H04M2203/6045

Destination device billing according to call recipient

A method, system, and program for billing for service provided to destination device according to the calling plan of the individual receiving the call. An authenticated identity for a callee answering a call placed to a destination device is received at an intermediary device. The intermediary device then accesses a billing plan for the authenticated identity of the callee and loads the billing plan for specifying charges for the call, such that telephone service billed to the callee is accessible at multiple destination devices.

System and method for extracting information and retrieving contact information using the same
11250091 · 2022-02-15 ·

A method and system for managing and retrieving contact information included on a plurality of business cards from a plurality of contacts of a user. The method may, for a given business card corresponding to a given contact of the user, obtain from the business card a unique identifier and a registered phone number corresponding to the contact; determine the unique identifier is associated with the registered phone number to verify the contact has been registered with a contact management server, wherein the contact management server stores contact information of the contact in association with a contact identifier comprising the registered phone number; in response to said determining, generating a record locator comprising the registered phone number and retrieving, from the contact management server, the contact information based on locating the contact identifier; and storing the retrieved contact information.

Method and system for fraud clustering by content and biometrics analysis

A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.

SYSTEMS AND METHODS FOR AUTHENTICATING CALLER IDENTITY AND CALL REQUEST HEADER INFORMATION FOR OUTBOUND TELEPHONY COMMUNICATIONS
20170264443 · 2017-09-14 ·

Various embodiments of a system and method for authenticating a call request header including identity information that is lightweight and deployable in VoIP and PSTN systems are disclosed.

METHOD AND SYSTEM FOR REMOTE INTERACTION BETWEEN AT LEAST ONE USER AND A HUMAN OPERATOR AND BETWEEN AT LEAST ONE USER AND AT LEAST ONE AUTOMATED AGENT
20220046128 · 2022-02-10 ·

A computer-implemented method is described for remote interaction between a user and an automated agent and for remote interaction between the user and a human operator. The method comprises bidirectionally connecting a user's electronic device with the automated agent by means of a data communication channel through a telecommunications network comprising a server device; acquiring information representative of the identity of a user of the user's electronic device; generating at the server device, as a function of the acquired information representative of the user's identity, a reference profile of digital identity associated with the user of the user's electronic device; storing, into a non-volatile memory of the server device, said user's digital identity reference profile; analysing, by means of an electronic operator device, at least a part of the user's digital identity reference profile.

SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING USER AUTHENTICATION FOR A VOICE-BASED COMMUNICATION SESSION
20210400480 · 2021-12-23 · ·

A method includes: in response to a request from a human user to access account information, authenticating the human user via a graphical user interface (GUI); storing a result of authenticating the human user in a storage system; in response to authenticating the human user, directing the human user to a voice-based communication session; accessing the result of authenticating the human user from the storage system by the voice-based communication session; and providing access by the human user to the account information in the voice-based communication session based on the result of authenticating the human user.

SYSTEM AND METHOD FOR SECOND FACTOR AUTHENTICATION TO PERFORM SERVICES

A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication via a backchannel to reduce the potential for malicious third-party impersonation of the client prior to transfer of the call to the customer call center. Pre-authorized customer support calls may be intelligently and efficiently routed directly to call center agents, without incurring further delay. During call handling, call center agents may initiate further client authentication processes, including contactless card authentication requests, over one or more different communication channels for authorizing access to sensitive information or to allay suspicion.

INTERCEPTING AND CHALLENGING UNWANTED PHONE CALLS
20210385330 · 2021-12-09 ·

A call challenger can receive a user input from a called party identity to opt-in to a call challenge service, and a second user input of a keyword. When the call challenger receives a call directed to a user equipment of the called party identity, the call challenger can prompt the calling party to provide an audible response. In response to a receipt of the audible response, the call challenger can convert the audible response to a text. The call challenger can compare the text with the keyword to determine if there is a sufficient match. In response to the determining the output of the comparing does not satisfy a threshold match score, the call challenger can prevent the call from connecting with the user equipment.

Methods and systems for authenticating a user on a call

Methods and systems described in this disclosure allow customers to quickly be authenticated. In some embodiments, a device and a user verifier are associated with a user profile. When a call is received from the device, the user may be requested to input the user verifier. After verifying that the device is unique to the user and that the user verifier matches the user verifier associated with the user profile, the user may be authenticated to the call or activity.

Robocall detection
11196859 · 2021-12-07 · ·

A method of detecting robocalls includes generating at least one of an identification (ID) spoofing score, a number similarity score, and a call length prediction request for a telephone call request. The method further includes generating a robocall predictor score based at least in part on the call length prediction score and the ID spoofing score, and rejecting the telephone call request when the robocall predictor score indicates the telephone call request is invalid.