H04M2203/6027

CALL ORIGINATION VALIDATION FOR INCOMING CALLS WITHIN A WIRELESS COMMUNICATION NETWORK
20220368799 · 2022-11-17 ·

A computer-implemented method for validating the origination of an incoming customer call on a wireless communication network may include receiving a SIP invite message at the wireless communication network when the call is initiated, determining whether the SIP invite message includes one or more indicators indicating that the call originated within the wireless communication network from a device with a SIM registered in the wireless communication network, and writing a classification code to a database indicating that the call is validated if the SIP invite message includes the one or more indicators. The method may further include receiving the call at an agent computer device with caller identification information, querying the database via the agent computer device according to the caller identification information to obtain the classification code of the customer call, and suppressing a step used for call authentication if the classification code indicates that the call is validated.

Using calling party number for caller authentication

Embodiments include a system, method, and computer program product that authenticates a caller using calling party information. In an embodiment, an authentication device receives the call request and associated calling party information that includes a calling party number. The authentication device retrieves parameters associated with the calling party number, where a retrieved parameter is a number of accounts linked to the calling party number. The authentication device determines whether the number of accounts is between one and a threshold value, inclusive, and verifies that the call request originates from a location or a device associated with the calling party number. Based on the verifying and determining, the authentication device generates an authentication result that indicates whether the calling party number is authenticated. Then, the authentication device sends the authentication result to a call processing device that processes the call request from the caller according to the authentication result.

DEVICE BLOCKING TOOL
20170339155 · 2017-11-23 ·

A device blocking tool includes a user interface, a location engine, and a connection engine. The user interface receives at least one of a MAC address of a device and an IP address of the device. The location engine communicates a query to an access control server, receives a response, and determines, based on the response, that the device connected to a network through a wired connection. In response to a determination that the device connected through the wired connection, the location engine determines a switch through which the device connected. The location engine also determines a VLAN through which the device connected and determines, based on a type associated with the VLAN, that the device is an IP telephone. The connection engine connects to the determined switch in response to the determination that the device connected through the wired connection.

Call traffic data monitoring and management
11671532 · 2023-06-06 · ·

One example method of operation may include determining a call received from a calling party and intended for a subscriber device has an elevated likelihood of being a scam call, determining a percentage of calls over a current period of time being filtered as scam calls by a carrier server, when the percentage of calls being filtered as scam calls during the current period of time is above a call threshold percentage, retrieving call history information associated with a subscriber profile of the subscriber device, identifying one or more call patterns from the call history information of the subscriber profile corresponding to the received call, and determining whether to permit the received call based on the identified one or more call patterns.

Protecting sensitive information provided by a party to a contact center
09787835 · 2017-10-10 · ·

In one embodiment, a secure mechanism operates in conjunction with a three-way bridge in a contact center to protect against inadvertent exposure of sensitive information provided during a call. During the call, an agent may bridge on an interactive voice response system (“IVR”) onto the call prompting the party to enter sensitive information, such as a credit card account number, to effect a payment. The information may be provided by the party using dual-tone multiple frequency (“DTMF”) tones or speech. The IVR may provide a confirmatory announcement indicating the sensitive information received. A switch may be controlled by the IVR so that any sensitive information expected from the party or provided by the IVR in a confirmatory announcement is not presented to the agent or to a recording system. In this manner, the IVR suppresses the exposure of sensitive information to the agent and/or a recording system.

Method and system for fraud clustering by content and biometrics analysis

A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.

TELEPHONY COMMUNICATIONS SYSTEM FOR DETECTING ABUSE IN A PUBLIC TELEPHONE NETWORK

A telephony communications system for detecting abuse in a public telephone network to which a telephone network subscriber is connected includes: a telephone system server, configured to: emulate an extension subscriber in order to simulate the existence of the emulated extension subscriber of the telephone system vis-à-vis an attacking entity, receive a control command from the attacking entity to establish a telephone connection between the emulated extension subscriber and the telephone network subscriber, and send a connection request to the telephone network subscriber in response to receiving the control command in order to initiate the establishment of the telephone connection between the emulated extension subscriber and the telephone network subscriber; and a telephone network abuse detection device configured to detect an abuse attempt in the public telephone network on the basis of the telephone network address of the telephone network subscriber.

METHOD AND SYSTEM FOR AUTOMATICALLY DETECTING AND BLOCKING ROBOCALLS
20220046126 · 2022-02-10 ·

A method and system for automatically detecting and blocking robocalls. A robocall application on a server network device detects whether incoming calls from a first network device requesting a connection to a second network device are live voice calls are robocalls including natural synthesized voice data or artificial synthesized voice data. The robocall application on a server network device also detects whether incoming or outgoing calls from a third-party network device used to connect the first network device to the second network device are live voice calls or are robocalls including natural synthesized voice data or artificial synthesized voice data. Robocalls are automatically detected and blocked.

A METHOD AND APPARTUS FOR NOTIFYING AUTHENTICITY INFORMATION OF CALLER IDENTITY IN WIRELESS ACCESS SYSTEM
20170238177 · 2017-08-17 · ·

The present invention relates to a wireless access system, and more particularly, to methods and apparatus for notifying authenticity information of a caller identifier (ID) in a wireless access system, comprising: receiving, from a second network node, a first call message including a caller ID of a second UE (UE2), determining whether the caller ID of UE2 has been authenticated or not by detecting a trust level of authenticity information in the first call message, and transmitting, to a first UE (UE1), a second call message including the caller ID and an indication message indicating one or authentication levels out of an authenticated, a spoofed, or an unauthenticated level, wherein the authenticated indicates the caller ID is authenticity and the spoofed indicates the caller ID is not guaranteed to correspond to the UE2.

Secure mechanism for mute alert

In one implementation, an apparatus includes an audio detection circuit, a central processor, and the switch. The audio detection circuit is configured to determine whether audio is present in an input signal and generate an audio presence indicator indicative of the audio. The central processor is configured to receive the audio presence indicator and a mute command. The central processor generates a switch command based on the mute command. The switch is configured to block the input signal from a digital signal processor in response to the switch command. The central processor generates a dynamic mute message that indicates audio is detected while a mute command is active.