Patent classifications
H04M3/2272
Managing a telephone communication system to dynamically throttle call attempts and reduce congestions during mass call events
A device is configured to detect congestion and throttle phone calls in a telephone communication system. The device is configure to receive, from a telephone dialing system, an indication indicating a call failure to a phone number; determine that the phone number matches a flooding group number based on initial digits of the phone number, the flooding group number associated with a flooding group, the flooding group including a plurality of phone numbers with initial digits having identical values to the flooding group number; determine a time of the call failure and a number of concurrent active calls for the flooding group at the time of the call failure; and in response to the number of concurrent active calls at the time of the call failure exceeding a predefined threshold, update a capacity limit for the flooding group based on the number of concurrent active calls.
CONDITIONAL COMMUNICATION FORWARDING BASED ON ORIGINATION AND DESTINATION ATTRIBUTES
One example method of operation may include one or more of identifying an incoming call via a communication processing device, terminating the incoming call at a call management device, identifying one or more caller attributes received with the incoming call, comparing the one or more caller attributes to one or more call recipient preferences stored in a call recipient profile, and transmitting a notification, via the call management device, to a call recipient device based on the one or more caller attributes and the one or more call recipient preferences.
Reduction in network congestion
A system, method and non-transitory computer readable storage medium comprising instructions that when read by a processor perform receiving a telephony connection request at a location in a telephony network, the location separated from an intended recipient of the telephony connection request by a target telephony network, determining addressing information regarding the intended recipient, the addressing information including at least routing information or a phone number, determining a status characteristic of the intended recipient based on the addressing information, based on the status characteristic, and determining whether the intended recipient would successfully receive the telephony connection request if the telephony connection request was forwarded to the intended recipient.
Method for preventing sip device from being attacked, calling device, and called device
The present disclosure discloses a method for preventing a SIP device from being attacked, a calling device, and a called device, belonging to the field of network security. The present disclosure provides a method including: generating, by a calling device and a called device, the same public password, and transmitting, by the calling device, a connection request to the called device; performing, by the called device, header field verification on the connection request to verify whether a specified header field is carried in the connection request; performing, by the called device, device verification on the connection request; and performing, by the called device, identity verification on the connection request, and establishing, by the called device, a connection to the calling device. In this case, spoofing data is filtered out and the SIP device is not easily attacked, so that a user is free of disturbance.
DEVICE, SYSTEM AND METHOD FOR SCANNING COMMUNICATION SYSTEMS OF DIFFERENT TYPES
A device, method and system for scanning communication systems of different types is provided. A mobile device comprises: first and second transceivers to communicate first and second communication systems of different types; a memory storing first and second scan lists for scanning first and second channels on the first and second communication systems; and a controller configured to: communicate, using the first transceiver, an indication of the first and second scan lists to a gateway device configured as a proxy for the mobile device to communicate with the first communication systems; receive, using the first transceiver, from the gateway device, a reply indicating that the gateway device is capable of scanning the first communication systems using the first scan list, but is not capable of scanning the second communication systems; and control the second transceiver to scan the one or more second communication systems using the second scan list.
Device, system and method for scanning communication systems of different types
A device, method and system for scanning communication systems of different types is provided. A mobile device comprises: first and second transceivers to communicate first and second communication systems of different types; a memory storing first and second scan lists for scanning first and second channels on the first and second communication systems; and a controller configured to: communicate, using the first transceiver, an indication of the first and second scan lists to a gateway device configured as a proxy for the mobile device to communicate with the first communication systems; receive, using the first transceiver, from the gateway device, a reply indicating that the gateway device is capable of scanning the first communication systems using the first scan list, but is not capable of scanning the second communication systems; and control the second transceiver to scan the one or more second communication systems using the second scan list.
METHOD FOR PREVENTING SIP DEVICE FROM BEING ATTACKED, CALLING DEVICE, AND CALLED DEVICE
The present disclosure discloses a method for preventing a SIP device from being attacked, a calling device, and a called device, belonging to the field of network security. The present disclosure provides a method including: generating, by a calling device and a called device, the same public password, and transmitting, by the calling device, a connection request to the called device; performing, by the called device, header field verification on the connection request to verify whether a specified header field is carried in the connection request; performing, by the called device, device verification on the connection request; and performing, by the called device, identity verification on the connection request, and establishing, by the called device, a connection to the calling device. In this case, spoofing data is filtered out and the SIP device is not easily attacked, so that a user is free of disturbance.
PROVISIONING TOOL -- CALL CENTER-BASED AUTOMATED INTERFACE WITH NETWORK SWITCHES FOR INTERNET SERVICE DIAGNOSTICS AND PROVISIONING
Novel tools and techniques are provided for implementing call center-based automated interface with network switches for Internet service diagnostics and provisioning. In various embodiments, in response to receiving a request by a call center user to access an Internet service customer account, a computing system may access information regarding the Internet service customer account that is stored in a database, may identify a network switch that is configured to provide Internet service to customer premises equipment (“CPE”) disposed at a customer premises associated with the customer, based at least in part on the accessed information, and may autonomously access, from other databases, information associated with the Internet service customer account and with a network profile. The computing system may integrate the accessed information, may generate and present a user interface (“UI”) displaying the accessed information, and may autonomously initiate one or more diagnosis and repair procedures.
UNIFIED COMMUNICATIONS INCORPORATION IN A CONTACT CENTER
The technology disclosed herein enables incorporation of feature sets of a unified communications system and a contact center system. In a particular embodiment, a method includes, in a contact center system, in response to an agent logging into the contact center system, establishing a first connection between the contact center system and a unified communications endpoint operated by the agent. The first connection is established using a unified communications system that services the unified communications endpoint. After establishing the first connection, the method includes identifying a call on a second connection between the contact center system and a second endpoint operated by a user. In response to selecting the agent to handle the call, the method includes bridging the first connection and the second connection.
Conditional communication forwarding based on origination and destination attributes
One example method of operation may include one or more of identifying an incoming call via a communication processing device, terminating the incoming call at a call management device, identifying one or more caller attributes received with the incoming call, comparing the one or more caller attributes to one or more call recipient preferences stored in a call recipient profile, and transmitting a notification, via the call management device, to a call recipient device based on the one or more caller attributes and the one or more call recipient preferences.