H04M2203/60

Devices and methods for multipath communications
11582343 · 2023-02-14 · ·

Broadband communications devices and methods operate with at least two separate communication paths between the devices and the network, such as the Internet. The broadband devices and methods receive data concurrently over the communication paths or separately. The bandwidth is increased when the separate communication paths are combined. The broadband devices employ packetized data with Voice over Internet Protocol (VoIP) technologies combined with RF communications technologies.

COMMUNICATION ROUTING BASED ON USER CHARACTERISTICS AND BEHAVIOR

An enhanced routing system determines a service provider best suited to fulfill a user's request to interact and establishes a communication session between the user's client device and a device of the service provider. The enhanced routing system may use user characteristics and behavior to select the service provider. For example, the enhanced routing system receives a request to connect to a customer service system from a user who has recently started a new job and has been accessing a banking application on his mobile phone. The enhanced routing system may determine that a payroll service provider is best suited to fulfill the user's request. For example, the enhanced routing system uses a machine learning model that has been trained on previously fulfilled requests. In this way, the enhanced routing system improves upon systems that continuously prompt the user for information by selecting a service provider without overburdening the user.

SPOOFED TELEPHONE CALL IDENTIFIER
20220368801 · 2022-11-17 ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spoofed telephone call identifier are disclosed. In one aspect, a method includes the actions of receiving, by a first computing device, data indicating a placement of a telephone call from a second computing device to a third computing device, wherein the data includes a phone number of the second computing device. The actions further include determining characteristics of the phone number of the second computing device. The actions further include, based on the characteristics of the phone number of the second computing device, determining a likelihood that the phone number of the second computing device is spoofed. The actions further include, based on the likelihood that the phone number of the second computing device is spoofed, determining whether to transmit a notification of the telephone call to the third computing device.

CONTACT LOOKUP OPERATIONS DURING INOPERABILITY OF MOBILE DEVICES
20220358194 · 2022-11-10 ·

There are provided systems and methods for contact lookup operations during inoperability of mobile devices. A service provider, such as an online transaction processor, may provide additional services for secure contact lookup when a computing device of a user is nonoperational or unavailable. The user may establish a contact identifier and authentication mechanism with the service provider and allow access to the user's contacts. Once established, when the user's device is unable to access contacts and/or communication with other devices, the user may utilize the service provider for contact access through a contact lookup system. The user may utilize a different device to access a communication system or application and retrieve a data structure representing the user's contacts. The data structure may then be passed to the corresponding communication system or application interface system, which may then be output to the user.

Call Recording Authentication Using Distributed Transaction Ledgers
20230032477 · 2023-02-02 ·

A recording of a call is authenticated using a distributed transaction ledger. A call between two or more participants is recorded to generate a call recording. A record of the call recording is stored within a distributed transaction ledger. At a later time, such as in response to an access request for auditing or an authentication request, the call recording is authenticated based on information associated with the record within the distributed transaction ledger. An indication of the authentication is then output, such as for further processing or display.

System and method for replacing hold-time with a call-back in a contact center environment

System and method for handling a transaction between a waiting party and queuing party include an independent communication system (ICS) managing calls between the waiting party and calling party for handling sensitive data as well as call-attached data. The ICS manages the transaction in different stages and with different levels of sensitivity. Either party is allowed to modify the call or call preferences during the transaction. The ICS works independently from the queuing party calling system.

System and Method for Data Management and Task Routing Based on Data Tagging

Systems and methods are shown for managing call center data in accordance with one or more sets of compliance rules involving receiving data pertaining to an interaction, determining a set of compliance rules relevant to the received data, tagging the received data to identify the relevant set of compliance rules, and utilizing the data tagging, applying the relevant set of compliance rules to handling the received data. Examples also involve receiving an interaction request, obtaining the data tagging for data corresponding to the received interaction request, using the data tagging for the data corresponding to the received interaction request to obtain the corresponding relevant set of compliance rules, using the corresponding set of compliance rules to identify agents eligible to access the data corresponding to the received interaction request, and routing the received interaction request to one of the eligible agents based on a defined routing strategy.

Spoofed telephone call identifier

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a spoofed telephone call identifier are disclosed. In one aspect, a method includes the actions of receiving, by a first computing device, data indicating a placement of a telephone call from a second computing device to a third computing device, wherein the data includes a phone number of the second computing device. The actions further include determining characteristics of the phone number of the second computing device. The actions further include, based on the characteristics of the phone number of the second computing device, determining a likelihood that the phone number of the second computing device is spoofed. The actions further include, based on the likelihood that the phone number of the second computing device is spoofed, determining whether to transmit a notification of the telephone call to the third computing device.

COMMUNICATION ROUTING BASED ON USER CHARACTERISTICS AND BEHAVIOR

An enhanced routing system determines a service provider best suited to fulfill a user's request to interact and establishes a communication session between the user's client device and a device of the service provider. The enhanced routing system may use user characteristics and behavior to select the service provider. For example, the enhanced routing system receives a request to connect to a customer service system from a user who has recently started a new job and has been accessing a banking application on his mobile phone. The enhanced routing system may determine that a payroll service provider is best suited to fulfill the user's request. For example, the enhanced routing system uses a machine learning model that has been trained on previously fulfilled requests. In this way, the enhanced routing system improves upon systems that continuously prompt the user for information by selecting a service provider without overburdening the user.

Method and system for a scalable computer-telephony integration

Methods, systems, apparatus, and non-transitory computer readable media are described for a scalable computer-telephony integration system. Various aspects may include storing sets of call agent login information for several call agents within the computer-telephony integration system and across several independent computing systems in a contact center login database. Additionally, various aspects may include generating several contact center service categories and sets of contact information for each contact center service category, which may be stored in a contact center directory database. When an incoming call is received from a customer, various aspects may include obtaining customer call information from the customer and generating a customer call key, which may be stored as a reference to the customer call information in a contact center customer call information database. The call key may be used to reduce an amount of data electronically transferred between call agents during telephone call transfers.