Patent classifications
H04M3/42076
ADDITIONAL INFORMATION ON A CALLER
To provide a called one with information on the caller, a reference to a resource containing real-time or near-real-time information relating to the caller, or information deduced using the real-time or near-real-time information, or the real-time or near-real-time information, or the information deduced using the real-time or near-real-time information, is transmitted with a connection establishment request, and the information in the resource or the received information is displayed to the called one before the requested connection is established so that the called one can make a decision whether or not to answer the call.
ESTABLISHING AND MANAGING CONNECTIONS FOR REAL TIME COMMUNICATIONS
Methods and systems related to supporting real time communications are disclosed. In one type of a real time communication session, prior to an offer and acceptance to perform real time communications, a communication channel may be established between a caller device and a callee device. Information related to addresses of the caller and callee devices can be contained in, or pointed to, by a Universal Resource Locators (URLs) for the caller and callee devices. A network computing device may communicate messages relating to establishing and maintaining the communication channel between the caller and callee devices. In a scenario where the network computing device becomes unavailable, another network computing device can use the URLs and other channel information that may be stored in the database, to handle messages.
INTELLIGENTLY VERIFYING TELEPHONE CALLS USING AUTHENTICATED IDENTITY INFORMATION
Telephone calls can be automatically verified by a telecommunication system using identity information about the caller. For example, a telecommunication system can receive a communication associated with a caller requesting to make a telephone call to a recipient. The communication can include a reference to a security certificate. The telecommunication system can access the security certificate, the security certificate having a public key and a document identifier. The telecommunication system can retrieve identity information from a storage location using the document identifier. In response to verifying the identity information using the public key, the telecommunication system can flag the caller as verified.