H04M3/42059

Caller identification information analyzer

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a caller identifier are disclosed. In one aspect, a method includes the actions of receiving, by a server and from a user of a computing device, data indicating a request to update a name that corresponds to a phone number in a caller identification information storage. The actions further include accessing, by the server, a calling history that indicates previous telephone calls of the phone number. The actions further include accessing, by the server, identification data of the user. The actions further include based on the calling history that indicates previous telephone calls of the phone number and the identification data of the user, determining whether to update the caller identification information storage to indicate that the name corresponds to the phone number.

DELAYED INTERACTIVE AUTO ATTENDANT

Aspects of the subject disclosure may include, for example, a method of receiving, by a processing system including a processor, a call for a subscriber; determining, by the processing system, that the call is from an interactive voice response (IVR) system; determining whether the IVR system is providing a query that requires a response; and responsive to a first determination that the IVR system requires the response, providing the response. Other embodiments are disclosed.

Method and device for filtering a communication
11659084 · 2023-05-23 · ·

A method for filtering an original communication, being generated by a caller device toward a called device, and identified by an uncertified caller identity and by at least one certified caller identity. The method includes: verifying a condition satisfied if the uncertified caller identity and the at least one certified caller identity are different; and if the condition is satisfied, detecting expiry of a waiting duration following the verification, this duration being equivalent to the duration of at least one ring; and following the expiry and if no message is detected indicating the end of the original communication, presenting to the called device the original communication with at least one caller identity from among the uncertified caller identity and the at least one certified caller identity, the original communication not being presented to the called device before the detection.

Handling calls on a shared speech-enabled device

In some implementations, an utterance that requests a voice call is received, the utterance is classified as spoken by a particular known user, the particular known user is determined to be associated with a personal voice number, and in response to determining that the particular known user is associated with a personal voice number, the voice call is initiated with the personal voice number.

Method and device for redirecting a communication request
11622045 · 2023-04-04 · ·

A method for redirecting a communication request sent by a caller terminal to a called terminal, an identifier of the caller terminal being absent from a list of identifiers of caller terminals for which the establishment of a communication with the called terminal is authorized or blocked, referred to as a white list or black list, respectively. The method includes: redirecting the communication request to a redirection terminal associated with the called terminal, distinct from the called terminal; receiving an instruction message, including the identifier of the caller terminal and an instruction relating to the white list or to the black list, depending on the instruction received, adding the identifier of the caller terminal to the white list or to the black list.

CALL SCREENING SERVICE FOR INBOUND COMMUNICATIONS
20230143977 · 2023-05-11 ·

One example method of operation may include receiving a call message intended for a call recipient, removing one or more portions of call message data included in the call message, identifying one or more of a trunk group and an entry point associated with the received call message, adding one or more of a trunk group identifier (TGRP) and a universally unique identifier (UUID) to the call message to create a modified call message, and forwarding the modified call message to a destination network associated with the call recipient.

METHODS, SYSTEMS, AND DEVICES FOR MASKING CONTENT TO OBFUSCATE AN IDENTITY OF A USER OF A MOBILE DEVICE

Aspects of the subject disclosure may include, for example, identifying a first user associated with a first mobile device, and determining a first user type associated with the first user. Further embodiments can include identifying a first identity associated with the first user based on the first user type and identifying a second identity associated with the first user based on the first user type. Additional embodiments can include providing first alternate content to the first mobile device to mask the first identity and providing second alternate content to the first mobile device associated with the second identity. Other embodiments are disclosed.

System and method for limiting incoming spam calls

A system and method for maintaining a grey list for controlling incoming calls from numbers on a telephone network. Information associated with previous calls received by the telephone is stored in the form of a grey list. The stored information includes an indication of whether each of the previously received calls passed a previous challenge. Based on the stored information, when an incoming call is received, a determination is made whether the incoming call corresponds to a call that passed a previous challenge. The incoming call connected to the telephone if the stored information indicates that the incoming call previously passed a challenge. An action is taken if the stored information does not indicate that the incoming call previously passed the challenge. The action may include blocking the call, allowing the call or providing a current challenge to the call.

Call traffic data monitoring and management
11652919 · 2023-05-16 · ·

One example method of operation may include identifying one or more call parameters associated with each of a number of calls received over a fixed period of time, assigning scores to each of the calls based on the one or more identified call parameters for each of the plurality of calls, assigning one or more of the calls to a scam call category based on the assigned scores, and responsive to the assigning of the one or more of the calls to a scam call category, determining whether a number of remaining calls of the calls, which are not assigned to the scam call category, have increased or decreased beyond a deviation margin of a target percentage of calls.

Using automatically collected device problem information to route and guide users' requests
11652918 · 2023-05-16 · ·

A system and method for providing assistance to a customer of a computing device. In one aspect, an incoming call is received from a device of a customer; a check for identification of the customer is done; an event history of the device is obtained; and a solution is provided to the customer using the event history. In another aspect, a method includes: receiving a code from a mobile computing device; and in response to receiving the code, calculating at least one set of data for use in guiding a request of a customer for service to a resource that can provide a suggested remedy. In another aspect, a method includes: identifying a user associated with a mobile computing device; determining an event history of the mobile computing device; and providing guidance to resolve an issue based on the event history.