Patent classifications
H04M3/2218
TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
SYSTEMS AND METHODS FOR TAGGING FRAUDULENT PHONE NUMBERS
A method including: receiving a user report dataset indicating fraudulent activity corresponding to a phone number; responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number; and tagging the record to identify the phone number as being associated with fraudulent activity.
Method and apparatus for summarization of dialogs
A method for summarizing dialogs may include obtaining an agent text stream and a customer text stream, segmenting the agent text stream and customer text stream into sentences, and labeling sentences associated with the segmented agent text stream and the segmented customer text stream. The method may further include extracting sentences from the agent text stream and the customer text stream based upon frequencies of appearance of words and terms of interest; generating an agent summary paragraph based on the extracted sentences from the agent text stream, and generating a customer summary paragraph based on the extracted sentences from the customer text stream. The method may identify keywords associated with each of the agent summary paragraph and the customer summary paragraph.
Insight determination from aggregated call content
An example operation may include one or more of receiving audio files from public safety answering points (PSAPs), the audio files comprising recordings of telephone calls captured via the PSAPs, converting, via a speech-to-text converter, the audio files into text files that comprises respective transcripts of the respective telephone calls, identifying, via a reporting engine, a recurring topic that is repeatedly observed among the PSAPs from text content within the text files, and outputting, via the reporting engine, a descriptive identifier of the recurring topic via a user interface.
Telephony web event system and method
An embodiment of the system for publishing events of a telephony application to a client includes a call router that generates events from the telephony application and an event router that manages the publication of events generated by the call router and that manages the subscription to events by clients. The system can be used with a telephony application that interfaces with a telephony device and an application server.
SWITCH CONTROLLER FOR SEPARATING MULTIPLE PORTIONS OF CALL
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for collecting call data, feeding call data to applications, and providing advanced call features.
Caller verification via carrier metadata
Embodiments described herein provide for passive caller verification and/or passive fraud risk assessments for calls to customer call centers. Systems and methods may be used in real time as a call is coming into a call center. An analytics server of an analytics service looks at the purported Caller ID of the call, as well as the unaltered carrier metadata, which the analytics server then uses to generate or retrieve one or more probability scores using one or more lookup tables and/or a machine-learning model. A probability score indicates the likelihood that information derived using the Caller ID information has occurred or should occur given the carrier metadata received with the inbound call. The one or more probability scores be used to generate a risk score for the current call that indicates the probability of the call being valid (e.g., originated from a verified caller or calling device, non-fraudulent).
Caller identification information analyzer
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a caller identifier are disclosed. In one aspect, a method includes the actions of receiving, by a server and from a user of a computing device, data indicating a request to update a name that corresponds to a phone number in a caller identification information storage. The actions further include accessing, by the server, a calling history that indicates previous telephone calls of the phone number. The actions further include accessing, by the server, identification data of the user. The actions further include based on the calling history that indicates previous telephone calls of the phone number and the identification data of the user, determining whether to update the caller identification information storage to indicate that the name corresponds to the phone number.
METHOD FOR EVALUATING NETWORK SERVICE, ELECTRONIC DEVICE AND STORAGE MEDIUM
Embodiments of the present application relate to the field of communications, and provide a method for evaluating a network service, an electronic device and a storage medium. The method for evaluating a network service comprises: performing statistical analysis on each key quality indicator (KQI) according to call detail record (CDR) data in a first cycle, to obtain a first threshold of each KQI; obtaining a second threshold of each KQI according to the first threshold of each KQI in a second cycle, wherein, the second cycle comprises at least one first cycle; and obtaining a perception score of the network service according to the second threshold of each KQI and CDR data in a third cycle. The method is applied to the process of evaluating the network service.
Analysis of data metrics in IPBX networks
Apparatuses and methods concerning routing of calls in an IPBX server are disclosed. As an example, one apparatus includes a first processing circuit communicatively coupled to an IPBX server. The IPBX server is configured to generate call event messages for the VoIP calls routed by the IPBX server. The first processing circuit is configured to generate call summary metrics from the call event messages. The call summary metrics and/or related data indicate respective sets of call data for participants of the calls routed by the IPBX server. A second processing circuit is configured to identify organizations associated with the participants of the calls. The second processing circuit aggregates the call related data to assess needs of the organization.