Patent classifications
H04M3/42178
Automatic activation of the configuration of a communication terminal
A method of automatically activating a configuration of a communication terminal, which is customised according to a current user of the terminal. The method implements the following: identifying, at a current time, the current user in possession of the terminal; retrieving parameterization information of the terminal which has been predefined by the identified current user; retrieving usage data of at least one communication terminal having been used by the current user prior to the current time, according to the retrieved parameterization information of the terminal; and configuring the terminal that the current user has in possession, using the retrieved usage data.
SAFETY OF A MOBILE COMMUNICATIONS DEVICE
Systems and methods for improving safety of a multi-function portable personal communications device can include determining a first position of the personal communications device, after a predetermined time interval, determining a second position of the personal communications device, determining the distance between the first position and the second position, determining the time interval in which the personal communications device moved from the first position and the second position, calculating an average velocity of the personal communications device based on the first position, the second position and the time interval and, if the average velocity of the personal communication device exceeds a predetermined value, sending an alert or inhibiting a function of the personal communications device. Other systems and methods that improve safety are also disclosed.
Facilitating software downloads to internet of things devices via a constrained network
Software downloads to Internet of things (IoT) devices are facilitated over a constrained network. In one embodiment a method comprises monitoring, by a network device comprising a processor, data determined to have been sent to a device for transmission to the device via a radio access network device of a wireless communication network, and determining, by the network device, a type of traffic associated with the data. The method further includes based on a determination that the data comprises firmware and that the type of traffic is of a traffic priority that is lower than a defined traffic priority, applying, by the network device, a low priority transport protocol to the data, wherein the applying comprises associating protocol information with the data representative of the low priority transport protocol.
TOLL-FREE NUMBERS METADATA TAGGING, ANALYSIS AND REPORTING
A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.
TOLL-FREE TELECOMMUNICATIONS AND DATA MANAGEMENT PLATFORM
A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.
Distributed implementation of dynamic wireless traffic policy
A method of buffering application data operable at a delivery control server is provided. Related systems and computer program products are also provided.
Use of Identity Data Associated with a Device for Directing Communications to Another Device
Methods and systems for using and/or storing identity data associated with a device to direct communications to another device are described herein. A server may store identity data, such as subscriber identity module (SIM) data, associated with a device or user. The SIM data may be used to authenticate and/or register the device or user with a mobile network. Using the SIM data, other devices may use the capabilities of the first device. The server may receive, from another device, a request to access one or more capabilities of the first device. Based on the request, the server may send a request to register the SIM data with a mobile network. After registration of the SIM data with the mobile network, the server may be used to direct communications to the other device.
SYSTEM AND METHOD FOR ADDING CONTENT TO CONTACT CENTER INTERACTIONS
A system and method are presented for the addition of content to contact center interactions. An interaction is routed to an agent in the contact center environment. The interaction is routed through one or more providers of embedded client applications. Providers may be a first party, a DSL provider, or a programmatic provider. The provider triggers a user interface which displays one or more specified embedded client applications to the agent and when the agent selects one of the applications, it is asynchronously loaded through an inline frame.
Networked contact center user interface approach
This document is directed to, among other things, communication systems involving networked contact center interfaces. One example method includes presenting a frame on a user interface to present information in a selectable format. Another example method includes using a circuit device to detect selection of a frame as displayed and causing display of further graphical information in an un-selectable format.
ARRANGEMENTS FOR DETECTING BI-DIRECTIONAL ARTIFICIAL INTELLIGENCE (AI) VOICE COMMUNICATIONS AND NEGOTIATING DIRECT DIGITAL COMMUNICATIONS
Arrangements for automatically detecting bi-directional artificial intelligence (AI) communications and automatically negotiating (i.e., switching to alternative) direct digital communications.