Patent classifications
H04M2203/2005
Systems and methods for providing caller identification over a public switched telephone network
A system and method of providing caller identification (ID) over a public switched telephone network (PSTN). For outbound calls, the system and method enable a caller to provide a caller ID that differs from the native caller ID of their mobile phone. The system and method enable multiple phones tied to a single account to display the same caller ID for outbound calls. For forwarded inbound calls, such as calls being forwarded from an office, the system and method inform the recipient of the identification of the call as well as that the call is being forwarded. The system and method enable the recipient to have calls forwarded from more than one number and identify the identity of the caller as well as the specific number the call is being forwarded from.
Caller ID verification using call identification and block lists
In an illustrative embodiment, a user device may block all the phone numbers used by an enterprise. When an enterprise wants to call the user, the enterprise may notify the user device through a separate secure channel that an enterprise phone number is in the process of making a phone call to the user device. The secure channel may include an authentication server that may request the user device to unblock the enterprise phone number. An incoming phone call from the enterprise phone number therefore can be trusted. After the phone call is terminated, the user device may again block the enterprise phone number. An attacker may not have access to the authentication server and a phone call from the attacker with a spoofed enterprise phone number (now blocked) may be dropped by the user device.
System and method for device-based E911 call trigger
A method includes initiating an emergency call, responsive to the initiating step, generating a trigger, wherein the trigger comprises a request to suspend a call restriction associated with a user device, and transmitting the trigger using a Ut interface to a server to suspend the call restriction.
CALLER ID VERIFICATION USING CALL IDENTIFICATION AND BLOCK LISTS
In an illustrative embodiment, a user device may block all the phone numbers used by an enterprise. When an enterprise wants to call the user, the enterprise may notify the user device through a separate secure channel that an enterprise phone number is in the process of making a phone call to the user device. The secure channel may include an authentication server that may request the user device to unblock the enterprise phone number. An incoming phone call from the enterprise phone number therefore can be trusted. After the phone call is terminated, the user device may again block the enterprise phone number. An attacker may not have access to the authentication server and a phone call from the attacker with a spoofed enterprise phone number (now blocked) may be dropped by the user device.
CALL METHOD OF MOBILE TERMINAL, MOBILE TERMINAL CONTROL METHOD, AND RELATED DEVICE
The present application discloses a mobile terminal control method, including: receiving a communication request sent by a communication request initiating party, and calculating a time interval between a time when the communication request is received and a time when a previous communication request from the communication request initiating party is received; and if the time interval is greater than a preset threshold, skipping generating a vibrating and/or ringtone alert for the communication request, and detecting an online status of a communications software account associated with the communication request initiating party and sending prompt information to an online communications software account, where the prompt information is used to indicate that a mobile terminal is in a Do Not Disturb mode.
Device restrictions during events
A system and method for controlling functions on devices is disclosed. An occurrence of a start of an event is determined. Based on determining the occurrence of the start, a respective registration of a respective device associated with a respective attendee of the event is received. Based on receiving the respective registration and determining the occurrence of the start of the event, temporary restrictions are applied to the respective device from which the respective registration is received. Based on determining an occurrence of an end of the event, the temporary restrictions are removed from the respective device.
METHOD FOR DISABLING A DIGITAL ASSISTANT DURING A CONFERENCE CALL BASED ON SECURITY LEVEL
A digital assistant and method are provided that allow for the digital assistant to be disabled during a conference call. An initial security level for a conference call is determined. A second conference device that is associated with the digital assistant is alerted of the initial security level. The second conference device sends the initial security level to the digital assistant. The functionality of the digital assistant is adjusted based at least in part upon the initial security level.
SYSTEM AND METHOD FOR DEVICE-BASED E911 CALL TRIGGER
A method includes initiating an emergency call, responsive to the initiating step, generating a trigger, wherein the trigger comprises a request to suspend a call restriction associated with a user device, and transmitting the trigger using a Ut interface to a server to suspend the call restriction.
Call method of mobile terminal, mobile terminal control method, and related device
The present application discloses a mobile terminal control method, including: receiving a communication request sent by a communication request initiating party, and calculating a time interval between a time when the communication request is received and a time when a previous communication request from the communication request initiating party is received; and if the time interval is greater than a preset threshold, skipping generating a vibrating and/or ringtone alert for the communication request, and detecting an online status of a communications software account associated with the communication request initiating party and sending prompt information to an online communications software account, where the prompt information is used to indicate that a mobile terminal is in a Do Not Disturb mode.
System and methods for scheduling and optimizing inbound call flow to a call center
A method for providing inbound call reservations to a communication center has steps for monitoring service access points into the communication center by reservation software executing from a machine-readable medium, evaluating communicators and potential communicators, and issuing invitations for reserved communication sessions to qualified communicators and potential communicators, the reserved times coordinated according to data pertaining to predicted communication load and resource availability statistics.