H04M7/1295

Audio tokens for multi-factor authentication

Techniques are described for performing multi-factor authentication of a user during a service session, based at least partly on a code conveyed using an audio file. A code is generated that corresponds to the user and/or their user device. A playback device that is registered to the user can be used to output a playback of an audio file that encodes the code. The playback of the audio file is conveyed through the service session by the user device and received by a backend server, which analyzes the playback of the audio file to extract the code. The user can be authenticated based at least partly on verifying the code that is extracted from the playback of the audio file, by comparing the extracted code to the code that was generated and sent to the playback device.

CALL CLASSIFICATION THROUGH ANALYSIS OF DTMF EVENTS

Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.

Call classification through analysis of DTMF events

Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.

MAPPING OF TELECOMMUNICATIONS SOFT CLIENT INPUT TO FEATURE ACCESS CODES OF A TELECOMMUNICATIONS SERVICE
20220303394 · 2022-09-22 ·

The technology disclosed herein enables user input mapping to Feature Access Codes (FACs) of a telecommunications soft client. In a particular embodiment, a method includes, in a user system executing a telecommunications soft client, identifying a Feature Access Code (FAC) that, when sent to a telecommunications service compatible with the telecommunications soft client, triggers an action in the telecommunications service on behalf of the telecommunication soft client. The method further includes mapping a definition of user input to the FAC and, in response to receiving, from a user, user input defined by the definition, sending the FAC to the telecommunications service.

EMOJI COMMANDED ACTION
20220180336 · 2022-06-09 ·

A system and method for receiving and executing emoji based commands is disclosed. The system and method may include processes such as identifying emojis in a message, determining one or more action based on the emoji, and completing the determined actions.

SYSTEMS AND METHODS FOR TONE TO TOKEN TELECOMMUNICATIONS PLATFORM
20220198428 · 2022-06-23 ·

Methods and systems are disclosed for enabling the generation of a token corresponding to a tone generated by a telephony system, comprising receiving one or more dual tone multi-frequency (DTMF) tones generated by a telephony system, generating a token based on the one or more DTMF tones; and transmitting the generated token to a merchant system.

Emoji commanded action

A system and method for receiving and executing emoji based commands in messaging applications. The system and method may include processes such as identifying emojis in a message, determining one or more action based on the emoji, and completing the determined actions.

METHOD FOR PROCESSING VOICE MESSAGES, METHOD FOR DEACTIVATING DTMF CODING AND METHOD FOR PROCESSING A REQUEST TO DEACTIVATE DTMF CODING
20220086284 · 2022-03-17 ·

Methods are described for processing voice messages, for deactivating DTMF coding, and for processing a request to deactivate DTMF coding. The method for processing voice messages using a terminal includes sending a request to a voice server to be interpreted by the server to deactivate DTMF coding on a communication channel between the server and the terminal, receiving, from the server, a datum relating to the terminal's configuration, interpreting the configuration datum and applying to the terminal a configuration mode obtained from the interpretation, and processing voice messages using the terminal according to the configuration mode.

Systems and methods for tone to token telecommunications platform
11308475 · 2022-04-19 · ·

Methods and systems are disclosed for enabling the generation of a token corresponding to a tone generated by a telephony system, comprising receiving one or more dual tone multi-frequency (DTMF) tones generated by a telephony system, generating a token based on the one or more DTMF tones; and transmitting the generated token to a merchant system.

Appointment monitoring and tracking system
11289208 · 2022-03-29 · ·

A computer system includes a client-side presentation layer processor; a server-side service layer component including at least one application programming interface (API) controller, at least one repository pattern processor, and a data layer processor; and a back-end layer component comprising at least one structured query language (SQL) server and a cache, wherein the client-side presentation layer processor interprets conversational modes directed to dialogues programmed in the computer system.