Patent classifications
H04M2203/6081
APPARATUSES AND METHODS FOR CALL ADDITION CONTROL
A method for call addition control in a User Agent (UA) or a call service system is provided. The UA or the call service system receives or initiates a call addition request comprising information of a called party during a call. The UA or the call service system determines whether the called party is already present in the call. The UA or the call service system blocks the call addition request in response to the called party being already present in the call.
Remote management
A system enables collaboration through electronic devices executes software or an operating system feature that allows a first device's computing environment to run remotely on a second devices computing software by scanning predetermined wireless channels to detect remote clients via a communication controller. The system transmits device profiles that include protocol versions that multiple clients support. The system generates a link layer that joins a first device to a second device and generates authenticating keys that establish a communication channel. The system enables operating modes of the first and second devices that establish the content and control of those devices.
INVISIBLE INTERCOM AND ACCESS SYSTEM AND METHOD
An invisible intercom and access system and method. The invisible intercom and access system may include a visitor device configured to make a phone call to a specific phone number; one or more authorized point of contact (APoC) device configured to receive the phone call and having an input configured to receive a code that produces tones; one or more third party device configured to control access to one or more access point of a property or building; and an invisible intercom and access apparatus configured to receive the phone call from the visitor device and connect the phone call to the one or more APoC device, recognize the tones of the code input at the one or more APoC device, and control or send a control signal to the one or more third party device. The invisible intercom and access method may include receiving via an invisible intercom and access apparatus a phone call from a visitor device using a specific phone number provided to a visitor at one or more access point of a building or property; connecting via the invisible intercom and access apparatus the phone call to one or more APoC device; recognizing via the invisible intercom and access apparatus tones of a code input by the one or more APoC device; and controlling the one or more third party device in response to the recognizing of the tones.
Secure call center communications
This disclosure describes techniques for authenticating a person that seeks to engage in a voice call session with a call center agent, an interactive voice response system, or other system. In one example, this disclosure describes a method that includes storing information associating an authorized device with an account; receiving, over a network and from a device operated by a user, authentication credentials for the user; determining, based on the authentication credentials, that the user is authorized to access the account; receiving, over the network and from the device operated by the user, a request to engage in a voice conversation; responsive to receiving the request, accessing the phone number associated with the authorized device; and initiating a voice call session by placing a call, over the network, to the phone number associated with the authorized device.
Methods and systems for customizing interactive voice response calls
Methods and systems described in this disclosure allow customers to personalize their phone experience when calling into an organization. In some embodiments, customers who may benefit from this service are identified based on the content of the customer's previous or current phone calls to the organization. The identified customers may be invited to enroll and to provide preferences for a customized Interactive Voice Response experience. In some embodiments, the customer can elect to hear the balances of one or more of his accounts without going through a phone menu or asking a representative to look up the relevant amounts. Once enrolled, when the customer dials into the organization and upon successful authentication, the organization proactively states the customer's account balances with no further customer request.
Door-Knocking For Teleconferencing
A method for teleconferencing between a monitoring device and a user device includes establishing an audio channel connection between the user device and the monitoring device of a remote user; displaying an entry code on a display of the monitoring device; obtaining from a user of the monitoring device a verbal confirmation of the entry code; and, in response to receiving the entry code from the remote user, enabling a camera of the monitoring device. In response to the verbal confirmation, the entry code is sent to the remote user. Enabling the camera of the monitoring device establishes an audio-visual connection between the user device and the monitoring device.
CALL AUTHORIZATION AND VERIFICATION VIA A SERVICE PROVIDER CODE
One example method of operation may include receiving a call message associated with a call, determining a service provider network identifier based on a telephone number of a call origination device, identifying, from the call message, an identity header with a link to a public certificate repository storing a public certificate assigned to a service provider network hosting the call origination device, retrieving a service provider code assigned to the service provider network from the public certificate, and determining whether the service provider code matches the service provider network identifier as identified from a verification table.
Methods and systems for transferring call context
Methods and systems described in this disclosure receive a call from a device associated with a caller and request an indication of a context of the call. The system can send a request for authentication credentials in a push notification to the device. The push notification can be linked to an authentication tab or page in an application. After authentication of the caller, the system can direct the application to cause a tab or page associated with the subject matter of the call to be displayed on the qualified device.
Enhanced call content delivery with message code
One example method may include identifying a call notification of a call intended for a mobile device, retrieving call data having a code object identifier with the call notification, forwarding the call data with a code object to the mobile device based on the code object identifier prior to forwarding the call, and forwarding the call to the mobile device.
SYSTEMS AND METHODS FOR AUTHENTICATING CALLS FOR A CALL CENTER
Disclosed embodiments may include a method for authenticating calls for a call center where the user can authenticate before or after starting a call to a call center using an application on a user device. The system determines what level of authentication is necessary depending on the task the user wants to accomplish during the call. The system may direct the user to provide credentials, such as a username and password, for some tasks. Other tasks may require the user to verify their financial card by taking a photo of their financial card or tapping their financial card to their device and allow the device to interact with the financial card using NFC technology. Once appropriately authenticated, the system then allows the user to make a call to the call center and also sends a signal to the call center that the user has been previously authenticated.