H04M3/22

System and method for assessing security threats and criminal proclivities
11553079 · 2023-01-10 · ·

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.

RELATIONSHIP GRAPHS FOR TELECOMMUNICATION NETWORK FRAUD DETECTION

A processing system may maintain a relationship graph that includes nodes and edges representing phone numbers and device identifiers having associations with the phone numbers. The processing system may obtain an identification of a first phone number or a first device identifier for a fraud evaluation and extract features from the relationship graph associated with at least one of the first phone number or the first device identifier. The plurality of features may include one or more device identifiers associated with the first phone number, or one or more phone numbers associated with the first device identifier. The processing system may then apply the features to a prediction model that is implemented by the processing system and that is configured to output a fraud risk value of the first phone number or the first device identifier and implement at least one remedial action in response to the fraud risk value.

Simultaneous voice and data content driven commercial data platform
11553082 · 2023-01-10 ·

One disclosed system includes dialer device with a dialer identifier that initiates a call with a receiver device with a receiver identifier over a voice channel. A database stores: interaction data in association with both the receiver identifier and the dialer identifier; a content quality metric in association with the interaction data; and a network topology in which the receiver identifier and the dialer identifier are associated with nodes and are connected by an edge. A server is programmed to: update, based on the content quality metric and the network topology, a rankings associated with the receiver identifier and the dialer identifier; and one of: surface the ranking associated with the dialer identifier and the ranking associated with the receiver identifier to an external searching agent using an external data channel and without using any voice channel; or rank the dialer identifier for an internal searching agent using the ranking.

Method, system and device for permitting unfamiliar call
11695870 · 2023-07-04 ·

A method for permitting unfamiliar call, applied to a communication device having a memory and a call-blocking app to provide an unfamiliar call, includes the steps of: configuring an area in the memory of the communication device as a storage unit; recording at least one password into a password-correlated table in the storage unit, each of the at least one password being related to a specific user of the communication device; as an unfamiliar call is received, asking a caller of the unfamiliar call to provide an answer for a trivial question immediately provided by the communication device; determining whether or not the answer matches any of the at least one password in the password-correlated table; forwarding the unfamiliar call to the user corresponding to the matched password listed in the password-correlated table if positive; and, blocking the unfamiliar call if negative.

SYSTEM FOR CENTRALIZED CAPTIONED TELEPHONE SERVICE
20230007121 · 2023-01-05 ·

A system for centralized captioned telephone service (“C-CTS”), which includes a C-CTS system (“C-CTSS”) for providing a transcription service to a user subscribed to the C-CTS during a phone call with a peer; a mobile communications device of the user which includes a first phone number assigned from a carrier of the user; a communications device of the peer which includes a second phone number; and a plurality of caption providers that communicate with the C-CTSS. The first phone number is associated with the C-CTSS and each of the caption providers provides a captioned telephone service. A carrier of the first phone number includes a voice network, a data network, and a database that stores the first phone number of the user which is subscribed to the C-CTS. The C-CTSS includes a database that stores the first phone number of the user.

Customer self-help control system for contact centers

A computer system is described that is configured to enable customers of an organization to self-monitor account activity and modify account access settings via a contact center of the organization. The contact center control system is configured to provide an interactive call history associated with the customer's accounts with the organization. Using the call history, the customer may perform self-monitoring of calls into the contact center that access the customer's accounts, and notify the organization if any of the calls appear suspicious. The contact center control system is configured provide a user interface through which the customer may modify account access settings including changing which types of authentication methods are enabled to access the customer's accounts, and blocking account access by callers from certain phone numbers. The contact center control system may allow the customer to turn off all access to the customer's accounts via the contact center.

Systems and methods for managing software telephones
11546463 · 2023-01-03 · ·

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for managing software telephones and telephone services, such as customer service support or sales, for multiple clients. Methods consistent with the present disclosure may be implemented as non-transitory computer-readable storage medium, where a processor executes instructions out of a memory when services are provided or organized during a telephone call or a text message communication session. In general, a telephone or text messaging service may be managed along multiple different components including origination services, platform services, and termination services without introducing additional conferencing and/or secondary voice conferencing sessions to calls between clients and respective customers.

SUSPICIOUS CALL HANDLING SYSTEM, SUSPICIOUS CALL HANDLING METHOD, OUTGOING/INCOMING CALL INFORMATION COLLECTION SERVER AND PROGRAM
20220417360 · 2022-12-29 ·

A suspicious call handling system that detects and handles a suspicious call within a communication network includes an outgoing and incoming call information collecting server 10 and session control servers 20A to 20C. The outgoing and incoming call information collecting server 10 includes a storage unit 15 that stores a suspicious call condition, a collecting unit 11 that collects outgoing and incoming call information from each of the session control servers 20A to 20C within a communication network, and a searching unit 12 that searches for a phone call that matches the suspicious call condition from the outgoing and incoming call information and gives a notification of the phone call to the session control servers 20A to 20C accommodating a user to which the phone call is connected. The session control servers 20A to 20C include an action unit 24 that executes an action, which has been set in advance, in a case where it is detected that a call has been transmitted to a user who has received the notification from the outgoing and incoming call information collecting server 10.

Operation related to user equipment using secret identifier

A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.

Data center disaster circuit breaker utilizing machine learning
11537943 · 2022-12-27 · ·

Calls received by a data center that are associated with a request are monitored. Features are subsequently extracted from the monitored calls so that a machine learning model may use such features to determine that the request will cause the data center to malfunction. The machine learning model can be trained using data derived from a transaction log for the data center. At least one correction action to prevent the data center from malfunctioning can then be initiated in response to such determination. Related apparatus, systems, techniques and articles are also described.