H04M2203/6009

SECURE REMOTE DATA SUBMISSION FOR IVR SYSTEMS

Apparatus and methods for enhancing security of an authentication process of a caller that initiated a call in an Interactive Voice Response (“IVR”) system are provided. The methods may include routing the call through the IVR system to a headset. After the routing, the methods may include retrieving data associated with the caller. In response to the retrieved data meeting one or more predetermined conditions, a graphical user interface of an agent computer paired to the headset may display a plurality of validation information for validating the caller. Selection by the agent of validation information may trigger methods for transmitting a request to the caller, via a caller mobile phone, to input the validation information selected by the agent. The methods may additionally include authenticating the caller based at least in part on the information input into the mobile phone.

DEVICE, SYSTEM AND METHOD FOR CHANGING COMMUNICATION INFRASTRUCTURES BASED ON CALL SECURITY LEVEL
20230042020 · 2023-02-09 ·

A device, method and system for changing communication infrastructure based on call security level is provided. A device determines a call security level of a call occurring at a first communication infrastructure; the first communication infrastructure associated with a first security level; the call security level determined from one or more of; a profile of a caller on the call; and audio on the call. In response to determining that the call security level and the first security level are misaligned, the device causes the call to change to a second communication infrastructure associated with a second security level aligned with the call security level.

Second level interactive voice response component

In an example embodiment, a solution is provided that introduces a second level IVR component controlled by a call control service that also controls a first IVR component. Controlling the IVR components using this call control service (which also interfaces with client software operated by a human agent) allows for data collected during the IVR sessions or during a live session with the human agent to be shared among the components. This also acts to eliminate the need for a traditional “transfer” of a call from a human agent to an IVR or vice versa, which would often be accompanied by audible clicks or beeps discernable to the caller.

SECOND LEVEL INTERACTIVE VOICE RESPONSE COMPONENT
20230224404 · 2023-07-13 ·

In an example embodiment, a solution is provided that introduces a second level IVR component controlled by a call control service that also controls a first IVR component. Controlling the IVR components using this call control service (which also interfaces with client software operated by a human agent) allows for data collected during the IVR sessions or during a live session with the human agent to be shared among the components. This also acts to eliminate the need for a traditional “transfer” of a call from a human agent to an IVR or vice versa, which would often be accompanied by audible clicks or beeps discernable to the caller.

Customer self-help control system for contact centers

A computer system is described that is configured to enable customers of an organization to self-monitor account activity and modify account access settings via a contact center of the organization. The contact center control system is configured to provide an interactive call history associated with the customer's accounts with the organization. Using the call history, the customer may perform self-monitoring of calls into the contact center that access the customer's accounts, and notify the organization if any of the calls appear suspicious. The contact center control system is configured provide a user interface through which the customer may modify account access settings including changing which types of authentication methods are enabled to access the customer's accounts, and blocking account access by callers from certain phone numbers. The contact center control system may allow the customer to turn off all access to the customer's accounts via the contact center.

Parallel data provision

A system includes a client device including a processor, a telephony radio that supports telephony communications, and a data radio that supports data communications. The client device conducts, via the telephony radio, a call with a telephony service. Further the client device identifies a context of the call, identifies a subset of stored private data associated with the context of the call; and in parallel with the call, provides the subset of the stored private data, via a data radio, to a data service.

DATA EXCHANGE DURING A VOICE CALL SESSION
20220407957 · 2022-12-22 ·

Techniques for performing data exchanges during voice call sessions is described. In one example, a network server may facilitate a voice call session between user devices and associate a unique session number (USN) to each of the voice call sessions. The USN may be used as a reference when toggling between voice call sessions. In one example, when a particular voice call session is toggled to an active state, the network server may limit recipients of sensitive financial information to be between transacting parties in the active voice call session. By isolating other user devices that are not privy to transactions in the active voice call session, the chances for a transacting party in the active voice call session to accidentally send payments, for example, to an unintended recipient can be substantially minimized.

Secure transmission of sensitive data during call processing
11588792 · 2023-02-21 · ·

Apparatus for the transfer of sensitive information between two parties facilitated by an intermediary, the apparatus adapted to: receive from the first party voice signals and data signals; determine a parameter relating to an estimate of the time required for sensitive information to be determined from the data signals received from the first party; transmit to the intermediary the received voice signals and the parameter; determine sensitive information from the received data signals; and transmit the sensitive information to the second party. A corresponding method is also provided.

Communication method and device capable of ensuring the security of personal information
20220343002 · 2022-10-27 ·

A communication method and device capable of ensuring the security of personal information, wherein the device comprises a database, an information processor and a transceiver; wherein in the database at least one Party B's personal information, including a Party B's code and a Party B's means of communication, is saved, if a Party C (anyone else) wants to communicate the Party B, the Party C can use the said communication device capable of ensuring the security of personal information to forward an information, whereby the security of personal information is guaranteed while the Party C is communicating with the Party B.

Systems and methods related to automated transcription of voice communications
11468897 · 2022-10-11 ·

A method for selectively transcribing voice communications that includes: receiving keywords; receiving an audio stream of audio data of speech; searching the audio stream to detect keywords or keyword detections and recording parameter data for each that includes a location of the keyword within the audio stream; generating one or more cumulative datasets for one or more portions of the audio stream that each includes parameter data for the keyword detections occurring therein; for each of the one or more portions of the audio stream, calculating a transcription favorableness score via inputting the corresponding one of the one or more cumulative datasets into an algorithm; and determining whether to transcribe each of the one or more portions of the audio stream by comparing the corresponding transcription favorableness score against a predetermined threshold.