-
公开(公告)号:US10791222B2
公开(公告)日:2020-09-29
申请号:US16014837
申请日:2018-06-21
发明人: Julio Jiron , Kevin King , Beth S. Moss , James Lyle Schafer , Kalyan Subramanian , Chris Theodore Kalaboukis , Raziq Yaqub
摘要: A call screening computing system is described that is configured to perform voice captcha and real-time monitoring of calls into a contact center of an organization. The call screening computing system includes a chat bot configured to operate as an AI-based call screener. The chat bot is configured to perform voice captcha by sending a random question to a user device placing a call into the contact center, and analyzing the received answer to determine whether a user of the user device is human or a robot. The chat bot is configured to, based on the user being human, determine whether the user is a legitimate customer of the organization by generating and presenting authentication challenges to the user device. The chat bot may be configured to monitor and interact with a conversation between the user and an agent of the organization during the call into the contact center.
-
公开(公告)号:US10674010B1
公开(公告)日:2020-06-02
申请号:US16418692
申请日:2019-05-21
发明人: Julio Jiron , Kevin King , Beth S. Moss , James Lyle Schafer , Kalyan Subramanian , Chris Theodore Kalaboukis , Raziq Yaqub
摘要: A computer system is described that is configured to enable customers of an organization to self-monitor account activity and modify account access settings via a contact center of the organization. The contact center control system is configured to provide an interactive call history associated with the customer's accounts with the organization. Using the call history, the customer may perform self-monitoring of calls into the contact center that access the customer's accounts, and notify the organization if any of the calls appear suspicious. The contact center control system is configured provide a user interface through which the customer may modify account access settings including changing which types of authentication methods are enabled to access the customer's accounts, and blocking account access by callers from certain phone numbers. The contact center control system may allow the customer to turn off all access to the customer's accounts via the contact center.
-
公开(公告)号:US09904967B1
公开(公告)日:2018-02-27
申请号:US15333588
申请日:2016-10-25
发明人: Sean S. Hamidi , Beth S. Moss , Jason M. Stokes , Ryan S. Alexander , Wendy M. Stutz , Angela C. Berkery , Benjamin W. Geertz
CPC分类号: G06Q50/265 , H04L63/0227 , H04L63/14 , H04L63/1425
摘要: Systems, methods, and other embodiments associated with automated secondary linking for fraud detection systems. According to one embodiment, a system includes a parsing logic configured to receive an incoming fraud report based on a first fraud detection strategy. The parse logic is also configured to parse the incoming fraud report into fraud data. The system further includes a search logic configured to search a set of fraud reports to identify instances of the fraud data. The system also includes an alert logic configured to generate an alert in response to an instance of the fraud data being identified in the set of fraud reports.
-
公开(公告)号:US11445065B1
公开(公告)日:2022-09-13
申请号:US17035421
申请日:2020-09-28
发明人: Julio Jiron , Kevin King , Beth S. Moss , James Lyle Schafer , Kalyan Subramanian , Chris Theodore Kalaboukis , Raziq Yaqub
摘要: A call screening computing system is described that is configured to perform voice captcha and real-time monitoring of calls into a contact center of an organization. The call screening computing system includes a chat bot configured to operate as an AI-based call screener. The chat bot is configured to perform voice captcha by sending a random question to a user device placing a call into the contact center, and analyzing the received answer to determine whether a user of the user device is human or a robot. The chat bot is configured to, based on the user being human, determine whether the user is a legitimate customer of the organization by generating and presenting authentication challenges to the user device. The chat bot may be configured to monitor and interact with a conversation between the user and an agent of the organization during the call into the contact center.
-
公开(公告)号:US10694040B1
公开(公告)日:2020-06-23
申请号:US15905318
申请日:2018-02-26
发明人: Julio Jiron , Kevin King , Beth S. Moss , James Lyle Schafer , Kalyan Subramanian , Chris Theodore Kalaboukis , Raziq Yaqub
摘要: A computer system is described that is configured to generate an entry in a centralized event log for each voice call into a contact center of an organization. The event log system is configured to receive call data associated with action performed during the call and retrieve context data associated with the call from across a plurality of disparate systems used by the contact center to service the call. The event log system is configured to include both the call data and the context data in the call entry, and to correlate the call entry with previous call entries for a same entity identified for the call. The call entry may also include entity profile data as metadata. The pertinent data for the call will be stored in a single, centralized location accessible by any of the front-end systems for use in determining how to handle the call.
