Patent classifications
H04M2203/6063
Establishing a voice authentication credential
This disclosure describes techniques for establishing a voice authentication credential for an authenticated user of a mobile device. In one example, a system comprises an IVR system and a computing system, where the computing system comprises processing circuitry configured to: receive, over a network, authentication data from a mobile device; authenticate, based on the authentication data, a user operating the mobile device; output, over the network and to the mobile device, instructions for communicating with the IVR system; after outputting the instructions, receive, from the IVR system, information indicating that the mobile device, operated by the user, has contacted the IVR system; communicate with the IVR system to authenticate the user of the mobile device, receive, from the IVR system, a voiceprint created by the user of the mobile device; store the voiceprint as an authentication credential for the user of the mobile device.
TECHNIQUES FOR CALL AUTHENTICATION
Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.
Techniques for call authentication
Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.
SYSTEMS AND METHODS FOR AUTHENTICATING CALLS FOR A CALL CENTER
Disclosed embodiments may include a method for authenticating calls for a call center where the user can authenticate before or after starting a call to a call center using an application on a user device. The system determines what level of authentication is necessary depending on the task the user wants to accomplish during the call. The system may direct the user to provide credentials, such as a username and password, for some tasks. Other tasks may require the user to verify their financial card by taking a photo of their financial card or tapping their financial card to their device and allow the device to interact with the financial card using NFC technology. Once appropriately authenticated, the system then allows the user to make a call to the call center and also sends a signal to the call center that the user has been previously authenticated.
Techniques for call authentication
Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.
Systems and methods for computing real-time communication matrices
In some embodiments, a client driven referral management method may include: receiving the credentials of a member through a user device and a remote member through a user device; recording the consent of the member and the remote member to a referral fee agreement; associating a client with the member on the server when the client provides registration data to the server using a user device; recording real estate information browsing data and location data of the client with the user device of the client; assigning the remote member to the client, in which the remote member may be assigned by the server using the real estate information browsing data and location of client with the user device of the client; and notifying the member through a user device of the member of a real estate transaction involving the remote member and the client.
Method and system for least cost routing (LCR) of international mobile telephone calls with an integrated money transfer facility
A method and system for least cost routing for mobile telephone calls between the United States and Mexico in such a way so that the call is separated into several call legs and the international portion or call leg is routed via a low-cost or no-cost route independently of the local call legs, essentially achieving an international call with local call rates. This uses a SIM card that automatically identifies any incoming or outgoing call and provides the ability to convert the call from an expensive international and/or roaming call to a local (free) call. Several slight variations are disclosed, and all embodiments have an integrated money transfer service that can be used with a very simple low-cost basic mobile phone using IVR, SMS and voice recognition, or can be accessed via the web or via a smartphone app.
TECHNIQUES FOR CALL AUTHENTICATION
Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.
Establishing a voice authentication credential
This disclosure describes techniques for establishing a voice authentication credential for an authenticated user of a mobile device. In one example, a system comprises an IVR system and a computing system, where the computing system comprises processing circuitry configured to: receive, over a network, authentication data from a mobile device; authenticate, based on the authentication data, a user operating the mobile device; output, over the network and to the mobile device, instructions for communicating with the IVR system; after outputting the instructions, receive, from the IVR system, information indicating that the mobile device, operated by the user, has contacted the IVR system; communicate with the IVR system to authenticate the user of the mobile device, receive, from the IVR system, a voiceprint created by the user of the mobile device; store the voiceprint as an authentication credential for the user of the mobile device.
Testing methods and systems for mobile communication devices
A testing method for testing mobile communication devices comprises transmitting, by a testing front end module, a testing profile associated with a Universal Integrated Circuit Card, UICC, to a mobile communication device, activating the testing profile on the mobile communication device, setting, by a testing controller, the configuration of the mobile communication device to a testing mode according to the information of the activated testing profile of the UICC, and performing operational tests on the mobile communication device using a testing front end module of a testing system while the configuration of the mobile communication device is set to the testing mode.