H04M3/42178

METHOD AND SYSTEM FOR ESTABLISHING A COMMUNICATION CHANNEL BETWEEN COMPUTING DEVICES IN A CUSTOMER CARE ENVIRONMENT
20180013874 · 2018-01-11 ·

The disclosed embodiments illustrate method and system for establishing a communication channel between computing devices in a customer care environment. The method includes receiving a first input from a customer-computing device associated with the customer. The received first input is compared with one or more pre-stored datasets. Based on the comparison, a plurality of options corresponding to each of a plurality of levels of one or more workflows is rendered on a user interface displayed on a display screen of the customer-computing device. A second input is received for one of the rendered plurality of options. The second input is representative of at least a preference of the customer for a service associated with a workflow. Based on at least the received second input, a communication channel is established between the customer-computing device and an agent-computing device associated with the customer care agent.

CONFERENCE DEVICE HAVING A CONFIGURABLE CONTROL BUTTON
20230007125 · 2023-01-05 ·

A conference device includes a physical control button having multiple underlying pressure zones; a configuration unit, adapted to visualize a number of active functions on and/or around the control button based on a chosen usage application, wherein the number is at most equal to the number of the underlying pressure zones; a control unit adapted to control one or multiple components on the conference device. The pressing of the control button at the position of one of the pressure zones results in a control which depends on the chosen usage application.

Arrangements for detecting bi-directional artificial intelligence (AI) voice communications and negotiating direct digital communications
11716394 · 2023-08-01 · ·

Arrangements for automatically detecting bi-directional artificial intelligence (AI) communications and automatically negotiating (i.e., switching to alternative) direct digital communications.

Toll-free telecommunications and data management platform

A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.

Toll-free numbers metadata tagging, analysis and reporting

A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.

Extension mobility via a headset connection

A method is disclosed for performing extension mobility via a headset connection. The method includes receiving a headset identifier from a headset. Also, the method includes, in response to receiving the headset identifier, sending the headset identifier to a device management server. Further, the method includes receiving a call control user identifier from the device management server, and sending, to a call control server, the call control user identifier. Still yet, the method includes receiving, from the call control server, a configuration profile associated with the call control user identifier. One or more settings of a desk phone are configured using the configuration profile.

SYSTEMS AND METHODS FOR TAGGING FRAUDULENT PHONE NUMBERS

A method including: receiving a user report dataset indicating fraudulent activity corresponding to a phone number; responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number; and tagging the record to identify the phone number as being associated with fraudulent activity.

Over the Air Provisioning of Mobile Device Settings
20230118924 · 2023-04-20 · ·

A mobile device has a display, a memory, an antenna, a transceiver connected to the antenna for communicating voice and data through a wireless communication system, at least one processor, and executable instructions stored in the memory. The executable instructions, when executed by the at least one processor, (i) cause the mobile device to communicate wirelessly with one or more remote servers; (ii) cause the mobile device to display on the display, a user interface for enabling the user of the mobile device to select a mobile network service provider; (iii) in response to a selection, cause the mobile device to be configured for use with a first one of a plurality of mobile network service providers and enable access by the mobile device of wireless communication service; and (iv) in response to a selection, cause the mobile device to be configured for use with a second one of the plurality of mobile network service providers and enable access by the mobile device of wireless communication service provided by the second one of the plurality of mobile network service providers for a service plan offered by the second one of the plurality of mobile network service providers.

Method, telephone, telecommunication system and device for controlling power consumption of a telephone

The invention relates to a method for controlling the power consumption of a telephone (10), (310). A power saving mode is automatically switched on or off for the telephone (10), (310), depending on: at least one given timespan, within which the telephone (10) is predicted not to be used or another terminal (380).

SYSTEMS AND METHODS FOR PHONE NUMBER FRAUD PREDICTION

A method including: receiving one or more datasets indicating call activity corresponding to a phone number; analyzing the one or more datasets to identify unusual call activity; and generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.