H04M2203/6027

Managing phone identification via immutable connection verification

Embodiments of the present invention provide methods, computer program products, and systems. Embodiments of the present invention can create an authentication mechanism for communication services utilizing a distributed recording system. Embodiments of the present invention can then, in response to receiving a request to connect with a device, utilize the created authentication mechanism to connect with or prevent connection with the device.

DELAYED INTERACTIVE AUTO ATTENDANT

Aspects of the subject disclosure may include, for example, a method of receiving, by a processing system including a processor, a call for a subscriber; determining, by the processing system, that the call is from an interactive voice response (IVR) system; determining whether the IVR system is providing a query that requires a response; and responsive to a first determination that the IVR system requires the response, providing the response. Other embodiments are disclosed.

Detection of spoofed calls using call header
11425240 · 2022-08-23 · ·

Implementations described herein relate to methods, systems, and computer-readable media to label incoming phone calls. A method to label an incoming phone call includes detecting the incoming phone call associated with a caller identifier (ID), determining a location associated with the call, and analyzing a call header of the call to determine one or more call characteristics. The method further includes determining, based on the location and the call characteristics, if the location is spoofed and determining, based on the caller ID and the call characteristics, if an access network associated with the call is spoofed. The method further includes applying a trained machine learning model to determine whether the call is a robocall. The method further includes assigning a label to the call that indicates whether the call is a spoofed call or is the robocall and sending the label to a callee device associated with the call.

PROTECTING USER DATA DURING AUDIO INTERACTIONS
20220294899 · 2022-09-15 ·

A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

FRAUD DETECTION SYSTEM AND METHOD
20220294900 · 2022-09-15 ·

A method, computer program product, and computing system for receiving input information concerning a conversation between a caller and a recipient; processing the input information to assess a fraud-threat-level; defining a targeted response based, at least in part, upon the fraud-threat-level assessed, wherein the targeted response is intended to refine the assessed fraud-threat-level; and effectuating the targeted response.

Fraud detection system and method
11363138 · 2022-06-14 · ·

A method, computer program product, and computing system for receiving input information concerning a conversation between a caller and a recipient; processing the input information to assess a fraud-threat-level; defining a targeted response based, at least in part, upon the fraud-threat-level assessed, wherein the targeted response is intended to refine the assessed fraud-threat-level; and effectuating the targeted response.

Clearing House Signaling
20220182393 · 2022-06-09 ·

In one embodiment, a network interface receives a communication request over a communication link of a first network according to a first signaling protocol. A processor then verifies caller information in the communication request with a certification procedure. The processor converts the communication request to a second signaling protocol used in a second network. The processor transmits the converted communication request according to the second signaling protocol.

System and Method for Enabling Trusted Caller Identity and Spoofed Call Prevention

A system and method of verifying a caller identification utilizing a server that communicates with a computing device capable of monitoring communication networks for specific communications from an enterprise voice network. The server can push a spoof prevention contact list to user devices. Additionally, the server can receive notifications from the computing device in response to user inputs that allow match analysis to occur with the information in the received notifications. When a match is found, the server can send a notification to a user device to modify a contact name in the spoof prevention list stored in the user device. After a specified time, the contact name can be altered back to the original state. As an example, the contact name in the spoof prevention list may start out as “unverified call,” and be changed temporarily to “verified call” upon receipt of the notification.

SIGNAL DETECTION AND BLOCKING FOR VOICE PROCESSING EQUIPMENT

A telephone call processor for processing telephone calls comprising voice signals and data signals, the call processor comprising a first telephone interface and a second telephone interface, the call processor being operable in a first mode and in a second mode. In the first mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface and to transmit voice signals and data signals via the second telephone interface. In the second mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface, to block data signals from being transmitted via the second telephone interface and optionally to transmit voice signals via the second telephone interface.

SPOOF CALL DETECTION IN TELEPHONE NETWORK
20220094786 · 2022-03-24 ·

Computer-implemented methods of placing and processing calls in a communications network are provided. The computer-implemented method of processing calls in a telephone network comprises: identifying a plurality of calls that have been made by a particular telephone number to telephone numbers in the telephone network; determining whether a sequence in which the calls were placed corresponds to a correct order for calling those telephone numbers, the correct order being determined based on a predetermined order for calling telephone numbers in the telephone network; and determining that one or more of the calls were made by spoofing the particular telephone number if the sequence in which the calls were placed does not correspond to a correct order.