H04M2203/6081

ENHANCED CALL CONTENT DELIVERY WITH MESSAGE CODE
20220329637 · 2022-10-13 ·

One example method may include identifying a call notification of a call intended for a mobile device, retrieving call data having a code object identifier with the call notification, forwarding the call data with a code object to the mobile device based on the code object identifier prior to forwarding the call, and forwarding the call to the mobile device.

Apparatuses and methods for call addition control

A method for call addition control in a User Agent (UA) or a call service system is provided. The UA or the call service system receives or initiates a call addition request comprising information of a called party during a call. The UA or the call service system determines whether the called party is already present in the call. The UA or the call service system blocks the call addition request in response to the called party being already present in the call.

Techniques for registering an internet protocol (IP) endpoint for emergency services calling

Techniques are described for obtaining current location data for a non-traditional telephony endpoint for emergency calling purposes. An emergency services (ES) provider receives, from a telephony server responding to a telecommunication session establishment request from a telephony endpoint, a location registration request, the location registration request including telephony endpoint identification information. The ES provider may push a quick response (QR) code to the telephony endpoint, the QR code when scanned by a mobile device causes the mobile device to retrieve its current location data. The ES provider may then receive the current location data from the mobile device and store it and the telephony endpoint identification information for subsequent use should a 911 call be made from that telephony endpoint. The ES provider may then send the telephony server an authorization acknowledgement for the telecommunication session establishment request.

Authentication using DTMF tones
11659082 · 2023-05-23 · ·

A method of obtaining and automatically providing secure authentication information includes registering a client device over a data line, storing information and a changeable value for authentication in subsequent telephone-only transactions. In the subsequent transactions, a telephone call placed from the client device to an interactive voice response server is intercepted and modified to include dialing of a delay and at least a passcode, the passcode being based on the unique information and the changeable value, where the changeable value is updated for every call session. The interactive voice response server forwards the passcode and a client device identifier to an authentication function, which compares the received passcode to plural passcodes generated based on information and iterations of a value stored in correspondence with the client device identifier. Authentication is confirmed when a generated passcode matches the passcode from the client device.

METHOD AND APPARATUS FOR DETECTING UNAUTHORIZED USE OF A MOBILE DEVICE
20170359720 · 2017-12-14 ·

A apparatus and method is disclosed for detecting an unauthorized use of a mobile device. In one embodiment the apparatus includes comparison logic that determines whether a first user of the mobile device is a second user of the mobile device by comparing a first set of electronic fingerprints associated with the mobile device to a second set of electronic fingerprints also associated with a mobile device. In one embodiment of the first set of electronic fingerprints identifies the first user and includes a first user communication electronic fingerprint, a first network communication electronic fingerprint, and a first power status electronic fingerprint. The second set of electronic fingerprints identifies the second user of a mobile device includes a second user communication electronic fingerprint, a second network communication electronic fingerprint, and a second power status electronic fingerprint.

System and method for customizing inmate communication notification
09843448 · 2017-12-12 · ·

The present disclosure provides details of a system and method for customizing an inmate communication notification. Such a system provides an inmate different customized notification messages to be played to different called parties. The system includes a list of different contacts, and each of the contacts can be associated with one or more contact numbers. Each contact number is associated with one or more customized notification messages. The customized notification messages include terms, phrases, and sentences that draws the called party's attention and sound familiar to the called party. The customized notification messages include customized text files, audio files, and video files. An inmate chooses one or more customized notification messages to be played to a called party.

Method for authentication, user terminal and authentication server for executing the same

An authentication server according to an embodiment disclosed includes a number receiver that receives a number of a user terminal from a callee who has received a call originated from the user terminal, an device authenticator that determines whether to generate an authentication key based on the number of the user terminal received from the callee and a caller number received from the user terminal, and generates the authentication key when it is determined to generate the authentication key, and an authentication key transmitter that transmits the authentication key to the user terminal.

FAX AND PRINT METHOD AND FAX SYSTEM USING SAME
20170353625 · 2017-12-07 ·

A fax and print method includes steps of providing a first fax device, a second fax device and a portable communication device, allowing the first fax device to send a fax password and a document to the second fax device and a data message and a text message corresponded to the fax password to the portable communication device, allowing the portable communication device to receive the text message and the data message, allowing the second fax device to receive the fax password and the document, generating a wireless connection between the portable communication device and the second fax device, judging if the text message is matched with the fax password, and printing the document when the result of the judgement is True. Therefore, the risk of being stolen is reduced through a transmission without the internet. The user does not have to remember any password. The user experiences are enhanced.

SYSTEM(S) AND METHOD(S) FOR ENABLING A REPRESENTATIVE ASSOCIATED WITH AN ENTITY TO MODIFY A TRAINED VOICE BOT ASSOCIATED WITH THE ENTITY
20230188481 · 2023-06-15 ·

Implementations are directed to enabling a representative associated with an entity to quickly and efficiently modify a voice bot associated with the entity. The voice bot can be previously trained to communicate with user(s) on behalf of the entity through various communication channels (e.g., a telephone communication channel, a software application communication channel, a messaging communication channel, etc.). Processor(s) of a computing device can receive, from the representative, representative input to modify behavior(s) and/or parameter(s) that the voice bot utilizes in communicating with the plurality of users via the communication channels, determine whether the representative is authorized to cause the behavior(s) and/or parameter(s) to be modified, and cause the behavior(s) and/or parameter(s) to be modified in response to determining that the representative is authorized. Notably, the representative input can be received through the same communication channels that the user(s) utilize to communicate with the voice bot.

Methods and systems for multiple channel authentication

Methods and systems for multiple channel authentication are described. In one embodiment, a request for an interaction is initiated from within a mobile application. The request may include authentication information and contextual information relating to a current exchange between the mobile application and an organization. The user may be authenticated with the authentication information and the request may be routed to a representative based on the contextual information to continue the exchange.