Patent classifications
H04M2203/6045
COMMUNICATION WITH USER PRESENCE
A system and method establishes a communication connection between a first device of a first user and a second device of a second user. Request data corresponding to a request to establish a communication connection with a second user is received, and a user profile associated with the second user is determined. One or more sensors of the second device receive input data corresponding to the environment of the second device, and an identity of the second user is determined based thereon. The communication connection is established and, based on the identity, the second device tracks movement of the second user in the environment.
Method and apparatus for identifying a speaker
Systems and methods for identifying a participant providing audible information during a communication session are disclosed. More particularly, speech localization is utilized to determine a location of the participant providing audible information. An identification device determined to be at a location corresponding to the location of the participant providing audible information is identified. The identity of the participant providing the audible information is then obtained by mapping the identification device to the participant. The information identifying the participant providing audible information can be provided to other endpoints of the communication session.
SYSTEMS AND METHODS FOR PHONE NUMBER CERTIFICATION AND VERIFICATION
Methods, systems, apparatuses, and computer-readable storage mediums are described for issuing digital certificates to phone numbers and verifying phone numbers based on the digital certificates. For instance, a client may request from a certificate authority a digital certificate to be associated with the client's phone number. The certificate authority issues a phone number challenge to the client to verify that the request did in fact come from the client. The certificate authority signs and issues the digital certificate to the client responsive to a successful challenge. The digital certificates are utilized to exchange messages between a caller and call recipient to determine whether a phone number provided via CLI is accurate or inaccurate. Embodiments described herein determine whether the phone number is accurate using a process referred herein as positive CLI verification and determines whether the phone number is inaccurate using a process referred herein as negative CLI verification.
CALL ORIGINATION VALIDATION FOR INCOMING CALLS WITHIN A WIRELESS COMMUNICATION NETWORK
A computer-implemented method for validating the origination of an incoming customer call on a wireless communication network may include receiving a SIP invite message at the wireless communication network when the call is initiated, determining whether the SIP invite message includes one or more indicators indicating that the call originated within the wireless communication network from a device with a SIM registered in the wireless communication network, and writing a classification code to a database indicating that the call is validated if the SIP invite message includes the one or more indicators. The method may further include receiving the call at an agent computer device with caller identification information, querying the database via the agent computer device according to the caller identification information to obtain the classification code of the customer call, and suppressing a step used for call authentication if the classification code indicates that the call is validated.
Method and system for fraud clustering by content and biometrics analysis
A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
IDENTIFYING SPEAKERS IN TRANSCRIPTION OF MULTIPLE PARTY CONVERSATIONS
A method and system in which a transcription of multi-party communication is provided. A plurality of speakers are recorded using any of a variety of recording devices. A copy of the recording is processed through a diarisation process to create a final diarisation product and a second copy of the recording is processed through a transcription process to create a final transcription product. The final diarisation product is used to differentiate individual speakers of the plurality of speakers in a final transcript. The final transcript and audio samples of each of the voice prints identified through the diarisation process are presented to a reviewer to determine the identity of each of the differentiated individual speakers. The identity of the each of the differentiated individual speakers is then inserted into the final transcript.
Communication server, communication system, program, and communication method
A communication server includes a terminal management unit managing data identifying each of a plurality of communication terminals in association with group identification data identifying a group to which the communication terminals belong; a determination unit determining, when a session for transmitting and receiving content data is established between first and second communication terminals, whether group identification information sets of the first and the second communication terminals associated with the session are the same as each other based on the group identification data; and a report unit reporting, when the group identification information sets of the first and the second communication terminals are the same as each other, shared location information indicating a location of a shared memory area shared between the first and the second communication terminals to the first and the second communication terminals associated with the session while the session is being established.
Authentication of phone call origination
A method of authenticating a call origination directed to an enterprise call center. The method comprises receiving a first call origination message from a communication network by a computer system, wherein the first call origination message comprises an automatic number identification (ANI) storing a first phone number, determining by the computer system that the first phone number is not associated with an originator of the first call origination message, and responsive to determining that the first phone number is not associated with the originator of the first call origination message, dropping the first call origination message by the computer system and not answering the associated call, whereby the enterprise call center reduces its vulnerability to call origination spoofing.
Inbound Calls to Intelligent Controlled-Environment Facility Resident Media and/or Communications Devices
An inbound call connection request may be received from a non-resident, directed to a controlled-environment facility resident and/or the resident's device. A determination may be made that a calling account of the resident does not have sufficient funds to pay for the inbound call, whereupon a message may be provided to the non-resident offering billing options, including at least a wireless carrier billing option, to complete the call connection. The call may be connected with the resident device in response to a determination a calling account of the inmate has sufficient funds to pay for the call or acceptance of one of the payment methods by the non-resident, along with authentication that the non-resident is associated with an address identifier (AID) of the resident device, and verification that the resident operating the device is associated with the AID of the device.
A METHOD AND APPARTUS FOR NOTIFYING AUTHENTICITY INFORMATION OF CALLER IDENTITY IN WIRELESS ACCESS SYSTEM
The present invention relates to a wireless access system, and more particularly, to methods and apparatus for notifying authenticity information of a caller identifier (ID) in a wireless access system, comprising: receiving, from a second network node, a first call message including a caller ID of a second UE (UE2), determining whether the caller ID of UE2 has been authenticated or not by detecting a trust level of authenticity information in the first call message, and transmitting, to a first UE (UE1), a second call message including the caller ID and an indication message indicating one or authentication levels out of an authenticated, a spoofed, or an unauthenticated level, wherein the authenticated indicates the caller ID is authenticity and the spoofed indicates the caller ID is not guaranteed to correspond to the UE2.