H04M3/436

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES WITH RECORD OBJECTS BASED ON ENTITY RELATIONSHIPS

The present disclosure relates to systems and methods for matching electronic activities with record objects based on entity relationships. The method can include accessing a plurality of electronic activities, identifying an electronic activity, identifying a first participant associated with a first entity and a second participant associated with a second entity, determining whether a record object identifier is included in the electronic activity, identifying a first record object of the system of record that includes an instance of the record object identifier, and storing an association between the electronic activity and the first record object. The method can include determining a second record object corresponding to the second entity, identifying, using a matching policy, a third record object linked to the second record object and identifying a third entity, and storing, by the one or more processors, an association between the electronic activity and the third record object.

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES WITH RECORD OBJECTS BASED ON ENTITY RELATIONSHIPS

The present disclosure relates to systems and methods for matching electronic activities with record objects based on entity relationships. The method can include accessing a plurality of electronic activities, identifying an electronic activity, identifying a first participant associated with a first entity and a second participant associated with a second entity, determining whether a record object identifier is included in the electronic activity, identifying a first record object of the system of record that includes an instance of the record object identifier, and storing an association between the electronic activity and the first record object. The method can include determining a second record object corresponding to the second entity, identifying, using a matching policy, a third record object linked to the second record object and identifying a third entity, and storing, by the one or more processors, an association between the electronic activity and the third record object.

System and method for gender based authentication of a caller
11582336 · 2023-02-14 · ·

A system and method for authenticating a caller may include receiving an incoming call from the caller, determining a gender of the caller, and selecting, based on the determined gender, to search for the caller in one of: a watchlist of untrustworthy female callers, and a watchlist of untrustworthy male callers.

System and method for gender based authentication of a caller
11582336 · 2023-02-14 · ·

A system and method for authenticating a caller may include receiving an incoming call from the caller, determining a gender of the caller, and selecting, based on the determined gender, to search for the caller in one of: a watchlist of untrustworthy female callers, and a watchlist of untrustworthy male callers.

Systems and methods of live streaming emergency dispatch data to first responders

Systems, devices, and methods including: capturing, by a capture device, an audio and corresponding location metadata associated with an emergency call; refining the location metadata to provide a refined location metadata; correlating, by the capture device, the refined location metadata of the emergency call with a geofenced location of the computing devices of one or more first responders (FRs); screening, by the capture device or the computing device, the emergency call data; transmitting, by the capture device, a first signal to the one or more computing devices based on the correlation, the transmitted signal including a portion of the captured audio and corresponding location metadata; receiving, by the capture device, an accept signal from the one or more computing devices of one or more FRs; transmitting, by the capture device, a second signal to the one or more computing devices based on the received accept signal.

Displaying a textual message based on configuration of the user equipment
11582344 · 2023-02-14 · ·

In various aspects, a system that receives a first message, wherein the first message comprises a communication device identification and a feature tag having a language indication that indicates a language configuration of a user equipment. In response to the receiving the first message, storing the language indication and associating the language indication with the communication device identification. The system determines whether an incoming call is not authenticated and in response to the determining that the incoming call is not authenticated, transmitting a textual message to the communication device using the language configuration to indicate the incoming call is not authenticated.

Displaying a textual message based on configuration of the user equipment
11582344 · 2023-02-14 · ·

In various aspects, a system that receives a first message, wherein the first message comprises a communication device identification and a feature tag having a language indication that indicates a language configuration of a user equipment. In response to the receiving the first message, storing the language indication and associating the language indication with the communication device identification. The system determines whether an incoming call is not authenticated and in response to the determining that the incoming call is not authenticated, transmitting a textual message to the communication device using the language configuration to indicate the incoming call is not authenticated.

DEVICE, SYSTEM AND METHOD FOR CHANGING COMMUNICATION INFRASTRUCTURES BASED ON CALL SECURITY LEVEL
20230042020 · 2023-02-09 ·

A device, method and system for changing communication infrastructure based on call security level is provided. A device determines a call security level of a call occurring at a first communication infrastructure; the first communication infrastructure associated with a first security level; the call security level determined from one or more of; a profile of a caller on the call; and audio on the call. In response to determining that the call security level and the first security level are misaligned, the device causes the call to change to a second communication infrastructure associated with a second security level aligned with the call security level.

AUTOMATIC CALL CATEGORIZATION AND SCREENING

Implementations described herein relate to methods, systems, and computer-readable media to automatically answer a call. In some implementations, a method includes receiving a call from a caller device at a client device. The method further includes determining, based on an identifier associated with the call, whether the call matches auto answer criteria, and yin response to determining that the call matches the auto answer criteria, answering the call without user input and without alerting a user of the client device. The method further includes generating a call embedding for the call based on received audio of the call, comparing the call embedding with spam embeddings to determine whether the call is a spam call, and in response to determining that the call is a spam call, terminating the call.

AUTOMATIC CALL CATEGORIZATION AND SCREENING

Implementations described herein relate to methods, systems, and computer-readable media to automatically answer a call. In some implementations, a method includes receiving a call from a caller device at a client device. The method further includes determining, based on an identifier associated with the call, whether the call matches auto answer criteria, and yin response to determining that the call matches the auto answer criteria, answering the call without user input and without alerting a user of the client device. The method further includes generating a call embedding for the call based on received audio of the call, comparing the call embedding with spam embeddings to determine whether the call is a spam call, and in response to determining that the call is a spam call, terminating the call.