Patent classifications
H04M15/06
Providing audio announcement to called parties
The present disclosure describes a system, method, and computer-readable medium for providing audio announcement of communications to a called party in a communication network. The method includes receiving communication from a calling party and performing a lookup of information relating to the calling party in a database via an Internet Protocol connection based on an identifier of at least one of the calling party and the called party. The information comprises one or more audio files. The method then provides the audio announcement to a called party based on the audio files.
System and method for identifying unwanted communications using communication fingerprinting
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
System and method for identifying unwanted communications using communication fingerprinting
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
Simultaneous voice and data content driven commercial data platform
One disclosed system includes dialer device with a dialer identifier that initiates a call with a receiver device with a receiver identifier over a voice channel. A database stores: interaction data in association with both the receiver identifier and the dialer identifier; a content quality metric in association with the interaction data; and a network topology in which the receiver identifier and the dialer identifier are associated with nodes and are connected by an edge. A server is programmed to: update, based on the content quality metric and the network topology, a rankings associated with the receiver identifier and the dialer identifier; and one of: surface the ranking associated with the dialer identifier and the ranking associated with the receiver identifier to an external searching agent using an external data channel and without using any voice channel; or rank the dialer identifier for an internal searching agent using the ranking.
System and method for identifying and handling unwanted callers using a call answering system
A method and system for identifying an unwanted caller using a call answering system. The method comprises receiving, by a call records server, information about callers from a plurality of telephony devices and one or more phone number data sources, classifying, by the call records server, one or more of the callers as either wanted or unwanted callers based on the received information, and storing, by the call records server, the received information and the classification of the one or more of the callers into a directory. The method further comprises identifying, by a call answering server, that a call from a given caller from a phone number to a receiving telephony device is from an unwanted caller by searching the directory, and handling, by the call answering server, the call from the given caller according to one or more preferences of the user, the one or more preferences including rejecting the call from the receiving telephony device, playing a recorded message, and disposing of the call.
FUNCTION AS A SERVICE CONSOLE FOR AN ONLINE APPLICATION EXCHANGE PLATFORM
A method for managing an application exchange platform includes receiving, from a developer, a service function, wherein the service function includes configuration details for an application available through an online application exchange. The method includes deploying the service function in the application exchange, identifying a first domain event requesting access to the service function from a user, and calling the service function in the online application exchange, in response to the first domain event. The method also includes recording a metric associate with the service function and a return parameter, emitting a second domain event indicative of a completion of the service function, and charging, with a billing tool, an appropriate party based on a usage metadata for the service function. A system and a non-transitory, computer-readable memory storing instructions to cause the system to perform the above method are also provided.
Simultaneous Voice and Data Content Driven Commercial Data Platform
One disclosed system comprises a server; a receiver device with a receiver identifier; a dialer device with a dialer identifier; a dialer programmed to initiate a voice call, over a voice channel, with the receiver device using the receiver identifier; a database; and a data channel connecting the dialer device, the receiver device, and the server. The database stores interaction data in association with both the receiver identifier and the dialer identifier. The system is programmed to: obtain a voice sample from the voice call; process the voice sample to obtain a search cue; obtain one or more interaction data from the database using the search cue; obtain a response data from the one or more interaction data; and surface, during the voice call, the response data to one of the dialer device and the receiver device.
SYSTEMS AND METHODS FOR IDENTIFYING ENTITY LOCATIONS BASED ON DEVICE LOCATION DATA
Systems and methods are provided for use in identifying an entity's location based on device-level location data. One example computer-implemented method includes, for an entity associated with an unconfirmed location, transmitting, to a mobile device, a request to identify a physical location of the entity and receiving, from the mobile device, a response including at least (i) an identifier associated with the entity and/or a user associated with the mobile device and (ii) a location of the mobile device at the physical location of the entity. The method also includes matching the location of the mobile device to a transaction record for a transaction at the entity based on the transaction record including the identifier from the response and, in response to a match, assigning the location to the entity and publishing the assigned location of the entity.
Caller identification trust
Disclosed are example methods, systems, and devices for allowing caller computing devices to authenticate calls via a service provider computing system. Users may opt to have entities register to contact the user with a positive ID, icon, or other notification on the user's computing device transmitted by the service provider computing system. A caller computing device may use a unique security token of the user to activate the notification on the user's device. The user device may be used to exert control over the security token via a service provider client application running on the user device. The caller computing device may initiate authentication via an API call to the service provider computing system. The caller computing device is able to have items (text, images, documents, etc.) delivered to the user computing device if authenticated.
Independent notification system for authentication
When a customer service representative (CSR) calls a customer, the customer may be able to authenticate himself or herself by providing the CSR with personal identifying information. However, the CSR may be unable to provide information to authenticate himself or herself to the customer. Thus, this patent document describes authentication techniques that can allow the CSR to authenticate himself or herself to the customer. For example, before or during a call that the second person (e.g., CSR) initiates to call a first person (e.g., customer), a notification message may be sent to the first person's user device. The content of notification message displayed on the user device may provide information to the first person which can allow the first person to determine whether the second person is trustworthy.