H04M3/42153

Customization of emergency notifications for telecommunications services
10999651 · 2021-05-04 · ·

Certain aspects of the disclosure are directed to control of data communications services. According to a specific example, an apparatus is provided including one or more computer processor circuits configured and arranged to interface with remotely-situated client entities using a first programming language associated with a message exchange protocol between a data communications server and data sources, and to provide a database of communications services to the client entities. The apparatus further includes communications control circuitry configured and arranged to control communications routing for each respective client entity, by identifying, client-specific sets of control data derived from programming instructions received over the message exchange protocol and corresponding to a second programming language that is compatible with the first programming language, and providing the communications services to end-users of the client entity based on the client-specific sets of control data including particular routing functions for emergency notifications.

Intelligent user device management in a multi device environment

An incoming communication is received. For example, an incoming voice call is received for a user. A rule is applied to the incoming communication. The rule is based on sensor information associated with the user, presence information associated with the user, and a prior history of handling communications by the user. In response to applying the rule to the incoming communication, a method of notifying the user of the incoming communication is determined. For example, a voice call may be converted to a text communication where the user is notified via text. The incoming communication is routed to a user communication device of the user based on the rule.

System and method for intelligent call interception and fraud detecting audio assistant

A fraud analysis computing system is provided. The system includes a network interface configured to communicate data over a network and a processing circuit including one or more processors coupled to non-transitory memory. The processing circuit is configured to monitor incoming call data generated during an incoming call between a user and an incoming caller, detect a fraud trigger within the incoming call data, and complete a fraud interception activity in response to detection of the fraud trigger.

SYSTEM AND METHOD OF CONNECTING A CALLER TO A RECIPIENT BASED ON THE RECIPIENT'S STATUS AND RELATIONSHIP TO THE CALLER
20230412730 · 2023-12-21 ·

An example method comprising receiving a plurality of categories of availability statuses, receiving a plurality of categories of different contact groups, identifying, for each contact, at least one contact group, receiving a plurality of rules for call handling, each of the plurality of rules being associated with at least one of the different availability statuses and at least one of the different contact groups, receiving a telephone call from a first caller, identifying a caller identifier of the first caller, determining a contact group of the first caller, determining a current availability status of the recipient, identifying an applicable rule based on the contact group of the first caller and the current availability status of the recipient, selecting an audio prompt based on the applicable rule, and presenting the audio prompt to the first caller based on the applicable rule, the audio prompt indicating a preference of communication.

AUTOMATIC EVENT TRIGGERED BALANCE TOP-UP, MONEY TRANSFER, AND LOCATION BASED ADVERTISING PLATFORM
20210042785 · 2021-02-11 ·

This disclosure provides aspects and embodiments of methods, services, and platforms for prompting users with a zero account balance to send a callback message to a contact informing the contact that the user cannot call them and asking the contact to call the user. This disclosure further provides location determining platforms and rewards platforms for users.

SYSTEM AND METHOD FOR IDENTIFYING UNWANTED COMMUNICATIONS USING COMMUNICATION FINGERPRINTING

A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.

Message management methods and systems
10966063 · 2021-03-30 · ·

A communications device is disclosed. The communications device comprises a memory configured to store instructions and a processor configured to execute the instructions to receive data representing a message provided by a caller, determine at least an attribute of the message based on the received data, generate one or more options based on the attribute of the message, and present the one or more options to the caller to prompt the caller to take an additional action related to the message.

System and method for customizing inmate communication notification
10917241 · 2021-02-09 · ·

The present disclosure provides details of a system and method for customizing an inmate communication notification. Such a system provides an inmate different customized notification messages to be played to different called parties. The system includes a list of different contacts, and each of the contacts can be associated with one or more contact numbers. Each contact number is associated with one or more customized notification messages. The customized notification messages include terms, phrases, and sentences that draw the called party's attention and sound familiar to the called party. The customized notification messages include customized text files, audio files, and video files. An inmate chooses one or more customized notification messages to be played to a called party.

TOLL-FREE NUMBERS METADATA TAGGING, ANALYSIS AND REPORTING

A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.

SYSTEM AND METHOD FOR TALKBURST INITIATOR SELECTION OF TALKGROUP PARTICIPANTS
20210051449 · 2021-02-18 ·

In one aspect, a method for talkburst initiator selection of talkgroup participants is provided. A selection application may receive, from an initiator of a group call destined for a talkgroup, a talkburst associated with a set of rules. The set of rules may specify criteria for selection of participants of the talkgroup that should receive the talkburst. It may be determined which members of the talkgroup satisfy the criteria specified by the set of rules. The talkburst may be sent, wherein only talkgroup members that satisfy the criteria specified by the set of rule output the talkburst.