H04M1/56

SYSTEMS AND METHODS TO DISABLE CALLER IDENTIFICATION BLOCKING

In one aspect, a first device includes a processor and storage accessible to the processor. The storage bears instructions executable by the processor to identify contact information for a person associated with a second device and determine, based on the identification, whether to disable a caller identification (ID) blocking function associated with making calls from the first device. The instructions are also executable by the processor to, responsive to a determination to disable the caller ID blocking function, disable the caller ID blocking function while facilitating a call from the first device to the second device.

Telecommunications privacy method

One embodiment of the invention could be a method of disguising the caller ID of an incoming phone call comprising the following steps: providing a portable telecommunication smart device that interfaces with telecommunication system to receive an incoming phone call; selecting a phone number to be placed upon a fake list manager database and assigning a fake display caller ID to the selected user known phone number; storing the selected phone number and the assigned fake caller display ID upon the fake list manager database, receiving an incoming phone call; matching a phone number of the incoming phone call with selected phone number; displaying the fake caller ID upon portable telecommunication smart device.

Providing audio announcement to called parties

The present disclosure describes a system, method, and computer-readable medium for providing audio announcement of communications to a called party in a communication network. The method includes receiving communication from a calling party and performing a lookup of information relating to the calling party in a database via an Internet Protocol connection based on an identifier of at least one of the calling party and the called party. The information comprises one or more audio files. The method then provides the audio announcement to a called party based on the audio files.

Authentication and control of incoming communication
10091350 · 2018-10-02 · ·

An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.

CALL CLASSIFICATION THROUGH ANALYSIS OF DTMF EVENTS

Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.

CALL CLASSIFICATION THROUGH ANALYSIS OF DTMF EVENTS

Systems, methods, and computer-readable media for call classification and for training a model for call classification, an example method comprising: receiving DTMF information from a plurality of calls; determining, for each of the calls, a feature vector including statistics based on DTMF information such as DTMF residual signal comprising channel noise and additive noise; training a model for classification; comparing a new call feature vector to the model; predicting a device type and geographic location based on the comparison of the new call feature vector to the model; classifying the call as spoofed or genuine; and authenticating a call or altering an IVR call flow.

System and method for identifying unwanted communications using communication fingerprinting

A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.

Method and apparatus for notifying an end user of a messaging event in a multi-user setting

A method and apparatus for notifying an end user of a messaging event in a multi-user setting is disclosed. An apparatus that incorporates teachings of the present disclosure may include, for example, a non-transitory computer-readable storage medium in a communication device which includes computer instructions at least for matching a caller identifier associated with a messaging event and entries in a plurality of contact books corresponding to a plurality of users, and identifying a plurality of parties to whom the messaging event is potentially directed based on the matching. Additional embodiments are disclosed.

Providing audio announcement to called parties

The present disclosure describes a system, method, and computer-readable medium for providing audio announcement of communications to a called party in a communication network. The method includes receiving communication from a calling party and performing a lookup of information relating to the calling party in a database via an Internet Protocol connection based on an identifier of at least one of the calling party and the called party. The information comprises one or more audio files. The method then provides the audio announcement to a called party based on the audio files.

Virtual telephony assistant

Examples are disclosed for screening an inbound telephony call to a called party. At a communications server, an inbound telephony call intended for a called party's telephone number is received and checked against a whitelist database and a blacklist database. When the caller ID of the inbound call matches a telephone number contained in the blacklist database, the communications server automatically routes the call to a voicemail system or spam folder associated with the called party's telephone number. When the caller ID of the inbound call matches a telephone number contained in the whitelist database, the communications server determines whether the called party is available to receive the call. Otherwise, when the caller ID of the inbound call does not match a telephone number contained in either the whitelist database or the blacklist database, the communications server prompts the caller for additional information.