Patent classifications
H04M2203/6045
COMMUNICATION TERMINAL, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM
In an information processing system, a storage unit stores data related to a voice of a user for each item of user identification information that identifies the user during transmission or reception of a call. An acquisition unit acquires the user identification information on a calling side and data related to the voice of the user on the calling side after a call is started. A determination unit determines whether the data related to the voice of the user on the calling side and the data related to the voice stored by the storage unit in the user identification information acquired by the acquisition unit are based on the voice of the same person during the call.
System and method for second factor authentication to perform services
A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication via a backchannel to reduce the potential for malicious third-party impersonation of the client prior to transfer of the call to the customer call center. Pre-authorized customer support calls may be intelligently and efficiently routed directly to call center agents, without incurring further delay. During call handling, call center agents may initiate further client authentication processes, including contactless card authentication requests, over one or more different communication channels for authorizing access to sensitive information or to allay suspicion.
INTERCEPTING AND CHALLENGING UNWANTED PHONE CALLS
A call challenger can receive a user input from a called party identity to opt-in to a call challenge service, and a second user input of a keyword. When the call challenger receives a call directed to a user equipment of the called party identity, the call challenger can prompt the calling party to provide an audible response. In response to a receipt of the audible response, the call challenger can convert the audible response to a text. The call challenger can compare the text with the keyword to determine if there is a sufficient match. In response to the determining the output of the comparing does not satisfy a threshold match score, the call challenger can prevent the call from connecting with the user equipment.
PHONE NUMBER LIST MANAGEMENT
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for managing a phone number list are disclosed. In one aspect, a method includes the actions of receiving, by a computing device, telephone call data that reflects characteristics of telephone calls placed and received by a first user. Based on the telephone call data, the actions further include generating, by the computing device, a first telephone number whitelist for the first user. The actions further include determining, by the computing device, whether to combine the first telephone number whitelist and a second telephone number whitelist for a second user. The actions further include storing, by the computing device, the first telephone number whitelist or the combined telephone number whitelist in association with the first user.
Validating Telephone Calls by Verifying Entity Identities Using Blockchains
Telephone calls can be validated using blockchains. In one example, a computing node can generate a distributed ledger indicating relationships between telephone numbers and unique identifiers assigned to the telephone numbers. The distributed ledger can be accessible to a telecommunication system for validating telephone calls.
Systems and methods for authentication and fraud detection
Systems and methods are provided to stop both external and internal fraud, ensure correct actions are being followed, and information is available to fraud teams for investigation. The system includes components that can address: 1) behavioral analytics (ANI reputation, IVR behavior, account activity)—this gives a risk assessment event before a call gets to an agent; 2) fraud detection—the ability to identify, in real time, if a caller is part of a fraudster cohort' and alert the agent and escalate to the fraud team; 3) identity authentication—the ability to identify through natural language if the caller is who they say they are; and 4) two factor authentication—the ability to send a text message to the caller and automatically process the response and create a case in the event of suspected fraud.
Real Time Audio Stream Validation
Real time audio stream validation is provided. An audio stream of a voice communication corresponding to a call is segmented into a plurality of blocks in response to receiving the audio stream from a user. The plurality of blocks is modified to generate a first modified audio stream corresponding to the call that includes hashed values of the plurality of blocks. The first modified audio stream along with the hashed values of the plurality of blocks is sent via a network.
Call center web-based authentication using a contactless card
Systems, methods, articles of manufacture, and computer-readable media. A server may receive a phone call and generate a uniform resource locator (URL) comprising a session identifier for an account. The server may transmit the URL to a client device. The server may receive, from a web browser, a request comprising the URL. The server may determine that the session identifier in the URL of the request matches the session identifier for the account, and transmit, to the web browser, a web page at the URL. The server may receive, from the web browser, a cryptogram read by the web page via a card reader of the client device and decrypt the cryptogram. The server may authenticate the identity of the caller for the call based on decrypting the cryptogram and the session identifier of the URL matching the session identifier of the account.
SPECIALLY PROGRAMMED COMPUTING DEVICES BEING CONTINUOUSLY CONFIGURED TO ALLOW UNFAMILIAR INDIVIDUALS TO HAVE AN IN-PERSON INSTANTANEOUS MEETING INVOLVING LOCAL COLOR
In some embodiments, the present invention provides for a computer system which includes at least the following components: a plurality of computing devices associated with a plurality of users associated with a plurality of users; where each computing device of the plurality of computing devices is configured to: electronically receive software which, when being executed, cause such computing device to display a plurality of instances of a specifically programmed graphical user interface (GUI); where each instance of the GUI is configured to display a real-time updatable meeting information representative of a direct electronic proximity-based communication between at least two computing devices associated with at least two users who desire to meet at a particular location to engage in a transaction of at least one good, at least one service, or both, whose marketable value lasts for a period of 30 seconds to 60 minutes.
CALLER VERIFICATION IN RICH COMMUNICATION SERVICES (RCS)
Techniques for caller verification in Rich Communication Services (RCS) for text messaging are discussed herein. A communication client can be the communication client designated to receive incoming communications for the user equipment. The user equipment may use the communication client to send, to a network device, a Session Initiation Protocol (SIP) instance to set communication client. The SIP instance may include a primary designator and a Universally Unique Identifier (UUID) associated with the client. The network device may store the information for the user equipment including the UUID and capability set. A second user equipment may poll the network device for the communications capabilities of the first user equipment before establishing a connection.