H04M3/436

Cloud-based private branch exchange call flip
11546464 · 2023-01-03 · ·

In an example embodiment, a cloud-based unified communications solution and collaboration platform is provided that includes private branch exchange (PBX) business phone service, among other services, in one interface. Furthermore, in an example embodiment, this cloud-based unified communications solution enables a feature called “call flip,” which allows a user to transfer an active phone call from one device of the user to another device of the same user, without disconnecting the phone call, and despite both devices sharing a common extension or phone number. More particularly, the system is able to detect that a user wishes to perform a “call flip”, identify the device from which the user is attempting to perform the call flip, identify the other devices associated with the user, and then ring only the other devices and not the device from which the user is attempting to perform the call flip.

SUSPICIOUS CALL HANDLING SYSTEM, SUSPICIOUS CALL HANDLING METHOD, OUTGOING/INCOMING CALL INFORMATION COLLECTION SERVER AND PROGRAM
20220417360 · 2022-12-29 ·

A suspicious call handling system that detects and handles a suspicious call within a communication network includes an outgoing and incoming call information collecting server 10 and session control servers 20A to 20C. The outgoing and incoming call information collecting server 10 includes a storage unit 15 that stores a suspicious call condition, a collecting unit 11 that collects outgoing and incoming call information from each of the session control servers 20A to 20C within a communication network, and a searching unit 12 that searches for a phone call that matches the suspicious call condition from the outgoing and incoming call information and gives a notification of the phone call to the session control servers 20A to 20C accommodating a user to which the phone call is connected. The session control servers 20A to 20C include an action unit 24 that executes an action, which has been set in advance, in a case where it is detected that a call has been transmitted to a user who has received the notification from the outgoing and incoming call information collecting server 10.

User interface for fraud alert management
11538128 · 2022-12-27 · ·

A user interface for a fraud detection application includes a visual display; a plurality of panes displayed on the visual display, each pane including an identifier corresponding to a communication received; a graphical representation of a threat risk associated with the identifier; a numeric score associated with the threat risk, wherein the numeric score is a weighted score based on a plurality of predetermined factors updated substantially continuously. The graphical representation may include a status bar indicative of a threat risk associated with the identifier, the threat risk provided by the fraud detection algorithm and based on a weighted score. Each pane may include additional information about the identifier, such as a number of accounts accessed or attempted to be accessed associated with the identifier; a number of days the identifier has been active; a type of channel associated with the identifier; and a number of communications initiated by the identifier over a predetermined period of time. A user may access further information by activating a portion of the visual display to access additional information related to the threat risk. The communication may be a phone call, a chat, a web interaction or the like.

Systems and methods for detecting fraudulent calls using virtual assistants

A system may include a processor that may execute computer-executable instructions that cause the processor to receive caller information regarding an incoming communication from a caller and receive a request from a user to route the incoming communication to a virtual assistant application. The virtual assistant application is configured to interact with the caller and determine whether the caller is associated a fraudulent caller activity stored on databases accessible by the processor. The processor may then receive an indication from the virtual assistant application that the caller is associated with the fraudulent caller activity and forward the incoming communication to another party in response to receiving the indication.

Validating telephone calls by verifying entity identities using blockchains
11533396 · 2022-12-20 · ·

Telephone calls can be validated using blockchains. In one example, a computing node can generate a distributed ledger indicating relationships between telephone numbers and unique identifiers assigned to the telephone numbers. The distributed ledger can be accessible to a telecommunication system for validating telephone calls.

Validating telephone calls by verifying entity identities using blockchains
11533396 · 2022-12-20 · ·

Telephone calls can be validated using blockchains. In one example, a computing node can generate a distributed ledger indicating relationships between telephone numbers and unique identifiers assigned to the telephone numbers. The distributed ledger can be accessible to a telecommunication system for validating telephone calls.

Communications network security for handling proxy voice calls

Concepts and technologies are disclosed herein for communications network security for handling proxy voice calls that employ a voicebot. According to one aspect disclosed herein, a call handling system can intercept, from a communications network, a call request that is directed to a called target device. The call handling system can determine that the call request was generated by a voicebot on behalf of a user equipment. The call handling system can suspend the call request from being routed to the called target device. The call handling system can generate a voicebot confirmation request that identifies the voicebot and the user equipment. The call handling system can provide the voicebot confirmation request to the called target. The call request can be suspended while the voicebot confirmation request is provided to the called target device.

METHOD, SYSTEM AND DEVICE FOR PERMITTING UNFAMILIAR CALL
20220394128 · 2022-12-08 ·

A method for permitting unfamiliar call, applied to a communication device having a memory and a call-blocking app to provide an unfamiliar call, includes the steps of: configuring an area in the memory of the communication device as a storage unit; recording at least one password into a password-correlated table in the storage unit, each of the at least one password being related to a specific user of the communication device; as an unfamiliar call is received, asking a caller of the unfamiliar call to provide an answer for a trivial question immediately provided by the communication device; determining whether or not the answer matches any of the at least one password in the password-correlated table; forwarding the unfamiliar call to the user corresponding to the matched password listed in the password-correlated table if positive; and, blocking the unfamiliar call if negative.

METHOD, SYSTEM AND DEVICE FOR PERMITTING UNFAMILIAR CALL
20220394128 · 2022-12-08 ·

A method for permitting unfamiliar call, applied to a communication device having a memory and a call-blocking app to provide an unfamiliar call, includes the steps of: configuring an area in the memory of the communication device as a storage unit; recording at least one password into a password-correlated table in the storage unit, each of the at least one password being related to a specific user of the communication device; as an unfamiliar call is received, asking a caller of the unfamiliar call to provide an answer for a trivial question immediately provided by the communication device; determining whether or not the answer matches any of the at least one password in the password-correlated table; forwarding the unfamiliar call to the user corresponding to the matched password listed in the password-correlated table if positive; and, blocking the unfamiliar call if negative.

Call content management for mobile devices

One example method of operation may include identifying a call to a mobile device, determining whether the call includes call content data intended for the mobile device, initiating an active session and a time to live (TTL) associated with the call content data, forwarding the call content data to the mobile device when the call includes call content data associated with the caller, and receiving a content confirmation from the mobile device that the call content data was received.