H04M2203/609

Utilizing a mnemonic for communicating sensitive data

Systems and methods for utilizing a mnemonic to communicate sensitive data to an agent are disclosed. In aspects, a computer-implemented method comprises: establishing a telephone connection between a caller and an agent; entering an encryption key received from the agent into a mnemonic application of the computer device to permute an algorithm of the mnemonic application; receiving sensitive data in the form of one or more alphabetic, numeric or alpha-numeric sequence; initiating the mnemonic application to generate a mnemonic of the sensitive data using the encryption key, wherein the mnemonic is a sequence of words representing the sensitive data; displaying the mnemonic to the caller; and conveying audio communication of the mnemonic to the agent through the telephone connection to enable remote decoding of the mnemonic back into the at least one sensitive number sequence.

Protecting confidential conversations on devices

A first mobile device may receive user-input data for generation of an electronic message. The electronic message may be generated as the user-input data is received. The first mobile device may identify sensitive information, within the electronic message. The first mobile device may secure the sensitive information. The first mobile device may disable a screen capture function of the first mobile device. The first mobile device may send the electronic message to a second mobile device. The sending of the electronic message to the second mobile device may include the sending of the secured sensitive information.

Apparatus, system, and method of conference assistance

A conference assistance system and method for assisting a user in utilizing conference-related information, each of which: receives input of voice or writing of at least one meeting participant; determines whether text data representing the received voice or writing is to be used by the conference assistance system to generate assistance information, to generate a determination result; when the determination result indicates that the text data is to be used, generates, based on the text data, assistance information for assisting the meeting participant; and controls a display to display the generated assistance information.

Location-based security rules
10354079 · 2019-07-16 · ·

Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper identification information. The proper identification information is based in part on the location of the user and/or the user's access request.

APPARATUS, SYSTEM, AND METHOD OF CONFERENCE ASSISTANCE

A conference assistance system and method for assisting a user in utilizing conference-related information, each of which: receives input of voice or writing of at least one meeting participant; determines whether text data representing the received voice or writing is to be used by the conference assistance system to generate assistance information, to generate a determination result; when the determination result indicates that the text data is to be used, generates, based on the text data, assistance information for assisting the meeting participant; and controls a display to display the generated assistance information.

Apparatus, system, and method of conference assistance

A conference assistance system and method for assisting a user in utilizing conference-related information, each of which: receives input of voice or writing of at least one meeting participant; determines whether text data representing the received voice or writing is to be used by the conference assistance system to generate assistance information, to generate a determination result; when the determination result indicates that the text data is to be used, generates, based on the text data, assistance information for assisting the meeting participant; and controls a display to display the generated assistance information.

SECURE CALL ANSWERING

In currently available mobile devices (e.g., a user equipment (UE)), no authentication occurs at the mobile device to answer an incoming call at the mobile device. In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus for secure call answering are provided. The apparatus is a first UE. The apparatus receives an incoming call originated from a second UE. The apparatus determines whether the incoming call originated from the second UE is a secure incoming call. The apparatus also receives a secure authentication input upon determining that the incoming call is a secure incoming call. Further, the apparatus determines whether the secure authentication input matches with authentication information upon receiving the secure authentication input. Additionally, the apparatus answers the received secure incoming call originated from the second UE when the received secure authentication input matches the authentication information.

Location-Based Security Rules
20180268153 · 2018-09-20 · ·

Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper identification information. The proper identification information is based in part on the location of the user and/or the user's access request.

System and method for geo-location based media recording for a contact center

A system and method for recording media for a contact center includes establishing via a processor in a first geographic location, a communication session between first and second communication devices. The processor determines that media exchanged during the media session is to be recorded. The processor identifies a second geographic location associated with a resource involved in the media session, and identifies a media controller associated with the second geographic location. The media controller bridges the media path between the first and second communication devices, and the media exchanged during the media session is recorded.

Computer-Implemented System And Method For Call Status Determination
20180198909 · 2018-07-12 ·

A computer-implemented system and method for call status determination is provided. A request for verification of incoming calls to a party is received. An incoming call from a caller to that party is identified and metadata associated with the incoming call is obtained. An identification of the caller and whether a security certificate is present is determined from the metadata. A connection status of the call is determined based on one of a presence and absence of the security certificate. A notification of the connection status is provided to the party.