H04M3/436

Call routing methods and systems

A system can route calls based on a minimum expected delay, classification, and priority of the call. In some embodiments, when a call is received, the call is classified and prioritized within the classification. A minimum expected delay time is determined. Based on the minimum expected delay time, the classification, and the prioritization, the call is routed to a representative with instructions on how the call should be treated.

Call routing methods and systems

A system can route calls based on a minimum expected delay, classification, and priority of the call. In some embodiments, when a call is received, the call is classified and prioritized within the classification. A minimum expected delay time is determined. Based on the minimum expected delay time, the classification, and the prioritization, the call is routed to a representative with instructions on how the call should be treated.

Intercepting and challenging unwanted phone calls

A call challenger can receive a user input from a called party identity to opt-in to a call challenge service, and a second user input of a keyword. When the call challenger receives a call directed to a user equipment of the called party identity, the call challenger can prompt the calling party to provide an audible response. In response to a receipt of the audible response, the call challenger can convert the audible response to a text. The call challenger can compare the text with the keyword to determine if there is a sufficient match. In response to the determining the output of the comparing does not satisfy a threshold match score, the call challenger can prevent the call from connecting with the user equipment.

Intercepting and challenging unwanted phone calls

A call challenger can receive a user input from a called party identity to opt-in to a call challenge service, and a second user input of a keyword. When the call challenger receives a call directed to a user equipment of the called party identity, the call challenger can prompt the calling party to provide an audible response. In response to a receipt of the audible response, the call challenger can convert the audible response to a text. The call challenger can compare the text with the keyword to determine if there is a sufficient match. In response to the determining the output of the comparing does not satisfy a threshold match score, the call challenger can prevent the call from connecting with the user equipment.

Verification of caller identification using application

Technology for identifying that a communication is from a verified enterprise includes receiving, by a device associated with a user, a data packet from a phone network. The data packet can be included in a communication to the device, which can have an application configured to verify communications from at least one enterprise. A token within the data packet can be identified by the application, and the application can compare the token to at least one token identifier associated with the at least one enterprise. In response to the token corresponding to at least one token identifier, the application can verify that the communication is from the at least one enterprise. In response to the communication being verified, the application can display a validation image on the device.

Verification of caller identification using application

Technology for identifying that a communication is from a verified enterprise includes receiving, by a device associated with a user, a data packet from a phone network. The data packet can be included in a communication to the device, which can have an application configured to verify communications from at least one enterprise. A token within the data packet can be identified by the application, and the application can compare the token to at least one token identifier associated with the at least one enterprise. In response to the token corresponding to at least one token identifier, the application can verify that the communication is from the at least one enterprise. In response to the communication being verified, the application can display a validation image on the device.

Automated Robocall Detection
20230216955 · 2023-07-06 ·

Novel tools and techniques are provided for implementing automated robocall detection. In various embodiments, a computing system may compare first abstracted raw data, obtained from a portion of call data from a first call from a first originating party, with each of a plurality of abstracted raw data, obtained from portions of call data from a plurality of calls from a corresponding plurality of originating parties. In some instances, the plurality of abstracted raw data and the first abstracted raw data may each include at least one of word count data, phoneme count data, inter-word timing data, voice pitch estimation data, and/or background noise data. The computing system may determine whether the first abstracted raw data is indicative of the first call being a suspected unsolicited or unwanted communication, based at least in part on the comparison. If so, the computing system may perform one or more tasks.

Automated Robocall Detection
20230216955 · 2023-07-06 ·

Novel tools and techniques are provided for implementing automated robocall detection. In various embodiments, a computing system may compare first abstracted raw data, obtained from a portion of call data from a first call from a first originating party, with each of a plurality of abstracted raw data, obtained from portions of call data from a plurality of calls from a corresponding plurality of originating parties. In some instances, the plurality of abstracted raw data and the first abstracted raw data may each include at least one of word count data, phoneme count data, inter-word timing data, voice pitch estimation data, and/or background noise data. The computing system may determine whether the first abstracted raw data is indicative of the first call being a suspected unsolicited or unwanted communication, based at least in part on the comparison. If so, the computing system may perform one or more tasks.

Dynamically providing safe phone numbers for responding to inbound communications
11553083 · 2023-01-10 · ·

A system and method for dynamically providing safe call back numbers to use to respond to an inbound communication, the method comprising parsing message records from a message server, analyzing the message records for untrustworthy phone numbers by comparing content of the message records to a reference data set that is retrieved from a database, the reference data set including genuine and fraud data wherein the genuine and fraud data includes entities and contact information corresponding to the entities, determining untrustworthy phone numbers in the message records from the analysis, and generating remedy actions based on the determination of the untrustworthy phone numbers.

Dynamically providing safe phone numbers for responding to inbound communications
11553083 · 2023-01-10 · ·

A system and method for dynamically providing safe call back numbers to use to respond to an inbound communication, the method comprising parsing message records from a message server, analyzing the message records for untrustworthy phone numbers by comparing content of the message records to a reference data set that is retrieved from a database, the reference data set including genuine and fraud data wherein the genuine and fraud data includes entities and contact information corresponding to the entities, determining untrustworthy phone numbers in the message records from the analysis, and generating remedy actions based on the determination of the untrustworthy phone numbers.