H04M3/4365

IDENTIFYING CALLER DETAILS FOR PROMOTIONAL VOICE COMMUNICATION

Origin information for promotional calls is provided by recording caller numbers for parties making the promotional calls; and receiving subscriber numbers for receiving the promotional calls. The subscribers numbers are stored in a database that also includes approved content for the promotional calls to be received by the subscriber. Caller numbers and approved content are matched for the subscriber with a call scrubber including a disturbed ledger. The distributed ledger recording a caller designation attached to the caller numbers indicative of a type for the promotional call. A promotional call is received by the subscriber. The caller identification for the subscriber indicates both the caller numbers and the caller designation that is indicative of the type for the promotional call.

Robocall screening
11601547 · 2023-03-07 · ·

Embodiments may provide techniques to screen for, detect, and prevent connection of robocalls. For example, in an embodiment, a method, implemented in a computer system comprising a processor, memory accessible by the processor, and computer program instructions stored in the memory and executable by the processor, may comprise receiving, at a telecommunications switch, a request to initiate a call from an originating party, selecting, at the telecommunications switch, from a list of terminating carrier networks, a media server, routing, at the telecommunications switch, the request to initiate the call to the media server, forwarding, from the media server, a media prompt requesting the originating party to enter a response to the media prompt, and when the originating party does not enter a correct response to the media prompt, forwarding, from the media server, an indication that the call is forbidden.

SYSTEMS AND METHODS FOR PROVIDING CALLING PARTY INFORMATION

System and methods for providing calling party information are disclosed. In one implementation, a server for providing calling party information includes one or more processors configured to receive a query for calling party information from a carrier. The query includes an identifier associated with the calling party. The processors are further configured to determine a score based on one or more previously obtained queries, generate the calling party information based on the score, and transmit the calling party information to the carrier. The carrier transmits the calling party information to a device associated with the called party as a Caller ID Name (CNAM).

Call screening service for communication devices

One example method of operation may include collecting call metric data over a predefined period of time for identified calls, querying the call metric data to identify whether one or more call filtering criteria parameters require changes, determining one or more call filtering criteria parameters require changes based on a deviation from one or more expected call metric data values included in the call metric data, modifying one or more of the call filtering criteria parameters, and updating an active call scam model stored on a call processing server based on the one or more call filtering parameters.

ENHANCED CALL CONTENT DELIVERY WITH MESSAGE CODE
20220329637 · 2022-10-13 ·

One example method may include identifying a call notification of a call intended for a mobile device, retrieving call data having a code object identifier with the call notification, forwarding the call data with a code object to the mobile device based on the code object identifier prior to forwarding the call, and forwarding the call to the mobile device.

INTERCEPTING AND CHALLENGING UNWANTED PHONE CALLS
20230164267 · 2023-05-25 ·

A call challenger can receive a user input from a called party identity to opt-in to a call challenge service, and a second user input of a keyword. When the call challenger receives a call directed to a user equipment of the called party identity, the call challenger can prompt the calling party to provide an audible response. In response to a receipt of the audible response, the call challenger can convert the audible response to a text. The call challenger can compare the text with the keyword to determine if there is a sufficient match. In response to the determining the output of the comparing does not satisfy a threshold match score, the call challenger can prevent the call from connecting with the user equipment.

PROVIDING HEALTH URGENCY CONTEXT FOR INCOMING CALLS

A computing device may receive, from a remote computing device, a request to establish a communication session with the remote computing device and contextual information indicative of an urgency level of the communication session. The computing device may output, at one or more output devices, the contextual information indicative of the urgency level of the communication session and at least one of: haptic output or an audible alert that indicates the request to establish the communication session.

DEVICE, SYSTEM AND METHOD FOR SELECTING CALLS FOR FORWARDING TO A COMMUNICATION DEVICE

A device, system and method for selecting calls for forwarding to a communication device is provided. An automated call-answering device answers a plurality of calls associated with an incident. The device assigns, to the plurality of calls, questions associated with the incident, each of the questions assigned to at least two of the plurality of calls. The device asks the questions on the plurality of calls, as assigned. The device receives answers to the questions. The device selects a call to be forwarded to a communication device operated by a human user, the call selected from a group of the plurality of calls where one or more consistent answers were received in response to a given question, the call further selected based on voice attributes of callers in the group of the plurality of calls. The device forwards, to the communication device, the call as selected.

CALL CONTENT MANAGEMENT FOR MOBILE DEVICES

One example method of operation may include identifying a call to a mobile device, determining whether the call includes call content data intended for the mobile device, initiating an active session and a time to live (TTL) associated with the call content data, forwarding the call content data to the mobile device when the call includes call content data associated with the caller, and receiving a content confirmation from the mobile device that the call content data was received.

Voice and video watermark for exfiltration prevention

A legitimate voice or video communication application modifies data in a communication session to produce a watermark. The watermark is a piece of information that is part of a communication session that is not readily observable, but can be verified later on. The purpose of a watermark is to verify that the communication session is a legitimate communication session and does not pose a security breach. The video or audio communication session is monitored for a watermark. In response to determining that the communication session contains the watermark, the communication session is allowed continue. In response to determining that the communication session does not contain the watermark, the communication session is identified as a potential security breach. If the communication session is identified as a potential security breach, the communication session can be dropped and a user can be notified of the potential security breach.