Patent classifications
H04M3/2254
Method and apparatus for threat identification through analysis of communications signaling, events, and participants
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS ISGNALING EVENTS, AND PARTICIPANTS
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
SYSTEM AND METHOD FOR TRACING A COMMUNICATIONS PATH OVER A NETWORK
A call path through one or more communications networks can be traced by retrieving voice equipment information based on a call data record (CDR). A path through the networks and across multiple routers may be identified based on the CDR and voice equipment information. Router operation information may be retrieved from each of the multiple routers. A filterable interface can be generated based on the CDR, voice equipment information, and router operation information through which configurations to the networks may be performed.
SYSTEMS, METHODS, AND APPARATUS TO MONITOR MOBILE INTERNET ACTIVITY
Systems, methods, and apparatus to monitor mobile Internet activity are disclosed. An example system includes at least one processor, and memory including instructions, when executed, cause the at least one processor to in response to obtaining first panelist demographic information associated with a first panelist and second panelist demographic information associated with a second panelist, assign a first port of a proxy server to a first mobile device associated with the first panelist and a second port of the proxy server to a second mobile device associated with the second panelist, the first port different from the second port, transmit configuration information to the first mobile device to instruct the first mobile device to transmit requests for media including a first request to the first port, and in response to obtaining the first request at the first port, store an association between the first panelist demographic information and the media.
Systems, methods, and apparatus to monitor mobile internet activity
Systems, methods, and apparatus to monitor mobile Internet activity are disclosed. An example method comprises assigning a port of a proxy to the mobile device associated with a panelist. A property list file is transmitted to the mobile device, the property list file instructing the mobile device to transmit future requests for media to the port of the first proxy. A first request for media is received on the port of the proxy, the first request originating from the mobile device. The first request for media is associated with a demographic of the panelist associated with the mobile device based on an identifier of the port.
SYSTEMS, METHODS, AND APPARATUS TO MONITOR MOBILE INTERNET ACTIVITY
Systems, methods, and apparatus to monitor mobile Internet activity are disclosed. An example apparatus includes at least one memory, machine-readable instructions, programmable circuitry to execute the machine-readable instructions to at least assign a first port of a proxy server to a mobile device associated with a panelist, cause transmission of configuration data to the mobile device to instruct the mobile device to transmit future requests the first port of the proxy server, obtain a first request for media on the first port originating from the mobile device, and after a determination that the first request originated from an Internet Protocol (IP) address associated with an IP address range representative of devices on a cellular network, service the first request, generate a data association, request the media from an Internet media provider identified in the first request, and cause transmission of the media to the mobile device.
HIERARCHY BASED GRAPHICAL USER INTERFACE GENERATION
One or more embodiments related to a method of generating a graphical user interface. The method includes obtaining an interface hierarchy having multiple nodes, where each node defines a visualization for the node, and the interface hierarchy defining an ordering on the nodes. The method further includes traversing the interface hierarchy starting with a selected node to obtain a subhierarchy, and creating the graphical user interface from a general interface by populating the general interface with the visualization. The method further includes providing the graphical user interface.
SYSTEMS AND METHODS FOR GENERATING APPLICATION DATA FROM CALL DATA
Systems and methods are provided for generating application data from call data. In one implementation, a method includes acquiring call data from a call-data source with a call-data aggregator; modifying a portion of the call data with a call-data modifier; and generating application data from the portion of the call data. Application data may be configured for diagram generation. The diagram may graphically indicate call volume in branches of an interactive voice response (IVR) system map. The diagram may be a flow diagram including a connector associated with a branch of the IVR system map and the connector may have a width proportional to a call volume in the branch of the IVR system map. The diagram may indicate call-portion durations, which may be associated with a phase of a call and which may have a color associated with a phase of a call.
METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
DEVICES AND METHODS FOR FACILITATING TRAINING AND QUALITY ASSURANCE IN CONTACT CENTERS
Contact management servers are adapted to facilitate training and quality assurance of agents working in contact centers. According to at least one example, a contact management server may transmit a first prerecorded prospect audio segment. A first transmission may be received, where the first transmission indicates a keypress by a call center agent in response to the transmitted first prerecorded prospect audio segment. The contact management server can grade the keypress indicated by the first transmission. Other aspects, embodiments, and features are also included.