Patent classifications
H04M2207/12
Method and apparatus for threat identification through analysis of communications signaling, events, and participants
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
SECURITY SYSTEM
A security system for acquiring situation data at the time of trouble in a space where a customer receives a service. The security system includes a recorder for capturing an image and recording a sound for security in a space in which a customer receives a service provided by a service provider, and a server used for providing the service and managed by the service provider. The server includes a processor which executes a software for running the system, and an application storage for storing a customer application which is downloaded to the mobile terminal possessed by the customer. A processor of the mobile terminal is, by executing the customer application, starts the recorder, takes the recorded data into the mobile terminal, and transmits the data to the server for recording the data in the server. The customer can use the captured and recorded data as objective situation data.
Generation of information based on event data of a call
A server, a system, a computer program product, and a method for generating information relating to a subscriber B with respect to a call connection attempt from a subscriber A to the subscriber B by a server. The method including steps of receiving event data; determining when the event data comprises an event representing a busy state; determining when the previous event represents a call ringing state; generating an indication that the call connection attempt is rejected by the subscriber B; and in response to a determination that the previous event does not represent the call ringing state, generating an indication that the call connection attempt did not reach the subscriber B.
METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS ISGNALING EVENTS, AND PARTICIPANTS
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
System and method for provision of a second line service to a telecommunications device
A method and system for providing a second line service (SLS) feature to a subscriber using a telecommunications device (TD) which includes receiving at a switch on the network of the subscriber's primary service provider a communication made up of a trigger and a directory number. When the communication is received at the primary service provider's switch, the switch parses the communication and detects the trigger. Once the switch has received the communication, the switch additionally transmits a query message to a SLS platform that manages the SLS feature. As a result of the switch's query message transmission, the switch receives a reply to the query message from the SLS platform. Based at least in part on the reply to the query message, the switch can route the communication such that the switch connects one or multiple voice channel circuit between the subscriber's TD and the terminating TD.
System and method for provision of an advanced network function to a device
Enhanced capabilities within a telephone network are made accessible to a telecommunications device. The telecommunications device is used to dial a sequence. A network server receives and identifies the sequence invokes an advanced network function. A advanced network function server in communication with the network server provides instructions as to how the network server is to provide the advanced network function. The network server processes the call in accordance with the received instructions to provide the particular advanced network function.
PRIORITIZED ROUTING DURING A REGIONAL EVENT
Disclosed are methods and systems for routing messages based on regional events. In some aspects, an origin of a call is determined, and a datastore consulted to determine whether the origin is experiencing a regional event. If so, an identity of the caller may be ascertained. If the caller is determined to have sufficient priority, the call may be routed over a first network. Otherwise, the call may be routed over a second network, or in some aspects, placed in a hold queue until sufficient network capacity is available to service the call.
System and method for effectuating real-time shaped data transfer during call setup procedure in a telecommunication network
The present disclosure generally relates to the field of telecommunication systems. The disclosure more particularly relates to a system and method for effectuating real time shaped data transfer during call setup procedure in a telecommunication network, where selection is made to shape the data transfer during call setup by called party, providing a dynamic tone service operation, where dynamic tone consists of dynamic ring back tone and dynamic busy tone.
Virtual service control point in a network
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for implementing a virtual service control point in a telecommunications network. In one embodiment, the system and methods involve implementing the functions of a service control point (SCP) device on one or more computing devices, such as application servers of the network, of the telecommunications network to create a virtual service control point device. In one embodiment, the virtual SCP may translate toll-free communications, such as 8xx based telephone communications, into a destination address associated with a customer of the network. In addition to resolving communications into a destination address or number, a virtual SCP instantiated in a network may provide one or more routing rules or features for such communications to a customer.
Callback notification from devices with insufficient credit for communication
A method and a callback notification system (CNS) are provided for sending a missed call ring alert (MCRA) from a source number to a destination number. The CNS receives communication information from a calling party device (CGPD) or a network thereof, when an unsuccessful communication attempt is made by the CGPD to contact a called party device (CDPD), and places a call to the destination number with an identification of an originator of the call as the source number using the communication information. The CNS identifies a ring of the CDPD when the call successfully reaches the destination number and terminates the call before chargeable completion of the call, thereby sending an MCRA from the source number of the CGPD to the destination number of the CDPD. The CNS sends one or more alternative callback notifications to the destination number, concurrently with the MCRA or if the MCRA is unsuccessful.