02 ·

A multi-modal portal system provides an authorization prior to establishing a visual interface connection between a support user or caller and a client user or receiving party. Once the caller is authorized, the caller is permitted to drop-in such that a visual interface connection is established with the receiving party. The authorization can be based on a profile configuration that indicates whether the caller has the credentials required for the visual interface. The authorization can require that a notification be sent to a trusted user or primary contact or the caller can be associated with a profile configuration that allows for a pre-authorization without requiring the notification. By providing such an authorization, a secure and private visual interface with the client user can be accomplished without requiring an express action or consent by the client user.

Big Data 911TM - Expedited EMT response after Vehicle Accidents or Other Emergencies
20220346728 · 2022-11-03 ·

Device, system and method, for simplicity called Big Data 911™, which continuously sends GPS and other data to the cloud for storage and analysis, and Big Data automatically detects a vehicle crash and/or other emergency and immediately automatically calls 911 with crash information comprising the location, severity of the crash, etc. Victims, with their relevant medical records, are identified using onboard cameras and sensors or with medical information voluntarily linked via a phone app to the cloud. This medical data and GPS location ensures the optimum medical response during the crucial Golden Hour after the accident and that EMTs (Emergency Medical Technicians), police and other responders provide the optical medical treatment both en route to the hospital and once there. This includes AI or statistical information to expedite the ideal medical solution of the victim. This system could be used nationally or internationally as a person travels worldwide.

System and method for dynamic redundant call recording
11616878 · 2023-03-28 · ·

A system or method for dynamic redundant call recording may include a plurality of recording devices, each recording device having a plurality of recording resources, and a resource allocator. The resource allocator may receive a request from a call receiving node for commencement of a recording session. It may then attempt to connect to a first one of the plurality of recording devices and if successful, establish a recording session between the call receiving node and the recording device, or if not successful, attempting to connect the recording session controller to a second one of the multiple recording devices. Two resource allocators may operate in parallel to establish dual recording using resources at two different recording devices. Call content may be recorded separately from call metadata and may be integrated with the metadata using a unique call ID.

System and method for handling unwanted telephone calls through a branching node

Disclosed herein are systems and methods for handling unwanted telephone calls through a branching node. In one aspect, an exemplary method comprises, intercepting a call request from a terminal device of a calling party to a terminal device of a called party, establishing a connection through the branching node via two different communication channels, a first communication channel being with the terminal device of the called party and a second communication channel being with a call recorder; duplicating media data between the terminal devices such that one data stream is directed towards a receiving device of the media data and a second data stream is directed towards the call recorder; recording and sending the recorded call to an automatic speech recognizer for converting the media file to digital information suitable for analysis; and when the call is unwanted, handling the call based on classification of the call.

Identifying and processing, for priority, calls in data communications server
11611654 · 2023-03-21 · ·

Apparatuses and methods concerning routing and processing of calls in a server are disclosed, and involving a processing circuit communicatively coupled to a server that routes calls (e.g., data communications) for a plurality of end-users and generates call event messages for the routed calls. The processing circuit generates call summary data and evaluates the call summary data to identify a set of incoming calls to the server that were missed and have not been returned by the end-users. Certain of the calls are checked relative to a secondary data source and respective priorities for the set of incoming calls are ascribed for further processing, and some having a higher priority.

SYSTEMS AND METHODS FOR GENERATING A FILTERED DATA SET
20220345543 · 2022-10-27 · ·

The present disclosure relates to generating a filtered data set. Data from a plurality of systems of record of a plurality of data source providers may be accessed. A master data set generated using the data accessed from the plurality of systems of record may be maintained. Restriction policies including one or more rules for restricting sharing of data may be maintained. A filtered data set may be generated for a data source provider responsive to an application of restriction policies of other data source providers to the master data set. The filtered data set may be provisioned.

SYSTEMS AND METHODS FOR UPDATING RECORD OBJECTS OF A SYSTEM OF RECORD

The present disclosure relates to generating performance profiles of member nodes. A plurality of electronic activities can be accessed. A subset of electronic activities from the plurality of electronic activities can be identified. The subset of electronic activities can be parsed to identify participants of the electronic activities. A second node profile can be accessed for each participant. Participant types can be identified from each second node profiles. A distribution of the subset of electronic activities can be determined. A performance profile can be generated.

Call recording authentication

Audio qualities of a call and of a call recording are identified and compared to authenticate the call recording as a true representation of the call. A call is enabled between two or more participants, and the call is recorded to generate a call recording. The call recording is authenticated based on a match between information determined during the call and information determined during the call recording. In some cases, the call recording is authenticated based on a match between audio scores for the call recording and audio scores for the call. In some cases, the call recording is authenticated based on a match between audio watermarks included within the call recording and audio watermarks included within the call. An indication of the authentication is then output, such as for further processing or display.