Patent classifications
H04M3/2281
Method, system and device for permitting unfamiliar call
A method for permitting unfamiliar call, applied to a communication device having a memory and a call-blocking app to provide an unfamiliar call, includes the steps of: configuring an area in the memory of the communication device as a storage unit; recording at least one password into a password-correlated table in the storage unit, each of the at least one password being related to a specific user of the communication device; as an unfamiliar call is received, asking a caller of the unfamiliar call to provide an answer for a trivial question immediately provided by the communication device; determining whether or not the answer matches any of the at least one password in the password-correlated table; forwarding the unfamiliar call to the user corresponding to the matched password listed in the password-correlated table if positive; and, blocking the unfamiliar call if negative.
Customer self-help control system for contact centers
A computer system is described that is configured to enable customers of an organization to self-monitor account activity and modify account access settings via a contact center of the organization. The contact center control system is configured to provide an interactive call history associated with the customer's accounts with the organization. Using the call history, the customer may perform self-monitoring of calls into the contact center that access the customer's accounts, and notify the organization if any of the calls appear suspicious. The contact center control system is configured provide a user interface through which the customer may modify account access settings including changing which types of authentication methods are enabled to access the customer's accounts, and blocking account access by callers from certain phone numbers. The contact center control system may allow the customer to turn off all access to the customer's accounts via the contact center.
Relaying device and method of recording voice communication
[Problem] Provided is a relaying device that can track and record a communicated voice of a specific communication terminal using a mixing function of the relaying device. [Solution] When a communication terminal has made a call, a communication session in which the communication terminal that has made a call and a communication terminal that has been called are participating terminals is established. When a voice signal is transmitted from one participating terminal of the established communication session, this voice signal is transmitted to the other participating terminal(s) of the same communication session along with session information. A virtual device is associated with a communication terminal, and is registered in a communication session in which the communication terminal participates as a participating terminal together with the communication terminal. A communication monitoring unit records a voice signal transmitted to the virtual device from the communication session.
SUSPICIOUS CALL HANDLING SYSTEM, SUSPICIOUS CALL HANDLING METHOD, OUTGOING/INCOMING CALL INFORMATION COLLECTION SERVER AND PROGRAM
A suspicious call handling system that detects and handles a suspicious call within a communication network includes an outgoing and incoming call information collecting server 10 and session control servers 20A to 20C. The outgoing and incoming call information collecting server 10 includes a storage unit 15 that stores a suspicious call condition, a collecting unit 11 that collects outgoing and incoming call information from each of the session control servers 20A to 20C within a communication network, and a searching unit 12 that searches for a phone call that matches the suspicious call condition from the outgoing and incoming call information and gives a notification of the phone call to the session control servers 20A to 20C accommodating a user to which the phone call is connected. The session control servers 20A to 20C include an action unit 24 that executes an action, which has been set in advance, in a case where it is detected that a call has been transmitted to a user who has received the notification from the outgoing and incoming call information collecting server 10.
OPTIMIZED ROUTING FOR LAW ENFORCEMENT SUPPORT
An improved lawful intercept (LI) infrastructure is described. In response to a valid LI provisioning request, a subscriber management component statically allocates a user equipment (UE) subject to the LI provisioning request to an edge location comprising a high-speed gateway and a Mediation and Delivery Function (MDF), which coordinates the delivery of intercepted communications. The subscriber management component maintains this allocation for the life of the LI provisioning request and reverses the UE to a dynamic gateway allocation scheme when the LI provisioning request ends. As a result, only a subset of edge locations must be equipped with MDFs, and the handover is transparent to the UE.
Operation related to user equipment using secret identifier
A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.
Systems and methods for detecting fraudulent calls using virtual assistants
A system may include a processor that may execute computer-executable instructions that cause the processor to receive caller information regarding an incoming communication from a caller and receive a request from a user to route the incoming communication to a virtual assistant application. The virtual assistant application is configured to interact with the caller and determine whether the caller is associated a fraudulent caller activity stored on databases accessible by the processor. The processor may then receive an indication from the virtual assistant application that the caller is associated with the fraudulent caller activity and forward the incoming communication to another party in response to receiving the indication.
System and method for optimizing agent time
A method and system automatically optimizes agent time. The method performed by a transferring device includes monitoring a communication session between an agent device used by an agent of the contact center and a user device used by a user. The communication session including first communications generated by the agent and second communications generated by the user. The method includes determining when the communication session is to be transferred from the agent device to an automated system of the contact center. The automated system is configured to perform the communication session by generating third communications for the second communications. The method includes generating a control signal upon determining the communication session is to be transferred that is configured to automatically transfer the communications session from the agent device to the automated system.
METHOD, SYSTEM AND DEVICE FOR PERMITTING UNFAMILIAR CALL
A method for permitting unfamiliar call, applied to a communication device having a memory and a call-blocking app to provide an unfamiliar call, includes the steps of: configuring an area in the memory of the communication device as a storage unit; recording at least one password into a password-correlated table in the storage unit, each of the at least one password being related to a specific user of the communication device; as an unfamiliar call is received, asking a caller of the unfamiliar call to provide an answer for a trivial question immediately provided by the communication device; determining whether or not the answer matches any of the at least one password in the password-correlated table; forwarding the unfamiliar call to the user corresponding to the matched password listed in the password-correlated table if positive; and, blocking the unfamiliar call if negative.
PARALLEL PATH CALLER VERIFICATION CONTROLLER
The present disclosure describes techniques for determining whether a communication request is associated with a legitimate communication or spoof communication, prior to establishing the connection. A Parallel Path Caller Verification (PPCV) controller is described that is configured to intercept a communication request from an originating device and generate a proof-of-identity (PoI) message for delivery to the originating device. Upon receipt of a reply message that is responsive to the PoI message, the PPCV controller may determine whether the communication is a legitimate communication. If the communication is determined as legitimate, the PPCV controller may establish a communication based on the communication request.