H04M3/2263

AutoMate - Automated Interface Between Call Center Agents and Network Orchestration Systems via Application Programming Interfaces (APIs)
20230048667 · 2023-02-16 ·

Novel tools and techniques are provided for implementing call center-based automated interface between call center agents and network orchestration systems, in some cases, via application programming interfaces (“APIs”). In various embodiments, an automated services platform may collect, from data sources, data associated with services provided by a service provider. The collected data may be autonomously analyzed to identify any issues with provisioning a service(s) to a customer. If so, one or more automation actions may be autonomously identified to address the determined issue(s). The automated services platform may autonomously send instructions to automation bots to perform the identified one or more automation actions, and may generate and present a UI on a user terminal operated by a user, the UI displaying information regarding at least one of the at least one issue, the affected service(s), the identified one or more automation actions, or the automation bots, and/or the like.

BASEBAND PROCESSOR AND METHOD FOR POWER SAVING BY ADJUSTMENT OF CLOCK RATE AND SUPPLY VOLTAGE
20180007631 · 2018-01-04 ·

The disclosure relates to a baseband processing method, comprising: receiving a downlink (DL) baseband (BB) signal in a transmission time interval (TTI), wherein the DL BB signal comprises a time-frequency resource comprising a control section and a data section; decoding at least part of the control section to detect a DL grant information; if the DL grant information is detected, determine a number of granted data resource blocks from the DL grant information; and adjust at least one of a clock rate and supply voltage of the baseband processing based on the number of granted resource blocks.

Toll-free telecommunications and data management platform

A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.

Toll-free numbers metadata tagging, analysis and reporting

A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.

Systems and methods for intercepting communications

Tangible, non-transitory, machine-readable media include instructions that cause a processor to receive a first indication that a user is attempting to communicate with a provider, and intercept communication between the user and the provider based on the first indication being received. The instructions also cause the processor to send user information to a provider application server based on the first indication being received, and display a visual interface that establishes communication with the relevant provider department or performs a transaction based on the first indication being received. The instructions further cause the processor to receive a second indication associated with performing the action associated with the provider via the visual interface; and performing the action based on the second indication being received.

SYSTEMS AND METHODS FOR TAGGING FRAUDULENT PHONE NUMBERS

A method including: receiving a user report dataset indicating fraudulent activity corresponding to a phone number; responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number; and tagging the record to identify the phone number as being associated with fraudulent activity.

SYSTEMS AND METHODS FOR PHONE NUMBER FRAUD PREDICTION

A method including: receiving one or more datasets indicating call activity corresponding to a phone number; analyzing the one or more datasets to identify unusual call activity; and generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.

Method and apparatus for determining performance indicator of communications network

The present disclosure provides a method and an apparatus for determining a performance indicator of a communications network. The method includes: acquiring bandwidth utilization rates, throughputs of GBR services, and throughputs of non-GBR services of multiple areas included in a communications network; determining load statuses of the multiple areas according to the bandwidth utilization rates of the multiple areas; determining rate requirements of the non-GBR services of the multiple areas according to the load statuses of the multiple areas, the throughputs of the GBR services of the multiple areas, and the throughputs of the non-GBR services of the multiple areas; determining rate requirements of the GBR services of the multiple areas; determining loads of the multiple areas according to the rate requirements of the GBR services and the rate requirements of the non-GBR services of the multiple areas; and determining a load-associated key performance indicator of the communications network.

INDIVIDUALIZATION OF MIGRATION BETWEEN TELEPHONY SYSTEMS
20170311052 · 2017-10-26 ·

Various technologies described herein pertain to controlling migration of a source endpoint in a source telephony system to a destination endpoint in a destination telephony system. The source endpoint is deactivated and the destination endpoint is activated as part of the migration. The migration of endpoints between the source telephony system and the destination telephony system can be performed in an individualized manner. Source information that specifies a state of the source endpoint is retrieved from the source telephony system and destination information that specifies a state of the destination endpoint is retrieved from the destination telephony system. Moreover, a validation is performed concerning whether the source endpoint is migratable to the destination endpoint based on the source information and the destination information. Subsequent to validating that the source endpoint is migratable to the destination endpoint, the migration is performed to deactivate the source endpoint and activate the destination endpoint.

IMPROVED CONTROL OF COMMUNICATION SERVICES MANAGEMENT
20220311862 · 2022-09-29 ·

A computer-implemented method, system and computer program product, implementing management of a telephony system comprising one or more PBX systems (PBX) having data repositories having entity information, a temporary data repository comprising entity information from entities in the PBX, and a management repository comprising site information. The method includes obtaining a rule matching entities explicitly defined in the PBX to sites not explicitly defined in the PBX, obtaining entity identifier; obtaining entity information using the entity identifier, comprising querying the temporary repository, applying the rule against the entity, to match a site with which the entity is associated, obtaining site information, and performing an action with respect to the entity based on the site information. Updates to device information to be persistently available is implemented in the data repository of the PBX, and content of the temporary data repository is periodically replaced with data obtained from the data repositories