H04M3/4365

Systems and methods for intercepting communications

Tangible, non-transitory, machine-readable media include instructions that cause a processor to receive a first indication that a user is attempting to communicate with a provider, and intercept communication between the user and the provider based on the first indication being received. The instructions also cause the processor to send user information to a provider application server based on the first indication being received, and display a visual interface that establishes communication with the relevant provider department or performs a transaction based on the first indication being received. The instructions further cause the processor to receive a second indication associated with performing the action associated with the provider via the visual interface; and performing the action based on the second indication being received.

Call routing methods and systems

A system can route calls based on a minimum expected delay, classification, and priority of the call. In some embodiments, when a call is received, the call is classified and prioritized within the classification. A minimum expected delay time is determined. Based on the minimum expected delay time, the classification, and the prioritization, the call is routed to a representative with instructions on how the call should be treated.

Intercepting and challenging unwanted phone calls

A call challenger can receive a user input from a called party identity to opt-in to a call challenge service, and a second user input of a keyword. When the call challenger receives a call directed to a user equipment of the called party identity, the call challenger can prompt the calling party to provide an audible response. In response to a receipt of the audible response, the call challenger can convert the audible response to a text. The call challenger can compare the text with the keyword to determine if there is a sufficient match. In response to the determining the output of the comparing does not satisfy a threshold match score, the call challenger can prevent the call from connecting with the user equipment.

System and method for managing routing of customer calls to agents

A call management system of a call center retrieves from a customer database enterprise customer data associated with an identified customer in a customer call, which may include customer event data, attributions data, and activity event data. The customer database tracks prospects, leads, new business, and purchasers of an enterprise. The system retrieves customer demographic data associated with the identified customer. A predictive model is selected from a plurality of predictive models based on retrieved enterprise customer data. The selected predictive model, including a logistic regression model, and tree-based model, determines a value prediction signal for the identified customer, then classifies the identified customer into a first value group or a second value group. The system routes a customer call classified in the first value group to a first call queue assignment, and routes a customer call classified in the second value group to a second call queue assignment.

Method, system and device for permitting unfamiliar call
11695870 · 2023-07-04 ·

A method for permitting unfamiliar call, applied to a communication device having a memory and a call-blocking app to provide an unfamiliar call, includes the steps of: configuring an area in the memory of the communication device as a storage unit; recording at least one password into a password-correlated table in the storage unit, each of the at least one password being related to a specific user of the communication device; as an unfamiliar call is received, asking a caller of the unfamiliar call to provide an answer for a trivial question immediately provided by the communication device; determining whether or not the answer matches any of the at least one password in the password-correlated table; forwarding the unfamiliar call to the user corresponding to the matched password listed in the password-correlated table if positive; and, blocking the unfamiliar call if negative.

SUSPICIOUS CALL HANDLING SYSTEM, SUSPICIOUS CALL HANDLING METHOD, OUTGOING/INCOMING CALL INFORMATION COLLECTION SERVER AND PROGRAM
20220417360 · 2022-12-29 ·

A suspicious call handling system that detects and handles a suspicious call within a communication network includes an outgoing and incoming call information collecting server 10 and session control servers 20A to 20C. The outgoing and incoming call information collecting server 10 includes a storage unit 15 that stores a suspicious call condition, a collecting unit 11 that collects outgoing and incoming call information from each of the session control servers 20A to 20C within a communication network, and a searching unit 12 that searches for a phone call that matches the suspicious call condition from the outgoing and incoming call information and gives a notification of the phone call to the session control servers 20A to 20C accommodating a user to which the phone call is connected. The session control servers 20A to 20C include an action unit 24 that executes an action, which has been set in advance, in a case where it is detected that a call has been transmitted to a user who has received the notification from the outgoing and incoming call information collecting server 10.

METHOD, SYSTEM AND DEVICE FOR PERMITTING UNFAMILIAR CALL
20220394128 · 2022-12-08 ·

A method for permitting unfamiliar call, applied to a communication device having a memory and a call-blocking app to provide an unfamiliar call, includes the steps of: configuring an area in the memory of the communication device as a storage unit; recording at least one password into a password-correlated table in the storage unit, each of the at least one password being related to a specific user of the communication device; as an unfamiliar call is received, asking a caller of the unfamiliar call to provide an answer for a trivial question immediately provided by the communication device; determining whether or not the answer matches any of the at least one password in the password-correlated table; forwarding the unfamiliar call to the user corresponding to the matched password listed in the password-correlated table if positive; and, blocking the unfamiliar call if negative.

Call content management for mobile devices

One example method of operation may include identifying a call to a mobile device, determining whether the call includes call content data intended for the mobile device, initiating an active session and a time to live (TTL) associated with the call content data, forwarding the call content data to the mobile device when the call includes call content data associated with the caller, and receiving a content confirmation from the mobile device that the call content data was received.

Systems and methods for providing calling party information

System and methods for providing calling party information are disclosed. In one implementation, a server for providing calling party information includes one or more processors configured to receive a query for calling party information from a carrier. The query includes an identifier associated with the calling party. The processors are further configured to determine a score based on one or more previously obtained queries, generate the calling party information based on the score, and transmit the calling party information to the carrier. The carrier transmits the calling party information to a device associated with the called party as a Caller ID Name (CNAM).

PARALLEL PATH CALLER VERIFICATION CONTROLLER

The present disclosure describes techniques for determining whether a communication request is associated with a legitimate communication or spoof communication, prior to establishing the connection. A Parallel Path Caller Verification (PPCV) controller is described that is configured to intercept a communication request from an originating device and generate a proof-of-identity (PoI) message for delivery to the originating device. Upon receipt of a reply message that is responsive to the PoI message, the PPCV controller may determine whether the communication is a legitimate communication. If the communication is determined as legitimate, the PPCV controller may establish a communication based on the communication request.