Patent classifications
H04M3/42042
Digital assistant integration with telephony
Systems and processes for integrating a digital assistant with telephony are provided. For example, an incoming call may be received, from a caller, at an electronic device. A communication session may be established between the caller and the digital assistant of the electronic device. In accordance with a determination that the identification of the caller is unknown, determination is made whether the caller corresponds to an automated calling system. In accordance with a determination that the identification of the caller is known, a response is provided by the digital assistant to the caller. An output including information corresponding to the communication is provided at the electronic device.
AUTOMATIC CALLER IDENTIFICATION TRANSLATION
The invention provides an interrogator for obtaining information associated with a caller identification, such as a telephone number, transmitted within an incoming telephone call including: a receiving device configured to receive the incoming telephone call and to extract the caller identification from the incoming telephone call; an interrogating device configured to receive the extracted caller identification from the receiving device and to interrogate information associated with the caller identification from an external data base, which is configured to operate independently from the user voice communication device for which the incoming telephone call is intended for; and a forwarding device configured to receive and to forward the interrogated information.
System and method for managing routing of customer calls
A call management system of a call center identifies an inbound caller based upon computer analysis of customer identifiers, which may include at least two of customer name, street address, and zip code. Approximate string matching analysis matches n-grams generated from strings within customer identifiers, with n-grams generated from customer identification fields while searching one or more databases. Approximate string matching can incorporate a closeness metric based on Jaccard distance, and a Gaussian mixture model of best matches. In one embodiment, a polymr search engine analyzes customer identifiers of inbound callers to retrieve customer data, such as customer demographic data, matched to the customer identifiers. In another embodiment, the polymr search engine analyzes customer identifiers of inbound callers to identify repeat callers and retrieve previously collected customer data. Retrieved customer data is used in predictive modeling and scoring value of the inbound call, and in routing the scored inbound call.
Region-based connecting of calls using client-specific control and provisioned numbers
Systems and methods are disclosed for client-based control of revising caller identifications (IDs) for communications between a private network and a public network. An apparatus including a communications provider server and processing circuit that communicates client-specific sets of data over an interface protocol. The telecommunications-providing server revises a caller ID for a call based on the client-specific sets of data, an identifier that corresponds to a requesting endpoint, and a geographic region determined from the call request. Further, the telecommunications-providing server connects the VoIP call by accessing and passing a provisioned number. The provisioned number includes the revised caller ID which is a local number identified by the determined geographic region that the endpoint is located.
SPOOFED TELEPHONE CALL IDENTIFIER
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spoofed telephone call identifier are disclosed. In one aspect, a method includes the actions of receiving, by a first computing device, data indicating a placement of a telephone call from a second computing device to a third computing device, wherein the data includes a phone number of the second computing device. The actions further include determining characteristics of the phone number of the second computing device. The actions further include, based on the characteristics of the phone number of the second computing device, determining a likelihood that the phone number of the second computing device is spoofed. The actions further include, based on the likelihood that the phone number of the second computing device is spoofed, determining whether to transmit a notification of the telephone call to the third computing device.
Systems and methods for curation and delivery of content for use in electronic calls
Systems and methods are described herein for a computer-based communication application that displays, along with an incoming call notification, content specific to the parties involved. The application identifies electronic records of events attended by the users, and retrieves content specific to those records. For example, the application may identify electronic mail or meeting notifications sent between the users and concerning a particular subject matter. Images related to that subject matter are then retrieved and displayed during calls between those users. Users are thus presented with customized and personalized content specific to the subject matter of each call, thus helping them better recognize callers and more readily engage with the call.
Method, System, and Computer Program Product for Accessing Data about a Caller from Multiple Data Sources in Real Time
Described are a method, system, and computer program product for accessing data about a caller from multiple data sources in real time. The method includes communicatively connecting with call handling equipment and receiving caller data including a unique caller identifier. The method also includes communicating a request for initial information to a location information database and/or an additional data repository. The method further includes reconfiguring the initial information from an inbound format to a different outbound format such that the initial information is readable by the call handling equipment, a computer aided dispatch system, and/or a public safety information management system. The method further includes communicating a request for and receiving additional information from a cloud-based repository. The method further includes communicating the additional information to the call handling equipment, the computer aided dispatch system, and/or the public safety information management system for display to a user.
Method, system, and computer program product for accessing data about a caller from multiple data sources in real time
Described are a method, system, and computer program product for accessing data about a caller from multiple data sources in real time. The method includes communicatively connecting with call handling equipment and receiving caller data including a unique caller identifier. The method also includes communicating a request for initial information to a location information database and/or an additional data repository. The method further includes reconfiguring the initial information from an inbound format to a different outbound format such that the initial information is readable by the call handling equipment, a computer aided dispatch system, and/or a public safety information management system. The method further includes communicating a request for and receiving additional information from a cloud-based repository. The method further includes communicating the additional information to the call handling equipment, the computer aided dispatch system, and/or the public safety information management system for display to a user.
Independent notification system for authentication
When a customer service representative (CSR) calls a customer, the customer may be able to authenticate himself or herself by providing the CSR with personal identifying information. However, the CSR may be unable to provide information to authenticate himself or herself to the customer. Thus, this patent document describes authentication techniques that can allow the CSR to authenticate himself or herself to the customer. For example, before or during a call that the second person (e.g., CSR) initiates to call a first person (e.g., customer), a notification message may be sent to the first person's user device. The content of notification message displayed on the user device may provide information to the first person which can allow the first person to determine whether the second person is trustworthy.
Obtaining a Caller ID on a Second SIM of a Multi-SIM User Equipment
A user equipment (UE) configured to initiate a first voice call with a first network associated with a first subscriber identity module (SIM) of the UE, receive a paging request from a second network indicating an incoming voice call associated with a second SIM of the UE, wherein the paging request is received while the first voice call is active, perform a radio resource control (RRC) connection setup with the second network and perform one of accepting the incoming voice call or rejecting the incoming voice call.