Patent classifications
H04M15/41
SYSTEMS AND METHODS OF GENERATING AN ENGAGEMENT PROFILE
The present disclosure relates to systems and methods for determining an engagement profile of a participant by associating electronic activities to a profile. It may generate the engagement profile based on analysis of the electronic activity level. An example implementation may contain the following steps. The system may access for a first record object a plurality of electronic activities linked with the first record object. The system may identify for a participant from the plurality of electronic activities a set of electronic activities including the participant. The system may determine an engagement profile of the participant based on a first number of electronic activities of the set of electronic activities sent by the participant, a second number of the set of electronic activities received by the participant and a temporal distribution of the set of electronic activities. The system may store the engagement profile in one or more data structures.
Systems and methods for generating node profiles using electronic activity information
The present disclosure relates to systems and methods for generating new node profiles using information from electronic activities. The system is configured to maintain node profiles corresponding to unique entities; access electronic activities transmitted or received via electronic accounts associated with data source providers; identify a first email address of a sender and second email addresses of respective recipients of an electronic activity; identify that the first email address matches a value of a field of a first node profile; link the electronic activity to the first node profile; determine that a second email address of a respective recipient of the electronic activity cannot be matched to any node profile associated with the respective participant; and generate, responsive to determining that the electronic activity cannot be matched to any node profile of the plurality of node profiles, a new node profile including the second email address of the respective recipient.
Ensuring correctness of session identifiers in call duration records in mobile networks
A mechanism to insert a correct call identifier as a session identifier in an accounting request (AR) record and a mechanism for a charging control function (CCF) device to check the value and generate an error as required. A method can comprise receiving a session initiation protocol packet representing a first attribute value pair; based on the session initiation protocol packet, checking for an existence of an identity between a first field associated with the session initiation protocol packet and a second field associated with a second attribute value pair; and in response to a result of the checking being that the existence of the identity is not determined to be presents between the first field and the second field, updating a third attribute value pair.
Detecting and diagnosing call quality degradation issues using data session record data
A computer-implemented method includes: receiving, using a processor, multiple data session records (DSRs); storing the multiple DSRs in a memory communicatively coupled to the processor; analyzing, using the processor, the stored multiple DSRs for temporal and spatial data; and determining, using the processor, quality degradation by using the temporal and spatial data for the stored multiple DSRs.
METHOD OF ENABLING DIGITAL MUSIC CONTENT TO BE DOWNLOADED TO AND USED ON A PORTABLE WIRELESS COMPUTING DEVICE
The invention enables digital music content to be downloaded to and used on a portable wireless computing device. An application running on the wireless device has been automatically adapted to parameters associated with the wireless device without end-user input (e.g. the application has been configured in dependence on the device OS and firmware, related bugs, screen size, pixel number, security models, connection handling, memory etc. This application enables an end-user to browse and search music content on a remote server using a wireless network; to download music content from that remote server using the wireless network and to playback and manage that downloaded music content. The application also includes a digital rights management system that enables unlimited legal downloads of different music tracks to the device and also enables any of those tracks stored on the device to be played so long as a subscription service has not terminated.
METHOD OF ENABLING DIGITAL MUSIC CONTENT TO BE DOWNLOADED TO AND USED ON A PORTABLE WIRELESS COMPUTING DEVICE
The invention enables digital music content to be downloaded to and used on a portable wireless computing device. An application running on the wireless device has been automatically adapted to parameters associated with the wireless device without end-user input (e.g. the application has been configured in dependence on the device OS and firmware, related bugs, screen size, pixel number, security models, connection handling, memory etc. This application enables an end-user to browse and search music content on a remote server using a wireless network; to download music content from that remote server using the wireless network and to playback and manage that downloaded music content. The application also includes a digital rights management system that enables unlimited legal downloads of different music tracks to the device and also enables any of those tracks stored on the device to be played so long as a subscription service has not terminated.
METHOD OF ENABLING DIGITAL MUSIC CONTENT TO BE DOWNLOADED TO AND USED ON A PORTABLE WIRELESS COMPUTING DEVICE
The invention enables digital music content to be downloaded to and used on a portable wireless computing device. An application running on the wireless device has been automatically adapted to parameters associated with the wireless device without end-user input (e.g. the application has been configured in dependence on the device OS and firmware, related bugs, screen size, pixel number, security models, connection handling, memory etc. This application enables an end-user to browse and search music content on a remote server using a wireless network; to download music content from that remote server using the wireless network and to playback and manage that downloaded music content. The application also includes a digital rights management system that enables unlimited legal downloads of different music tracks to the device and also enables any of those tracks stored on the device to be played so long as a subscription service has not terminated.
Service Selection Set Publishing To Device Agent With On-Device Service Selection
Disclosed herein are various embodiments for publishing a service offer set to a device agent on an end-user device and for on-device selection of a service. In some embodiments, a network system publishes a service offer set to an end-user device over a wireless access network, receives an offer set user selection from the end-user device, and provisions one or more network functions based on the offer set user selection.
ACR BUFFERING IN THE CLOUD
A network element of an Internet Protocol multimedia subsystem buffers network resource usage information in the cloud. After generating network resource usage information based on an observation of network resource usage, the network element transmits the network resource usage information to a cloud-based storage service for buffering. Once a network resource usage collection function is available, the network element retrieves the network resource usage information from the cloud-based storage service and transmits it to a charging collection function for generation of call detail records.
FRAUD DETECTION IN INTERACTIVE VOICE RESPONSE SYSTEMS
Systems and methods for call detail record (CDR) analysis to determine a risk score for a call and identify fraudulent activity and for fraud detection in Interactive Voice Response (IVR) systems. An example method may store information extracted from received calls. Queries of the stored information may be performed to select data using keys, wherein each key relates to one of the received calls, and wherein the queries are parallelized. The selected data may be transformed into feature vectors, wherein each feature vector relates to one of the received calls and includes a velocity feature and at least one of a behavior feature or a reputation feature. A risk score for the call may be generated during the call based on the feature vectors.