H04M2203/6054

SECURE REMOTE DATA SUBMISSION FOR IVR SYSTEMS

Apparatus and methods for enhancing security of an authentication process of a caller that initiated a call in an Interactive Voice Response (“IVR”) system are provided. The methods may include routing the call through the IVR system to a headset. After the routing, the methods may include retrieving data associated with the caller. In response to the retrieved data meeting one or more predetermined conditions, a graphical user interface of an agent computer paired to the headset may display a plurality of validation information for validating the caller. Selection by the agent of validation information may trigger methods for transmitting a request to the caller, via a caller mobile phone, to input the validation information selected by the agent. The methods may additionally include authenticating the caller based at least in part on the information input into the mobile phone.

SYSTEM AND METHOD FOR GENDER BASED AUTHENTICATION OF A CALLER
20230041266 · 2023-02-09 · ·

A system and method for authenticating a caller may include receiving an incoming call from the caller, determining a gender of the caller, and selecting, based on the determined gender, to search for the caller in one of: a watchlist of untrustworthy female callers, and a watchlist of untrustworthy male callers.

AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION
20180007194 · 2018-01-04 · ·

An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.

INTEGRATION OF VOIP PHONE SERVICES WITH INTELLIGENT CLOUD VOICE RECOGNITION
20180013869 · 2018-01-11 ·

Integration of VoIP phone services with Intelligent Cloud Voice Recognition for emergency services overcomes limitations of conventional residential telephone technology to inexpensively provide more useful and advanced residential telephone services. For example, in an embodiment, a communication method may comprise establishing a communications session between either a user device and a telephone system or between a user device and voice recognition system, if the communications session is between a user device and a telephone system, extending the communications session to include a voice recognition system, if the communications session is between a user device and a voice recognition system, extending the communications session to include a telephone system, providing voice or speech information to the voice recognition system from the user device, and performing at least one function with the voice recognition system based on the provided voice or speech information.

System and method for identifying unwanted communications using communication fingerprinting

A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.

Biometric authentication during voice data transfers
11711361 · 2023-07-25 · ·

There are provided systems and methods for biometric authentication during voice data transfers. A user may initiate voice communications with a service provider endpoint that provides automated services to the user through the voice or audio communications, such as an interactive voice response (IVR) system where a user may navigate menus through audio commands. The user may by required to authenticate their identity during the phone call or other voice data transfer, which may be done by entering a biometric, such as a fingerprint. The biometric may be converted to biometric feature data and provided to one or more token service providers. The token service providers may provide one or more tokens for the biometric, which may be used as the authentication token. This token may then be transmitted to the IVR system through the user's endpoint using a dialer feature of the endpoint.

System and method for predicting intelligent voice assistant content

A method including receiving an incoming call from a calling device of a caller and determining identification information for the calling device. The method also includes receiving voice audio data of the caller from the calling device, converting the voice audio data to caller phones, and identifying a customer account associated with the identification information. The method further includes obtaining user phones for multiple candidate users associated with the identified customer account, comparing the caller phones to the user phones for the multiple candidate users, and determining the identity of the caller based on the comparison.

Caller deflection and response system and method

Provided are a call deflection and response system and method, wherein a voice call from a caller device is received, a skill group is determined to resolve an issue associated with the call, and a text response to the issue is sent to the caller device, providing a context-based personalized response. A caller leaves a detailed voicemail explaining an issue needing resolution, which is electronically transcribed and then run through a classifier to determine concepts and intents associated with the call. Based on the concepts and intents, responsibility for the call and associated files are transferred to a particular skill group on a chat platform for resolution. A chat entity from the appropriate skill group determines and provides an issue response via text message to the caller device, e.g., to the caller's mobile phone.

SYSTEMS AND METHODS FOR AUTHENTICATION USING BROWSER FINGERPRINTING
20230015583 · 2023-01-19 ·

Embodiments described herein provide for authenticating callers to call centers using browser fingerprinting. A call center system or third-party analytics system includes a server that transmits notifications to a caller device that includes an interactive hyperlink or URL to a particular webpage. When a browser of the caller device navigates to the webpage, the server captures certain types of information about the caller device and generates a browser fingerprint for the caller device. The browser fingerprint is compared against a database of registered browser fingerprints to verify that the caller device of the current call is the registered, expected caller device. The server transmits the notification via any number of communication channels and protocols, such as text messages (e.g., SMS messages, MMS messages), emails, and push notifications associated with client-side software, among others.

Intercepting and challenging unwanted phone calls

A call challenger can receive a user input from a called party identity to opt-in to a call challenge service, and a second user input of a keyword. When the call challenger receives a call directed to a user equipment of the called party identity, the call challenger can prompt the calling party to provide an audible response. In response to a receipt of the audible response, the call challenger can convert the audible response to a text. The call challenger can compare the text with the keyword to determine if there is a sufficient match. In response to the determining the output of the comparing does not satisfy a threshold match score, the call challenger can prevent the call from connecting with the user equipment.