H04M2201/18

TELEPHONE NUMBER BASED INFORMATION LOADING METHOD AND DEVICE
20170346952 · 2017-11-30 ·

Disclosed are a telephone-number-based information loading method and device, wherein the method comprises steps of: detecting a telephone number in current display contents on a terminal side; determining whether the telephone number carries a feature identifier; and if yes, then generating a dial option control that is based on the telephone number in the current display contents, and/or invoking entry information of a webpage type service previously associated with the telephone number. According to the present invention, it is possible to conserve bandwidth resources, while preventing the occurrence of a situation in which a user mistakenly enters a dangerous website because of a search error, resulting in a security threat or other losses.

METHOD AND APPARATUS FOR CALL CORRELATION
20170344963 · 2017-11-30 ·

There is provided a method of correlating a telephone call between a first party and a second party with information that is to be used in a third party service implemented in relation to the telephone call. The method comprises routing telephone calls involving the first party via a third party service system that implements the third party service. The method further comprises, at a communication management system of the first party, determining call identification data for the telephone call and session data associated with a session of the third party service to be implemented in relation to the telephone call, and sending the call identification data and the session data to the third party service system; and, at the third party service system, receiving the call identification data and the session data from the communication management system, using the received call identification data to identify the telephone call, using the received session data to determine the information that is be used in the third party service, and correlating the information with the identified telephone call.

Method to determine the quality of civic address produced by reverse geocoder
11668784 · 2023-06-06 · ·

Systems and methods are provided for determining the quality of a civic address produced by a reverse geocoder, utilizing the uncertainty of a geodetic location and a distance between the geodetic location and a geocoded location (i.e., a civic address) determined by the reverse geocoder. Upon receiving a request by a PSAP for a civic address corresponding to a UE initiating a call for emergency services, a node initially identifies a geodetic location of the UE and an uncertainty of the geodetic location. The node initiates an API call to a reverse geocoder API. The node receives a geocoded location corresponding to the geodetic location and compares the geocoded location to the geodetic location to determine a distance between them. Based on the uncertainty of the geodetic location and the distance between the geodetic location and the geocoded location, a quality of the civic address is determined.

Techniques for behavioral pairing in a contact center system
11265420 · 2022-03-01 · ·

Techniques for behavioral pairing in a contact center system are disclosed. In one particular embodiment, the techniques may be realized as a method for pairing in a contact center including ordering one or more contacts, ordering one or more agents, comparing a first difference in ordering between a first contact and a first agent in a first pair with a second difference in ordering between a second contact and a second agent in a second pair, and selecting the first pair or the second pair for connection based on the comparing, wherein the first contact and the second contact are different or the first agent and the second agent are different.

DEVICE PAIRING TAKING INTO ACCOUNT AT LEAST ONE CONDITION

Some embodiments of the present invention include pairing two wireless devices by placing at least one of two devices in a pairing mode; performing at least one pairing motion event with at least one of the wireless devices to satisfy at least one pairing condition; detecting satisfaction of the at least one pairing condition; and pairing the two wireless devices in response to detecting satisfaction of the at least one pairing condition. Numerous other aspects are provided.

Techniques for benchmarking pairing strategies in a contact center system
11265422 · 2022-03-01 · ·

A method is provided. The method comprises associating a first pairing strategy to a first plurality of contacts during a first period of time, associating a second pairing strategy to a second plurality of contacts during a second period of time, associating a third pairing strategy to a third plurality of contacts during a third period of time, associating the first pairing strategy to a fourth plurality of contacts during a fourth period of time, associating the second pairing strategy to a fifth plurality of contacts during a fifth period of time, associating to a sixth plurality of contacts during a sixth period of time, determining a first performance measurement based on outcomes of the first, second, fourth, and fifth pluralities of contacts, determining a second performance measurement based on outcomes of the third and sixth pluralities of contacts, and outputting data that enables a comparison of the first and second performance measurements.

SYSTEM AND METHOD FOR IDENTIFYING UNWANTED COMMUNICATIONS USING COMMUNICATION FINGERPRINTING

A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.

MONITORING AND PREVENTING COMMUNICATIONS BETWEEN INMATES
20170318143 · 2017-11-02 ·

Systems and methods are disclosed for monitoring communications between inmates at controlled facilities. In an embodiment request is first received to initiate a call involving an inmate at a controlled facility. The identity of the inmate may then be authenticated, and the call may be connected to an outside third party upon successful authentication. A tone encoded with source information of the call may be generated and intermittently transmitted while the call is active. The inmate's received call data may then be monitored to detect a second tone. Source information encoded within the second tone may be extracted and compared with call data stored in a call database to determine whether the extracted source information corresponds to a second inmate at a controlled facility. Finally, an alert may be sent to relevant parties when it is determined that the extracted source information corresponds to the second inmate.

Wireless device and computer readable medium for storing a message in a wireless device

Embodiments of the disclosure include a wireless device and a computer readable medium with programmable instructions which when executed cause a processor of the wireless device to securely store a message. The device and computer readable medium are configured to receive a message at the device, filter the message according to at least one predetermined criteria, encrypt the message if the message includes at least the one predetermined criteria, and store the encrypted message in the wireless device.

METHOD AND APPARATUS FOR IDENTIFYING A FAKE VIDEO CALL
20220060578 · 2022-02-24 ·

A method and apparatus for identifying a faked video is provided herein. During operation, when a video, or video call is received from a device, a simultaneous audio call is placed to the device (i.e., the video call and audio call take place simultaneously in time). The audio streams on both the video and audio call are compared, and a difference between the audio streams is identified. The video is deemed a potential fake if the difference between the audio streams is above a particular threshold.