Patent classifications
H04M2203/6081
Parallel data provision
A system includes a client device including a processor, a telephony radio that supports telephony communications, and a data radio that supports data communications. The client device conducts, via the telephony radio, a call with a telephony service. Further the client device identifies a context of the call, identifies a subset of stored private data associated with the context of the call; and in parallel with the call, provides the subset of the stored private data, via a data radio, to a data service.
Communication channel enhancement
A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests and/or customer service agent control over a customer's access device. Some embodiments include logic configured to manage and enhance communication channels between devices.
PARALLEL PATH CALLER VERIFICATION CONTROLLER
The present disclosure describes techniques for determining whether a communication request is associated with a legitimate communication or spoof communication, prior to establishing the connection. A Parallel Path Caller Verification (PPCV) controller is described that is configured to intercept a communication request from an originating device and generate a proof-of-identity (PoI) message for delivery to the originating device. Upon receipt of a reply message that is responsive to the PoI message, the PPCV controller may determine whether the communication is a legitimate communication. If the communication is determined as legitimate, the PPCV controller may establish a communication based on the communication request.
System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions
A system for controlling, monitoring, and recording of wireless telecommunications services associated with penal institutions is provided comprising a portable electronic device and application executing on the device that present a listing of available call destinations based on receiving a first instruction from a first authorized party possessing the device. The application receives a second instruction comprising a choice of a first call destination from the listing. The application transmits a third instruction requesting connection with the destination and joins a second authorized party associated with the first call destination in a first voice session. The application joins the first authorized party to the first session. The application further joins the first party to a second voice session initiated by the second party based on determining that the second party initiated the second session from the first destination. The device originates and receives transmissions solely upon approval of the application.
CONTACT LOOKUP OPERATIONS DURING INOPERABILITY OF MOBILE DEVICES
There are provided systems and methods for contact lookup operations during inoperability of mobile devices. A service provider, such as an online transaction processor, may provide additional services for secure contact lookup when a computing device of a user is nonoperational or unavailable. The user may establish a contact identifier and authentication mechanism with the service provider and allow access to the user's contacts. Once established, when the user's device is unable to access contacts and/or communication with other devices, the user may utilize the service provider for contact access through a contact lookup system. The user may utilize a different device to access a communication system or application and retrieve a data structure representing the user's contacts. The data structure may then be passed to the corresponding communication system or application interface system, which may then be output to the user.
Automated consent management system and method for managing autoreply messages to incoming calls
The systems and methods disclosed herein provide automated consent management for ensuring compliance with user-consent laws, rules, and/or regulations integrated with the automatic generation and transmission of autoreply messages. In accordance with the disclosed embodiments, a computer system may be configured to communicate with a user over both first and second communication channels, where the system requires the user's consent before it can communicate with the user over the second communication channel. The system may receive an incoming communication, such as a telephone call, from the user over the first communication channel. The computer system may automatically generate an autoreply message, such as a text message, to send to the user over the second communication channel in response to the incoming communication if the computer system automatically determines that the user has provided all necessary user consents for sending the autoreply message over the second channel.
SUBSCRIBER AUTHENTICATION RESPONSIVE TO EMERGENCY SERVICES REGISTRATION
Methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a subscriber of a communications device. The method may include receiving, via a server coupled to a network, a first signal that indicates a modification of one or more location descriptors corresponding to a communications device. The modification may occur in connection with receipt of the one or more location descriptors by an emergency services provider. The method may include storing a record of the modification of the one or more location descriptors in response to creation of one or more new location descriptors corresponding to a subscriber identifier, modification of one or more previously existing location descriptors corresponding to the subscriber identifier, or deletion of the subscriber identifier. The method may additionally include generating a second signal to form or update an electronic or digital identity of the communications device responsive to receiving the first signal.
SYSTEMS AND METHODS FOR INDICATING AND MANAGING A VALIDATION OF A CALLER IDENTIFICATION TO PREVENT IDENTITY SPOOFING
In some implementations, a device may receive a SIP invite associated with a call to a first user device from a second user device. The first user device may be associated with a first network and the second user device may be associated with a second network that is separate from the first network. The SIP invite may include an identity header that indicates a carrier identifier associated with the second network. The device may authenticate the call based on a caller identification associated with the second user device and the carrier identifier. The device may send, based on authenticating the call, the SIP invite to the first user device to indicate, in association with receiving the call and via a user interface, an authorized entity associated with the carrier identifier according to the SIP update.
Methods and systems for customizing interactive voice response calls
Methods and systems described in this disclosure allow customers to personalize their phone experience when calling into an organization. In some embodiments, customers who may benefit from this service are identified based on the content of the customer's previous or current phone calls to the organization. The identified customers may be invited to enroll and to provide preferences for a customized Interactive Voice Response experience. In some embodiments, the customer can elect to hear the balances of one or more of his accounts without going through a phone menu or asking a representative to look up the relevant amounts. Once enrolled, when the customer dials into the organization and upon successful authentication, the organization proactively states the customer's account balances with no further customer request.
System and methods for tamper proof interaction recording and timestamping
A system and method for securely recording voice communications, comprising a network-connected computer server and an authentication system which verifies the validity of voice communications.