MOBILE CALLER AUTHENTICATION FOR CONTACT CENTERS

    公开(公告)号:US20180139206A1

    公开(公告)日:2018-05-17

    申请号:US15354816

    申请日:2016-11-17

    Applicant: Avaya Inc.

    Abstract: A call request is received, from a mobile device, to establish a communication with a contact center. For example, the call request may be to establish a voice call with the contact center. In response to the call request, the mobile device sends authentication factors to a cloud authentication service that the user/mobile device has previously registered with. For example, the authentication factors may include usage factors of the mobile device, such as a call history of the user on the mobile device. If the authentication factors are validated, a token is generated. The token is sent to the contact center along with the call request. The token is validated at the contact center. At this point, the contact center knows that the user/mobile device are authentic. A call is then established between the user and the contact center.

    LEDGER-BASED CONFIDENCE MODEL FOR CONTENT TRANSFERS ACROSS A COMMUNICATION NETWORK

    公开(公告)号:US20200295947A1

    公开(公告)日:2020-09-17

    申请号:US16354340

    申请日:2019-03-15

    Applicant: Avaya Inc.

    Abstract: Embodiments of the disclosure provide a communication system and method to leverage distributed ledger technology as the basis upon which a trustless method can be deployed to validate file provenance and authenticity, while also supporting a strong form of non-repudiation. In one example, the method includes transferring electronic content from a sending communication device to the receiving communication device via Rich Communication Services. The method includes generating, at the sending communication device, file transfer parameters, identity signature and timestamp that are associated with the transfer of electronic content from the sending communication device. The method then includes causing the identity signature and timestamp to be written as part of a content transfer ledger. The method may also include securely providing the file transfer parameters associated with the transfer of electronic content from the sending device to one or more receiving communication devices as part of validating the electronic content.

    CALL RECONSTRUCTION SEQUENCED APPLICATION
    14.
    发明申请

    公开(公告)号:US20200028962A1

    公开(公告)日:2020-01-23

    申请号:US16585905

    申请日:2019-09-27

    Applicant: Avaya Inc.

    Abstract: Embodiments provide systems and methods for reconstructing a communication session upon a failure of a session manager by monitoring a communication session associated with a Universal Call IDentifier (UCID) and detecting a failure of the session manager. In some cases, A timer can be set in response to detecting the failure of the session manager. In response to the timer expiring before detecting the recovery of the session manager, the application server can end monitoring of the communication session. In response to detecting a subsequent recovery of the session manager, a re-invitation message associated with the communication session and including the UCID can be sent. Communications components of the contact center can receive and accept the re-invitation message, re-map a session initiated by the re-invitation message to the communication session based on the UCID from the re-invitation message, and reconstruct the communication session.

    EXPORTED DIGITAL RELATIONSHIPS
    15.
    发明申请

    公开(公告)号:US20200012810A1

    公开(公告)日:2020-01-09

    申请号:US16029225

    申请日:2018-07-06

    Applicant: Avaya Inc.

    Inventor: David Chavez

    Abstract: The present disclosure provides a communication system and method, among other things. As a non-limiting example, the method includes enabling access to entries of personal digital data for a plurality of users; enabling at least some of the personal digital data for the plurality of users to be retrieved by a query that contains an identification of a first user and authentication information associated with the first user; receiving a group identifier that is stored with reference to personal digital data of the first user; and distributing relationship digital data that describes a relationship between the first user and the second user based on the existence of the group identifier.

    Method and system for altered alerting

    公开(公告)号:US10470006B2

    公开(公告)日:2019-11-05

    申请号:US15877111

    申请日:2018-01-22

    Applicant: Avaya Inc.

    Inventor: David Chavez

    Abstract: The methods and systems of the present disclosure can configure, by a microprocessor, a message from a sending user to a recipient device; set, by the microprocessor, a reduced alert for the message, where the reduced alert is set by the sending user; and send the message to the recipient device, wherein the recipient device provides the reduced alert upon receipt of the message.

    METHOD AND SYSTEM FOR ALTERED ALERTING
    17.
    发明申请

    公开(公告)号:US20190230482A1

    公开(公告)日:2019-07-25

    申请号:US15877111

    申请日:2018-01-22

    Applicant: Avaya Inc.

    Inventor: David Chavez

    Abstract: The methods and systems of the present disclosure can configure, by a microprocessor, a message from a sending user to a recipient device; set, by the microprocessor, a reduced alert for the message, where the reduced alert is set by the sending user; and send the message to the recipient device, wherein the recipient device provides the reduced alert upon receipt of the message.

    CELLULAR CENTREX: DUAL-PHONE CAPABILITY
    18.
    发明申请

    公开(公告)号:US20190230163A1

    公开(公告)日:2019-07-25

    申请号:US15877071

    申请日:2018-01-22

    Applicant: Avaya Inc.

    Inventor: David Chavez

    Abstract: Embodiments of the disclosure provide a communication system and method. In some embodiments, a mobile network core is provided with a communication interface that establishes enables the receipt of incoming calls, a microprocessor, and memory that stores instructions that, when executed by the microprocessor, enable the microprocessor to identify an incoming call as being associated with a first persona or a second persona and, based on whether the incoming call is identified as being associated with the first persona or the second persona, automatically causes a user interface of a mobile device associated with the incoming call to present a particular set of applications from a plurality of applications to a user of the mobile device.

    Methods and systems for creating and exchanging a device specific blockchain for device authentication

    公开(公告)号:US10212145B2

    公开(公告)日:2019-02-19

    申请号:US15284103

    申请日:2016-10-03

    Applicant: Avaya Inc.

    Abstract: Mobile devices and other devices used in transactions or interactions with other computer systems can be identified by an abstract composite of information unique to the device. For example, the device can record and store when a user first started the device (a date and time of first use), how the device is configured (including any hardware/software identifications, versions, install dates, time when configurations or installations occurred, etc.), etc. All of the information can be collected for a specified period of time (e.g., 30 minutes, 1 hour, etc.), periodically, or continually. This process yields a large collection of data, which can be condensed (a record before condensing the data may be approximately 10 to 50 MB). The data may then be encapsulated in a blockchain. At least a portion of the blockchain may then be exchanged to identify the device.

    Mobile caller authentication for contact centers

    公开(公告)号:US10164977B2

    公开(公告)日:2018-12-25

    申请号:US15354816

    申请日:2016-11-17

    Applicant: Avaya Inc.

    Abstract: A call request is received, from a mobile device, to establish a communication with a contact center. For example, the call request may be to establish a voice call with the contact center. In response to the call request, the mobile device sends authentication factors to a cloud authentication service that the user/mobile device has previously registered with. For example, the authentication factors may include usage factors of the mobile device, such as a call history of the user on the mobile device. If the authentication factors are validated, a token is generated. The token is sent to the contact center along with the call request. The token is validated at the contact center. At this point, the contact center knows that the user/mobile device are authentic. A call is then established between the user and the contact center.

Patent Agency Ranking