Patent classifications
H04M2215/0164
SYSTEM AND METHOD FOR IDENTIFYING AND HANDLING UNWANTED CALLERS USING A CALL ANSWERING SYSTEM
A method and system for identifying an unwanted caller using a call answering system. The method comprises receiving, by a call records server, information about callers from a plurality of telephony devices and one or more phone number data sources, classifying, by the call records server, one or more of the callers as either wanted or unwanted callers based on the received information, and storing, by the call records server, the received information and the classification of the one or more of the callers into a directory. The method further comprises identifying, by a call answering server, that a call from a given caller from a phone number to a receiving telephony device is from an unwanted caller by searching the directory, and handling, by the call answering server, the call from the given caller according to one or more preferences of the user, the one or more preferences including rejecting the call from the receiving telephony device, playing a recorded message, and disposing of the call.
SERVING A NETWORK RESOURCE USAGE FILE
A method of serving a network resource usage record file is disclosed. The method can comprise: storing network resource usage records in a distributed database, the network resource usage records relating to network resource usage in a telecommunications network; sending a file list identifying a network resource usage record file over a file retrieval interface without having constructed the network resource usage record file; receiving, over the file retrieval interface, a request for the network resource usage record file; constructing, in response to the receiving of the request, the network resource usage record file, the network resource usage record file comprising one or more network resource usage records obtained from the distributed database; and serving, over the file retrieval interface, the network resource usage record file.
System and method for identifying unwanted communications using communication fingerprinting
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
End-to-End Session-Related Call Detail Record
A method, implemented in a distributed system including a plurality of processing devices, generates an end-to-end Call Detail Record (CDR) on voice and multimedia telecommunication sessions over a plurality of telecommunication network elements and interfaces. The method includes the steps of receiving CDRs generated in real-time and streamed by multiple network elements, each CDR referring to a specific interface or protocol, processing the received CDRs as they are received to identify the specific interface or protocol to which the received CDR refers and to identify a single telecommunication session based on a key associated with the received CDR, and creating an end-to-end CDR incrementally based on all of the received CDRs identified for the single telecommunication session, wherein at least two of the received CDRs have a different interface or protocol from one another.
Communication analysis mechanism and methods
Systems and methods for characterizing communications in a network are disclosed. The method includes obtaining records from multiple sources within the network; correlating the records according to one or more attributes of the communications facilitated by the network; and calculating one or more detailed metrics based on the correlation.
DETERMINING DROPPED CALL RATES IN IP MULTIMEDIA NETWORKS
Systems and methods are described herein for determining dropped call rates (DCR) for various communications networks, such as IP Multimedia Networks (IMS), which include Voice over LTE (VoLTE) networks. For example, the systems and methods utilize data (e.g. abnormal cause codes) generated by layers of the IMS networks, such as a Session Initiation Protocol (SIP) layer of the IMS network, when determining dropped call rates for IMS networks.
Determining dropped call rates in IP multimedia networks
Systems and methods are described herein for determining dropped call rates (DCR) for various communications networks, such as IP Multimedia Networks (IMS), which include Voice over LTE (VoLTE) networks. For example, the systems and methods utilize data (e.g. abnormal cause codes) generated by layers of the IMS networks, such as a Session Initiation Protocol (SIP) layer of the IMS network, when determining dropped call rates for IMS networks.
Enhanced Roaming Services and Converged Carrier Networks With Device Assisted Services and a Proxy
A method performed by a network system communicatively coupled to a wireless device by a wireless access network, the network system including a network element corresponding to a network element destination, the method comprising providing at least a portion of a device policy to the wireless device, wherein the device policy is configured to assist in detecting wireless device traffic associated with a service activity, identifying the service activity as being included in a service usage activity classification, and directing or routing the wireless device traffic associated with the service activity over the wireless access network based on information identifying the network element destination; providing a network element policy to the network element corresponding to the network element destination; detecting, at the network element, traffic associated with the wireless device; and applying the network element policy at the network element to the traffic associated with the wireless device.
SYSTEM AND METHOD FOR IDENTIFYING AND HANDLING UNWANTED CALLERS USING A CALL ANSWERING SYSTEM
A method and system for identifying an unwanted caller using a call answering system. The method comprises receiving, by a call records server, information about callers from a plurality of telephony devices and one or more phone number data sources, classifying, by the call records server, one or more of the callers as either wanted or unwanted callers based on the received information, and storing, by the call records server, the received information and the classification of the one or more of the callers into a directory. The method further comprises identifying, by a call answering server, that a call from a given caller from a phone number to a receiving telephony device is from an unwanted caller by searching the directory, and handling, by the call answering server, the call from the given caller according to one or more preferences of the user, the one or more preferences including rejecting the call from the receiving telephony device, playing a recorded message, and disposing of the call.
SYSTEM AND METHOD FOR IDENTIFYING UNWANTED COMMUNICATIONS USING COMMUNICATION FINGERPRINTING
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.