Patent classifications
H04M3/42059
COMPUTER-IMPLEMENTED DETECTION OF ANOMALOUS TELEPHONE CALLS
Computer-implemented detection of anomalous telephone calls, for example detection of interconnect bypass fraud, is disclosed. A telephone call associated with user devices is analyzed remote from the user devices. A first set of multiple features, for example Mel Frequency Cepstral Coefficients, is derived from a call audio stream. The first set is converted to an embedding vector, for example via a model based on a Universal Background Model comprising a Gaussian Mixture Model, which model is preferably configured based on a training plurality of first sets of multiple features derived form a corresponding training plurality of audio streams. Occurrence, or probability of occurrence, of an anomalous telephone call is determined based on the embedding vector, for example via a back-end classifier, such as a Gaussian Backend Model, which classifier is preferably configured based on labels associated with the training plurality of audio streams.
SYSTEMS AND METHODS INVOLVING RICH CONTACTS FOR PRE-PHONECALL COMMUNICATION
systems and methods for communication prior to acceptance of a phone call. A method of the present invention that is comprised the steps of: generating a phone number; generating a message to be presented upon receipt of a phone call; generating a Rich Contact containing said message and said phone number; transmitting the Rich Contact to a recipient phone device and further storing it therein; initiating a phone call bearing a phone number of the Rich Contact to said recipient phone device; wherein, upon receipt of the phone call on the phone device, a default call application shall identify said phone number of said phone call and present said message from said Rich Contact associated with the phone number.
Providing audio announcement to called parties
The present disclosure describes a system, method, and computer-readable medium for providing audio announcement of communications to a called party in a communication network. The method includes receiving communication from a calling party and performing a lookup of information relating to the calling party in a database via an Internet Protocol connection based on an identifier of at least one of the calling party and the called party. The information comprises one or more audio files. The method then provides the audio announcement to a called party based on the audio files.
FRAUD DAMAGE PREVENTION SYSTEM, FRAUD DAMAGE PREVENTION METHOD, CALL PROCESSING SERVER, ENUM / DNS SERVER, AND PROGRAM
A fraud damage prevention system (1000) includes a call processing server (20) and an ENUM/DNS server (10). The call processing server (20) includes: a fraud determination requesting unit that transmits a fraud number determination request, to which a call originating number of a call originating device (4) is affixed, to the ENUM/DNS server (10), and that receives the determination result as to whether or not the call originating number is a fraud number; and a fraud prevention processing unit that performs a predetermined fraud damage prevention process. The ENUM/DNS server (10) includes: a storage unit that stores fraud number information (100); and a fraud determination unit that references the fraud number information (100) using the call originating number, determines that the call originating number is a fraud number in the case where a number that is the same as the call originating number is registered, and transmits the determination result to the call processing server (20).
OPTIMIZED SYSTEM AND METHOD FOR NOTIFYING A CALLED PARTY OF A CALL ATTEMPT
A system and method for notifying a called party of a call attempt is provided. The method comprises initiating a communication request by a calling party; routing the communication request to an intelligent network via an mobile service center; validating the communication request by the intelligent network; and handing over the communication request to an intelligent platform by the intelligent network in the event of a nonstandard trigger event such as calling party insufficient balance. The processing of communication request by the intelligent platform includes monitoring number of call attempts, introducing a delay in sending notification, monitoring availability of called party and performing one or more actions based on the delay and the availability of the called party.
METHOD OF PROVIDING A RECENT CALL LIST, SOFTWARE PRODUCT, TELECOMMUNICATIONS DEVICE AND SYSTEM
A method of providing a recent call list of calls recently received or initiated by a telecommunications device where information on recent services which are services recently handled by or using the telecommunications device other than calls are incorporated as entries in a recent call list of the telecommunications device. Each entry can be formed by a data structure being composed of a plurality of data fields. Each data field can include a data value. An entry representing a recent service other than a call in the recent call list can include a service code identifying a recent service as a data value. A device, system, and apparatus can be configured to utilize or execute the method.
Call Collision Processing Method for Terminal Device, and Terminal Device
The present disclosure relates to a call collision processing method for a terminal device, and a terminal device. A state machine records that a current state of the terminal device is an incoming call state, an outgoing call state, or an idle state. When the terminal device is in the idle state, that the terminal device processes an incoming call or an outgoing call is determined according to occupation of the state machine by incoming call information or by outgoing call information, and a state of the state machine after the state machine is occupied by the incoming call or the outgoing call is protected by using a mutex lock.
INTEGRATION OF VOIP PHONE SERVICES WITH INTELLIGENT CLOUD VOICE RECOGNITION
Integration of VoIP phone services with Intelligent Cloud Voice Recognition for emergency services overcomes limitations of conventional residential telephone technology to inexpensively provide more useful and advanced residential telephone services. For example, in an embodiment, a communication method may comprise establishing a communications session between either a user device and a telephone system or between a user device and voice recognition system, if the communications session is between a user device and a telephone system, extending the communications session to include a voice recognition system, if the communications session is between a user device and a voice recognition system, extending the communications session to include a telephone system, providing voice or speech information to the voice recognition system from the user device, and performing at least one function with the voice recognition system based on the provided voice or speech information.
PRIORITIZATION OF ELECTRONIC COMMUNICATIONS
Methods, systems, and apparatus for prioritizing communications are described. Metadata that characterizes an electronic communication is obtained and a machine learning algorithm is applied to the metadata to generate a scoring model. A score for the electronic communication is generated based on the scoring model.
NETWORK SERVICES DEPENDENT ON GEOGRAPHICAL CONSTRAINTS
A method and system are disclosed for determining the geographic location of a user communicating on a communications network such as the Internet. In one embodiment, a provider of a product or service: (a) receives the user's phone number (or other identification for contacting the user's station), and (b) supplies the user's station with a distinctive identifier. The provider then supplies a location determining service with the user's phone number (or other identification). A phone call is made to the phone number by the location determining service for retrieving the distinctive identifier from the network station having the phone number. If the distinctive identifier is retrieved and the location determining service determines that the user's station is within an appropriate geographical area (or not within an inappropriate area), then the provider can provide the requested product or service to the user.