Patent classifications
H04M3/2263
AUTOMATE-AUTOMATED INTERFACE BETWEEN CALL CENTER AGENTS AND NETWORK ORCHESTRATION SYSTEMS VIA APPLICATION PROGRAMMING INTERFACES (APIs)
Novel tools and techniques are provided for implementing call center-based automated interface between call center agents and network orchestration systems, in some cases, via application programming interfaces (APIs). In various embodiments, an automated services platform may collect, from data sources, data associated with services provided by a service provider. The collected data may be autonomously analyzed to identify any issues with provisioning a service(s) to a customer. If so, one or more automation actions may be autonomously identified to address the determined issue(s). The automated services platform may autonomously send instructions to automation bots to perform the identified one or more automation actions, and may generate and present a UI on a user terminal operated by a user, the UI displaying information regarding at least one of the at least one issue, the affected service(s), the identified one or more automation actions, or the automation bots, and/or the like.
Automated call center software build generator
A call center (CC) generator includes generator software (GSW) executing on a computerized appliance from a machine-readable physical medium, an input interface for receiving a CC configuration, access to a data repository storing CC software components, a function relating configuration parameters to individual ones of the stored CC software components, and an output interface for delivering a CC SW suite. The CC generator, executing the GSW, considers the CC configuration, applies the relating function, selects CC software components to copy from the data repository, and builds the CC SW suite for output.
Methods and apparatus to dynamically select a peered voice over internet protocol (VoIP) border element
Methods and apparatus to select a dynamically peered voice over Internet protocol (VoIP) border element are disclosed. An example method comprises collecting data representative of a dynamic performance of a voice over Internet protocol network, prioritizing a selection of a peered border element based on the collected data, and modifying a telephone number mapping (ENUM) database based on the prioritized selection.
Sound-based call-quality detector
System and techniques for sound-based call-quality detector are described herein. An audio sample can be received via a hardware interface from an on-going communication. The audio sample can be processed to produce a transcript. The transcript can be compared to a call-quality dataset to produce a call-quality degradation indication. Here, the call quality dataset includes indicia of communication quality. Network maintenance can then be performed in response to the call-quality degradation indication. The network maintenance can include adjusting a network device setting.
TOLL-FREE TELECOMMUNICATIONS AND DATA MANAGEMENT PLATFORM
A Toll-Free Management Platform (TFMP) includes methods and systems for number administration, customer administration, call management services, texting services and text registry, and a smart services registry. The TFMP may allow users to receive through a web-based interface, an activate request from a user, wherein the request includes at least a customer record template reference and an indication of when to active a toll-free telecommunications number associated with the request. The request may include at least one IP address datum associated with the toll-free telecommunications number. A user interface may allow activating a toll-free number, and users may access the TFMP to create and access existing templates of toll-free call routing templates, and utilize a routing tree engine to create customized call routing trees for the toll-free numbers of interest to the user.
IP telephony network using a configuration map for organizing sites
A method for scheduling a meeting using an email client that is part of an email system includes receiving a request at the email client to schedule the meeting. The request may include an indication of the resources that are to be provided by a conferencing system for the meeting. The method also includes communicating the request to a conference bridge that is part of the conferencing system and receiving from the conference bridge an access code associated with the meeting. The method also includes appending the access code to a meeting invitation associated with the meeting and providing the meeting invitation to an email server that is part of the email system. The method also includes sending the meeting invitation to users invited to participate in the meeting.
Identifying call features and associations to detect call traffic pumping and take corrective action
A system and method for monitoring telephone calls to detect call traffic pumping activity and take corrective action is described. The system receives a group of training telephone calls having associated call audio content and associated information, and the system analyzes the training telephone calls to generate and store a classification model that correlates call features and associations with a probability of call traffic pumping activity. The system receives a subsequent monitored telephone call to be analyzed. The system analyzes the monitored telephone call to identify features present in the audio content of the monitored telephone call and other associated information. The system then compares the features and associated information to the stored classification model in order to determine a probability that the monitored telephone call is associated with call traffic pumping activity. If the assessed probability of call traffic pumping activity exceeds a threshold, the system takes appropriate corrective action, such as terminating or flagging the monitored call.
Context-based cloud security assurance system
A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs. Preferably, these options are then surfaced to the user with easy-to-understand, pre-configured templates representing security assurance levels. When a template (e.g., representing a pre-configured assurance level) is selected by the user, the system then applies specific capabilities and controls to translate the user-selected generalized specification (e.g., high security) into granular requirements for a specific set of security resources. Preferably, the identification of these security resources is based on system configuration, administration, and information associated with the pre-configured template.
MANAGEMENT OF TOLL-FREE NUMBER MISUSE AND FRAUD DETECTION
Methods and systems for providing a rating system that allow for customers to create a database of toll-free numbers that are abused by malicious consumers which may be cloud-based and allow for service providers to dip prior to completing or accepting calls.
VOICE USER INTERFACE FOR DATA ACCESS CONTROL
A voice user interface (VUI) may be deployed for accessing data that are stored in databases of a telecommunications network. A voice command received at a voice interface device connected to a telecommunications network may be converted into a persistent data representation via a speech interpretation engine. The persistent data representation is sent to an intent mapping service that maps persistent data representations to intermediate command representations. In turn, a command interpreter of the telecommunications network may receive the intermediate command representation from the intent mapping service. The command interpreter may translate the intermediate command representation into a database function command via a command interpreter of the telecommunications network. The database function command may be executed on data stored in a database of the telecommunications network via a database interface to generate at a synthesized speech output presented by the voice interface device or a visual output presented by a display device.