H04M3/22

Toll-free numbers metadata tagging, analysis and reporting

A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.

SYSTEM AND METHOD FOR ASSESSING SECURITY THREATS AND CRIMINAL PROCLIVITIES
20230231947 · 2023-07-20 · ·

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.

THIRD PARTY MONITORING OF ACTIVITY WITHIN A MONITORING PLATFORM
20230231948 · 2023-07-20 · ·

The present disclosure describes a monitoring environment that monitors an activity for activity that may be indicative of being prohibited by the local, the state, and/or the national governing authorities, namely suspicious activity, or activity that is prohibited by the local, the state, and/or the national governing authorities, namely prohibited activity. The monitoring environment verifies the activity is actually being monitored within the monitoring environment. The verification can require one or more monitoring persons monitoring the activity to perform one or more tasks to verify their attentiveness in monitoring the activity. The one or more tasks can be as simple as activating a checkbox or providing a code or an electronic signature to provide some examples, although more complicated tasks, such as a biometric verification such as a retinal, a facial, and/or a voice verification to provide some examples, are possible as will be recognized by those skilled in the relevant art(s) without departing from the spirit and scope of the present disclosure.

System and method for determining unwanted call origination in communications networks
11706335 · 2023-07-18 · ·

A method and system for discovering and locating the source of unwanted communication origination in a communications network, the method comprising compiling a communication campaign database storing data of one or more communication campaigns along with automatically identified instances of those campaigns, and simultaneously or sequentially matching those instances against known communication traffic of a set of cooperating telecommunication carriers. The one or more communications campaigns include a grouping of related fingerprints and patterns that identify a sequence of characters, audio or video associated with instances of a same likely campaigns, either legitimate or illegitimate/fraudulent.

Customization of CNAM information for calls placed to mobile devices

One example method of operation may include identifying a call from a calling device destined for a mobile device, identifying a calling device number associated with the calling device and a mobile device number associated with the mobile device, determining whether a stored calling relationship exists between the calling device number and the mobile device number, and appending one of a plurality of caller identification names (CNAM) to the call based on the determination as to whether there is a stored calling relationship.

System, Method, and Apparatus for Initiating Outbound Communications from a User Device
20230224402 · 2023-07-13 ·

Provided are systems, methods, and apparatuses initiating outbound communications. The system may include at least one processor of a telecommunications device comprising a display and a communication application, the at least one processor programmed or configured to: receive, with the communication application, a communication request comprising a number, the communication request initiated by a user of the telecommunications device, determine whether to automatically initiate a communication to the number based on recipient data associated with the number, in response to determining to not automatically initiate the communication to the number, prompt the user, on the display of the telecommunications device, with a selectable option configured to initiate the communication to the number upon selection, and in response to determining to automatically initiate the communication to the number, automatically initiate the communication to the number upon selection

Acoustic quality evaluation apparatus, acoustic quality evaluation method, and program

To obtain an appropriate evaluation value in an acoustic quality evaluation by a conversational test. An acoustic quality evaluation apparatus 3 evaluates the acoustic quality of a call performed between a near-end terminal 1 and a far-end terminal 2 via a voice communication network 4. An evaluation value presenting unit 31 displays, on a display unit 13, evaluation categories obtained by classifying each of a plurality of evaluation viewpoints into a predetermined number of levels. An input unit 14 transmits the evaluation category selected by the evaluator for each of the evaluation viewpoints, to an evaluation value determination unit 32. The evaluation value determination unit 32 determines the lowest evaluation value among evaluation values assigned to the evaluation category received from the input unit 14 as a subjective evaluation value for acoustic quality.

CALL LIMITING USING BURST DETECTION
20230008835 · 2023-01-12 ·

Described are techniques including a computer-implemented method of maintaining a list of newly assigned phone numbers. The method further comprises intermittently removing phone numbers from the list of newly assigned phone numbers. The method further comprises determining that a newly assigned phone number initiates a number of calls per unit time that exceeds a threshold number of calls per unit time. The method further comprises automatically flagging the newly assigned phone number as a possible robocaller.

CALL SCREENING SERVICE FOR DETECTING FRAUDULENT INBOUND/OUTBOUND COMMUNICATIONS WITH SUBSCRIBER DEVICES

An example method of operation may include one or more of identifying an outbound call placed by a mobile device subscribed to a protected carrier network, determining the outbound call is destined for a destination telephone number that was stored in a call history of the mobile device, determining the destination telephone number is a scam call suspect telephone number based on one or more identified call filter parameters associated with the destination telephone number, and forwarding a scam call notification to the mobile device while the outbound call is dialing the destination telephone number.

MANAGING SERVICE INTERRUPTS IN LAWFUL INTERCEPTION

A service interruption manager function, SIMF, receives information that indicates that lawful interception, LI, service interruption associated with an LI task has occurred. Based on the received information, a determination is made of a status regarding the LI service interruption associated with the LI task, for example a determination whether the LI service interruption associated with the LI task has a current status that is any of: terminated, ongoing or initiated. A message is then transmitted, to a delivery function, DF, via an HI2 interface, the message comprising at least the determined status regarding the LI service interruption.