H04M2203/6045

Systems and methods for blockchain wireless services in a controlled environment
11689658 · 2023-06-27 ·

A method of providing blockchain wireless services in a controlled environment is provided. The method comprises a wireless communication device associated with an inmate of a controlled environment receiving one of a voice and video call from a device external to the controlled environment. The method further comprises the device placing the received call into a hold state and sending a request for validation of the call via a blockchain, the request identifying at least parties to the call. The method further comprises the device, upon receipt of validation, removing the call from the hold state; and enabling at least one of voice and video functionality for the parties. The method further comprises the wireless communication device sending the request for validation to a telecommunications server and the server conducting real time monitoring of the call. The method further comprises the device continuously recording the call.

System, method, and computer-readable medium that facilitate voice biometrics user authentication

A system, method, and computer readable medium that facilitate user authentication via voice biometrics in a network system featuring interactive voice response system access is provided. The voice biometric authentication mechanisms alleviate identity theft occurring via specific interactive voice response transactions. A voice biometrics authentication system interfaces with an interactive network platform and may be hosted by a third party provider of voice biometric technologies.

SPECIALLY PROGRAMMED COMPUTING DEVICES BEING CONTINUOUSLY CONFIGURED TO ALLOW UNFAMILIAR INDIVIDUALS TO HAVE AN INSTANTANEOUS MEETING

In some embodiments, the present invention provides for a computer system which includes at least the following components: a plurality of computing devices associated with a plurality of users associated with a plurality of users; where each computing device of the plurality of computing devices is configured to: electronically receive software which, when being executed, cause such computing device to display a plurality of instances of a specifically programmed graphical user interface (GUI); where each instance of the GUI is configured to display a real-time updatable meeting information representative of a direct electronic proximity-based communication between at least two computing devices associated with at least two users who desire to meet at a particular location to engage in a transaction of at least one good, at least one service, or both, whose marketable value lasts for a period of 30 seconds to 60 minutes.

System for authenticating a phone number using a phone number certificate

An apparatus, related devices and methods, having a memory element operable to store instructions; and a processor operable to execute the instructions, such that the apparatus is configured to identify, on an electronic device, a phone number of an incoming caller device; request, via an out-of-band control channel, a digital certificate for the phone number from the incoming caller device; receive, via the out-of-band control channel, the digital certificate for the phone number from the incoming caller device; determine whether the digital certificate for the phone number is authentic; and indicate, on the electronic device, based on a determination that the digital certificate for the phone number is authentic or not authentic, whether the phone number is authentic or not authentic.

Utilizing machine learning with call histories to determine support queue positions for support calls

A device receives, from a user device, a communication associated with a support issue encountered by a user of the user device and assigns the communication to a position in a support queue based on when the communication is received, wherein the support queue includes data identifying positions of other communications received from other users, and data identifying when the other communications were received. The device processes data identifying the communication and historical communication data describing prior communications associated with the user, with a model, to determine an average time spent on hold by the user for the prior communications. The device modifies the position of the communication in the support queue based on the average time and performs one or more actions based on modifying the position of the communication in the support queue.

Automated verification of a telephone number
09832643 · 2017-11-28 · ·

A system and method for automatically verifying a telephone number proffered by a user of an application. During registration or installation of the application, client software is installed on the user's mobile device (e.g., a smart phone, a tablet computer). One of a pool of telephone numbers for outgoing calls is selected, and a call is initiated to the proffered number by the system. The software executing on the user's device detects the incoming call, extracts caller identification data (i.e., the originating telephone number), formats a data communication (e.g., an http request) to include the data, and sends it to the system. The system receives the data communication and compares the data with the originating number. If they match, the user's telephone number is verified. The outgoing call from the system may be canceled before it rings at the device if the data communication is received in time.

DYNAMICALLY PROVIDING SAFE PHONE NUMBERS FOR RESPONDING TO INBOUND COMMUNICATIONS
20230179705 · 2023-06-08 · ·

A system and method for dynamically providing safe call back numbers to use to respond to an inbound communication, the method comprising parsing message records from a message server, analyzing the message records for untrustworthy phone numbers by comparing content of the message records to a reference data set that is retrieved from a database, the reference data set including genuine and fraud data wherein the genuine and fraud data includes entities and contact information corresponding to the entities, determining untrustworthy phone numbers in the message records from the analysis, and generating remedy actions based on the determination of the untrustworthy phone numbers.

Communication Channel Enhancement
20170318152 · 2017-11-02 · ·

A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests and/or customer service agent control over a customer's access device. Some embodiments include logic configured to manage and enhance communication channels between devices.

Communication system and computer readable medium
09807128 · 2017-10-31 · ·

A communication system include: a first acquisition unit configured to acquire request information of session initiation and authentication information of session participation; a session management unit configured to establish the session between the first terminal and the second terminal; a second acquisition unit configured to acquire request information of session participation and the authentication information of session participation being input by a third terminal; and a participation determination unit configured to compare the authentication information of session participation obtained by the first acquisition unit with the authentication information of session participation obtained by the second acquisition unit, and the participation determination unit allowing the third terminal to participate in the session when the authentication information of session participation obtained by the first acquisition unit is identical to the authentication information of session participation obtained by the second acquisition unit.

Using successive levels of authentication in online commerce
09807614 · 2017-10-31 · ·

A method comprising performing following acts on a network server: receiving a communication from a client terminal operated by a client; performing a first authentication of the client terminal or client; in response to the first authentication, delivering a first service to the client; after delivering the first service, sending an offer for a second service to the client terminal; receiving an acceptance message for the second service from the client terminal; performing a second authentication of the client terminal and/or the client; in response to receiving the acceptance message for the second service from the client terminal and to the second authentication being successful, delivering a second service to the client; wherein the first authentication and the second authentication use different authentication techniques. Other aspects include a programmed data processing apparatus for carrying out the method and a tangible program carrier instructing the apparatus to perform the acts.