H04M3/42085

User controlled call management

A system and methods for call facilitation are provided. The system includes interfaces to call handling networks for receiving or transmitting information by voice, data, email or internet protocol, a storage means and a processing means. The storage means stores caller and/or callee associated information. And the processing means initiates and controls calls to one or more of the call handling networks utilizing associated information corresponding to the caller and the callee of the calls. The associated information includes identification information, calling rules, authentication information, and electronic addresses for each caller and/or callee. In addition, a method for facilitation of a call between a caller and a callee includes setting-up and/or controlling the call in response to information in one or more URL links accessed by the caller and/or the callee via their electronic addresses and/or online accounts.

Fraudulent call detection

There is disclosed in one example a mobile telephone, including: a hardware platform including a processor and a memory; a telecommunication transceiver; and instructions encoded within the memory to instruct the processor to: identify a call made via the telecommunication transceiver; analyze the call and assign the call a predicted local reputation according to the analysis, including a legitimacy confidence score; if the legitimacy confidence score is less than a first threshold, terminate the call; if the legitimacy confidence score is greater than a second threshold, cease analysis of the call; and if the legitimacy confidence score is between the first and second thresholds, continue analysis of the call.

Automated robocall detection

Novel tools and techniques are provided for implementing automated robocall detection. In various embodiments, a computing system may compare first abstracted raw data, obtained from a portion of call data from a first call from a first originating party, with each of a plurality of abstracted raw data, obtained from portions of call data from a plurality of calls from a corresponding plurality of originating parties. In some instances, the plurality of abstracted raw data and the first abstracted raw data may each include at least one of word count data, phoneme count data, inter-word timing data, voice pitch estimation data, and/or background noise data. The computing system may determine whether the first abstracted raw data is indicative of the first call being a suspected unsolicited or unwanted communication, based at least in part on the comparison. If so, the computing system may perform one or more tasks.

Auto switch-call center-based automated interface with voice switches for voice service diagnostics and provisioning

Novel tools and techniques are provided for implementing call center-based automated interface with voice switches for voice service diagnostics and provisioning. In various embodiments, in response to receiving a request by a call center user to access a voice service customer account, a computing system may access information regarding the voice service customer account that is stored in a database, may identify a switch that is configured to control voice service to a customer premises associated with the customer, based at least in part on the accessed information, and may autonomously access, from other databases, information associated with the voice service customer account. The computing system may integrate the accessed information, may generate and present a user interface (UI) displaying the accessed information, and may generate and present one or more options within the UI for the call center user to select to change features of the voice service.

Phone number list management

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for managing a phone number list are disclosed. In one aspect, a method includes the actions of receiving, by a computing device, telephone call data that reflects characteristics of telephone calls placed and received by a first user. Based on the telephone call data, the actions further include generating, by the computing device, a first telephone number whitelist for the first user. The actions further include determining, by the computing device, whether to combine the first telephone number whitelist and a second telephone number whitelist for a second user. The actions further include storing, by the computing device, the first telephone number whitelist or the combined telephone number whitelist in association with the first user.

FRAUDULENT CALL DETECTION

There is disclosed in one example a mobile telephone, including: a hardware platform including a processor and a memory; a telecommunication transceiver; and instructions encoded within the memory to instruct the processor to: identify a call made via the telecommunication transceiver; analyze the call and assign the call a predicted local reputation according to the analysis, including a legitimacy confidence score; if the legitimacy confidence score is less than a first threshold, terminate the call; if the legitimacy confidence score is greater than a second threshold, cease analysis of the call; and if the legitimacy confidence score is between the first and second thresholds, continue analysis of the call.

AUTOMATED ROBOCALL DETECTION

Novel tools and techniques are provided for implementing automated robocall detection. In various embodiments, a computing system may compare first abstracted raw data, obtained from a portion of call data from a first call from a first originating party, with each of a plurality of abstracted raw data, obtained from portions of call data from a plurality of calls from a corresponding plurality of originating parties. In some instances, the plurality of abstracted raw data and the first abstracted raw data may each include at least one of word count data, phoneme count data, inter-word timing data, voice pitch estimation data, and/or background noise data. The computing system may determine whether the first abstracted raw data is indicative of the first call being a suspected unsolicited or unwanted communication, based at least in part on the comparison. If so, the computing system may perform one or more tasks.

AUTO SWITCH - CALL CENTER-BASED AUTOMATED INTERFACE WITH VOICE SWITCHES FOR VOICE SERVICE DIAGNOSTICS AND PROVISIONING

Novel tools and techniques are provided for implementing call center-based automated interface with voice switches for voice service diagnostics and provisioning. In various embodiments, in response to receiving a request by a call center user to access a voice service customer account, a computing system may access information regarding the voice service customer account that is stored in a database, may identify a switch that is configured to control voice service to a customer premises associated with the customer, based at least in part on the accessed information, and may autonomously access, from other databases, information associated with the voice service customer account. The computing system may integrate the accessed information, may generate and present a user interface (UI) displaying the accessed information, and may generate and present one or more options within the UI for the call center user to select to change features of the voice service.

Managing an organization's brand identity, brand security, and brand reputation delivered by a communication network

The present invention relates to methods of managing brand identity, security, and reputation delivered by communications networks by monitoring calling party reputation data associated with an originating calling party identifier used on the communications network. In operation, a first inquiry received call is attempted with the originating calling party identifier received at a computing device that is configured with a receiving called party identifier. The computing device captures a plurality of calling party reputation data and communicates it to a number sentry server. If the first attempt fails a second attempt is executed to a different computing device and different receiving called party identifier on the same communication network. The plurality of calling party reputation data is saved, tracked, and analyzed at the number sentry server, and brand identity, security, and reputation reports associated with the originating calling party identifier are generated and available to authorized users.

PHONE NUMBER LIST MANAGEMENT

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for managing a phone number list are disclosed. In one aspect, a method includes the actions of receiving, by a computing device, telephone call data that reflects characteristics of telephone calls placed and received by a first user. Based on the telephone call data, the actions further include generating, by the computing device, a first telephone number whitelist for the first user. The actions further include determining, by the computing device, whether to combine the first telephone number whitelist and a second telephone number whitelist for a second user. The actions further include storing, by the computing device, the first telephone number whitelist or the combined telephone number whitelist in association with the first user.