H04M2203/6045

Dynamically providing safe phone numbers for responding to inbound communications
11553083 · 2023-01-10 · ·

A system and method for dynamically providing safe call back numbers to use to respond to an inbound communication, the method comprising parsing message records from a message server, analyzing the message records for untrustworthy phone numbers by comparing content of the message records to a reference data set that is retrieved from a database, the reference data set including genuine and fraud data wherein the genuine and fraud data includes entities and contact information corresponding to the entities, determining untrustworthy phone numbers in the message records from the analysis, and generating remedy actions based on the determination of the untrustworthy phone numbers.

Caller verification in rich communication services (RCS)
11546760 · 2023-01-03 · ·

Techniques for caller verification in Rich Communication Services (RCS) for text messaging are discussed herein. A communication client can be the communication client designated to receive incoming communications for the user equipment. The user equipment may use the communication client to send, to a network device, a Session Initiation Protocol (SIP) instance to set communication client. The SIP instance may include a primary designator and a Universally Unique Identifier (UUID) associated with the client. The network device may store the information for the user equipment including the UUID and capability set. A second user equipment may poll the network device for the communications capabilities of the first user equipment before establishing a connection.

Systems and methods for detecting fraudulent calls using virtual assistants

A system may include a processor that may execute computer-executable instructions that cause the processor to receive caller information regarding an incoming communication from a caller and receive a request from a user to route the incoming communication to a virtual assistant application. The virtual assistant application is configured to interact with the caller and determine whether the caller is associated a fraudulent caller activity stored on databases accessible by the processor. The processor may then receive an indication from the virtual assistant application that the caller is associated with the fraudulent caller activity and forward the incoming communication to another party in response to receiving the indication.

Validating telephone calls by verifying entity identities using blockchains
11533396 · 2022-12-20 · ·

Telephone calls can be validated using blockchains. In one example, a computing node can generate a distributed ledger indicating relationships between telephone numbers and unique identifiers assigned to the telephone numbers. The distributed ledger can be accessible to a telecommunication system for validating telephone calls.

Communication channel enhancement
11516338 · 2022-11-29 · ·

A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests and/or customer service agent control over a customer's access device. Some embodiments include logic configured to manage and enhance communication channels between devices.

TERMINAL IMPLEMENTING A COMMUNICATION METHOD, AND SERVER IMPLEMENTING A METHOD FOR ESTABLISHING A COMMUNICATION BETWEEN TWO TERMINALS
20220377178 · 2022-11-24 ·

Methods and devices for establishing a communication between a first and a second terminal are described. The disclosed technology can be implemented in or by a server or a terminal in communication with the server. The first terminal can to the server, using a first calling identity, a request including connection information and an identifier of the first terminal. Using the identifier, the server can obtain from a database a pair of calling identities including one certified and one non-certified, the pair comprising the first calling identity and a second calling identity. The server can determine, from one of the calling identities and from the connection information, a connectivity mode of the terminal, and determine a routable number on which the terminal can send a communication to the server. The server can route the communication towards the second terminal by presenting a calling identity of the pair and sending the routable number to the first terminal.

SYSTEM AND METHOD FOR VOICE BIOMETRICS AUTHENTICATION
20220375461 · 2022-11-24 · ·

A system and method for authenticating an identity may include generating a first generic representation representing a stored audio content, generating a second generic representation representing input audio content, and, providing the first and second generic representations to a voice biometrics unit adapted to authenticate an identity based on the first and second generic representations.

PARALLEL PATH CALLER VERIFICATION CONTROLLER

The present disclosure describes techniques for determining whether a communication request is associated with a legitimate communication or spoof communication, prior to establishing the connection. A Parallel Path Caller Verification (PPCV) controller is described that is configured to intercept a communication request from an originating device and generate a proof-of-identity (PoI) message for delivery to the originating device. Upon receipt of a reply message that is responsive to the PoI message, the PPCV controller may determine whether the communication is a legitimate communication. If the communication is determined as legitimate, the PPCV controller may establish a communication based on the communication request.

System and method of caller verification

A computer-implemented method and system for improving caller verification is provided. The method comprises registering an intended communications session by generating a key using, at least, a first call time window identifier, and storing the key in a database; in response to registering the intended communication session, receiving a request for caller verification, wherein the request comprises data representing a second call time window identifier; in response to receiving the request for caller verification, generating a comparison key based on the request; comparing the comparison key with the key stored in the database; and verifying the intended communication session in response to comparing the comparison key with the key.

Caller identification trust
11509765 · 2022-11-22 · ·

Disclosed are example methods, systems, and devices for allowing caller computing devices to authenticate calls via a service provider computing system. Users may opt to have entities register to contact the user with a positive ID, icon, or other notification on the user's computing device transmitted by the service provider computing system. A caller computing device may use a unique security token of the user to activate the notification on the user's device. The user device may be used to exert control over the security token via a service provider client application running on the user device. The caller computing device may initiate authentication via an API call to the service provider computing system. The caller computing device is able to have items (text, images, documents, etc.) delivered to the user computing device if authenticated.