H04L65/1076

SYSTEMS AND METHODS FOR SEAMLESS AUDIOVISUAL TELECONFERENCING

User Equipment (“UEs”) associated with a conference may automatically join the conference (e.g., in situations where the teleconference is a scheduled teleconference or other suitable situations). As discussed below, when automatically joining a teleconference in such a manner, the UE may refrain from sending conference-related information (e.g., captured audio, video, etc.) to a teleconferencing system or to other participants of the teleconference until a user of the UE selects to join the teleconference. In this manner, control signaling or other setup procedures may be performed prior to the user selecting to join the teleconference, thus reducing the amount of time spent to perform such signaling or procedures after the user has indicated readiness to join the teleconference.

Apparatus, methods, and articles of manufacture for filtering calls and reducing spoofing and spamming
11665277 · 2023-05-30 ·

Unsolicited electronic communications such as robocalls and person-initiated solicitation calls are reduced by imposing tolls for completion of the connections to the called parties, and refunding the tolls to the entities indicated by the electronic communications as the calling parties. In this way, a dishonest originator of a spoofed call bears the cost of the toll, and the toll is not refunded to the dishonest originator. On the other hand, the toll collected from an honest originator of a non-spoofed call is refunded to the honest originator, making the toll transparent to the honest originator and avoiding annoyance of the honest caller caused by the toll. Unsolicited calls may be subjected to filtering, particularly filtering based on the indications of the origins of the calls.

Apparatuses and methods for call addition control

A method for call addition control in a User Agent (UA) or a call service system is provided. The UA or the call service system receives or initiates a call addition request comprising information of a called party during a call. The UA or the call service system determines whether the called party is already present in the call. The UA or the call service system blocks the call addition request in response to the called party being already present in the call.

Apparatuses and methods for call addition control

A method for call addition control in a User Agent (UA) or a call service system is provided. The UA or the call service system receives or initiates a call addition request comprising information of a called party during a call. The UA or the call service system determines whether the called party is already present in the call. The UA or the call service system blocks the call addition request in response to the called party being already present in the call.

DEVICES AND METHODS FOR UE-BASED DETECTION AND PREVENTION OF ILLEGITIMATE NETWORK CALLS

Various embodiments may include methods and systems for avoiding connecting an illegitimate call within a telecommunications network. Various embodiments may include receiving, from a telecommunications network, an incoming call initiating message notifying the first wireless device of an incoming call, in which the incoming call initiating message includes caller information. Some embodiments may further include transmitting a provisional response message including callee information of the first wireless device in response to receiving the incoming call initiating message, transmitting a request message to a second wireless device based on the caller information and the callee information, determining whether the second wireless device initiated the incoming call based on a response message from the second wireless device, if received, in response to the request message, and taking an action to prevent connection of the incoming call in response to determining that the second wireless device did not initiate the incoming call.

AUTOMATICALLY ANSWERING COMMUNICATION SESSIONS RECEIVED FROM TRUSTED CALLERS

Methods, systems, apparatus, and computer program products that can automatically answer communication sessions received from trusted callers are disclosed herein. One method includes maintaining, by a processor of an information handling device, a list of trusted callers encoded in a memory and automatically answering a communication session received by the information handling device from a trusted caller in the encoded list of trusted callers without receiving input from a user of the information handling device accepting the communication session on the information handling device. Systems, apparatus, and computer program products that include hardware and/or software that can perform the methods for automatically answering communication sessions received from trusted callers are also disclosed herein.

AUTOMATICALLY ANSWERING COMMUNICATION SESSIONS RECEIVED FROM TRUSTED CALLERS

Methods, systems, apparatus, and computer program products that can automatically answer communication sessions received from trusted callers are disclosed herein. One method includes maintaining, by a processor of an information handling device, a list of trusted callers encoded in a memory and automatically answering a communication session received by the information handling device from a trusted caller in the encoded list of trusted callers without receiving input from a user of the information handling device accepting the communication session on the information handling device. Systems, apparatus, and computer program products that include hardware and/or software that can perform the methods for automatically answering communication sessions received from trusted callers are also disclosed herein.

APPARATUS, METHODS, AND PROGRAM PRODUCTS FOR MANAGING VIDEO FILTERS

Apparatus, methods, and computer program products for managing video filters are disclosed. One apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to detect whether a video feed for a user participating in a video conference on a video conferencing platform includes a video filter and, in response to detecting that the video feed includes a video filter, determine whether the video filter is socially suitable for an environment of the video conference. Methods and computer program products that include and/or perform the operations and/or functions of the apparatus are also disclosed.

APPARATUS, METHODS, AND PROGRAM PRODUCTS FOR MANAGING VIDEO FILTERS

Apparatus, methods, and computer program products for managing video filters are disclosed. One apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to detect whether a video feed for a user participating in a video conference on a video conferencing platform includes a video filter and, in response to detecting that the video feed includes a video filter, determine whether the video filter is socially suitable for an environment of the video conference. Methods and computer program products that include and/or perform the operations and/or functions of the apparatus are also disclosed.

CALL PROTECT GEOLOCATOR DISPLAY FOR 5G OR OTHER NEXT GENERATION NETWORK
20230109014 · 2023-04-06 ·

Call spoofing can be mitigated by providing geolocation information to the called device. For example, when a call rings, a geolocator can be invoked and the incoming call display screen can show a carrier logo and/or a geolocator globe illustrating the location of the call originator. The geolocation session initiation protocol data can be confirmed by a network device and compared against carrier specific data of the calling device to authenticate voice calls for called devices. In one embodiment location data of the calling device can purposely be shared in order to facilitate the mitigation of call spoofing.