Patent classifications
H04M3/42008
COMPUTER-IMPLEMENTED DETECTION OF ANOMALOUS TELEPHONE CALLS
Computer-implemented detection of anomalous telephone calls, for example detection of interconnect bypass fraud, is disclosed. A telephone call associated with user devices is analyzed remote from the user devices. A first set of multiple features, for example Mel Frequency Cepstral Coefficients, is derived from a call audio stream. The first set is converted to an embedding vector, for example via a model based on a Universal Background Model comprising a Gaussian Mixture Model, which model is preferably configured based on a training plurality of first sets of multiple features derived form a corresponding training plurality of audio streams. Occurrence, or probability of occurrence, of an anomalous telephone call is determined based on the embedding vector, for example via a back-end classifier, such as a Gaussian Backend Model, which classifier is preferably configured based on labels associated with the training plurality of audio streams.
TRACKING DEVICE LOCATION AND COORDINATION
Communication between an owner of a lost tracking device and a finder of a lost tracking device is established. A tracking system receives an identifier of a tracking device and a request for a web page from a mobile device that has captured an image of a smart code on the tracking device. The smart code is embedded with a URL to the web page. The system displays the web page on the mobile device and prompts the user to provide a location of the mobile device. The location is associated with the identifier of the tracking device. A notification indicating the location of the tracking device is generated for the owner. The owner is prompted to provide information to establish contact with the finder of the device, and the web page is populated with the owner's provided information for display on the finder's mobile device.
COMMUNICATION USING VIRTUAL NUMBERS
Examples disclosed herein involve receiving a request from a calling device to establish a communication session between a mobile device and the calling device, the mobile device assigned a virtual telephone number, retrieving location information corresponding to a location of the mobile device from a location register, and sending a redirect to a session border controller (SBC) to establish the communication session between the calling device and the mobile device based on the location information.
ROUTING A TELEPHONE CALL TO AN ALIAS VOICEMAIL SYSTEM
A method for establishing a telephone communication between a first terminal and a second terminal. The first and second terminals each have a main caller identifier, and the second terminal additionally has a secondary caller identifier. This method is implemented when the user of the first terminal seeks to communicate with the user of the second terminal by using the secondary caller identifier of the second terminal. The method allows redirecting the telephone call of the first terminal to a voicemail system associated with the secondary caller identifier when the user of the second terminal does not answer this telephone call. The voicemail system is associated with a voicemail system caller identifier selected from a database connected to a communication management platform.
MANAGING LAWFUL INTERCEPTION INFORMATION
A determination is made that an identity of a non-target communicating entity (102) with which a target communicating entity (101) is communicating, is to be obfuscated in any report of lawful interception of the target communicating entity (101) to a law enforcement agency (131). Lawful interception is performed of the target communicating entity (101) and information pertaining to the lawful interception of the target communicating entity (101) is reported to the law enforcement agency (131). The reported information comprises non-obfuscated identity information of the target communicating entity (101) and obfuscated identity information of the non-target communicating entity (102).
SYSTEMS AND METHODS FOR AUTHENTICATION USING BROWSER FINGERPRINTING
Embodiments described herein provide for authenticating callers to call centers using browser fingerprinting. A call center system or third-party analytics system includes a server that transmits notifications to a caller device that includes an interactive hyperlink or URL to a particular webpage. When a browser of the caller device navigates to the webpage, the server captures certain types of information about the caller device and generates a browser fingerprint for the caller device. The browser fingerprint is compared against a database of registered browser fingerprints to verify that the caller device of the current call is the registered, expected caller device. The server transmits the notification via any number of communication channels and protocols, such as text messages (e.g., SMS messages, MMS messages), emails, and push notifications associated with client-side software, among others.
TRACKING DEVICE LOCATION AND COORDINATION
Communication between an owner of a lost tracking device and a finder of a lost tracking device is established. A tracking system receives an identifier of a tracking device and a request for a web page from a mobile device that has captured an image of a smart code on the tracking device. The smart code is embedded with a URL to the web page. The system displays the web page on the mobile device and prompts the user to provide a location of the mobile device. The location is associated with the identifier of the tracking device. A notification indicating the location of the tracking device is generated for the owner. The owner is prompted to provide information to establish contact with the finder of the device, and the web page is populated with the owner's provided information for display on the finder's mobile device.
DATA EXCHANGE DURING A VOICE CALL SESSION
Techniques for performing data exchanges during voice call sessions is described. In one example, a network server may facilitate a voice call session between user devices and associate a unique session number (USN) to each of the voice call sessions. The USN may be used as a reference when toggling between voice call sessions. In one example, when a particular voice call session is toggled to an active state, the network server may limit recipients of sensitive financial information to be between transacting parties in the active voice call session. By isolating other user devices that are not privy to transactions in the active voice call session, the chances for a transacting party in the active voice call session to accidentally send payments, for example, to an unintended recipient can be substantially minimized.
TERMINAL IMPLEMENTING A COMMUNICATION METHOD, AND SERVER IMPLEMENTING A METHOD FOR ESTABLISHING A COMMUNICATION BETWEEN TWO TERMINALS
Methods and devices for establishing a communication between a first and a second terminal are described. The disclosed technology can be implemented in or by a server or a terminal in communication with the server. The first terminal can to the server, using a first calling identity, a request including connection information and an identifier of the first terminal. Using the identifier, the server can obtain from a database a pair of calling identities including one certified and one non-certified, the pair comprising the first calling identity and a second calling identity. The server can determine, from one of the calling identities and from the connection information, a connectivity mode of the terminal, and determine a routable number on which the terminal can send a communication to the server. The server can route the communication towards the second terminal by presenting a calling identity of the pair and sending the routable number to the first terminal.
Handling calls on a shared speech-enabled device
In some implementations, a determination that a first party has spoken a query for a voice-enabled virtual assistant during a voice call between the first party and a second party is made, in response to the determination that the first party has spoken the query for the voice-enabled virtual assistant during the voice call between the first party and the second party, the voice call between the first party and the second party is placed on hold, a determination that the voice-enabled virtual assistant has resolved the query is made, and in response to the determination that the voice-enabled virtual assistant has handled the query, the voice call between the first party and the second party is resumed from hold.