CONTACT CENTER CALL BACK
    31.
    发明申请
    CONTACT CENTER CALL BACK 有权
    联络中心回电话

    公开(公告)号:US20140153703A1

    公开(公告)日:2014-06-05

    申请号:US14176509

    申请日:2014-02-10

    Abstract: A method may include receiving a call from a caller and determining whether the call has been queued for at least a predetermined period of time. The method may also include interacting with the customer via an interactive voice response unit, in response to determining that the call has been queued for at least the predetermined period of time, to offer a call back service to the customer. The call back service may include a scheduled call back or an immediate type call back when an agent is available. The method may further include receiving, from the customer and via the interactive voice response unit, an indication that the customer would like a call back and queuing the call back.

    Abstract translation: 方法可以包括从呼叫者接收呼叫并确定呼叫是否已经排队了至少预定的一段时间。 该方法还可以包括响应于确定呼叫已经排队等待至少预定时间段,经由交互式语音响应单元与客户交互,向客户提供回呼服务。 当代理可用时,回呼服务可以包括调度的回叫或立即类型的回叫。 该方法还可以包括从客户和经由交互式语音响应单元接收客户想要回叫并排队回叫的指示。

    Personal identity system
    32.
    发明授权

    公开(公告)号:US12052246B2

    公开(公告)日:2024-07-30

    申请号:US17537706

    申请日:2021-11-30

    Abstract: A service provider may offer an identity proofing service that can be used to generate verifiable credentials (VCs) with customer-selected attributes. The VCs may use cryptographic signatures to indicate proof of identity certified by, for example, a telecommunications service provider. After a one-time process to obtain the VCs and associate them with a shell identity, the customer with a client device may use the VCs as a form of authentication for relying parties in a two-way (e.g., peer-to-peer) authentication process.

    SYSTEMS AND METHODS FOR DETECTING ANOMALOUS BEHAVIOR

    公开(公告)号:US20220303296A1

    公开(公告)日:2022-09-22

    申请号:US17832985

    申请日:2022-06-06

    Abstract: A method may include monitoring calls and/or traffic on a network and identifying behavior associated with each of a plurality of user devices with respect to activity on the network. The method may also include aggregating information about the behavior associated with the user devices, determining whether the aggregated information corresponds to an anomaly with respect to usage of the network and determining, when the aggregated information corresponds to the anomaly, whether the anomaly meets a threshold based on a type of anomaly and a number of user devices affected by the anomaly. The method may further include identifying, when the aggregated information corresponds to the anomaly, user devices in an area corresponding to the anomaly, generating a notification in response to determining that the aggregated information corresponds to the anomaly and transmitting the notification to the identified user devices in the area corresponding to the anomaly.

    Identity management via a centralized identity management server device

    公开(公告)号:US11336634B2

    公开(公告)日:2022-05-17

    申请号:US15929806

    申请日:2020-05-22

    Abstract: A device can establish an identity for an individual by communicating with a first set of devices. The first set of devices can include a user device, a first server device associated with a certificate authority, or a second server device associated with an identity provider. The device can authenticate the identity of the individual by communicating with a second set of devices. The second set of devices can include the user device, or a third server device associated with a first service provider. The device can authorize the identity of the individual to be used by one or more service providers by communicating with a third set of devices. The third set of devices can include the user device, the third server device, or a fourth server device associated with a second service provider.

    Analyzing network traffic based on a quantity of times a credential was used for transactions originating from multiple source devices

    公开(公告)号:US09769187B2

    公开(公告)日:2017-09-19

    申请号:US14823239

    申请日:2015-08-11

    Abstract: A device may receive network traffic information, associated with multiple transactions, that indicates, for each transaction of the multiple transactions, a credential and a source device identifier associated with the transaction. The device may determine, based on the network traffic information, a quantity of times that a common credential was used in two transactions occurring at different times and originating from different source devices. The device may provide information that identifies the quantity of times and the different source devices. The device may determine whether to block network traffic associated with a source device, of the different source devices, based on the quantity of times and/or user input received based on providing the information that identifies the quantity of times and the different source devices. The device may selectively provide an instruction to block the network traffic associated with the source device based on this determination.

    MULTIFACTOR AUTHENTICATION FOR MAIL SERVER ACCESS
    38.
    发明申请
    MULTIFACTOR AUTHENTICATION FOR MAIL SERVER ACCESS 有权
    MAIL SERVER访问的多媒体认证

    公开(公告)号:US20170034164A1

    公开(公告)日:2017-02-02

    申请号:US14813532

    申请日:2015-07-30

    CPC classification number: H04L63/0876 H04L51/20 H04L63/0884

    Abstract: A proxy device intercepts requests from client devices to access message data through a message data device, such as accessing e-mail messages through a mail server implementing post office protocol (POP) or other messaging protocol. The proxy device determines to authenticate of a client device when, for example, the client device, is located within certain areas that differ from a geographic region associated with a message account holder. Authentication of the client device may include collecting additional information, such as a universal identifier that may be used by the client device to access various services. The proxy device may further forward a notification message to the client device indicating the access to the message data is pending until the client device is authenticated. If the client device is successfully authenticated, the proxy device forwards the request to the message data device to enable the client device to access the message data.

    Abstract translation: 代理设备通过消息数据设备拦截来自客户端设备访问消息数据的请求,例如通过实现邮局协议(POP)或其他消息协议的邮件服务器访问电子邮件。 当例如客户端设备位于与与消息帐户持有者相关联的地理区域不同的某些区域内时,代理设备确定认证客户端设备。 客户端设备的认证可以包括收集附加信息,诸如客户端设备可以使用以访问各种服务的通用标识符。 代理设备还可以向客户端设备转发通知消息,指示对消息数据的访问是待定的,直到客户端设备被认证为止。 如果客户端设备被成功认证,则代理设备将该请求转发到消息数据设备,以使得客户端设备能够访问消息数据。

    No-CAPTCHA CAPTCHA
    39.
    发明授权
    No-CAPTCHA CAPTCHA 有权
    无人机验证人员验船

    公开(公告)号:US09465928B2

    公开(公告)日:2016-10-11

    申请号:US14587206

    申请日:2014-12-31

    CPC classification number: G06F21/31 G06F2221/2133

    Abstract: A device generates parameters identifying selectively revealed un-obfuscated information associated with administering and assessing a Turing test. The device provides, to a client device, a challenge based on the parameters. The challenge directs the client device to selectively reveal the un-obfuscated information for presentation to a user associated with the client device. The device receives a response, to the challenge, from the client device and determines, based on the response and the parameters, whether the user associated with the client device is human. The device selectively performs an action based on determining whether the user associated with the client device is human.

    Abstract translation: 设备产生识别选择性地显示与管理和评估图灵测试相关联的未混淆信息的参数。 该设备向客户端设备提供基于参数的挑战。 该挑战指示客户端设备选择性地显示用于呈现给与客户端设备相关联的用户的未混淆信息。 该设备从客户端设备接收针对挑战的响应,并且基于响应和参数来确定与客户端设备相关联的用户是否为人。 设备基于确定与客户端设备相关联的用户是否是人,选择性地执行动作。

Patent Agency Ranking