H04M2203/6072

SYSTEM AND METHOD FOR AUTOMATICALLY DETECTING UNDESIRED CALLS
20180013881 · 2018-01-11 ·

A system is provided for thwarting the undesired incoming calls and eliminating the impact of robocalls, tollfree pumping, political spam, data collection bots, and other phone fraud forms. The system has a spam detection unit with a plurality of spam type modules and each spam type module is configured to detect a different type of spam.

System and method for communication analysis for use with agent assist within a cloud-based contact center

Methods to reduce agent effort and improve customer experience quality through artificial intelligence. The Agent Assist tool provides contact centers with an innovative tool designed to reduce agent effort, improve quality and reduce costs by minimizing search and data entry tasks The Agent Assist tool is natively built and fully unified within the agent interface while keeping all data internally protected from third-party sharing.

Method, system and device for permitting unfamiliar call
11695870 · 2023-07-04 ·

A method for permitting unfamiliar call, applied to a communication device having a memory and a call-blocking app to provide an unfamiliar call, includes the steps of: configuring an area in the memory of the communication device as a storage unit; recording at least one password into a password-correlated table in the storage unit, each of the at least one password being related to a specific user of the communication device; as an unfamiliar call is received, asking a caller of the unfamiliar call to provide an answer for a trivial question immediately provided by the communication device; determining whether or not the answer matches any of the at least one password in the password-correlated table; forwarding the unfamiliar call to the user corresponding to the matched password listed in the password-correlated table if positive; and, blocking the unfamiliar call if negative.

Systems and methods for detecting fraudulent calls using virtual assistants

A system may include a processor that may execute computer-executable instructions that cause the processor to receive caller information regarding an incoming communication from a caller and receive a request from a user to route the incoming communication to a virtual assistant application. The virtual assistant application is configured to interact with the caller and determine whether the caller is associated a fraudulent caller activity stored on databases accessible by the processor. The processor may then receive an indication from the virtual assistant application that the caller is associated with the fraudulent caller activity and forward the incoming communication to another party in response to receiving the indication.

METHOD, SYSTEM AND DEVICE FOR PERMITTING UNFAMILIAR CALL
20220394128 · 2022-12-08 ·

A method for permitting unfamiliar call, applied to a communication device having a memory and a call-blocking app to provide an unfamiliar call, includes the steps of: configuring an area in the memory of the communication device as a storage unit; recording at least one password into a password-correlated table in the storage unit, each of the at least one password being related to a specific user of the communication device; as an unfamiliar call is received, asking a caller of the unfamiliar call to provide an answer for a trivial question immediately provided by the communication device; determining whether or not the answer matches any of the at least one password in the password-correlated table; forwarding the unfamiliar call to the user corresponding to the matched password listed in the password-correlated table if positive; and, blocking the unfamiliar call if negative.

Multi-factor message authentication

Systems, methods, and apparatuses are described for authenticating a user device and/or user application. A user device may receive, based on a first authentication request, a plurality of messages sent over a plurality of channels of communication (e.g., a message to a URL address associated with the user device and a binary Short Message Service (SMS) message). Based on information from the messages, the user device may transmit a second authentication request.

Systems and methods for optimizing voice verification from multiple sources against a common voiceprint

Systems and methods for authenticating a user using a voice activated device. The method includes receiving first data representing a user identifier corresponding to a user and second data representing a device identifier corresponding to the voice activated device. The method further includes determining user metadata corresponding to the user identifier and a device audio type corresponding to the device identifier. The method also includes calculating a risk score based on the user metadata. The method further includes calculating a length of spoken voice utterance based on the calculated risk score. The method also includes receiving and processing third data representing a spoken voice utterance having the calculated length corresponding to the user using the voice activated device. The method further includes validating the user in response to determining that the processed third data substantially matches the voiceprint associated with the user.

SYSTEM AND METHOD FOR AUTOMATED AGENT ASSISTANCE WITHIN A CLOUD-BASED CONTACT CENTER

Methods to reduce agent effort and improve customer experience quality through artificial intelligence. The Agent Assist tool provides contact centers with an innovative tool designed to reduce agent effort, improve quality and reduce costs by minimizing search and data entry tasks The Agent Assist tool is natively built and fully unified within the agent interface while keeping all data internally protected from third-party sharing.

Customer communication system including service pipeline
11615423 · 2023-03-28 · ·

A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests.

Robocall screening
11601547 · 2023-03-07 · ·

Embodiments may provide techniques to screen for, detect, and prevent connection of robocalls. For example, in an embodiment, a method, implemented in a computer system comprising a processor, memory accessible by the processor, and computer program instructions stored in the memory and executable by the processor, may comprise receiving, at a telecommunications switch, a request to initiate a call from an originating party, selecting, at the telecommunications switch, from a list of terminating carrier networks, a media server, routing, at the telecommunications switch, the request to initiate the call to the media server, forwarding, from the media server, a media prompt requesting the originating party to enter a response to the media prompt, and when the originating party does not enter a correct response to the media prompt, forwarding, from the media server, an indication that the call is forbidden.