Patent classifications
H04M15/06
Over the top network traffic classification
A system and method is disclosed to transform Over-The-Top (OTT) call log data collected by telecommunications network operators into a peer-to-peer log in order to determine more accurate information. In this method the IP addresses in the call log records are compared to a list of known mediator server IP addresses and the records in the log that contain mediator server IP addresses are removed from the log to create a peer-to-peer log containing only those records that contain peer IP addresses. The data in the peer-to-peer log can then be categorized with confidence to determine network performance information as well as, for example, the percentage of traffic to a particular country. Conclusions may then be inferred regarding the removed data records based upon the data found in the peer-to-peer log.
System and method of providing social caller ID and caller rating on web calls
A method is provided for providing caller ID for a caller. An indication is received from a social networking site on which a caller has a profile that the caller has signed into the social networking site. A request is received from the caller to place a call to a callee. The system automatically associates at least one aspect of the caller's profile from the social networking site with the call request. The system then signals to the callee that there is a new call by displaying the call request with the at least one aspect of the caller's profile from the social networking site. A method is also provided for enhancing a callee's control over receiving a call. A method is also provided for facilitating web calling by a caller.
Blocking unsolicited calls from CallerID-spoofing autodialing devices
Novel tools and techniques for deterring unsolicited calls are described for deterring unsolicited telephone calls that include a service provider searching and determining that the originating telephone number is in a no-call list, and based on this determination, prohibiting the call from terminating (i.e., connecting with the destination telephone number). Penalties may also be imposed against callers (e.g., solicitors) for no-call violations. Various embodiments provide methods and systems that do not depend on the CallerID (which could be spoofed or might be unavailable) in order to identify the offending party of an unsolicited call or text message (i.e., originating entity), and to block the unsolicited call or text message.
Blocking unsolicited calls from CallerID-spoofing autodialing devices
Novel tools and techniques for deterring unsolicited calls are described for deterring unsolicited telephone calls that include a service provider searching and determining that the originating telephone number is in a no-call list, and based on this determination, prohibiting the call from terminating (i.e., connecting with the destination telephone number). Penalties may also be imposed against callers (e.g., solicitors) for no-call violations. Various embodiments provide methods and systems that do not depend on the CallerID (which could be spoofed or might be unavailable) in order to identify the offending party of an unsolicited call or text message (i.e., originating entity), and to block the unsolicited call or text message.
METHOD AND APPARATUS FOR DATA CHANNEL AUGMENTED VOICE TELEPHONY SYSTEMS
A computerized method of terminating audio telephone calls that provides the other party with more information as to why the telephone call was terminated. This method, which is particularly useful for computerized smartphones equipped with voice and data channel communications methods, automatically provides the user with a variety of different informative text messages that can be selected by the user and sent to the other party at the time that a voice call is terminated.
METHOD AND APPARATUS FOR DATA CHANNEL AUGMENTED VOICE TELEPHONY SYSTEMS
A computerized method of terminating audio telephone calls that provides the other party with more information as to why the telephone call was terminated. This method, which is particularly useful for computerized smartphones equipped with voice and data channel communications methods, automatically provides the user with a variety of different informative text messages that can be selected by the user and sent to the other party at the time that a voice call is terminated.
METHOD AND APPARATUS FOR IMPLEMENTING TELEPHONE PAYMENTS
There is provided a method of implementing a payment in relation to a telephone call between a customer and a merchant or service provider, the telephone call consisting of a signalling component and a media component. The method comprises, when establishing the telephone call, routing the signalling component to the merchant/service provider via a payment service system and routing the media component directly to the merchant/service provider. The method further comprises, at a communication management system of the merchant or service provider, sending an indication that the customer is required to make a payment to the payment service system and, at the payment service system, upon receipt of the indication that the customer is required to make a payment, using the signalling component of the telephone call to implement a redirection of the media component of the telephone call via the payment service system, extracting payment details of the customer from the redirected media component, and providing the payment details to a payment processing system to action the payment.
Charge management system, charge management method, program, program providing system, and maintenance system
A charge management system includes a user managing unit configured to manage pieces of user identification information for identifying users and pieces of terminal identification information for identifying transmission terminals, each piece of user identification information being associated with pieces of terminal identification information for identifying transmission terminals used by a user identified by the each piece of identification information; and a calculating unit configured to calculate a participation charge to each of the transmission terminals, bases on a total participation duration in which the each of the transmission terminals has participated in a conversation during a predetermined period, and calculate a total participation charge to each of the users by summing up the participation charges to transmission terminals specified by the pieces of terminal identification information associated with the each piece of the user identification information.
Charge management system, charge management method, program, program providing system, and maintenance system
A charge management system includes a user managing unit configured to manage pieces of user identification information for identifying users and pieces of terminal identification information for identifying transmission terminals, each piece of user identification information being associated with pieces of terminal identification information for identifying transmission terminals used by a user identified by the each piece of identification information; and a calculating unit configured to calculate a participation charge to each of the transmission terminals, bases on a total participation duration in which the each of the transmission terminals has participated in a conversation during a predetermined period, and calculate a total participation charge to each of the users by summing up the participation charges to transmission terminals specified by the pieces of terminal identification information associated with the each piece of the user identification information.
Using calling party number for caller authentication
Embodiments include a system, method, and computer program product that authenticates a caller using calling party information. In an embodiment, an authentication device receives the call request and associated calling party information that includes a calling party number. The authentication device retrieves parameters associated with the calling party number, where a retrieved parameter is a number of accounts linked to the calling party number. The authentication device determines whether the number of accounts is between one and a threshold value, inclusive, and verifies that the call request originates from a location or a device associated with the calling party number. Based on the verifying and determining, the authentication device generates an authentication result that indicates whether the calling party number is authenticated. Then, the authentication device sends the authentication result to a call processing device that processes the call request from the caller according to the authentication result.