H04M3/42034

Virtual telephony assistant

Examples are disclosed for screening an inbound telephony call to a called party. At a communications server, an inbound telephony call intended for a called party's telephone number is received and checked against a whitelist database and a blacklist database. When the caller ID of the inbound call matches a telephone number contained in the blacklist database, the communications server automatically routes the call to a voicemail system or spam folder associated with the called party's telephone number. When the caller ID of the inbound call matches a telephone number contained in the whitelist database, the communications server determines whether the called party is available to receive the call. Otherwise, when the caller ID of the inbound call does not match a telephone number contained in either the whitelist database or the blacklist database, the communications server prompts the caller for additional information.

VIRTUAL TELEPHONY ASSISTANT

Examples are disclosed for screening an inbound telephony call to a called party. At a communications server, an inbound telephony call intended for a called party's telephone number is received and checked against a whitelist database and a blacklist database. When the caller ID of the inbound call matches a telephone number contained in the blacklist database, the communications server automatically routes the call to a voicemail system or spam folder associated with the called party's telephone number. When the caller ID of the inbound call matches a telephone number contained in the whitelist database, the communications server determines whether the called party is available to receive the call. Otherwise, when the caller ID of the inbound call does not match a telephone number contained in either the whitelist database or the blacklist database, the communications server prompts the caller for additional information.

Methods, Systems, and Products for Notifications

A message notification indicates a message has been retrieved and/or read. The message notification may be sent to any destination, such as a sender's device. When the sender's device receives the message notification, an icon or other graphical indicator may be displayed to indicate the message has been retrieved and/or read.

CONTEXT-AWARE AUDIO INTERFACING
20240357036 · 2024-10-24 · ·

A redirection and messaging system receives telephony information identifying a caller and call context from a telephony system. The system selects one of a plurality of messaging operators based on the call context, optionally sends an introductory message to the caller via a messaging service, and generates a message interface for the selected message operator. The message interface includes the caller and call context and any messages sent between the caller and the selected message operator, with an input interface allowing the selected message operator to input and send messages to the caller.

Virtual telephony assistant

Examples are disclosed for screening an inbound telephony call to a called party. At a communications server, an inbound telephony call intended for a called party's telephone number is received and checked against a whitelist database and a blacklist database. When the caller ID of the inbound call matches a telephone number contained in the blacklist database, the communications server automatically routes the call to a voicemail system or spam folder associated with the called party's telephone number. When the caller ID of the inbound call matches a telephone number contained in the whitelist database, the communications server determines whether the called party is available to receive the call. Otherwise, when the caller ID of the inbound call does not match a telephone number contained in either the whitelist database or the blacklist database, the communications server prompts the caller for additional information.

AUTHENTICATED SECURE AUDIO CALLING AND DIGITALLY SIGNED METADATA FOR INTEGRITY VERIFICATION
20240365118 · 2024-10-31 ·

Techniques are described for providing secure audio calls between a calling party and a receiving party. Upon receiving a call request from a call initiating party, a notification is sent to the intended call recipient. The call recipient can send a request for a secure call. Upon receiving the request for a secure call, a bi-directional multifactor authentication is performed to authenticate the identity of both the call initiating party and the call receiving party. In response to successfully authenticating both parties, a secure call between the parties is established. One or more secure key tokens or other metadata can be embedded in the call to ensure security of the call.

VIRTUAL TELEPHONY ASSISTANT

Examples are disclosed for screening an inbound telephony call to a called party. At a communications server, an inbound telephony call intended for a called party's telephone number is received and checked against a whitelist database and a blacklist database. When the caller ID of the inbound call matches a telephone number contained in the blacklist database, the communications server automatically routes the call to a voicemail system or spam folder associated with the called party's telephone number. When the caller ID of the inbound call matches a telephone number contained in the whitelist database, the communications server determines whether the called party is available to receive the call. Otherwise, when the caller ID of the inbound call does not match a telephone number contained in either the whitelist database or the blacklist database, the communications server prompts the caller for additional information.

Methods, systems, and products for notifications

A voicemail notification indicates a caller has recorded a voicemail. The voicemail notification may be sent to any destination, such as a caller's device. The voicemail notification may be displayed in a communication log to visually indicate that the voicemail was recorded. A different notification may be sent and displayed to indicate the recipient retrieved the voicemail.

Systems and methods for processing calls

Methods and systems are described for processing calls. An example method may comprise receiving a message for establishing a call. Identification information in the message may be compared to screening data. If a match is found, the message may be forwarded to a screening server. The screening server may establish a call based on the session and provide information indicative of a level of trust associated with the call.

CALL HANDLING BASED ON AUGMENTED CALLER INFORMATION
20180048764 · 2018-02-15 ·

A device can receive a call from a calling party device to a called party device, and can determine caller information based on the call from the calling party device. The device can determine that the caller information satisfies a criterion, and can modify the caller information to create modified caller information, the caller information being modified based on the caller information satisfying the criterion. The device can compare the modified caller information to a data structure that includes information associated with multiple call handling decisions. The device can identify a call handling decision, of the multiple call handling decisions, based on comparing the modified caller information to the data structure that includes the plurality of call handling decisions, and can cause the call handling decision to be implemented.