H04M2203/105

Methods and systems for customizing interactive voice response calls

Methods and systems described in this disclosure allow customers to personalize their phone experience when calling into an organization. In some embodiments, customers who may benefit from this service are identified based on the content of the customer's previous or current phone calls to the organization. The identified customers may be invited to enroll and to provide preferences for a customized Interactive Voice Response experience. In some embodiments, the customer can elect to hear the balances of one or more of his accounts without going through a phone menu or asking a representative to look up the relevant amounts. Once enrolled, when the customer dials into the organization and upon successful authentication, the organization proactively states the customer's account balances with no further customer request.

SPECIALLY PROGRAMMED COMPUTING DEVICES BEING DYNAMICALLY CONFIGURED TO PARTICULAR COMMUNICATION SESSION PROTOCOL BASED ON LOCATION AND METHODS OF USE THEREOF

In some embodiments, the present disclosure provides for a computer system that includes a plurality of computing devices, a particular computing device includes: a first circuitry configured to conduct a first wireless communication session with another computing device in accordance with a first wireless communication protocol; a second circuitry configured to conduct a second wireless communication session with another computing device in accordance with a second wireless communication protocol; the particular computing device to: receive a location indication of a location of the another computing device, determine, based on the location indication, a unique communication session identifier and a particular wireless communication protocol from the first and second wireless communication protocols; instruct a particular circuitry to conduct a particular communication session with the another computing device by utilizing the unique communication session identifier; and where the particular circuitry is one of the first circuitry or the second circuitry.

SPECIALLY PROGRAMMED COMPUTING DEVICES BEING CONTINUOUSLY CONFIGURED TO ALLOW UNFAMILIAR INDIVIDUALS TO HAVE AN INSTANTANEOUS, IN-PERSON MEETING INVOLVING COLOR

In some embodiments, the present invention provides for a computer system which includes at least the following components: a plurality of computing devices associated with a plurality of users associated with a plurality of users; where each computing device of the plurality of computing devices is configured to: electronically receive software which, when being executed, cause such computing device to display a plurality of instances of a specifically programmed graphical user interface (GUI); where each instance of the GUI is configured to display a real-time updatable meeting information representative of a direct electronic proximity-based communication between at least two computing devices associated with at least two users who desire to meet at a particular location to engage in a transaction of at least one good, at least one service, or both, whose marketable value lasts for a period of 30 seconds to 60 minutes.

Security tool

A memory stores a first voice record of a first user and a second voice record of a second user. A processor receives from a device of the first user a recording of a voice conversation between the first and second users and compares the recording with the first and second voice records to determine that the voice conversation is between the first and second users. The processor also determines that the first and second users intend to conduct a transaction with each other and determines a transaction amount for the transaction. The processor further communicates, to the device of the first user, a message, receives, from the device of the first user, a confirmation of the transaction in response to the message, and in response to the confirmation, initiates the transaction.

VERIFYING TRUSTED COMMUNICATIONS USING ESTABLISHED COMMUNICATION CHANNELS

In various examples, communications from a host device—which may be associated with an entity—and to a client device may be are verified through established channels of communication. Systems and methods are disclosed that use authentication signals and notifications, which may include predetermined passwords and time-sensitive values, to facilitate verification of the communication between the host device and client device. The notifications may be delivered using applications or web-based applications that are associated with an entity. Once the communication has been verified as trusted, the host device and/or the client device may present notifications that the communication is verified as trusted. The notifications may be presented using audio, video, and/or haptic methods.

SYSTEM AND METHOD OF PERFORMING SECURED TRANSACTIONS IN A COMMUNICATION NETWORK
20220092583 · 2022-03-24 · ·

A system and a method of data communication between a first computing device, associated with a first user, and at least one second computing device associated with a second user may include: receiving, by the first computing device, one or more data elements pertaining to details of a transaction request from the second computing device, via a voice channel; extracting said transaction request details by the first computing device; transmitting, by the first computing device, one or more authentication data elements of an electronic wallet module, comprised in the first computing device, to the second computing device, via the voice channel; and carrying out the requested transaction by the first computing device, based on the extracted transaction request details and the electronic wallet authentication data.

Systems and methods for calling party authentication

Methods and systems described in this disclosure are directed to authentication of calling parties. The authentication of calling parties applies to simultaneous voice and/or data communications with multiple parties over multiple electronic mediums including a variety of electronic devices. A user can continue to maintain a data exchange session with a representative of an entity offering the goods or services of interest to the user across more than one user device. In some embodiments, a user can invite other parties in a multi-party call involving the user and the representative. Various embodiments for multi-party and multi-device authentication mechanisms are described herein. In some embodiments, the system calculates an estimated call waiting time for a user to speak with the representative.

Best time to send limited-content text messages to parties
11102622 · 2021-08-24 · ·

Technologies are disclosed for determining a best time to send a text message to a party over a plurality of contact periods of time to achieve having the party respond to the message with a desired outcome and/or result. Various embodiments of the invention involve determining, for each period of time, an amount of time the party is expected to take to respond to the text message, a cost of sending the message, and a probability of the party responding with the desired outcome and/or result as a result of sending the message during the period of time. A contact attempt value is determined for each period of time based on these variables along with a desirability of sending the message to the party during the period of time. Accordingly, the best time to send the message is identified as the period of time having the highest contact attempt value.

APPARATUS, METHODS, AND ARTICLES OF MANUFACTURE FOR FILTERING CALLS AND REDUCING SPOOFING AND SPAMMING
20210297529 · 2021-09-23 ·

Unsolicited electronic communications such as robocalls and person-initiated solicitation calls are reduced by imposing tolls for completion of the connections to the called parties, and refunding the tolls to the entities indicated by the electronic communications as the calling parties. In this way, a dishonest originator of a spoofed call bears the cost of the toll, and the toll is not refunded to the dishonest originator. On the other hand, the toll collected from an honest originator of a non-spoofed call is refunded to the honest originator, making the toll transparent to the honest originator and avoiding annoyance of the honest caller caused by the toll. Unsolicited calls may be subjected to filtering, particularly filtering based on the indications of the origins of the calls.

Method and system for facilitation of wireless e-commerce transactions

A method for facilitating a wireless transaction includes receiving, by a transaction fulfillment system, a transaction request from a transaction requester and verifying an identity of the transaction requester. After verifying the identity of the transaction requester, a transaction code is communicated from the transaction fulfillment system to a wireless communication device. After receiving the transaction code, the transaction code is optically scanned from a visual display of the wireless communication device by the transaction fulfillment system.