Patent classifications
H04M3/36
Method and system for a multitenancy telephone network
A method and system for operating a multitenancy telephony system including receiving a plurality of call requests associated with an application server; selecting a subset of the received call requests using a load balancer; assigning each selected call request to one of a plurality of resources creating, on the assigned resource, a call session for each selected call request; and coordinating the created call sessions resulting from the selected subset of the received call requests associated with the application server.
Reduction in network congestion
A system, method and non-transitory computer readable storage medium comprising instructions that when read by a processor perform receiving a telephony connection request at a location in a telephony network, the location separated from an intended recipient of the telephony connection request by a target telephony network, determining addressing information regarding the intended recipient, the addressing information including at least routing information or a phone number, determining a status characteristic of the intended recipient based on the addressing information, based on the status characteristic, and determining whether the intended recipient would successfully receive the telephony connection request if the telephony connection request was forwarded to the intended recipient.
Machine intelligent isolation of international calling performance degradation
The disclosed system identifies international calling performance issues of a wireless telecommunication network. The system receives network traffic data for international calls including information about call attempts to a country. The system categorizes the country into a major category and a minor category based on the call attempts information. For a subset of countries, and for each key performance indicator in a subset of selected key performance indicators, the system monitors performance using an anomaly detection model to identify an anomaly in network performance, determines an actual value of the key performance indicator for the detected anomaly, and computes a variation value of the determined actual value based on a predicted range of values. The system ranks countries using the computed variation values, to indicate problematic parts of the wireless telecommunication network.
Machine intelligent isolation of international calling performance degradation
The disclosed system identifies international calling performance issues of a wireless telecommunication network. The system receives network traffic data for international calls including information about call attempts to a country. The system categorizes the country into a major category and a minor category based on the call attempts information. For a subset of countries, and for each key performance indicator in a subset of selected key performance indicators, the system monitors performance using an anomaly detection model to identify an anomaly in network performance, determines an actual value of the key performance indicator for the detected anomaly, and computes a variation value of the determined actual value based on a predicted range of values. The system ranks countries using the computed variation values, to indicate problematic parts of the wireless telecommunication network.
Computerized system and method for robocall steering
Disclosed are systems and methods for robocall steering over voice-hosted traffic networks. The disclosed framework provides novel systems and methods for increasing the accuracy and efficiency in tracking, identifying, blocking and preventing robocalls and robocallers. The disclosed systems and methods provide mechanisms for identifying and removing unwanted voice traffic from networks. The disclosed systems and methods analyze voice traffic over a predetermined period of time (e.g., 1 day or 30 days, for example), and leverage this information into a “know your customer” (KYC) score. This score enables incoming calls to be routed, controlled and/or blocked as they are communicated over voice networks.
Computerized system and method for robocall steering
Disclosed are systems and methods for robocall steering over voice-hosted traffic networks. The disclosed framework provides novel systems and methods for increasing the accuracy and efficiency in tracking, identifying, blocking and preventing robocalls and robocallers. The disclosed systems and methods provide mechanisms for identifying and removing unwanted voice traffic from networks. The disclosed systems and methods analyze voice traffic over a predetermined period of time (e.g., 1 day or 30 days, for example), and leverage this information into a “know your customer” (KYC) score. This score enables incoming calls to be routed, controlled and/or blocked as they are communicated over voice networks.
Message aggregation and comparing
Techniques for detecting spam accounts in a system are described. The system may analyze speech characteristics of communication content (e.g., telephone call content, VoIP content, audio messaging, etc.) to determine whether multiple devices or user profiles are associated with overlapping communications. The system may also analyze text transcriptions of communication content to determine whether multiple devices or user profiles are associated with overlapping communications. If so, the system may mitigate, such as throttling service, disabling accounts, and the like.
Message aggregation and comparing
Techniques for detecting spam accounts in a system are described. The system may analyze speech characteristics of communication content (e.g., telephone call content, VoIP content, audio messaging, etc.) to determine whether multiple devices or user profiles are associated with overlapping communications. The system may also analyze text transcriptions of communication content to determine whether multiple devices or user profiles are associated with overlapping communications. If so, the system may mitigate, such as throttling service, disabling accounts, and the like.
Emergency data statistics aggregation with data privacy protection
One disclosed method includes filtering incoming emergency data using at least one filtering criteria, as the emergency data is received in response to initiation of emergency events; generating at least one data bin representing a tally of emergency data meeting the at least one filtering criteria, without storing any of the emergency data used to generate the at least one data bin; and generating a statistical report using the at least one data bin. The statistical report may be generated real-time and displayed on a remote display.
Emergency data statistics aggregation with data privacy protection
One disclosed method includes filtering incoming emergency data using at least one filtering criteria, as the emergency data is received in response to initiation of emergency events; generating at least one data bin representing a tally of emergency data meeting the at least one filtering criteria, without storing any of the emergency data used to generate the at least one data bin; and generating a statistical report using the at least one data bin. The statistical report may be generated real-time and displayed on a remote display.