Patent classifications
H04M2203/2005
Scam mitigation back-off
A request is received to suspend providing scam protection to a user device that initiated an outgoing emergency voice call or an outgoing emergency communication message to a Public Safety Answering Point (PSAP). Scam protection for the user device is suspended for a predetermined time period, which allows the PSAP to make return emergency voice calls or send return emergency communication messages to the user device without the scam protection server marking the return emergency voice calls as a scam voice call or marking the emergency communication messages as a scam message during the predetermined time period.
Forwarding a communication transmitted to a portable communications device based on talkgroup affiliation and override settings
Methods, apparatuses, and systems for forwarding a communication transmitted to a portable communications device. One method includes affiliating the portable communications device with a talkgroup, and, in response to affiliating the portable communications device with the talkgroup, receiving, at an electronic processor included in the portable communications device, forwarding configuration data associated with the talkgroup. The method also includes forwarding a communication transmitted to the portable communications device while the portable communications device is affiliated with the talkgroup based on the forwarding configuration data associated with the talkgroup and one or more override settings.
SYSTEMS AND METHODS FOR PROVIDING CALLER IDENTIFICATION OVER A PUBLIC SWITCHED TELEPHONE NETWORK
A system and method of providing caller identification (ID) over a public switched telephone network (PSTN). For outbound calls, the system and method enable a caller to provide a caller ID that differs from the native caller ID of their mobile phone. The system and method enable multiple phones tied to a single account to display the same caller ID for outbound calls. For forwarded inbound calls, such as calls being forwarded from an office, the system and method inform the recipient of the identification of the call as well as that the call is being forwarded. The system and method enable the recipient to have calls forwarded from more than one number and identify the identity of the caller as well as the specific number the call is being forwarded from.
PRIORITY RECONNECTION OF DROPPED NODES FROM A NETWORK
Contact centers may receive a call that is unintentionally disconnected or has poor audio quality. If the customer needs to call again, re-entering the normal queuing process, which may have a significant delay, or re-starting an issue (e.g., providing background information, stating a problem, etc.) further adds to the frustration. Methods and systems are provided to enable a customer, who is disconnected or other wise unable to communicate effectively with an agent, to be re-queued at a higher priority, if they call the contact center again, such as within a period of time likely to be associated with the same event.
CALLER ID VERIFICATION USING CALL IDENTIFICATION AND BLOCK LISTS
In an illustrative embodiment, a user device may block all the phone numbers used by an enterprise. When an enterprise wants to call the user, the enterprise may notify the user device through a separate secure channel that an enterprise phone number is in the process of making a phone call to the user device. The secure channel may include an authentication server that may request the user device to unblock the enterprise phone number. An incoming phone call from the enterprise phone number therefore can be trusted. After the phone call is terminated, the user device may again block the enterprise phone number. An attacker may not have access to the authentication server and a phone call from the attacker with a spoofed enterprise phone number (now blocked) may be dropped by the user device.
Caller ID verification using call identification and block lists
In an illustrative embodiment, a user device may block all the phone numbers used by an enterprise. When an enterprise wants to call the user, the enterprise may notify the user device through a separate secure channel that an enterprise phone number is in the process of making a phone call to the user device. The secure channel may include an authentication server that may request the user device to unblock the enterprise phone number. An incoming phone call from the enterprise phone number therefore can be trusted. After the phone call is terminated, the user device may again block the enterprise phone number. An attacker may not have access to the authentication server and a phone call from the attacker with a spoofed enterprise phone number (now blocked) may be dropped by the user device.
SYSTEMS AND METHODS FOR PROVIDING CALLER IDENTIFICATION OVER A PUBLIC SWITCHED TELEPHONE NETWORK
A system and method of providing caller identification (ID) over a public switched telephone network (PSTN). For outbound calls, the system and method enable a caller to provide a caller ID that differs from the native caller ID of their mobile phone. The system and method enable multiple phones tied to a single account to display the same caller ID for outbound calls. For forwarded inbound calls, such as calls being forwarded from an office, the system and method inform the recipient of the identification of the call as well as that the call is being forwarded. The system and method enable the recipient to have calls forwarded from more than one number and identify the identity of the caller as well as the specific number the call is being forwarded from.
Multi-SIM Call Management Method and Apparatus, Managed Device, and Server
A method applicable to a multi-subscriber identity module (SIM) call management process includes parsing, by a managed device, an incoming call to obtain call information, determining a communications circuit corresponding to a called identifier, and when the managed device has performed an incoming call shielding setting on the communications circuit in response to a remote management instruction sent by an entitlement server (ES), skipping responding, by the managed device, to an incoming call event, or receiving, by the server, a remote management instruction from the ES, and deleting or freezing routing information corresponding to an identifier in response to the remote management instruction such that a communications circuit corresponding to the identifier in the managed device is unable to respond to an incoming call event.
CALLER ID VERIFICATION USING CALL IDENTIFICATION AND BLOCK LISTS
In an illustrative embodiment, a user device may block all the phone numbers used by an enterprise. When an enterprise wants to call the user, the enterprise may notify the user device through a separate secure channel that an enterprise phone number is in the process of making a phone call to the user device. The secure channel may include an authentication server that may request the user device to unblock the enterprise phone number. An incoming phone call from the enterprise phone number therefore can be trusted. After the phone call is terminated, the user device may again block the enterprise phone number. An attacker may not have access to the authentication server and a phone call from the attacker with a spoofed enterprise phone number (now blocked) may be dropped by the user device.
Guard timer to optimize E911 call handling
Systems and methods for optimized call handling during e911 calls. Normally, when a user equipment (UE) is connected to a public safety answering point (PSAP)e.g., is on a 911 callall incoming calls are automatically routed to voicemail. In contrast, the systems and methods disclosed herein enable calls that were dialed within a predetermined time window of the 911 call to be sent through to call-waiting to enable the user to accept or reject the call. The system can use a guard timer to determine whether a call is within the predetermined time window. The system can include a single guard timer for all incoming callse.g., any call made from the UE within the previous X minutes prior to the 911 call. The system can also include individual guard timers for each call that expire separately relative to the call's proximity to the 911 call.