Patent classifications
H04M2203/6072
DELAYED INTERACTIVE AUTO ATTENDANT
Aspects of the subject disclosure may include, for example, a method of receiving, by a processing system including a processor, a call for a subscriber; determining, by the processing system, that the call is from an interactive voice response (IVR) system; determining whether the IVR system is providing a query that requires a response; and responsive to a first determination that the IVR system requires the response, providing the response. Other embodiments are disclosed.
Channel-based voice call method and apparatus
A channel-based voice call method, including: accepting a matching request of a client, acquiring a matching result of the client from a matching pool, and returning the matching result to the client; and acquiring a call matching acceptance instruction of the client, allocating a temporary channel and locking the temporary channel, and sending a successfully accepted matching message, a temporary channel number and a channel password to the client, such that the client enters the temporary channel based on the successfully accepted matching message, the temporary channel number and the channel password to make a call.
NETWORKING BETWEEN VOIP-AND PSTN-CALLS
Programmatically reversing numerical line identity presented at a communications services gateway into named IP Telephony users with “prior association”, delivers dynamic “reverse address resolution” switching connections from ground to cloud, permitting any conventional telephone to dial and connect to any associated IP Telephony endpoint in the world, without changes to the conventional telephone. Reversing line identity into associated named users bridges both the addressability and economic divide between mass conventional “paying” (mobile and fixed) and “free”. IP Telephony networks. A system for supporting communications between a user on an IP-addressed-communications-device and a telephony subscriber device, the telephony subscriber device having a corresponding telephone number, includes: one or more service nodes configured to: receive from the user the telephone number of the telephony subscriber device and create an association from the telephone number to the user, wherein the association allows the telephony subscriber device to connect to the user.
SYSTEM AND METHOD FOR PRE-AUTHENTICATION OF CUSTOMER SUPPORT CALLS
A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication to reduce the potential for malicious third-party impersonation of the client. Pre-authorized customer support calls are intelligently and efficiently routed in a manner that reduces the opportunity for malicious call interference and information theft.
Customer Communication System Including Service Pipeline
A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests.
Customer communication system including service pipeline
A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests.
Enabling user access to a cloud-based application
A method and system is disclosed for registering a user to a cloud-based application, for enabling user access to a cloud-based application. It may comprise receiving a registration request for user access to the cloud-based application, the registration request comprising an identifier associated with a telephone apparatus. The method may further comprise initiating a communication to the telephone apparatus using the identifier, and detecting receipt of the communication at the telephone apparatus to establish a telephony connection. The method may further comprise, subsequent to detecting receipt of the communication to establish a telephony connection, registering the user to the cloud-based application for enabling subsequent access.
System and method for pre-authentication of customer support calls
A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication to reduce the potential for malicious third-party impersonation of the client. Pre-authorized customer support calls are intelligently and efficiently routed in a manner that reduces the opportunity for malicious call interference and information theft.
Systems and methods for detecting fraudulent calls using virtual assistants
A system may include a processor that may execute computer-executable instructions that cause the processor to receive caller information regarding an incoming communication from a caller and receive a request from a user to route the incoming communication to a virtual assistant application. The virtual assistant application is configured to interact with the caller and determine whether the caller is associated a fraudulent caller activity stored on databases accessible by the processor. The processor may then receive an indication from the virtual assistant application that the caller is associated with the fraudulent caller activity and forward the incoming communication to another party in response to receiving the indication.
INTELLIGENT TELEPHONE CALL BLOCKING AND MANAGEMENT
An intelligent telephone management and blocking system distributed over one or more backend servers and a remote calling device. The system provides a platform that allows a user to configure rules that process incoming telephone calls in a customized manner for the user. For example, rules can be used to determine how incoming telephone calls are managed. The rules may be generated based on the number itself, the time of call, one or more conditions detectable by the phone, geography, and other parameters. Based on the generated rules, the present system may better detect robo-calls, spam, and other unwanted calls for a user, and block or otherwise handle the calls in an efficient manner on behalf of the user.