Patent classifications
H04M2203/6045
SYSTEM AND METHOD FOR GENDER BASED AUTHENTICATION OF A CALLER
A system and method for authenticating a caller may include receiving an incoming call from the caller, determining a gender of the caller, and selecting, based on the determined gender, to search for the caller in one of: a watchlist of untrustworthy female callers, and a watchlist of untrustworthy male callers.
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
Caller deflection and response system and method
Provided are a call deflection and response system and method, wherein a voice call from a caller device is received, a skill group is determined to resolve an issue associated with the call, and a text response to the issue is sent to the caller device, providing a context-based personalized response. A caller leaves a detailed voicemail explaining an issue needing resolution, which is electronically transcribed and then run through a classifier to determine concepts and intents associated with the call. Based on the concepts and intents, responsibility for the call and associated files are transferred to a particular skill group on a chat platform for resolution. A chat entity from the appropriate skill group determines and provides an issue response via text message to the caller device, e.g., to the caller's mobile phone.
System and method for communication analysis for use with agent assist within a cloud-based contact center
Methods to reduce agent effort and improve customer experience quality through artificial intelligence. The Agent Assist tool provides contact centers with an innovative tool designed to reduce agent effort, improve quality and reduce costs by minimizing search and data entry tasks The Agent Assist tool is natively built and fully unified within the agent interface while keeping all data internally protected from third-party sharing.
Communication system and method of using the same
A communication system can include terminal devices that communicate with a social network or a computer server device for scheduling use of conference resources and/or for using conference appliances that may be located in a conference room being used for a video conference or teleconference. The communication system can be configured to permit a user to use such resources without having to have a user's device be physically and directly connected by wiring to a conference appliance or communication device. The communication system can also be configured to validate participants to help ensure that only authorized personnel are properly attending a scheduled conference based on audio and/or video input received for the different participants and can also be configured to allow screen sharing to be performed during a video conference or teleconference.
Multiple-factor authentication
One example involves a communications server providing communications services to remotely-situated client entities, wherein each client entity is associated with users and each user is associated with a communication device. The server may verify a first authentication factor for a user among the users, and generate a communication request that includes a first portion specifying at least one target endpoint associated with the user and a second portion associated with or indicating the security code and that includes a set of instructions which: are specific to the user, which specify how to communicate the security code for the user, and which specify different security codes for different types of communications. Via the server, the security code is sent to the user according to the set of instructions, and verified via a second authentication factor associated with or for the user by comparing input from the user to the security code.
Intercepting and challenging unwanted phone calls
A call challenger can receive a user input from a called party identity to opt-in to a call challenge service, and a second user input of a keyword. When the call challenger receives a call directed to a user equipment of the called party identity, the call challenger can prompt the calling party to provide an audible response. In response to a receipt of the audible response, the call challenger can convert the audible response to a text. The call challenger can compare the text with the keyword to determine if there is a sufficient match. In response to the determining the output of the comparing does not satisfy a threshold match score, the call challenger can prevent the call from connecting with the user equipment.
Verification of caller identification using application
Technology for identifying that a communication is from a verified enterprise includes receiving, by a device associated with a user, a data packet from a phone network. The data packet can be included in a communication to the device, which can have an application configured to verify communications from at least one enterprise. A token within the data packet can be identified by the application, and the application can compare the token to at least one token identifier associated with the at least one enterprise. In response to the token corresponding to at least one token identifier, the application can verify that the communication is from the at least one enterprise. In response to the communication being verified, the application can display a validation image on the device.
CALL CENTER WEB-BASED AUTHENTICATION USING A CONTACTLESS CARD
Systems, methods, articles of manufacture, and computer-readable media. A server may receive a phone call and generate a uniform resource locator (URL) comprising a session identifier for an account. The server may transmit the URL to a client device. The server may receive, from a web browser, a request comprising the URL. The server may determine that the session identifier in the URL of the request matches the session identifier for the account, and transmit, to the web browser, a web page at the URL. The server may receive, from the web browser, a cryptogram read by the web page via a card reader of the client device and decrypt the cryptogram. The server may authenticate the identity of the caller for the call based on decrypting the cryptogram and the session identifier of the URL matching the session identifier of the account.