H04M3/2218

SYSTEMS AND METHODS FOR PHONE NUMBER FRAUD PREDICTION

A method including: receiving one or more datasets indicating call activity corresponding to a phone number; analyzing the one or more datasets to identify unusual call activity; and generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES DIRECTLY TO RECORD OBJECTS OF SYSTEMS OF RECORD WITH NODE PROFILES

The system described herein can automatically match, link, or otherwise associate electronic activities with one or more record objects. For an electronic activity that is eligible or qualifies to be matched with one or more record objects, the system can identify one or more set of rules or rule sets. Using the rule sets, the system can identify candidate record objects. The system can then rank the identified candidate record objects to select one or more record objects with which to associate the electronic activity. The system can then store an association between the electronic activity and the selected one or more record objects.

Fault routing of an emergency communication

Aspects of the disclosure relate to routing of an emergency communication under fault conditions. Routing can be implemented in a packet-switching (PS) network that provides voice service. For a network node of the PS network, availability to route the emergency communication through a specific emergency service routing number (ESRN) can be determined and, in response to the network node being unavailable, administrative data associated with the ESRN can be accessed. In addition, an identifier associated with the administrative data can be updated (e.g., created or modified) with data indicative of the device that originated the emergency communication. The administrative data and the resulting identifier can be delivered to a second network node that can route the emergency communication to an emergency service network.

Using secondary channel information to provide for gateway recording

Systems and methods for using secondary communication channel information, such as RTCP information to facilitate correlating business information to allow gateway recording. Using information in this secondary communication channel the recording system can correlate the business metadata either directly (e.g., using a phone extension) or through one or more indirect operations (e.g., a call ID-to-universal call id-to-phone extension). Additionally, information in the primary communication channel may be used to perform an indirect operation to correlate auxiliary business information (e.g., using the CALLID or UCID in SIP signaling to resolve the agent's phone extension and thereby access auxiliary business information.)

Contraband wireless communications device identification in controlled-environment facilities
09854087 · 2017-12-26 · ·

Systems and methods for identification of a controlled-environment facility resident in possession of a contraband communications device capture or otherwise accept managed access data and/or contraband communications device assessment data for contraband communications devices operating in the controlled-environment facility. Controlled-environment facility resident call data for each resident of the controlled-environment facility is gathered from the controlled-environment facility resident communications system. Correlations in the managed access data and/or assessment data with the controlled-environment facility resident communications system call data are analyzed to identify each resident of the controlled-environment facility in possession of a contraband communications device.

Data exchange during a voice call session
11689654 · 2023-06-27 ·

Techniques for performing data exchanges during voice call sessions is described. In one example, a network server may facilitate a voice call session between user devices and associate a unique session number (USN) to each of the voice call sessions. The USN may be used as a reference when toggling between voice call sessions. In one example, when a particular voice call session is toggled to an active state, the network server may limit recipients of sensitive financial information to be between transacting parties in the active voice call session. By isolating other user devices that are not privy to transactions in the active voice call session, the chances for a transacting party in the active voice call session to accidentally send payments, for example, to an unintended recipient can be substantially minimized.

IDENTIFYING THE SOURCE AND DESTINATION SITES FOR A VOIP CALL WITH DYNAMIC-IP ADDRESS END POINTS

In a voice-over-IP communications network, call data records include dynamically assigned IP signaling addresses such as IPv6 signaling addresses used in provisioning communications sessions. Those dynamically assigned IP signaling addresses are computed from customer site identification codes using a reversible algorithm. The algorithm can then be reversed to compute a customer site identification code from an IP signaling address contained in a call data record, allowing the communications network provider to perform quality monitoring and diagnostics based on call data records.

Handheld electronic device having improved phone call log, and associated method

An improved handheld electronic device and an associated method provide an improved call log that presents information relating to logged phone calls in a collapsed manner, meaning that for each phone number having a call stored in the memory of the device, only the most recent in time call is listed on the call log. An improved handheld electronic device and an associated method also provide a call history for any phone call from the improved call log that is selected by the user. The call history includes a listing of all of the calls stored by the device that are associated with the selected call log call.

System and method for customizing inmate communication notification
09843448 · 2017-12-12 · ·

The present disclosure provides details of a system and method for customizing an inmate communication notification. Such a system provides an inmate different customized notification messages to be played to different called parties. The system includes a list of different contacts, and each of the contacts can be associated with one or more contact numbers. Each contact number is associated with one or more customized notification messages. The customized notification messages include terms, phrases, and sentences that draws the called party's attention and sound familiar to the called party. The customized notification messages include customized text files, audio files, and video files. An inmate chooses one or more customized notification messages to be played to a called party.

Method and apparatus for intelligent routing of instant messaging presence protocol (IMPP) events among a group of customer service representatives

A routing system is provided for intelligent routing of instant messages between clients connected to a data network and customer service representatives connected to the network. The system comprises at least one instant message server and at least one intermediate server connected to and addressable on the network, the intermediate server capable of routing and accessible to the instant message server. Clients connecting to the instant message server through instant message software assert a connection link advertised by the instant message server to establish bi-directional communication between the client machine and the intermediate server. In preferred application, the intermediate server interacts with the client for identification of client and client software. The client request is then routed to an appropriate customer service representative running compatible software according to enterprise rules establishing an active instant message connection between the client and the selected customer service representative.