H04M3/42076

Communication system and method for content access
09584563 · 2017-02-28 · ·

A method of accessing content at a user terminal connected to a communication network and executing a communication client includes the client displaying a list of contacts associated with a user of the client and the client retrieving a message from the communication network. The message is related to a further user represented by one of the contacts displayed in the list of contacts, and includes a reference to content stored in a storage means accessible by the communication network. The client initiates a call to the further user over the communication network responsive to a user of the client selecting the one of the contacts in the list of contacts. Responsive to initiating the call, the client establishes communication with the storage means using the reference, accesses the content and displays the content at the user terminal.

ADDITIONAL INFORMATION ON A CALLER
20170048367 · 2017-02-16 ·

To provide a called one with information on the caller, a reference to a resource containing real-time or near-real-time information relating to the caller, or information deduced using the real-time or near-real-time information, or the real-time or near-real-time information, or the information deduced using the real-time or near-real-time information, is transmitted with a connection establishment request, and the information in the resource or the received information is displayed to the called one before the requested connection is established so that the called one can make a decision whether or not to answer the call.

Digital signature-over-voice for caller ID verification

In an approach to caller ID verification by digital signature, a computing device receives caller ID and URL information associated with a call. The computing device retrieves a digital signature based on the URL. The computing device retrieves public key information associated with the caller. The computing device performs a digital signature assessment based on the public key information in order to ascertain the validity of the caller ID information. The computing device performs one or more actions based on the digital signature assessment.

DIGITAL SIGNATURE-OVER-VOICE FOR CALLER ID VERIFICATION
20170041459 · 2017-02-09 ·

In an approach to caller ID verification by digital signature, a computing device receives caller ID and URL information associated with a call. The computing device retrieves a digital signature based on the URL. The computing device retrieves public key information associated with the caller. The computing device performs a digital signature assessment based on the public key information in order to ascertain the validity of the caller ID information. The computing device performs one or more actions based on the digital signature assessment.

DIGITAL SIGNATURE-OVER-VOICE FOR CALLER ID VERIFICATION
20170041463 · 2017-02-09 ·

In an approach to caller ID verification by digital signature, a computing device receives authenticating information associated with a caller. The computing device creates a call record based on the authenticating information. The computing device retrieves additional information associated with the caller. The computing device updates the call record based on the additional information. The computing device retrieves a digital signature associated with the caller. The computing device retrieves public key information associated with the caller. The computing device performs a digital signature assessment based on the public key information. The computing device updates the call record based on the digital signature assessment. The computing device adds timestamp information to the call record. The computing device receives a request from a call recipient device. The computing device communicates information based on the call record to the call recipient device. The computing device marks the call record as expired.

Digital signature-over-voice for caller ID verification

In an approach to caller ID verification by digital signature, a computing device receives authenticating information associated with a caller. The computing device creates a call record based on the authenticating information. The computing device retrieves additional information associated with the caller. The computing device updates the call record based on the additional information. The computing device retrieves a digital signature associated with the caller. The computing device retrieves public key information associated with the caller. The computing device performs a digital signature assessment based on the public key information. The computing device updates the call record based on the digital signature assessment. The computing device adds timestamp information to the call record. The computing device receives a request from a call recipient device. The computing device communicates information based on the call record to the call recipient device. The computing device marks the call record as expired.

Systems and methods for authentication using browser fingerprinting
12301753 · 2025-05-13 · ·

Embodiments described herein provide for authenticating callers to call centers using browser fingerprinting. A call center system or third-party analytics system includes a server that transmits notifications to a caller device that includes an interactive hyperlink or URL to a particular webpage. When a browser of the caller device navigates to the webpage, the server captures certain types of information about the caller device and generates a browser fingerprint for the caller device. The browser fingerprint is compared against a database of registered browser fingerprints to verify that the caller device of the current call is the registered, expected caller device. The server transmits the notification via any number of communication channels and protocols, such as text messages (e.g., SMS messages, MMS messages), emails, and push notifications associated with client-side software, among others.

Additional information on a caller
12309307 · 2025-05-20 · ·

To provide a called one with information on the caller, a reference to a resource containing real-time or near-real-time information relating to the caller, or information deduced using the real-time or near-real-time information, or the real-time or near-real-time information, or the information deduced using the real-time or near-real-time information, is transmitted with a connection establishment request, and the information in the resource or the received information is displayed to the called one before the requested connection is established so that the called one can make a decision whether or not to answer the call.

ADDITIONAL INFORMATION ON A CALLER
20250267207 · 2025-08-21 · ·

To provide a called one with information on the caller, a reference to a resource containing real-time or near-real-time information relating to the caller, or information deduced using the real-time or near-real-time information, or the real-time or near-real-time information, or the information deduced using the real-time or near-real-time information, is transmitted with a connection establishment request, and the information in the resource or the received information is displayed to the called one before the requested connection is established so that the called one can make a decision whether or not to answer the call.

Establishing and managing connections for real time communications

Methods and systems related to supporting real time communications are disclosed. In one type of a real time communication session, prior to an offer and acceptance to perform real time communications, a communication channel may be established between a caller device and a callee device. Information related to addresses of the caller and callee devices can be contained in, or pointed to, by a Universal Resource Locators (URLs) for the caller and callee devices. A network computing device may communicate messages relating to establishing and maintaining the communication channel between the caller and callee devices. In a scenario where the network computing device becomes unavailable, another network computing device can use the URLs and other channel information that may be stored in the database, to handle messages.