Patent classifications
H04M3/42357
Presence-based notification system
Techniques for notifying multiple recipient devices of a communication request are described. The system may determine a score corresponding to each of the recipient devices and may notify the devices based on the score. The system may cause a first recipient device to output a notification for the communication request for a duration of time. After the duration of time elapses, the system may cause a second recipient device to output a notification for the communication request.
SYSTEM AND METHOD FOR USING A MOBILE DEVICE AS AN INPUT DEVICE FOR SURVEYS AT A LIVE EVENT
A method is provided for interacting with audience members in an event, each of the potential attendees having available thereto a unique identifier. The method comprises creating, for an attendee, a unique ID (UID) on a mobile wireless device (MWD) by the steps of inputting to the MWD one of the unique identifiers, combining the obtained unique identifier with a UID time stamp at the time of creation of the UID; receiving with a server on a first wireless channel communications from the MWD; registering the UID at the physical location of the event; generating a visual query; displaying on the MWD response indicators; receiving at the server from the registered attendee a response, to the query over the first wireless channel; and storing in a database on the server the received response in association with the displayed query.
EMERGENCY CALL SYSTEM, EMERGENCY CALL METHOD, AND PROGRAM
An emergency notification system includes: an emergency notification control device 10 that notifies an emergency institution of an emergency notification from an emergency notification agency; and a reception base that receives the emergency notification. The emergency notification control device includes a registration list in which the emergency notification agency is registered and a filtering unit that transmits only the emergency notification from the emergency notification agency registered in the registration list to the emergency institution, and the reception base receives the emergency notification transmitted by the filtering unit.
METHOD TO DETERMINE THE QUALITY OF CIVIC ADDRESS PRODUCED BY REVERSE GEOCODER
Systems and methods are provided for determining the quality of a civic address produced by a reverse geocoder, utilizing the uncertainty of a geodetic location and a distance between the geodetic location and a geocoded location (i.e., a civic address) determined by the reverse geocoder. Upon receiving a request by a PSAP for a civic address corresponding to a UE initiating a call for emergency services, a node initially identifies a geodetic location of the UE and an uncertainty of the geodetic location. The node initiates an API call to a reverse geocoder API. The node receives a geocoded location corresponding to the geodetic location and compares the geocoded location to the geodetic location to determine a distance between them. Based on the uncertainty of the geodetic location and the distance between the geodetic location and the geocoded location, a quality of the civic address is determined.
SYSTEMS AND METHODS FOR JIP AND CLLI MATCHING IN TELECOMMUNICATIONS METADATA AND MACHINE-LEARNING
Embodiments described herein provide for systems and methods for verifying authentic JIPs associated with ANIs using CLLIs known to be associated with the ANIs, allowing a computer to authenticate calls using the verified JIPs, among various factors. The computer builds a trust model for JIPs by correlating unique CLLIs to JIPs. A malicious actor might spoof numerous ANIs mapped to a single CLLI, but the malicious actor is unlikely to spoof multiple CLLIs due to the complexity of spoofing the volumes of ANIs associated with multiple CLLIs, so the CLLIs can be trusted when determining whether a JIP is authentic. The computer identifies an authentic JIP when the trust model indicates that a number of CLLIs associated with the JIP satisfies one or more thresholds. A machine-learning architecture references the fact that the JIP is authentic as an authentication factor for downstream call authentication functions.
Ring and hardware characteristic identification techniques to identify call devices
A voice communications computer system (“VCCS”) receives a ring signal from a call device having unverified device identification data. The VCCS identifies an audible frequency component and an electronic frequency component of the ring signal. The VCCS identifies a device identification characteristic or a geographic location characteristic based on the audible or electronic frequency components, and identifies a stored identification characteristic associated with the device identification data. Based on a comparison of the stored identification characteristic with the device identification characteristic or geographic location characteristic, the VCCS generates fraud estimation data. In some cases, the VCCS generates call status data based on the fraud estimation data. The VCCS provides the fraud estimation data or the call status data to a user interface device, which is configured to display data or perform a call action for a call associated with the ring signal.
Automatic Aftercall Directory And Phonebook Entry Advertising
This disclosure provides methods, services, and platforms that automatically prompt mobile phone users to add contact information to their phone book after a triggering event such as calling a phone number. The methods, services, and platforms allow mobile network operators to provide a service that allows businesses to potentially have their numbers added to the phonebook of a mobile phone after a disconnected call.
Detection of Spoofed Calls Using Call Header
Implementations described herein relate to methods, systems, and computer-readable media to label incoming phone calls. A method to label an incoming phone call includes detecting the incoming phone call associated with a caller identifier (ID), determining a location associated with the call, and analyzing a call header of the call to determine one or more call characteristics. The method further includes determining, based on the location and the call characteristics, if the location is spoofed and determining, based on the caller ID and the call characteristics, if an access network associated with the call is spoofed. The method further includes applying a trained machine learning model to determine whether the call is a robocall. The method further includes assigning a label to the call that indicates whether the call is a spoofed call or is the robocall and sending the label to a callee device associated with the call.
ELECTRONIC DEVICE FOR DETECTING SPAM CALL AND METHOD OF OPERATING THE SAME
A server may include a communication circuit and at least one processor. The at least one processor may be connected to a first electronic device and a second electronic device, using the communication circuit, and may be configured to: obtain first call log information including at least one outgoing call made using a call function of the first electronic device by the second electronic device, determine whether the second electronic device satisfies a first condition for determining that the second electronic device is a spam caller, based on the first call log information, search for one or more external electronic devices located around the second electronic device, based on the first condition being satisfied, obtain second call log information about the one or more external electronic devices, and determine at least one of the one or more external electronic devices or the second electronic device as a spam caller, based on the second call log information.
RING AND HARDWARE CHARACTERISTIC IDENTIFICATION TECHNIQUES TO IDENTIFY CALL DEVICES
A voice communications computer system (“VCCS”) receives a ring signal from a call device having unverified device identification data. The VCCS identifies an audible frequency component and an electronic frequency component of the ring signal. The VCCS identifies a device identification characteristic or a geographic location characteristic based on the audible or electronic frequency components, and identifies a stored identification characteristic associated with the device identification data. Based on a comparison of the stored identification characteristic with the device identification characteristic or geographic location characteristic, the VCCS generates fraud estimation data. In some cases, the VCCS generates call status data based on the fraud estimation data. The VCCS provides the fraud estimation data or the call status data to a user interface device, which is configured to display data or perform a call action for a call associated with the ring signal.