System and method for on-demand presence
    51.
    发明授权
    System and method for on-demand presence 有权
    按需存在的系统和方法

    公开(公告)号:US09516162B2

    公开(公告)日:2016-12-06

    申请号:US14526941

    申请日:2014-10-29

    CPC classification number: H04M3/42374 H04W4/16

    Abstract: Methods and systems for determining availability of a user based on mobile device status are provided herein. In some embodiments, a method for determining availability of a user based on mobile device status may include receiving, at a first device, an instruction to check a status of a second device; transmitting a status request from the first device to the second device; and receiving, responsive to the status request, a message from the second device indicating a telephony status of the second device.

    Abstract translation: 本文提供了用于基于移动设备状态来确定用户的可用性的方法和系统。 在一些实施例中,用于基于移动设备状态确定用户的可用性的方法可以包括在第一设备处接收用于检查第二设备的状态的指令; 从第一设备向第二设备发送状态请求; 以及响应于所述状态请求,从所述第二设备接收指示所述第二设备的电话状态的消息。

    System and method for non-disruptive mitigation of messaging fraud
    53.
    发明授权
    System and method for non-disruptive mitigation of messaging fraud 有权
    用于非破坏性缓解消息传递欺诈的系统和方法

    公开(公告)号:US09419988B2

    公开(公告)日:2016-08-16

    申请号:US14473289

    申请日:2014-08-29

    Abstract: A system and method are disclosed herein for providing mitigation of fraud in a hosted messaging service while having minimal impact on authorized messaging users. The method includes a system for detecting potential fraud based on multiple and configurable fraud indicators as well as historical data, which can be customized for individual users or groups. The system can terminate in-process messages that are potentially fraudulent and reset the network access credentials for the affected user accounts or devices that have been potentially compromised. The system uses historical data to block further messages from the compromised user accounts or devices to specific destination addresses where the presumed fraudulent messaging activity was directed. In a further aspect, the system and method can automatically reset the network access credentials for authorized users with minimal downtime.

    Abstract translation: 本文公开了一种系统和方法,用于在托管消息传送服务中提供减轻欺诈的同时对授权的消息传递用户的影响最小。 该方法包括用于基于多个可配置的欺诈指示符以及可以针对个体用户或组来定制的历史数据来检测潜在欺诈的系统。 系统可以终止潜在的欺诈性进程内消息,并重置受影响的用户帐户或潜在受到损害的设备的网络访问凭据。 该系统使用历史数据来阻止来自被入侵的用户帐户或设备的进一步消息到被推定的欺诈性消息活动被引导到特定目的地地址。 在另一方面,系统和方法可以以最少的停机时间自动重置授权用户的网络访问凭证。

    Systems and methods for verifying identity using biometric data

    公开(公告)号:US12190893B2

    公开(公告)日:2025-01-07

    申请号:US17345690

    申请日:2021-06-11

    Abstract: A system for registering an individual's biometric data and then later verifying the identity of the individual using the previously registered biometric data makes use of either an audio communications channel or a messaging channel, both of which are accessed via an application programming interface (API). In some instances, spoken audio input is received from the individual and the spoken audio input is used to generate a voice print for the individual. In other instances, the biometric data could be image-based, such as facial images or an image of an individual's iris.

    SYSTEMS AND METHODS FOR OBTAINING LOCATION DATA FOR MOBILE COMPUTING DEVICES

    公开(公告)号:US20220038854A1

    公开(公告)日:2022-02-03

    申请号:US16940721

    申请日:2020-07-28

    Abstract: A telephony software application on a first mobile computing device requests information about the present location of the first mobile computing device from a remote server. The remote server obtains information about the present location of a second mobile computing device that is located proximate to the first mobile computing device from the second mobile computing device. The remote server then provides the obtained location data to the first mobile computing device. This process may repeat at periodic time intervals.

    SYSTEMS AND METHODS FOR VERIFYING IDENTITY USING BIOMETRIC DATA

    公开(公告)号:US20210390962A1

    公开(公告)日:2021-12-16

    申请号:US17345690

    申请日:2021-06-11

    Abstract: A system for registering an individual's biometric data and then later verifying the identity of the individual using the previously registered biometric data makes use of either an audio communications channel or a messaging channel, both of which are accessed via an application programming interface (API). In some instances, spoken audio input is received from the individual and the spoken audio input is used to generate a voice print for the individual. In other instances, the biometric data could be image-based, such as facial images or an image of an individual's iris.

    Systems and methods for handling incoming telephone calls

    公开(公告)号:US11166129B2

    公开(公告)日:2021-11-02

    申请号:US16419109

    申请日:2019-05-22

    Abstract: Systems and methods for handling an incoming telephone call received at a private branch exchange system and directed to an employee enable an actual or virtual receptionist to camp the call on the employee's extension. When the call is camped on the employee's extension, the private branch exchange system causes a push notification to be sent to a telephony device used by the employee to notify the employee that a call is camped on his extension. Such a push notification may also inform the employee about how many calls are camped on his extension. Further, such a push notification may provide the employee with information about the identity of a calling party whose call is camped on the employee's extension.

    SYSTEM AND METHOD FOR USING PREDICTIVE ANALYSIS TO GENERATE A HIERARCHICAL GRAPHICAL LAYOUT

    公开(公告)号:US20210227169A1

    公开(公告)日:2021-07-22

    申请号:US16749018

    申请日:2020-01-22

    Abstract: Methods and systems for using predictive analysis to generate a hierarchical layout of participants in a video conference on display devices are provided herein. In some embodiments, a method for using predictive analysis to generate a hierarchical layout of participants in a video conference on display devices comprises receiving a request to set up a video conference among three or more participants predicting, based on historical data, a dominant participant of the three or more participants in the video conference; and displaying a hierarchical layout of the participants on display devices of the two or more remaining subordinate speakers, who are not predicted to be the dominant speaker, with the predicted dominant participant displayed more prominently than the remaining three or more participants.

Patent Agency Ranking