Patent classifications
H04M2207/12
METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
SYSTEM AND METHOD FOR PROVISION OF A SECOND LINE SERVICE TO A TELECOMMUNICATIONS DEVICE
A method and system for providing a second line service (SLS) feature to a subscriber using a telecommunications device (TD) which includes receiving at a switch on the network of the subscriber's primary service provider a communication made up of a trigger and a directory number. When the communication is received at the primary service provider's switch, the switch parses the communication and detects the trigger. Once the switch has received the communication, the switch additionally transmits a query message to a SLS platform that manages the SLS feature. As a result of the switch's query message transmission, the switch receives a reply to the query message from the SLS platform. Based at least in part on the reply to the query message, the switch can route the communication such that the switch connects one or multiple voice channel circuit between the subscriber's TD and the terminating TD.
Techniques for telephony-based voting
A telephone network voting system receives telephone ballots cast by voters by dialing a telephone number. The telephone number is dialed by voters spread over a large geographic area. The voting calls are routed to points of presence local to or otherwise identified with the caller by using the caller's ANI or other originating number identification. The points of presence then accumulate votes and periodically forward tallies to a centralized location over a data network. Instructions may be transmitted from the centralized location to the points of presence.
Communications handler for screening incoming calls
Concepts and technologies for handling and screening incoming calls are provided. A processor executing instructions associated with a call handling service can detect that a call from a calling party is being routed, via a communication interface, to a called party device associated with a customer. The processor can obtain caller identification data that can specify an identity that is generated by the calling party and intended to be representative of the calling party when presented to the customer by the called party device. The processor can determine an interface identifier associated with the communication interface, and retrieve a call authentication scenario based on the interface identifier. The call authentication scenario can specify a storage location of data. The processor can obtain the data from the storage location, determine a call handling action, prepare a call handling command, and provide the call handling command to a network.
GENERATION OF INFORMATION BASED ON EVENT DATA OF A CALL
A server, a system, a computer program product, and a method for generating information relating to a subscriber B with respect to a call connection attempt from a subscriber A to the subscriber B by a server. The method including steps of receiving event data; determining when the event data comprises an event representing a busy state; determining when the previous event represents a call ringing state; generating an indication that the call connection attempt is rejected by the subscriber B; and in response to a determination that the previous event does not represent the call ringing state, generating an indication that the call connection attempt did not reach the subscriber B.
System and method for provision of a second line service to a telecommunications device
A method and system for providing a second line service (SLS) feature to a subscriber using a telecommunications device (TD) which includes receiving at a switch on the network of the subscriber's primary service provider a communication made up of a trigger and a directory number. When the communication is received at the primary service provider's switch, the switch parses the communication and detects the trigger. Once the switch has received the communication, the switch additionally transmits a query message to a SLS platform that manages the SLS feature. As a result of the switch's query message transmission, the switch receives a reply to the query message from the SLS platform. Based at least in part on the reply to the query message, the switch can route the communication such that the switch connects one or multiple voice channel circuit between the subscriber's TD and the terminating TD.
Method and apparatus for threat identification through analysis of communications signaling, events, and participants
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
SYSTEM AND METHOD FOR EFFECTUATING REAL-TIME SHAPED DATA TRANSFER DURING CALL SETUP PROCEDURE IN A TELECOMMUNICATION NETWORK
The present disclosure generally relates to the field of telecommunication systems. The disclosure more particularly relates to a system and method for effectuating real time shaped data transfer during call setup procedure in a telecommunication network, where selection is made to shape the data transfer during call setup by called party, providing a dynamic tone service operation, where dynamic tone consists of dynamic ring back tone and dynamic busy tone.
VIRTUAL SERVICE CONTROL POINT IN A NETWORK
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for implementing a virtual service control point in a telecommunications network. In one embodiment, the system and methods involve implementing the functions of a service control point (SCP) device on one or more computing devices, such as application servers of the network, of the telecommunications network to create a virtual service control point device. In one embodiment, the virtual SCP may translate toll-free communications, such as 8xx based telephone communications, into a destination address associated with a customer of the network. In addition to resolving communications into a destination address or number, a virtual SCP instantiated in a network may provide one or more routing rules or features for such communications to a customer.
Method and apparatus of providing data service mobility
A method and apparatus of accessing a data service in a wireless communications network is disclosed. An example may include receiving a call identifying an application accessed by a mobile station, and verifying whether the accessed application is installed on the mobile station. The example may further include transferring a notification message to the mobile station based on the accessed application.