H04M3/2281

Systems and methods of an intelligent whisper

The present disclosure provides, among other things, methods of managing a whisper, the methods including: establishing a communication session; receiving a whisper request to provide the whisper to a first device associated with the communication session; retrieving environmental information; comparing the environment information to a rule; configuring the whisper based on the comparison; and providing the whisper based on the comparison.

Insight determination from aggregated call content
11637923 · 2023-04-25 · ·

An example operation may include one or more of receiving audio files from public safety answering points (PSAPs), the audio files comprising recordings of telephone calls captured via the PSAPs, converting, via a speech-to-text converter, the audio files into text files that comprises respective transcripts of the respective telephone calls, identifying, via a reporting engine, a recurring topic that is repeatedly observed among the PSAPs from text content within the text files, and outputting, via the reporting engine, a descriptive identifier of the recurring topic via a user interface.

Holistic fraud cocoon

Provided herein is a holistic fraud cocoon that protects a user from incoming or outgoing fraud and phishing communications by capturing, analyzing and either altering, discarding or presenting communications to the user. For example, the holistic fraud cocoon captures all incoming sources (mail, in-person visits, phone, TV, radio, newspapers and internet) and the actions performed by the user, triggered by those sources. Certain actions are held in a queue to be reviewed, validated and acted upon by a third party before the actions are executed.

SYSTEMS AND METHODS FOR MANAGING TELECOMMUNICATIONS

Systems and methods of the present disclosure are directed to a telecommunications management system (TMS) that receives an indication from a first user to participate in a telecommunication. The TMS can identify a characteristic of the first user and compare the characteristic with one or more characteristics of each user of a pool of users. The TMS can select, based on the comparison, a second user of the pool of users that matches the first user. The TMS can initiate, responsive to selecting the matching second user, an anonymous telecommunications channel between the first user and the second user.

A SYSTEM AND METHOD FOR SECURELY DELIVERING INFORMATION
20230067705 · 2023-03-02 ·

A computer-implemented method for correlating payment service submissions and data captured from a call stream is described herein. The method comprises receiving data captured from a call stream by a data capture device; receiving a payment service submission comprising an identifier; determining an association between the identifier and the call stream; and replacing the identifier in the payment service submission with the data captured from the call stream associated with the identifier.

Systems and methods for detecting communication fraud attempts

The present disclosure provides a computer system, method, and computer-readable medium for a computer processor to detect, prevent and counter potentially fraudulent communications by proactively monitoring communications and performing multi-step analysis to detect fraudsters and alert communication recipients. The present disclosure may implement artificial intelligence (AI) algorithms to identify fraudulent communications. The AI model may be trained by real world examples to become more efficient.

Call screening service for communication devices

One example method of operation may include collecting call metric data over a predefined period of time for identified calls, querying the call metric data to identify whether one or more call filtering criteria parameters require changes, determining one or more call filtering criteria parameters require changes based on a deviation from one or more expected call metric data values included in the call metric data, modifying one or more of the call filtering criteria parameters, and updating an active call scam model stored on a call processing server based on the one or more call filtering parameters.

Systems and methods employing graph-derived features for fraud detection

Embodiments described herein provide for performing a risk assessment using graph-derived features of a user interaction. A computer receives interaction information and infers information from the interaction based on information provided to the computer by a communication channel used in transmitting the interaction information. The computer may determine a claimed identity of the user associated with the user interaction. The computer may extract features from the inferred identity and claimed identity. The computer generates a graph representing the structural relationship between the communication channels and claimed identities associated with the inferred identity and claimed identity. The computer may extract additional features from the inferred identity and claimed identity using the graph. The computer may apply the features to a machine learning model to generate a risk score indicating the probability of a fraudulent interaction associated with the user interaction.

Call screening service for detecting fraudulent inbound/outbound communications with subscriber devices

An example method of operation may include one or more of identifying an inbound call intended for a mobile device subscribed to a protected carrier network, determining the inbound call is assigned an origination telephone number that is subscribed to the protected carrier network, determining whether an inbound call origination source location indicates the protected carrier network or an out-of-network carrier network based on one or more call parameters received with the inbound call, and determining whether to transmit an indication to the mobile device that the inbound call has an elevated likelihood of being a scam call based on the inbound call origination source location.

Apparatus, methods, and articles of manufacture for filtering calls and reducing spoofing and spamming
11665277 · 2023-05-30 ·

Unsolicited electronic communications such as robocalls and person-initiated solicitation calls are reduced by imposing tolls for completion of the connections to the called parties, and refunding the tolls to the entities indicated by the electronic communications as the calling parties. In this way, a dishonest originator of a spoofed call bears the cost of the toll, and the toll is not refunded to the dishonest originator. On the other hand, the toll collected from an honest originator of a non-spoofed call is refunded to the honest originator, making the toll transparent to the honest originator and avoiding annoyance of the honest caller caused by the toll. Unsolicited calls may be subjected to filtering, particularly filtering based on the indications of the origins of the calls.