H04M3/2281

Information provided to parent regarding a called for child protection

The present disclosure describes a system, method, and computer readable medium for providing information of a calling party to an alert party, wherein the calling party is in communication with the receiving party in a communications network. The method includes receiving a message from a calling party to a receiving party and performing a lookup of information relating to the calling party in a database, wherein the lookup is based on an identifier associated with the message, Thereafter, an alert is sent to the alert party if the calling party information is unavailable in a contact list of the receiving party.

Report evaluation device and operation method thereof

A report evaluation method of a report evaluation device may include receiving a report from at least one client terminal, determining a category of the received report, identifying a learning model corresponding to the category, evaluating a reliability of the report through the learning model, and generating and outputting information on the reliability.

System and method for determining and utilizing after-call-work factor in contact center quality processes
11676094 · 2023-06-13 · ·

A computerized-method for calculating an After-Call-Work (ACW) factor of an interaction in a contact center, by which a related recording may be filtered for evaluation is provided herein. The method includes an After-Call-Work (ACW) factor calculation module. The operating of the ACW factor calculation module includes: (i) receiving agent recording of the interaction. (ii) aggregating data fields associated with: (a) the interaction; and (b) the customer; (iii) retrieving ACW time of the interaction; (iv) forwarding the aggregated data fields to a machine learning model; (v) operating the machine learning model to calculate a predicted ACW time, based on the aggregated data fields; (vi) calculating an ACW factor based on the received time of ACW and the calculated predicted ACW time; and (vii) sending the calculated ACW factor to a platform by which the platform is preconfigured to distribute the interaction for evaluation, based on the ACW factor.

Optimized routing for law enforcement support

An improved lawful intercept (LI) infrastructure is described. In response to a valid LI provisioning request, a subscriber management component statically allocates a user equipment (UE) subject to the LI provisioning request to an edge location comprising a high-speed gateway and a Mediation and Delivery Function (MDF), which coordinates the delivery of intercepted communications. The subscriber management component maintains this allocation for the life of the LI provisioning request and reverses the UE to a dynamic gateway allocation scheme when the LI provisioning request ends. As a result, only a subset of edge locations must be equipped with MDFs, and the handover is transparent to the UE.

Detection of Spoofed Calls Using Call Header
20220360665 · 2022-11-10 · ·

Implementations described herein relate to methods, systems, and computer-readable media to label incoming phone calls. A method to label an incoming phone call includes detecting the incoming phone call associated with a caller identifier (ID), determining a location associated with the call, and analyzing a call header of the call to determine one or more call characteristics. The method further includes determining, based on the location and the call characteristics, if the location is spoofed and determining, based on the caller ID and the call characteristics, if an access network associated with the call is spoofed. The method further includes applying a trained machine learning model to determine whether the call is a robocall. The method further includes assigning a label to the call that indicates whether the call is a spoofed call or is the robocall and sending the label to a callee device associated with the call.

Detecting SS7 redirection attacks with audio-based distance bounding

Disclosed are various embodiments for detecting Signaling System 7 (SS7) redirection attacks by measuring call audio round trip times between phones. Such redirection attacks force calls to travel longer physical distances than usual, thereby causing longer end-to-end delay. Accordingly, various embodiments implement a distance bounding-inspired protocol that allows for securely characterizing the round trip time between two call endpoints. As a result, telephone users can reliably detect SS7 redirection attacks and protect the information contained in their calls.

MONITORING AND PREVENTING COMMUNICATIONS BETWEEN INMATES
20170318143 · 2017-11-02 ·

Systems and methods are disclosed for monitoring communications between inmates at controlled facilities. In an embodiment request is first received to initiate a call involving an inmate at a controlled facility. The identity of the inmate may then be authenticated, and the call may be connected to an outside third party upon successful authentication. A tone encoded with source information of the call may be generated and intermittently transmitted while the call is active. The inmate's received call data may then be monitored to detect a second tone. Source information encoded within the second tone may be extracted and compared with call data stored in a call database to determine whether the extracted source information corresponds to a second inmate at a controlled facility. Finally, an alert may be sent to relevant parties when it is determined that the extracted source information corresponds to the second inmate.

Method and apparatus for providing secured per-call adminstration, management, and control of communications between a secured party and a remote party
09800830 · 2017-10-24 · ·

A secured party audio and audio/video communication system and method providing administration, management and control that includes a portable secured communication device in possession solely of a secured party positioned in a secured environment, the portable secured communication device being exclusive to the secured party and communicatively connectable only to a secured connection management system, in a secured connection management system hosting a secured communication device interface, hosting a remote communication device interface, storing in the database information related to the secured party, the portable secured communication system, and the external party, at least one of which includes a predetermined connection parameter, creating the selective communication between the portable secured communication device and only the remote communication device response to the stored database information and controlling a duration of the communication as a function of the predetermined connection parameter as stored in the database.

METHOD AND APPARATUS FOR IDENTIFYING A FAKE VIDEO CALL
20220060578 · 2022-02-24 ·

A method and apparatus for identifying a faked video is provided herein. During operation, when a video, or video call is received from a device, a simultaneous audio call is placed to the device (i.e., the video call and audio call take place simultaneously in time). The audio streams on both the video and audio call are compared, and a difference between the audio streams is identified. The video is deemed a potential fake if the difference between the audio streams is above a particular threshold.

Multi-party conversation analyzer and logger

In one aspect, the present invention facilitates the investigation of networks of criminals, by gathering associations between phone numbers, the names of persons reached at those phone numbers, and voice print data. In another aspect the invention automatically detects phone calls from a prison where the voiceprint of the person called matches the voiceprint of a past inmate. In another aspect the invention detects identity scams in prisons, by monitoring for known voice characteristics of likely imposters on phone calls made by prisoners. In another aspect, the invention automatically does speech-to-text conversion of phone numbers spoken within a predetermined time of detecting data indicative of a three-way call event while monitoring a phone call from a prison inmate. In another aspect, the invention automatically thwarts attempts of prison inmates to use re-dialing services. In another aspect, the invention automatically tags audio data retrieved from a database, by steganographically encoding into the audio data the identity of the official retrieving the audio data.