Patent classifications
H04M3/42008
CALL ALERT DEVICE, CALL ALERT SYSTEM, CALL ALERT METHOD, AND CALL ALERT PROGRAM
When an SIP server receives a call signal addressed to a callee side terminal, the SIP server transmits a warning signal to the callee side terminal before transmitting the call signal to the callee side terminal when an international call identifier indicating that the call signal passes through a foreign country is set in the call signal. In addition, when the SIP server receives the call signal addressed to the callee side terminal, the SIP server includes a warning that the caller number is disguised in a warning signal when an international call identifier indicating that the call signal passes through a foreign country is set in the call signal and the caller number of the call signal is a number from a country in which the callee side terminal is located.
SPECIALLY PROGRAMMED COMPUTING DEVICES BEING CONTINUOUSLY CONFIGURED TO ALLOW UNFAMILIAR INDIVIDUALS TO HAVE AN INSTANTANEOUS MEETING
In some embodiments, the present invention provides for a computer system which includes at least the following components: a plurality of computing devices associated with a plurality of users associated with a plurality of users; where each computing device of the plurality of computing devices is configured to: electronically receive software which, when being executed, cause such computing device to display a plurality of instances of a specifically programmed graphical user interface (GUI); where each instance of the GUI is configured to display a real-time updatable meeting information representative of a direct electronic proximity-based communication between at least two computing devices associated with at least two users who desire to meet at a particular location to engage in a transaction of at least one good, at least one service, or both, whose marketable value lasts for a period of 30 seconds to 60 minutes.
SYSTEMS AND METHODS FOR MANAGING TELECOMMUNICATIONS
Systems and methods of the present disclosure are directed to a telecommunications management system (TMS) that receives an indication from a first user to participate in a telecommunication. The TMS can identify a characteristic of the first user and compare the characteristic with one or more characteristics of each user of a pool of users. The TMS can select, based on the comparison, a second user of the pool of users that matches the first user. The TMS can initiate, responsive to selecting the matching second user, an anonymous telecommunications channel between the first user and the second user.
Authentication using DTMF tones
A method of obtaining and automatically providing secure authentication information includes registering a client device over a data line, storing information and a changeable value for authentication in subsequent telephone-only transactions. In the subsequent transactions, a telephone call placed from the client device to an interactive voice response server is intercepted and modified to include dialing of a delay and at least a passcode, the passcode being based on the unique information and the changeable value, where the changeable value is updated for every call session. The interactive voice response server forwards the passcode and a client device identifier to an authentication function, which compares the received passcode to plural passcodes generated based on information and iterations of a value stored in correspondence with the client device identifier. Authentication is confirmed when a generated passcode matches the passcode from the client device.
Email alert for unauthorized email
The disclosed techniques enable selective forwarding and blocking of messages directed to an alias email address based on a whitelist, as well as email alerts triggered by emails from unauthorized senders. More generally, the disclosed techniques enable an enterprise system to store contact emails for users (i.e., alias email addresses) while avoiding storing and managing personal email addresses for the user. For example, the enterprise system may forward personal email addresses to an aliasing server configured to generate alias email addresses based on the personal email addresses. The aliasing server may operate as a “middle man” that receives emails directed to the alias email addresses and that forwards the emails to the personal email addresses (when appropriate). The enterprise system may store and maintain the alias email addresses in lieu of the personal email addresses.
Handling calls on a shared speech-enabled device
In some implementations, an utterance that requests a voice call is received, the utterance is classified as spoken by a particular known user, the particular known user is determined to be associated with a personal voice number, and in response to determining that the particular known user is associated with a personal voice number, the voice call is initiated with the personal voice number.
METHODS, SYSTEMS, AND DEVICES FOR MASKING CONTENT TO OBFUSCATE AN IDENTITY OF A USER OF A MOBILE DEVICE
Aspects of the subject disclosure may include, for example, identifying a first user associated with a first mobile device, and determining a first user type associated with the first user. Further embodiments can include identifying a first identity associated with the first user based on the first user type and identifying a second identity associated with the first user based on the first user type. Additional embodiments can include providing first alternate content to the first mobile device to mask the first identity and providing second alternate content to the first mobile device associated with the second identity. Other embodiments are disclosed.
Real-time contact center speech analytics, with critical call alerts, deployed across multiple security zones
The invention relates to systems/methods that enable real-time monitoring/processing of contact center communications to provide timely, actionable analytic insights and real-time critical call alerts, while simultaneously providing best-in-class protection of sensitive customer information.
SPECIALLY PROGRAMMED COMPUTING DEVICES BEING CONTINUOUSLY CONFIGURED TO ALLOW UNFAMILIAR INDIVIDUALS TO HAVE AN IN-PERSON INSTANTANEOUS MEETING INVOLVING LOCAL COLOR
In some embodiments, the present invention provides for a computer system which includes at least the following components: a plurality of computing devices associated with a plurality of users associated with a plurality of users; where each computing device of the plurality of computing devices is configured to: electronically receive software which, when being executed, cause such computing device to display a plurality of instances of a specifically programmed graphical user interface (GUI); where each instance of the GUI is configured to display a real-time updatable meeting information representative of a direct electronic proximity-based communication between at least two computing devices associated with at least two users who desire to meet at a particular location to engage in a transaction of at least one good, at least one service, or both, whose marketable value lasts for a period of 30 seconds to 60 minutes.
HANDLING CALLS ON A SHARED SPEECH-ENABLED DEVICE
In some implementations, an utterance that requests a voice call is received, the utterance is classified as spoken by a particular known user, the particular known user is determined to be associated with a personal voice number, and in response to determining that the particular known user is associated with a personal voice number, the voice call is initiated with the personal voice number.