H04M2203/6081

System and methods for using real-time context to proactively start a communication with a customer through a different device

Systems, apparatuses, and methods for providing support or service to a customer, such as a user of a service or product. The support or service may include one or more of assistance with operation, registration, configuration, trouble shooting, account creation, installation of software, replacement, repair, payment for services, and obtaining coverage under a warranty. A bootstrap code or other form of data is generated by a customer support provider and is transferred to the customer and used to authenticate the customer and enable access to securely stored contextual information regarding the device and/or identification information regarding the customer. The code may be provided by the customer support provider to a company and then provided to the customer.

Managing phone identification via immutable connection verification

Embodiments of the present invention provide methods, computer program products, and systems. Embodiments of the present invention can create an authentication mechanism for communication services utilizing a distributed recording system. Embodiments of the present invention can then, in response to receiving a request to connect with a device, utilize the created authentication mechanism to connect with or prevent connection with the device.

ADAPTABLE WARNINGS AND FEEDBACK

Co-browsing sessions between a customer and an agent are conducted in real-time and provide an opportunity for the customer to receive assistance or guidance from the agent while performing operations online, such as completing a web form. Systems monitor the inputs provided by the customer. If an error is detected, such as entering confidential information in a non-confidential field, the customer is warned and the agent may be blocked from seeing the data. However, this may be due to a mistake. As provided herein, if a customer tells the agent that the entry is correct a server may process the comment to the agent and automatically remove the warning, allow the customer to continue typing in the field, allow the agent to see the content provided, and/or automatically update the logic to reduce the chances of erroneous error detection in subsequent encounters with similar data.

Private vertical communication platform
11425540 · 2022-08-23 ·

The present disclosure provides a method of sending vertical SMS messages comprising a lead administrator contacting a first server with a request to create a group and providing certain identifying information to the first server; assigning an identification number to the group; creating and assigning at least one access code to the group; sharing the access code to desired members of the group and adding members to the group that send the access code to the identification number; and sending a SMS message to members of the group from the lead administrator, wherein the SMS messages are only shared vertically within the group.

METHOD FOR AUTHENTICATION, USER TERMINAL AND AUTHENTICATION SERVER FOR EXECUTING THE SAME

An authentication server according to an embodiment disclosed includes a number receiver that receives a number of a user terminal from a callee who has received a call originated from the user terminal, an device authenticator that determines whether to generate an authentication key based on the number of the user terminal received from the callee and a caller number received from the user terminal, and generates the authentication key when it is determined to generate the authentication key, and an authentication key transmitter that transmits the authentication key to the user terminal.

VERIFYING TRUSTED COMMUNICATIONS USING ESTABLISHED COMMUNICATION CHANNELS

In various examples, communications from a host device—which may be associated with an entity—and to a client device may be are verified through established channels of communication. Systems and methods are disclosed that use authentication signals and notifications, which may include predetermined passwords and time-sensitive values, to facilitate verification of the communication between the host device and client device. The notifications may be delivered using applications or web-based applications that are associated with an entity. Once the communication has been verified as trusted, the host device and/or the client device may present notifications that the communication is verified as trusted. The notifications may be presented using audio, video, and/or haptic methods.

SYSTEM AND METHOD OF PERFORMING SECURED TRANSACTIONS IN A COMMUNICATION NETWORK
20220092583 · 2022-03-24 · ·

A system and a method of data communication between a first computing device, associated with a first user, and at least one second computing device associated with a second user may include: receiving, by the first computing device, one or more data elements pertaining to details of a transaction request from the second computing device, via a voice channel; extracting said transaction request details by the first computing device; transmitting, by the first computing device, one or more authentication data elements of an electronic wallet module, comprised in the first computing device, to the second computing device, via the voice channel; and carrying out the requested transaction by the first computing device, based on the extracted transaction request details and the electronic wallet authentication data.

Secure text-to-voice messaging
11270702 · 2022-03-08 · ·

A personal voice model is created using a person's voice, essentially, voice cloning. When user wants to send a message to another person from his mobile phone or similar device, the user types the message and it is converted to a speech message using the voice model created. The speech message is delivered either to a voicemail or another medium which accepts a voice message. The text can be converted to a different language as well and send a voice message in a different language.

NETWORKING BETWEEN VOIP-AND PSTN-CALLS
20210337070 · 2021-10-28 ·

Programmatically reversing numerical line identity presented at a communications services gateway into named IP Telephony users with “prior association”, delivers dynamic “reverse address resolution” switching connections from ground to cloud, permitting any conventional telephone to dial and connect to any associated IP Telephony endpoint in the world, without changes to the conventional telephone. Reversing line identity into associated named users bridges both the addressability and economic divide between mass conventional “paying” (mobile and fixed) and “free”. IP Telephony networks. A system for supporting communications between a user on an IP-addressed-communications-device and a telephony subscriber device, the telephony subscriber device having a corresponding telephone number, includes: one or more service nodes configured to: receive from the user the telephone number of the telephony subscriber device and create an association from the telephone number to the user, wherein the association allows the telephony subscriber device to connect to the user.

Multi-factor authentication of caller identification (ID) identifiers

Systems and methods for multi-factor authentication of a caller identification (ID) identifier are disclosed. In embodiments, a method includes: receiving, by a computing device of a call recipient, a call request message from a remote caller device of a caller, the call request message including an authentication token shared between the caller and the call recipient, and an identifier; authenticating the caller using the authentication token; saving an authorized caller record in an authorized caller list on the computing device, the authorized caller record including the identifier; receiving an incoming telephone call from the caller, the incoming call including a caller ID identifier; determining that the caller ID identifier matches the identifier in the authorized caller record; and initiating completion of the call based on the determining that the caller ID identifier matches the identifier in the authorized caller record.