Patent classifications
H04M3/382
Method and apparatus for selectively releasing personal contact information stored in an electronic or telephonic database
A method and apparatus for screening access to personal contact information in an electronic or telephonic database is provided. The embodiments include a querying party generating a query signal to obtain personal contact information. The query signal is received by a bridge website server and the bridge website server sends a query notification signal to a listing party so as to inform him or her of the existence of a query for personal contact information and the identity of the querying party. The listing party generates a consent/no-consent signal that is sent to the bridge website server, wherein the consent/no-consent signal indicates the personal contact information that is to be revealed to the querying party. A personal contact information signal is then generated by the server, wherein the personal contact information signal provides the querying party the revealed personal contact information of the listing party.
END-TO-END MANAGEMENT OF AUTHENTICATED COMMUNICATIONS
Disclosed herein are systems and methods for providing mobile call authentication. For instance, a token indicative of a call request can be received from a calling party. The token can include a called party number and a time of the request. A subscriber database can be accessed to determine identifying information associated with the calling party based at least in part on the token. The token can be authenticated based at least in part on the identifying information and using one or more predefined authentication protocols. The token can be stored in a call session registry storing data indicative of a plurality of active telephone call events. A verification request for the call request can be received from the called party. The call request can be verified based at least in part on the token. The called party can be notified that the call request has been verified.
END-TO-END MANAGEMENT OF AUTHENTICATED COMMUNICATIONS
Disclosed herein are systems and methods for providing mobile call authentication. For instance, a token indicative of a call request can be received from a calling party. The token can include a called party number and a time of the request. A subscriber database can be accessed to determine identifying information associated with the calling party based at least in part on the token. The token can be authenticated based at least in part on the identifying information and using one or more predefined authentication protocols. The token can be stored in a call session registry storing data indicative of a plurality of active telephone call events. A verification request for the call request can be received from the called party. The call request can be verified based at least in part on the token. The called party can be notified that the call request has been verified.
System and method for processing high frequency callers
A call processing system and method for processing calls from high volume callers. A frequency of call activity is monitored for callers to determine reception of a call from a high frequency caller. When a call is received from such a caller, provided is information predicted to be requested from the caller prior to the caller being voice connected to a company representative. The retrieved information is then provided to a company representative prior to the caller being voice connected with a company representative as to expedite the call. Additionally, a customized message for the high frequency caller may be generated prior to the caller being voice connected with a company representative whereby the customized message contains information predicted to be responsive to a predicted inquiry from the determined high frequency caller to mitigate the need to connect the caller to a company representative.
Methods and systems for transferring call context
Methods and systems described in this disclosure receive a call from a device associated with a caller and request an indication of a context of the call. The system can send a request for authentication credentials in a push notification to the device. The push notification can be linked to an authentication tab or page in an application. After authentication of the caller, the system can direct the application to cause a tab or page associated with the subject matter of the call to be displayed on the qualified device.
Systems and methods for authenticating a caller
Methods and systems described in this disclosure receive a call from a caller, generate a first session through a first channel associated with the caller when the call is received and then send a request for authentication credentials to a device associated with the caller. In some embodiments, sending the request for authentication credentials generates a second session through a second channel associated with the caller. The caller can be authenticated to the first session using communication received during the second session through the second channel.
Systems and methods for authenticating a caller
Methods and systems described in this disclosure receive a call from a caller, generate a first session through a first channel associated with the caller when the call is received and then send a request for authentication credentials to a device associated with the caller. In some embodiments, sending the request for authentication credentials generates a second session through a second channel associated with the caller. The caller can be authenticated to the first session using communication received during the second session through the second channel.
METHOD FOR PREVENTING SIP DEVICE FROM BEING ATTACKED, CALLING DEVICE, AND CALLED DEVICE
The present disclosure discloses a method for preventing a SIP device from being attacked, a calling device, and a called device, belonging to the field of network security. The present disclosure provides a method including: generating, by a calling device and a called device, the same public password, and transmitting, by the calling device, a connection request to the called device; performing, by the called device, header field verification on the connection request to verify whether a specified header field is carried in the connection request; performing, by the called device, device verification on the connection request; and performing, by the called device, identity verification on the connection request, and establishing, by the called device, a connection to the calling device. In this case, spoofing data is filtered out and the SIP device is not easily attacked, so that a user is free of disturbance.
Door-Knocking For Teleconferencing
A method for teleconferencing between a monitoring device and a user device includes establishing an audio channel connection between the user device and the monitoring device of a remote user; displaying an entry code on a display of the monitoring device; obtaining from a user of the monitoring device a verbal confirmation of the entry code; and, in response to receiving the entry code from the remote user, enabling a camera of the monitoring device. In response to the verbal confirmation, the entry code is sent to the remote user. Enabling the camera of the monitoring device establishes an audio-visual connection between the user device and the monitoring device.
Methods and systems for transferring call context
Methods and systems described in this disclosure receive a call from a device associated with a caller and request an indication of a context of the call. The system can send a request for authentication credentials in a push notification to the device. The push notification can be linked to an authentication tab or page in an application. After authentication of the caller, the system can direct the application to cause a tab or page associated with the subject matter of the call to be displayed on the qualified device.