H04M3/42034

SYSTEM AND METHOD FOR PROVIDING AND MANAGING THIRD PARTY CONTENT WITH CALL FUNCTIONALITY
20200120208 · 2020-04-16 ·

Systems and methods for implementing an online content item campaign with selective call functionality can include a processor determining a rendering frequency of instances of a third-party content item for rendering with a call icon, based on a resource of the third-party content provider. The processor can provide a first instance of the content item for rendering with the call icon in accordance with the rendering frequency of instances. A call bridge device can receive a call from the client computing device upon actuation of the call icon, direct the call to a phone number of the third-party content provider, and determine a parameter of the call. The processor can adjust the rendering frequency of instances based on the parameter of the call and provide instances of the content item for display by client computing devices with the call icon in accordance with the adjusted rendering frequency of instances.

VOLTE-BASED VOICE CALL METHOD AND SYSTEM
20200068067 · 2020-02-27 ·

Disclosed in the present invention is a VoLTE-based voice call method. The method comprises: a calling terminal determining whether a VoLTE call mode is activated: if so, the calling terminal generating a call request, the call request comprising contact card information of the calling terminal; and the calling terminal sending the call request to the called terminal, so as to enable the called terminal to acquire the contact card information of the calling terminal from the call request. The present invention can facilitate users to exchange contact card information.

REAL TIME VERIFICATION OF CALLER IDENTIFICATION (ID)
20240064233 · 2024-02-22 ·

An electronic device and method for real-time verification of Caller IDs for live-human and robot call filtering is provided. A first electronic device receives an incoming first call from a second electronic device associated with a Caller identification (ID). The first electronic device transmits a verification text message to the second electronic device using the Caller ID, while the first call is still incoming. The first electronic device receives a response to the verification text message and compares the received response with a pre-defined response. If the response is correct and received within a predefined time, the first electronic device allows the call to connect. If a correct response is received beyond the predefined time, the Caller ID is added to a whitelist so that a next call from the same Caller ID is received automatically. In such case, the current first call is redirected to a voicemail system.

Real time verification of caller identification (ID)
11962719 · 2024-04-16 · ·

An electronic device and method for real-time verification of Caller IDs for live-human and robot call filtering is provided. A first electronic device receives an incoming first call from a second electronic device associated with a Caller identification (ID). The first electronic device transmits a verification text message to the second electronic device using the Caller ID, while the first call is still incoming. The first electronic device receives a response to the verification text message and compares the received response with a pre-defined response. If the response is correct and received within a predefined time, the first electronic device allows the call to connect. If a correct response is received beyond the predefined time, the Caller ID is added to a whitelist so that a next call from the same Caller ID is received automatically. In such case, the current first call is redirected to a voicemail system.

IDENTITY AND PHONE NUMBER VERIFICATION

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving, from a computer system, a request comprising a phone number, identifying a primary channel and one or more secondary channels based on, at least in part, respective performance data of the primary and secondary channels, sending a first message comprising a first text string via the primary channel to a destination device associated with the phone number, after sending the first message, determining that a conversion event for the message and the primary channel did not occur within a specified time period, and based on the determining, sending a second message comprising the first text string via a particular secondary channel to the destination device.

Sender identification system and method

A database is queried based upon data contained in a message to obtain sender identification information, at least part of which is not contained in the message as it was sent. The sender identification information is presented to a recipient, which can send a signal accepting or rejecting the message based upon the sender identification information. If an accept signal is entered, the message can be forwarded to the recipient and/or rendered to the recipient.

Context-aware audio interfacing
12063327 · 2024-08-13 · ·

A redirection and messaging system receives telephony information identifying a caller and call context from a telephony system. The system selects one of a plurality of messaging operators based on the call context, optionally sends an introductory message to the caller via a messaging service, and generates a message interface for the selected message operator. The message interface includes the caller and call context and any messages sent between the caller and the selected message operator, with an input interface allowing the selected message operator to input and send messages to the caller.

Communication device
10148803 · 2018-12-04 ·

The communication device comprising a voice communication implementer, a ringing mode implementer, a silent mode implementer, an answering machine implementer, and an audio data output implementer.

Outgoing call management in a communication environment with unified communication interfaces

A computer-implemented method for managing a billing policy for mobile phone associated with a first phone number corresponding to a first account and a second phone number corresponding to a second account is described herein. The billing policy defines actions performed by the mobile phone to be charged to the first account, and defines actions performed by the mobile phone to be charged to the second account. Charges are allocated to one of the first account and second account based on the billing policy. A user can configured to phone to operate in a private mode, in response to which actions are charged to a default account of the two accounts, and information about the action is not provided to an external entity.

Systems and methods for detecting and/or preventing vishing attacks using user-generated authentication information

A computer-implemented method for authenticating a source of a telephone call to a recipient of the telephone call may include receiving, prior to receiving the telephone call, a request to input first authentication information. The first authentication information may include a passcode or a selection of a security question. The method may include receiving input of the first authentication information and sending, by the user device, the first authentication information to a computing device associated with the source of the telephone call. The method may include receiving the telephone call from the source and receiving input from the recipient of the telephone call to answer the telephone call. The method may include receiving second authentication information from the computing device, where the second authentication information may include the passcode or an answer to the security question. The method may include outputting the second authentication information.