H04M15/755

Direct inward dialing pool lease for originating and terminating services in a unified communication platform

A method for originating and terminating services in a unified communication platform is provided. The method includes receiving, from a local market intermediate carrier, a request for a communication between a subscriber of a public network and an end-user endpoint in a local network, associated with an end-user phone number. The method includes creating a lease for an address anchor in a pool of addresses, receiving, in a proxy server from a carrier gateway server, a communication request from the end-user phone number to the address anchor, and establishing a communication channel to the address anchor. The method includes replacing, in the communication channel, a from header with a phone number of the subscriber of the public network, and a to header with the end-user phone number. A system and a non-transitory, computer-readable medium storing instructions to perform the above method are also provided.

Systems and methods for identifying node hierarchies and connections using electronic activities

The present disclosure relates to methods, systems, and storage media for identifying node hierarchies and connections using electronic activities. The method may include maintaining node profiles corresponding to unique entities; selecting electronic activities linked to both a first node profile and a second node profile of the plurality of node profiles; generating for each electronic activity of the plurality of electronic activities, a relevancy score based on a respective time at which the electronic activity was transmitted or received; generating a connection profile for a connection between the first node profile and the second node profile based on the respective relevancy score of each electronic activity and storing in a data structure, an association between the connection profile, the first node profile, and the second node profile.

Systems and methods for inferring a time zone of a node profile using electronic activities

The present disclosure relates to inferring a time zone of a node profile using electronic activities. A method can include accessing a plurality of electronic activities transmitted or received via a plurality of electronic accounts. The method can include identifying, for a node profile, a set of electronic activities sent from or received by an electronic account of the plurality of electronic accounts linked to the node profile within a time period. The method can include identifying, for each electronic activity of the set of electronic activities, a timestamp at which the electronic activity was sent or received. The method can include generating, for each of a plurality of time intervals within the time period, a temporal distribution of electronic activity based on respective timestamps of each electronic activity. The method can include determining a time zone of the node profile based on the temporal distribution.

Systems and methods for maintaining an electronic activity derived member node network
10860794 · 2020-12-08 · ·

The present disclosure relates to maintaining an electronic activity derived member node network. Exemplary implementations may: generate a plurality of node profiles; generate a node graph generated from the plurality of node profiles; identify a second electronic activity identifying a pair of electronic accounts; identify using the node graph, a pair of participant node profiles corresponding to the pair of electronic accounts identified by the second electronic activity; identify, using the node graph, an edge between a pair of nodes corresponding to the pair of participant node profiles; determine a relevancy score for the second electronic activity corresponding to the pair of the participant node profiles based on context of the second electronic activity; and update the node graph by modifying the connection corresponding to the edge between the pair of participant node profiles based on the relevancy score determined for the second electronic activity.

TOLL-FREE NUMBERS METADATA TAGGING, ANALYSIS AND REPORTING
20200314248 · 2020-10-01 ·

A method for reducing costs associated with fraudulent call activity is provided. The method includes receiving data associated with usage of a telecommunications number. The method further includes analyzing the data to determine that the usage of the telecommunications number is indicative of a fraudulent call activity. The method further includes assigning a call route to the telecommunications number adapted to reduce a cost associated with the fraudulent call activity.

Systems and methods for controlling secure persistent electronic communication account servicing with an intelligent assistant

The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is provided that includes receiving, at an enrollment web portal, enrollment data including: enrollment credentials identifying a user for authentication, a phone number of a mobile device associated with the user, and consent by the user to persistently interact with an account servicing system via SMS texting. The method includes: processing the received enrollment data, authenticating the user responsive to processing the received enrollment data, storing the phone number of the mobile device associated with the user in a phone number data storage, and generating, responsive to the authenticating, a revocable token for persistent access to a natural dialogue module via a SMS texting gateway for the mobile device identified by the phone number.

SYSTEMS AND METHODS FOR AUTO DISCOVERY OF FILTERS AND PROCESSING ELECTRONIC ACTIVITIES USING THE SAME

The present disclosure relates to systems and methods for filtering electronic activities. Exemplary implementations may include ingesting a first electronic activity; identifying an associated entity; and selecting a first filtering model based on the entity, the first filtering model trained to indicate whether to restrict further processing of ingested electronic activities. The method may further include generating a plurality of structured data tags for the first electronic activity; applying the selected first filtering model to the plurality of structured data tags for the first electronic activity to determine whether the first electronic activity satisfies a first restriction condition; and responsive to the first electronic activity satisfying the first restriction condition, restricting the first electronic activity from further processing; or responsive to the first electronic activity not satisfying the first restriction condition, further processing, by the one or more processors, the first electronic activity.

Systems and methods for identifying unsolicited communications on a computing device

The disclosed computer-implemented method for identifying unsolicited communications on a computing device may include a computing device receiving a communication from an unrecognized phone number; obtaining the unrecognized phone number from the communication; obtaining classification data associated with the unrecognized phone number based on categories of other computing devices contacted by the unrecognized phone number; obtaining a category associated with a phone number of the computing device; determining that the communication is an unsolicited communication based on the classification data and the category associated with the phone number of the computing device; and in response to determining that the communication is unsolicited, performing a security action to manage interactions with the communication from the unrecognized phone number. Various other methods, systems, and computer-readable media are also disclosed.

Systems and methods for removing electronic activities from systems of records based on filtering policies

The present disclosure relates to systems and methods for removing electronic activities from systems of record based on filtering policies. The method includes accessing record objects of one or more systems of record. The method includes identifying a plurality of electronic activities stored in a record object of one of the systems of record. The method includes parsing the plurality of electronic activities. The method includes determining that one of the electronic activities is associated with an electronic account corresponding to a data source provider. The method includes selecting one or more filtering policies associated with the electronic account. The method includes applying the selected one or more filtering policies to the plurality of electronic activities to identify a subset of electronic activities. The method includes initiating a process to cause removal of at least one electronic activity of the subset of electronic activities from the system of record.

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES DIRECTLY TO RECORD OBJECTS OF SYSTEMS OF RECORD WITH NODE PROFILES

The system described herein can automatically match, link, or otherwise associate electronic activities with one or more record objects. For an electronic activity that is eligible or qualifies to be matched with one or more record objects, the system can identify one or more set of rules or rule sets. Using the rule sets, the system can identify candidate record objects. The system can then rank the identified candidate record objects to select one or more record objects with which to associate the electronic activity. The system can then store an association between the electronic activity and the selected one or more record objects.