Patent classifications
H04M2203/6054
Methods, systems, and products for routing communications
Methods, systems, and products route communications according to schedules. When an incoming communication is detected, a schedule is retrieved that is associated with a recipient's address. A time associated with the communication is compared to entries in the schedule. If a match is determined, then an alternate destination may be chosen.
Updating device behavior based on user behavior
Systems, methods, and computer-readable medium are provided for updating device behavior based on user behavior. For example, a user device may receive activity information of a user. Based on the activity information, the device may identify a first activity level of the user. The device may receive an indication that a second device is receiving an incoming call. After receiving the indication of the incoming call, the user device may identify a second activity level of the user. The user device may infer the intent of the user with respect to interacting with the second device based on the relative activity levels and may provide instructions to the second device for changing a setting of the second device based on the inferred intent of the user.
Systems and methods for securely authenticating a caller over a voice channel
Systems and methods for authenticating a user using an interactive voice response application. The method includes receiving data representing a spoken voice utterance corresponding to a user of an interactive voice response application. The method further includes processing the data representing the spoken voice utterance based on a length and a quality of the spoken voice utterance. The method also includes comparing the processed data representing the spoken voice utterance and a voiceprint associated with the user. The method further includes generating a security token in response to determining that the processed data representing the spoken voice utterance substantially matches the voiceprint associated with the user. The method also includes receiving the security token from the interactive voice application and validating the security token corresponding to the user in response to determining that the security token matches a security token generated by a server computing device.
Method and system for fraud clustering by content and biometrics analysis
A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
EMERGENCY CALL BACK FOR REMOTE WORKERS
A fingerprint is received from a communication endpoint. The fingerprint is based on a hardware identifier of the communication endpoint. For example the fingerprint may be based on a Media Access Control (MAC) address of the communication endpoint. A request for an emergency call from the communication endpoint is received that also includes the fingerprint. For instance, a user may initiate a 911 call from the communication endpoint. The emergency call is established. After the emergency call is disconnected, a request for an emergency call back is received. For example, if the emergency call prematurely disconnected, the emergency call back is initiated. The request for the emergency call back is routed to the communication endpoint based on the fingerprint to ensure that the emergency call is properly completed.
Inbound Calls to Intelligent Controlled-Environment Facility Resident Media and/or Communications Devices
An inbound call connection request may be received from a non-resident, directed to a controlled-environment facility resident and/or the resident's device. A determination may be made that a calling account of the resident does not have sufficient funds to pay for the inbound call, whereupon a message may be provided to the non-resident offering billing options, including at least a wireless carrier billing option, to complete the call connection. The call may be connected with the resident device in response to a determination a calling account of the inmate has sufficient funds to pay for the call or acceptance of one of the payment methods by the non-resident, along with authentication that the non-resident is associated with an address identifier (AID) of the resident device, and verification that the resident operating the device is associated with the AID of the device.
System and method for multilingual authentication access to communication system in controlled environment
A system and method for multilingual authentication access to a communication system in a controlled environment is disclosed. The system includes a communication subsystem that connects a communication between a first communication device and a second communication device, wherein one of the first communication device or the second communication device is used by the inmate of the correctional system. The system also includes a profile subsystem configured to determine profile information of a party associated with the first communication device. The system further includes an authentication subsystem that provides one or more challenge questions to the first communication device based on the profile information, receives at least one response to the one or more challenge questions from the first communication device, and authorizes connection of the communication between the first communication device and the second communication device based on the at least one response.
ELECTRONIC DEVICE FOR AUTHENTICATING BASED ON BIOMETRIC DATA AND OPERATING METHOD THEREOF
The present disclosure relates generally to a device and method for performing authentication using biometric data in an electronic device. The electronic device can include a memory for storing biometric authentication information about one or more external electronic devices and one or more identification information corresponding to each of the one or more external electronic devices, the one or more external electronic devices including sensors configured to acquire biometric data corresponding to the biometric authentication information, and a processor. The processor can be configured to receive a request related with authentication, to select at least one external electronic device from among the one or more external electronic devices in relation with the authentication, to transmit a request for authentication to the at least one external electronic device, using at least one identification information corresponding to the at least one external electronic device from among the one or more identification information, and to perform the authentication based at least on authentication information received from the at least one external electronic device and the biometric authentication information.
Detecting robocalls using biometric voice fingerprints
The disclosed system and method detect robocalls using biometric voice fingerprints. The system receives audio input representing a plurality of telephone calls. For at least a portion of the telephone calls, the system analyzes the received audio based on a voice biometrics detection model to identify one or more biometric indicators characterizing a speaker in the analyzed telephone call. The system generates and stores a voice fingerprint characterizing the speaker based on the biometric indicators, and a time of the analyzed telephone call. The system analyzes stored voice fingerprints and times corresponding to speakers in the analyzed telephone calls to determine a frequency of occurrence of each voice fingerprint within an analyzed timeframe. If the frequency of occurrence of a voice fingerprint exceeds a threshold call quantity within the analyzed timeframe, the voice fingerprint is characterized as being associated with a robocaller.
Call Authentication Service Systems and Methods
A system for authenticating the calling device used to place a call to an enterprise call center. The system uses a premise component, a cloud-based Call Authentication Service (CAS), and orchestration between these two components. The premise component includes a number of sub-components including servers and probes. The CAS includes a Decision Engine that utilizes a number and variety of authentication plugins. The disclosed system may be used independently or as part of a multi-factor authentication strategy with other techniques such as reduced Knowledge-Based Authentication or voice biometrics.