Patent classifications
H04M2203/556
System and method for processing high frequency callers
A call processing system and method for processing calls from high volume callers. A frequency of call activity is monitored for callers to determine reception of a call from a high frequency caller. When a call is received from such a caller, provided is information predicted to be requested from the caller prior to the caller being voice connected to a company representative. The retrieved information is then provided to a company representative prior to the caller being voice connected with a company representative as to expedite the call. Additionally, a customized message for the high frequency caller may be generated prior to the caller being voice connected with a company representative whereby the customized message contains information predicted to be responsive to a predicted inquiry from the determined high frequency caller to mitigate the need to connect the caller to a company representative.
Computerized system and method for robocall steering
Disclosed are systems and methods for robocall steering over voice-hosted traffic networks. The disclosed framework provides novel systems and methods for increasing the accuracy and efficiency in tracking, identifying, blocking and preventing robocalls and robocallers. The disclosed systems and methods provide mechanisms for identifying and removing unwanted voice traffic from networks. The disclosed systems and methods analyze voice traffic over a predetermined period of time (e.g., 1 day or 30 days, for example), and leverage this information into a “know your customer” (KYC) score. This score enables incoming calls to be routed, controlled and/or blocked as they are communicated over voice networks.
Systems and methods for managing interaction invitations
The present disclosure relates generally to facilitating routing of communications. One example includes a communication server determining capacities associated with a terminal devices based on workloads for agents associated with the terminal devices. Historical acceptance data is accessed for past interaction invitations to user devices associated with one or more criteria. Current data is then used to determine available interactions and to facilitate interactions using interaction invitations based on the historical data and the current number of available interactions.
Detection and prevention of unwanted calls in a telecommunications system
A method that detects unwanted calls based on information shared between a first telecommunications network provided by a first service provider and a second service provider providing a second telecommunications network including receiving, by a data-processing system, a request to provide a telecommunications service to the first telecommunications network, the request being received by the first telecommunications network from a user of the first telecommunications network through a first gateway, and wherein the request comprises a calling party identification that identified a calling party and a called party identification that identified a called party. The method further includes examining, by the data-processing system, statistics relating to requests for telecommunications services; and generating, by the data-processing system, a first signal when the called party identification in the request appears in the statistics in excess of a predetermined first number of instances within a predetermined first time interval.
Systems and methods for detecting inmate to inmate conference calls
A system for detecting inmate to inmate conference calls in a correctional facility is disclosed herein. The system includes a database and a conference call detection server, wherein the conference call detection server is configured to monitor a plurality of inmate communications, convert an audio signal of each inmate communication to a frequency domain signal, identify frequency data comprising one or more frequency peaks and corresponding frequency values in the frequency domain signal for each inmate communication, generate a record comprising the frequency data for each inmate communication, resulting in a plurality of records, store the plurality of records in the database, detect an inmate to inmate conference call by matching a frequency subset of a new inmate communication with frequency data in a detected record in the database, and verify the inmate to inmate conference call by matching audio with voice biometric samples.
Systems and methods for telephone call regulation based on spam factor and user input
Systems and methods for telephone call regulation include the use of a predictive model. An example method includes receiving, by a predictive model, a telephone number from a user application comprising instructions for execution on a user device and determining, by the predictive model, a spam factor for the received telephone number. The example method further includes determining, by the predictive model, a classification of the received telephone number based on the spam factor and transmitting, by the predictive model, the classification of the received telephone number to the user application. The example method further includes receiving, by the predictive model, a feedback from the user application, the feedback indicative of a corrective classification of the received telephone number and modifying, by the predictive model, the spam factor for the received telephone number based on the corrective classification.
Call center load balancing and routing management
Systems and methods receiving performance data associated with a call center network; utilizing the performance data to create a model of the call center network; employing the model to run a simulation of the call center network that generates performance data associated with the model; using the model to generate solution parameters for the call center network; and providing the solution parameters to the call center network implementation in the call center network.
CALL SET UP FAILURE RATE METRIC AND COMMUNICATION NETWORK OPTIMIZATION BASED THEREON
A computer-implemented method includes generating at least one call detail record for each call initiated on a communication network, aggregating the call detail records generated over a predetermined time period to provide an aggregated call detail record, and calculating a call set up failure rate for the calls from the aggregated call detail record, wherein the call set up failure rate is a measure of the amount of calls that failed prior to ringing at a called party's device. The computer-implemented method further includes adjusting parameters of the communication network when the call set up failure rate is above a threshold.
SYSTEM AND METHOD OF HIGHLIGHTING INFLUENTIAL SAMPLES IN SEQUENTIAL ANALYSIS
Attention weights in a hierarchical attention network indicate the relative importance of portions of a conversation between an individual at one terminal and a computer or a human agent at another terminal. Weighting the portions of the conversation after converting the conversation to a standard text format allows for a computer to graphically highlight, by color, font, or other indicator visible on a graphical user interface, which portions of a conversation led to an escalation of the interaction from an intelligent virtual assistant to a human customer service agent.
Systems and methods for authenticating a caller
Methods and systems described in this disclosure receive a call from a caller, generate a first session through a first channel associated with the caller when the call is received and then send a request for authentication credentials to a device associated with the caller. In some embodiments, sending the request for authentication credentials generates a second session through a second channel associated with the caller. The caller can be authenticated to the first session using communication received during the second session through the second channel.