H04M3/436

Detecting fraud using machine-learning and recorded voice clips

A system and method are disclosed for training a machine-learning model to detect characteristics of fraudulent calls. The machine-learning model is trained using audio clips, voice recognition, call handler feedback and general public knowledge of commercial risks to detect and divert fraudulent calls, thereby alleviating the burdens otherwise placed on call center service representatives.

Detecting fraud using machine-learning and recorded voice clips

A system and method are disclosed for training a machine-learning model to detect characteristics of fraudulent calls. The machine-learning model is trained using audio clips, voice recognition, call handler feedback and general public knowledge of commercial risks to detect and divert fraudulent calls, thereby alleviating the burdens otherwise placed on call center service representatives.

SYSTEMS AND METHODS FOR SCREENING COMMUNICATIONS BASED ON RECEIVER PROGRAMMABLE PINS
20180007200 · 2018-01-04 ·

A method for connecting a communication session may include storing first user communication acceptance criteria that is associated with a first user. A method may further include receiving a request from a second user to initiate a communication session with the first user and determining whether the first user permits such communication sessions with the second user based on the first user communication acceptance criteria. A method may include initiating the communication session between the first user and the second user upon determining that the first user permits the communication session to be initiated based on the first user communication acceptance criteria.

SYSTEMS AND METHODS FOR SCREENING COMMUNICATIONS BASED ON RECEIVER PROGRAMMABLE PINS
20180007200 · 2018-01-04 ·

A method for connecting a communication session may include storing first user communication acceptance criteria that is associated with a first user. A method may further include receiving a request from a second user to initiate a communication session with the first user and determining whether the first user permits such communication sessions with the second user based on the first user communication acceptance criteria. A method may include initiating the communication session between the first user and the second user upon determining that the first user permits the communication session to be initiated based on the first user communication acceptance criteria.

AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION
20180007194 · 2018-01-04 · ·

An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.

METHODS AND APPARATUS TO MANAGE MESSAGING WITH URGENCY INDICATION VIA A NETWORK-BASED PORTAL
20180014169 · 2018-01-11 ·

A computer-implemented system and method to manage the communication of a user are disclosed. In one embodiment, when a person tries to electronically convey a message to the user, the status of the user, the identity of the person, and the urgency of the message can be identified. The access priority of the person can be determined based on the person's identity. Then, the message can be managed using one or more rules and in view of the status of the user, the access priority of the person and the urgency of the message.

METHODS AND APPARATUS TO MANAGE MESSAGING WITH URGENCY INDICATION VIA A NETWORK-BASED PORTAL
20180014169 · 2018-01-11 ·

A computer-implemented system and method to manage the communication of a user are disclosed. In one embodiment, when a person tries to electronically convey a message to the user, the status of the user, the identity of the person, and the urgency of the message can be identified. The access priority of the person can be determined based on the person's identity. Then, the message can be managed using one or more rules and in view of the status of the user, the access priority of the person and the urgency of the message.

Call Collision Processing Method for Terminal Device, and Terminal Device
20180013888 · 2018-01-11 ·

The present disclosure relates to a call collision processing method for a terminal device, and a terminal device. A state machine records that a current state of the terminal device is an incoming call state, an outgoing call state, or an idle state. When the terminal device is in the idle state, that the terminal device processes an incoming call or an outgoing call is determined according to occupation of the state machine by incoming call information or by outgoing call information, and a state of the state machine after the state machine is occupied by the incoming call or the outgoing call is protected by using a mutex lock.

Call Collision Processing Method for Terminal Device, and Terminal Device
20180013888 · 2018-01-11 ·

The present disclosure relates to a call collision processing method for a terminal device, and a terminal device. A state machine records that a current state of the terminal device is an incoming call state, an outgoing call state, or an idle state. When the terminal device is in the idle state, that the terminal device processes an incoming call or an outgoing call is determined according to occupation of the state machine by incoming call information or by outgoing call information, and a state of the state machine after the state machine is occupied by the incoming call or the outgoing call is protected by using a mutex lock.

Spam telephone call reducer
11711464 · 2023-07-25 · ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spam telephone call reducer are disclosed. In one aspect, a method includes the actions of receiving first telephone call data that reflects telephone calls received by a first user and second telephone call data that reflects telephone calls received by a second user. The actions further include comparing the first telephone call data and the second telephone call data. The actions further include determining that the first user received more spam telephone calls than the second user. The actions further include determining a first characteristic of the first user and a second characteristic of the second user. The actions further include determining an action that increases a similarity of the first characteristic to the second characteristic. The actions further include performing the action on the first characteristic.