-
公开(公告)号:US11062413B1
公开(公告)日:2021-07-13
申请号:US16537949
申请日:2019-08-12
发明人: Sean S. Hamidi , Beth S. Moss , Jason M. Stokes , Ryan S. Alexander , Wendy M. Stutz , Angela C. Berkery , Benjamin W. Geertz
摘要: Automated secondary linking can be employed in conjunction with fraud detection systems. According to one embodiment, a system includes a parsing logic configured to receive an incoming fraud report based on a first fraud detection strategy. The parse logic is also configured to parse the incoming fraud report into fraud data. The system further includes a search logic configured to search a set of fraud reports to identify instances of the fraud data. The system also includes an alert logic configured to generate an alert in response to an instance of the fraud data being identified in the set of fraud reports.
-
公开(公告)号:US10944871B1
公开(公告)日:2021-03-09
申请号:US16894347
申请日:2020-06-05
发明人: Julio Jiron , Kevin King , Beth S. Moss , James Lyle Schafer , Kalyan Subramanian , Chris Theodore Kalaboukis , Raziq Yaqub
摘要: A computer system is described that is configured to generate an entry in a centralized event log for each voice call into a contact center of an organization. The event log system is configured to receive call data associated with action performed during the call and retrieve context data associated with the call from across a plurality of disparate systems used by the contact center to service the call. The event log system is configured to include both the call data and the context data in the call entry, and to correlate the call entry with previous call entries for a same entity identified for the call. The call entry may also include entity profile data as metadata. The pertinent data for the call will be stored in a single, centralized location accessible by any of the front-end systems for use in determining how to handle the call.
-
公开(公告)号:US10546299B1
公开(公告)日:2020-01-28
申请号:US14743378
申请日:2015-06-18
IPC分类号: G06Q20/40
摘要: Systems, methods, and other embodiments associated with a fraudulent activity shell. According to one embodiment, a system includes an application having a normal environment and a shell environment. The system also includes a trigger logic that determines whether an action satisfies a trigger condition. In response to determining that the action satisfies the trigger condition, the trigger logic triggers the application to enter a fraudulent activity mode from a default mode. In the fraudulent activity mode, the normal environment is configured to hold the action. The shell environment is configured to display the action as executed in the fraudulent activity mode.
-
公开(公告)号:US10313511B1
公开(公告)日:2019-06-04
申请号:US16000453
申请日:2018-06-05
发明人: Julio Jiron , Kevin King , Beth S. Moss , James Lyle Schafer , Kalyan Subramanian , Chris Theodore Kalaboukis , Raziq Yaqub
摘要: A computer system is described that is configured to enable customers of an organization to self-monitor account activity and modify account access settings via a contact center of the organization. The contact center control system is configured to provide an interactive call history associated with the customer's accounts with the organization. Using the call history, the customer may perform self-monitoring of calls into the contact center that access the customer's accounts, and notify the organization if any of the calls appear suspicious. The contact center control system is configured provide a user interface through which the customer may modify account access settings including changing which types of authentication methods are enabled to access the customer's accounts, and blocking account access by callers from certain phone numbers. The contact center control system may allow the customer to turn off all access to the customer's accounts via the contact center.
-
公开(公告)号:US11861620B1
公开(公告)日:2024-01-02
申请号:US16715914
申请日:2019-12-16
IPC分类号: G06Q20/40
CPC分类号: G06Q20/4016 , G06Q20/40
摘要: Systems, methods, and other embodiments associated with a fraudulent activity shell. According to one embodiment, a system includes an application having a normal environment and a shell environment. The system also includes a trigger logic that determines whether an action satisfies a trigger condition. In response to determining that the action satisfies the trigger condition, the trigger logic triggers the application to enter a fraudulent activity mode from a default mode. In the fraudulent activity mode, the normal environment is configured to hold the action. The shell environment is configured to display the action as executed in the fraudulent activity mode.
-
-
-
-
-
-
-
-
-