H04M2203/6054

Conference Data Processing Method and Related Device
20220335949 · 2022-10-20 ·

A conference data processing method includes that a conference terminal collects an audio segment in a first conference site based on a sound source direction in a conference process, generates first additional information corresponding to each of the collected audio segments, and sends, to a conference information processing device, a conference audio recorded in the conference process and the first additional information; the conference information processing device segments the conference audio into a plurality of audio segments and attaches corresponding second additional information to the plurality of audio segments, where the second additional information corresponding to each audio segment includes information used to determine a speaker identity corresponding to the audio segment and identification information of the corresponding audio segment, and the conference information processing device generates a correspondence between a participant and a statement based on the first additional information and the second additional information.

Systems and methods for authentication and fraud detection

Systems and methods are provided to stop both external and internal fraud, ensure correct actions are being followed, and information is available to fraud teams for investigation. The system includes components that can address: 1) behavioral analytics (ANI reputation, IVR behavior, account activity)—this gives a risk assessment event before a call gets to an agent; 2) fraud detection—the ability to identify, in real time, if a caller is part of a fraudster cohort' and alert the agent and escalate to the fraud team; 3) identity authentication—the ability to identify through natural language if the caller is who they say they are; and 4) two factor authentication—the ability to send a text message to the caller and automatically process the response and create a case in the event of suspected fraud.

Call authentication service systems and methods

A system for authenticating the calling device used to place a call to an enterprise call center. The system uses a premise component, a cloud-based Call Authentication Service (CAS), and orchestration between these two components. The premise component includes a number of sub-components including servers and probes. The CAS includes a Decision Engine that utilizes a number and variety of authentication plugins. The disclosed system may be used independently or as part of a multi-factor authentication strategy with other techniques such as reduced Knowledge-Based Authentication or voice biometrics.

System, method, and computer-readable medium that facilitate voice biometrics user authentication

A system, method, and computer readable medium that facilitate user authentication via voice biometrics in a network system featuring interactive voice response system access is provided. The voice biometric authentication mechanisms alleviate identity theft occurring via specific interactive voice response transactions. A voice biometrics authentication system interfaces with an interactive network platform and may be hosted by a third party provider of voice biometric technologies.

POPULATING CONTACT INFORMATION ON AN ELECTRONIC COMMUNICATION DEVICE

Approaches presented herein enable automatically populating contact information of a previously unknown caller/sender in a contact list of an electronic communication device based on a communication (e.g., incoming call or communication message(s)) from the caller/sender. Specifically, a recipient communication device receives a communication (i.e., incoming call or communication message) from a user (i.e., caller or sender) using a sender communication device. When the user is determined to be unknown to the recipient communication device, the content of the communication is analyzed to determine identifying information. One or more searches are performed to determine extended name information using the identifying information. Using the identifying information and extended name information, contact information is determined for the user and may be stored in the contact list of the recipient communication device.

BREAKOUT SESSION ASSIGNMENT BY DEVICE AFFILIATION

Presented herein are techniques in which a device connects a plurality of user devices to a communication session in which a plurality of participants of the respective plurality of user devices communicate using audio and/or video and determines respective locations of the plurality of user devices. The devices receives, from a particular user device of the plurality of user devices, a request to group the user devices into a plurality of groups to form one or more breakout communication sessions off of the communication session, assigns user devices to respective ones of the plurality of groups based on the respective locations such that user devices at a common location are assigned to a same group, and transmits information identifying the plurality of groups to the particular user device

Secure remote data submission for IVR systems

Apparatus and methods for enhancing security of an authentication process of a caller that initiated a call in an Interactive Voice Response (“IVR”) system are provided. The methods may include routing the call through the IVR system to a headset. After the routing, the methods may include retrieving data associated with the caller. In response to the retrieved data meeting one or more predetermined conditions, a graphical user interface of an agent computer paired to the headset may display a plurality of validation information for validating the caller. Selection by the agent of validation information may trigger methods for transmitting a request to the caller, via a caller mobile phone, to input the validation information selected by the agent. The methods may additionally include authenticating the caller based at least in part on the information input into the mobile phone.

SYSTEM AND METHOD FOR IDENTIFYING UNWANTED COMMUNICATIONS USING COMMUNICATION FINGERPRINTING

A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.

Communication Channel Enhancement
20170318152 · 2017-11-02 · ·

A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests and/or customer service agent control over a customer's access device. Some embodiments include logic configured to manage and enhance communication channels between devices.

SECURE VOICE PRINT AUTHENTICATION FOR WIRELESS COMMUNICATION NETWORK SERVICES
20170339272 · 2017-11-23 ·

A method of accessing a wireless communication network using secure voice print authentication. The method includes receiving a request from a mobile device at a gateway of the wireless communication network for service on the wireless communication network. A voice print is obtained at the gateway from a user using the mobile device. The voice print is compared by the gateway with a primary voice print, wherein the primary voice print is associated with a voicemail account at the wireless communication network, and wherein the voicemail account is associated with a primary user of the mobile device. Based upon comparing the voice print with the primary voice print, the service may be provided to the mobile device on the wireless communication network.