Patent classifications
H04M3/42102
System, method, and apparatus for virtualizing digital assistants
A system and method for providing anonymous communications from a user to a called party includes obtaining a dedicated phone number and creating a user account for the user and assigning the dedicated phone number to the user account. A provider account is created for a digital assistant using the dedicated phone number and the digital assistant is preprogrammed with the user account. The digital assistant is also preprogrammed with a skill for recognizing a specific utterance (e.g. “Call”). Connectivity is provided between the digital assistant and the Internet, for example, using a wireless access point. The digital assistant listens for the specific utterance and, upon recognizing the specific utterance followed by an identification of the called party, the digital assistant initiates a voice call through the Internet to the called party.
Systems and methods for providing caller identification over a public switched telephone network
A system and method of providing caller identification (ID) over a public switched telephone network (PSTN). For outbound calls, the system and method enable a caller to provide a caller ID that differs from the native caller ID of their mobile phone. The system and method enable multiple phones tied to a single account to display the same caller ID for outbound calls. For forwarded inbound calls, such as calls being forwarded from an office, the system and method inform the recipient of the identification of the call as well as that the call is being forwarded. The system and method enable the recipient to have calls forwarded from more than one number and identify the identity of the caller as well as the specific number the call is being forwarded from.
SYSTEMS AND METHODS FOR PHISHING MONITORING
Disclosed are methods and systems for voice phishing monitoring. For instance, a method includes receiving voice data of an incoming call to a communication device from an application associated with a user account and executing on the device, identifying an entity and interaction allegedly associated with the incoming call from the voice data, determining first fraud indicator data based on a number of the incoming call and second fraud indicator data based on a correspondence of user account interaction data to the entity and/or interaction, and providing the voice data to a trained machine learning system to receive third fraud indicator data based on content and/or a voice characteristic identified from the voice data. The method may further include determining a status for the incoming call of fraudulent or confirmed based on the first, second, and third fraud indicator data, and generating a notification indicating the status for display.
SYSTEM AND METHOD FOR PROVIDING TELEPHONE EVENT DATA
A system and method for providing telephone event data are described. The system comprises a communications module; a processor coupled to the communications module; and a memory coupled to the processor, the memory storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module and from a telco server, telephone event data; translate at least a portion of the telephone event data into a format compliant with a particular application executing on a computing device; and send, via the communications module and to the computing device executing the particular application, the translated portion of the telephone event data.
Communication method for processing crank call
The disclosure provides a communication method. The method includes: receiving a call request forwarded by an operator server, the call request being sent by a calling terminal to the operator server; generating a transferring instruction in response to the call request being a crank call; and sending the transferring instruction to the operator server, such that the operator server establishes a call connection between the calling terminal and a smart device based on the transferring instruction.
Techniques for vetting inbound calls in a telecommunication network
Techniques are described for vetting unwanted calls. At an inbound customer call handling apparatus, a SIP INVITE is received from a destination carrier servicing the inbound customer intended for a destination user agent (UA) device of the inbound customer. The SIP INVITE includes a current origination identifier (ORIG ID) comprised of a fixed length character string. The call handling apparatus accesses a database of stored ORIG ID character strings, each stored ORIG ID character string in the database having been included with a previous SIP INVITE that has been previously associated with an unwanted inbound call. The call handling apparatus analyzes the current ORIG ID character string to determine if it matches any stored ORIG ID character strings in the database. When there is a match to a stored ORIG ID character string, the SIP INVITE is not forwarded to the destination UA device. Otherwise, it is forwarded to the destination UA device.
Automatic Aftercall Directory And Phonebook Entry Advertising
This disclosure provides methods, services, and platforms that automatically prompt mobile phone users to add contact information to their phone book after a triggering event such as calling a phone number. The methods, services, and platforms allow mobile network operators to provide a service that allows businesses to potentially have their numbers added to the phonebook of a mobile phone after a disconnected call.
SYSTEM AND METHOD FOR INTERRUPTING AN INCOMING UNWANTED CALL ON A MOBILE DEVICE
A method of interrupting an incoming call on a mobile device includes: intercepting an incoming telephone call received by a mobile device; determining one or more parameters of the intercepted telephone call; determining if the intercepted telephone call matches one or more telephone calls associated with a list of prohibited phone numbers by comparing the determined parameters of the intercepted call with parameters of the one or more telephone calls associated with the list of prohibited phone numbers; and in response to determining a match between the intercepted telephone call and the one or more telephone calls associated with the list of prohibited phone numbers: blocking reception of the intercepted telephone call; identifying a calling party associated with the intercepted telephone call; sending an authentication request to the identified calling party; and interrupting the intercepted telephone call in response to unsuccessful authentication.
TELEPHONE ADVERTISEMENT SYSTEM, TELEPHONE ADVERTISEMENT METHOD, AND COMPUTER READABLE MEDIUM STORING TELEPHONE ADVERTISEMENT PROGRAM
A telephone advertisement system acquires, in response to receiving a telephone talk request from a caller to a callee, callee information indicating a callee from a caller terminal device of the caller. The telephone advertisement system acquires, based on the acquired callee information, advertisement content associated with a condition corresponding to an attribute of the callee among a plurality of pieces of advertisement content, each of the plurality of piece of advertisement content associated with a condition of a person to whom respective advertisement content is presented, the condition of the person stored in a predetermined storage. The telephone advertisement system transmits the acquired advertisement content to the caller terminal device to cause the caller terminal device to present the advertisement content within an invitation period during which the callee is being invited to answer an incoming call.
Cloud-based assistive services for use in telecommunications and on premise devices
Cloud-based assistive services for use in telecommunications and on premise devices are disclosed herein. An example method includes: operating in a monitoring state to actively monitor for a first predetermined action, receiving an audio stream based on communications between a first party and a second party, identifying the first predetermined action, establishing one- or two-way communications with any of the first party or the second party in response to the first predetermined action, determining a request for the intelligent personal assistant service in the one- or two-way communications, generating a result by the intelligent personal assistant service, the result being responsive to the request, providing the result to any of the first party and the second party, receiving a second predetermined action from any of the first party and the second party, and returning the intelligent personal assistant service to the monitoring state based on the second predetermined action.