H04M1/571

Method and device for managing incoming calls in a communication terminal

A method for managing an incoming call in a communication terminal is described, the incoming call having an associated call identifier. The method can comprise checking the routing of an outgoing call to the call identifier associated with the incoming call, and classifying the incoming call on the basis of the result of the checking of the routing, the incoming call being classified as a malicious incoming call if the checking of the routing reveals that the outgoing call is not able to be routed. The method can be used, for example, to detect malicious calls or spam.

SIGNALING STORM BLOCKING METHOD, APPARATUS, AND DEVICE, AND STORAGE MEDIUM
20220131966 · 2022-04-28 ·

Embodiments of this application provide a signaling storm blocking method, apparatus, and device, and a storage medium, and belong to the field of network technologies. The method includes: obtaining traffic statistics information, where the traffic statistics information is statistics and output information of a traffic performance indicator; detecting a signaling storm based on the traffic statistics information; when the signaling storm is detected, obtaining a call history record (CHR) log of at least one user equipment UE, where the CHR log is a log file used to record a problem that occurs in a call process of a user; determining a target UE based on the CHR log of the at least one UE, where the target UE is a UE that generates signaling causing the signaling storm; and performing signaling blocking on the target UE.

SYSTEMS AND METHODS FOR PROVIDING CALLER IDENTIFICATION OVER A PUBLIC SWITCHED TELEPHONE NETWORK
20230291833 · 2023-09-14 · ·

A system and method of providing caller identification (ID) over a public switched telephone network (PSTN). For outbound calls, the system and method enable a caller to provide a caller ID that differs from the native caller ID of their mobile phone. The system and method enable multiple phones tied to a single account to display the same caller ID for outbound calls. For forwarded inbound calls, such as calls being forwarded from an office, the system and method inform the recipient of the identification of the call as well as that the call is being forwarded. The system and method enable the recipient to have calls forwarded from more than one number and identify the identity of the caller as well as the specific number the call is being forwarded from.

METHOD AND DEVICE FOR MANAGING INCOMING CALLS IN A COMMUNICATION TERMINAL

A method for managing an incoming call in a communication terminal is described, the incoming call having an associated call identifier. The method can comprise checking the routing of an outgoing call to the call identifier associated with the incoming call, and classifying the incoming call on the basis of the result of the checking of the routing, the incoming call being classified as a malicious incoming call if the checking of the routing reveals that the outgoing call is not able to be routed. The method can be used, for example, to detect malicious calls or spam.

Mobile-device-based carrier voicemail reduction
11089153 · 2021-08-10 ·

A mobile device having phoning capabilities also include capabilities to optionally reduce an operating load on a centralized mobile carrier voicemail system. The user of the mobile device is presented with a notification of an incoming call and is provided with an opportunity to answer the call in a traditional fashion, to optionally engage the centralized mobile carrier voicemail system, or to instead have the mobile device manage options relating to locally obtaining a voicemail from a maker of the incoming call. When the mobile device manages obtaining a voicemail from the maker of the incoming call, the voicemail is originally obtained and is stored locally, without use of centralized carrier resources at the time of recording the voicemail, and the mobile device can also play the recorded voicemail at any time without use of the centralized carrier resources.

Mobile-Device-Based Carrier Voicemail Reduction
20200112635 · 2020-04-09 ·

A mobile device having phoning capabilities also include capabilities to optionally reduce an operating load on a centralized mobile carrier voicemail system. The user of the mobile device is presented with a notification of an incoming call and is provided with an opportunity to answer the call in a traditional fashion, to optionally engage the centralized mobile carrier voicemail system, or to instead have the mobile device manage options relating to locally obtaining a voicemail from a maker of the incoming call. When the mobile device manages obtaining a voicemail from the maker of the incoming call, the voicemail is originally obtained and is stored locally, without use of centralized carrier resources at the time of recording the voicemail, and the mobile device can also play the recorded voicemail at any time without use of the centralized carrier resources.

SCAM CALL BACK PROTECTION
20200053205 · 2020-02-13 · ·

When an application server receives an invite message associated with a call from an originating user equipment (UE) to a terminating UE, the application server can determine if one of the originating UE or the terminating UE is associated with a scammer. If the originating UE is associated with a scammer, the application server can remove the scammer's caller identification (ID) information from the invite message, such that a user of the terminating UE cannot use that caller ID information to make a return call to the scammer. If the terminating UE is associated with a scammer, the application server can remove caller ID information associated with the originating UE from the invite message to hide the calling party's information from the scammer, and/or invoke playback of a scam announcement to the originating UE to warn the calling party that they are calling a scammer.

Telephonic privacy systems
10547738 · 2020-01-28 ·

Methods and devices for protecting telephone privacy are provided. Privacy is provided by altering the pitch of a person's voice, recording the call, changing caller ID information, routing a call straight to voicemail, playing background sounds during the call, call forwarding, and messaging. The various privacy mechanisms can be performed alone, or in combination with certain triggers, such as receiving a call from a certain number, dialing a call to a certain number, transmitting caller ID information with a certain number, or contacting a certain dial-in number of a call handling system.

Scam call back protection
10542137 · 2020-01-21 · ·

When an application server receives an invite message associated with a call from an originating user equipment (UE) to a terminating UE, the application server can determine if one of the originating UE or the terminating UE is associated with a scammer. If the originating UE is associated with a scammer, the application server can remove the scammer's caller identification (ID) information from the invite message, such that a user of the terminating UE cannot use that caller ID information to make a return call to the scammer. If the terminating UE is associated with a scammer, the application server can remove caller ID information associated with the originating UE from the invite message to hide the calling party's information from the scammer, and/or invoke playback of a scam announcement to the originating UE to warn the calling party that they are calling a scammer.

Systems and methods for real-time scam protection on phones

The disclosed computer-implemented method for using electronic text information to automatically determine untrustworthy voice calls, at least a portion of the method being performed by a computing device comprising at least one processor, may include (1) during a voice call, receiving, by the computing device, text information representing contents of the voice call, (2) analyzing, by the computing device, the text information representing the contents of the voice call, (3) determining, by the computing device, that the voice call is untrustworthy based on the analysis of the text information, and (4) during the voice call, advising a recipient of the voice call of the determination that the voice call is untrustworthy. Various other methods, systems, and computer-readable media are also disclosed.