Patent classifications
H04M2203/6072
Message dispatch system for telecommunications network
A system and method for dispatching messages from a user to at least one recipient over a telecommunications network is disclosed. The system includes a messaging system and an authentication system. The messaging system receives user messages, retrieves contact information for recipients on a user's contact list, and attempts to deliver messages to recipients on the list. The system may continue attempting to deliver messages to recipients until it finds a recipient who is available to receive the message. The authentication system is used to ensure the recipient is a person and not a machine. The messages could be audio messages delivered using a telephone network or messages delivered over an SMS network.
Systems and methods for providing call verification
Systems and methods for providing call verification to prevent voice phishing, comprising: receiving a first API call, wherein the first API call is a call request from a service provider to establish a call with a client device associated with a client of the service provider; verifying an identity of the service provider, wherein verifying the identity of the service provider comprises: generating a second API call; transmitting the second API to a verification system; and receiving verification of the service provider from the verification system; transmitting a notification to the client device that includes an indication that an incoming call is from a verified service provider; verifying the identity of the client; and establishing the call between the service provider and the client after both the identity of the service provider and the identity of the client are verified.
ROOM SENSOR APPLICATIONS AND TECHNIQUES
The disclosure relates to a method, apparatus and system to provide automated audio video conferencing in a conference room. In an exemplary embodiment, the disclosure relates to a mobile device having one or more processors and circuitry. The circuitry may execute a first logic, a second logic and a third logic. The first logic may be configured to receive instructions to connect the mobile device to a wireless equipment in a conference room. The second logic may be configured to obtain conference room information. The third logic may be configured to transmit a request to pair with a wireless equipment in the conference room. The third logic may be further configured to: receive information in a first communication mode that a code challenge will be issued, receive a code challenge in the second communication mode and pair the mobile device with the wireless equipment.
AUTHENTICATION USING DTMF TONES
A method of obtaining and automatically providing secure authentication information includes registering a client device over a data line, storing information and a changeable value for authentication in subsequent telephone-only transactions. In the subsequent transactions, a telephone call placed from the client device to an interactive voice response server is intercepted and modified to include dialing of a delay and at least a passcode, the passcode being based on the unique information and the changeable value, where the changeable value is updated for every call session. The interactive voice response server forwards the passcode and a client device identifier to an authentication function, which compares the received passcode to plural passcodes generated based on information and iterations of a value stored in correspondence with the client device identifier. Authentication is confirmed when a generated passcode matches the passcode from the client device.
Electronic apparatus and control method thereof
Disclosed is an electronic apparatus. The electronic apparatus includes a communicator comprising communication circuitry, and a processor configured to control the electronic apparatus to, in response to a call request being received through the communicator, transmit CAPTCHA information to an external device that requests the call, and in response to receiving response information about the CAPTCHA information from the external device, identify a counterpart that requests the call based on whether the response information is matched with the CAPTCHA information, and provide information on the identified counterpart.
Secure authentication of a user
A device detects a communication involving a user associated with an account and a service representative, and sends, to a user device associated with the account, an authentication notification that causes the user device to display an authentication field for the user. The device sends, to a service representative device associated with the service representative, a message that indicates that the service representative is to request, via the communication, the user to enter personal information associated with the user into the authentication field, where the user device is configured to generate a first authentication code based on a user input received from the user device in the authentication field. The device generates a second authentication code based on personal information associated with the account from a data structure, receives the first authentication code, and performs an action based on the first authentication code and the second authentication code.
Delayed interactive auto attendant
Aspects of the subject disclosure may include, for example, a method of receiving, by a processing system including a processor, a call for a subscriber; determining, by the processing system, that the call is from an interactive voice response (IVR) system; determining whether the IVR system is providing a query that requires a response; and responsive to a first determination that the IVR system requires the response, providing the response. Other embodiments are disclosed.
SECURE AUTHENTICATION OF A USER
A device detects a communication involving a user associated with an account and a service representative, and sends, to a user device associated with the account, an authentication notification that causes the user device to display an authentication field for the user. The device sends, to a service representative device associated with the service representative, a message that indicates that the service representative is to request, via the communication, the user to enter personal information associated with the user into the authentication field, where the user device is configured to generate a first authentication code based on a user input received from the user device in the authentication field. The device generates a second authentication code based on personal information associated with the account from a data structure, receives the first authentication code, and performs an action based on the first authentication code and the second authentication code.
Call data management platform
A device may receive voice call data indicating that a voice call has been initiated between a first device and an interactive voice response device. The device may obtain, based on the voice call data, a user account identifier identifying a user account and obtain, based on the user account identifier, user account data including user authentication data. The device may receive user input provided by the first device during the voice call and determine, based on the user authentication data, that the user input fails to authenticate a user associated with the user account. The device may receive data indicating that the voice call has terminated and identify, based on the user input failing to authenticate the user, a second device. The device may perform an action based on the second device and the voice call data.
Voice captcha and real-time monitoring for contact centers
A call screening computing system is described that is configured to perform voice captcha and real-time monitoring of calls into a contact center of an organization. The call screening computing system includes a chat bot configured to operate as an AI-based call screener. The chat bot is configured to perform voice captcha by sending a random question to a user device placing a call into the contact center, and analyzing the received answer to determine whether a user of the user device is human or a robot. The chat bot is configured to, based on the user being human, determine whether the user is a legitimate customer of the organization by generating and presenting authentication challenges to the user device. The chat bot may be configured to monitor and interact with a conversation between the user and an agent of the organization during the call into the contact center.