Patent classifications
H04M3/42306
COMMUNICATION USING VIRTUAL NUMBERS
Examples disclosed herein involve receiving a request from a calling device to establish a communication session between a mobile device and the calling device, the mobile device assigned a virtual telephone number, retrieving location information corresponding to a location of the mobile device from a location register, and sending a redirect to a session border controller (SBC) to establish the communication session between the calling device and the mobile device based on the location information.
VIDEO RELAY SERVICE, COMMUNICATION SYSTEM, AND RELATED METHODS FOR CONNECTING USERS WITH N11 SERVICES IN A VIDEO RELAY SERVICE ENVIRONMENT
Video relay services, communication systems, and methods are disclosed connecting users with N11 services in a video relay service environment. A video relay service may comprise at least one server configured to manage a customer database including customer records for audibly-impaired users of the video relay service, manage an N11 database including alternate numbers corresponding to N11 codes for a plurality of different locations defined by political boundaries, receive incoming video calls including an N11 code from a calling party, resolve the N11 code to an appropriate alternate number for an N11 service based on a political boundary for the calling party responsive to a query of the N11 database, establish a first connection between a video communication device associated with the calling party and a call assistant station associated with a sign language interpreter, and establish a second connection between the call assistant station and the N11 service.
Toll-free telecommunications and data management platform
A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.
Toll-free numbers metadata tagging, analysis and reporting
A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.
Methods and systems for facilitating context-to-call communications between communication points via dedicated context-to-call-enabled contact numbers
Methods and systems for facilitating communication sessions between multiple communication points via a contact number. The method includes receiving a purchase request from a first user device, through a first communication point which is enabled with a context-to-call (C2C) feature. The method further includes facilitating displaying of a predetermined list of contact numbers on the first user device and receiving a contact number selected by the first user. The method also includes processing the purchase request based, at least in part, on receiving subscription fees. The method also includes assigning the contact number to a C2C-enabled account of the first user, as a dedicated C2C-enabled contact number, based, at least in part, on purchase request-processing step. The method also includes facilitating the C2C-enabled account of the first user to receive calls from second user(s), on the dedicated C2C-enabled contact number, based, at least in part, on C2C contact-assigning step.
Core network bypass for toll-free calling
Techniques are described for determining when and how to re-route toll-free calls around a core telephony network experiencing significant disruptions. A core telephony network of a telephony service provider is monitored for anomalies. Upon detecting an anomaly, it is determined whether the anomaly is significant enough to warrant re-routing inbound toll-free calls around the core telephony network. The re-routing process comprises accessing an industry registry database including a plurality of toll-free numbers (TFNs) associated with a routing template comprising the instructions for routing toll-free calls. The routing template instructions may be switched to re-direct toll-free calls associated with one or more specific TFNs to a particular carrier. Within that particular carrier, the routing instructions may be switched to re-direct the toll-free calls away from the service provider's core telephony network to a network bypass cloud platform. The network bypass cloud platform may be configured to receive toll-free calls, determine a customer telephony network to which to route the received toll-free calls based on the TFN of the toll-free call, and route the toll-free call to the customer telephony network.
TELECOMMUNICATIONS CALL VALIDATION PLATFORM
A method for generating a list of telecommunication identifiers is provided. The method includes interpreting, via at least one processor, telecommunications data including available telecommunication identifiers, assigned telecommunication identifiers, in-use telecommunication identifiers, and disconnected telecommunication identifiers. The method further includes generating the list based at least in part on the telecommunications data, wherein the list includes telecommunication identifiers that are a subset of the available telecommunication identifiers. The method further includes transmitting the list.
Telecommunications validation system and method
According to an embodiment of the disclosure, a toll-free telecommunications validation system determines a confidence value that an incoming phone call to an enterprises' toll-free number is originating from the station it purports to be, i.e., is not a spoofed call by incorporating one or more layers of signals and data in determining said confidence value, the data and signals including, but not limited to, toll-free call routing logs, service control point (SCP) signals and data, service data point (SDP) signals and data, dialed number information service (DNIS) signals and data, automatic number identification (ANI) signals and data, session initiation protocol (SIP) signals and data, carrier identification code (CIC) signals and data, location routing number (LRN) signals and data, jurisdiction information parameter (JIP) signals and data, charge number (CN) signals and data, billing number (BN) signals and data, and originating carrier information (such as information derived from the ANI, including, but not limited to, alternative service provider ID (ALTSPID), service provider ID (SPID), or operating company number (OCN)). In certain configurations said enterprise provides an ANI and DNIS associated with said incoming toll-free call, which is used to query a commercial toll-free telecommunications routing platform for any corresponding log entries. The existence of any such log entries, along with the originating carrier information in the event log entries do exist, is used to determine a confidence value that said incoming toll-free call is originating from the station it purports to be. As a result, said entities or enterprises operating a toll-free number may be provided a confidence value regarding an incoming telephone call, and using that confidence value, further determine whether or not to accept the authenticity of the incoming telephone call and/or based on said confidence value, service the incoming call differently.
SYSTEMS AND METHODS FOR TAGGING FRAUDULENT PHONE NUMBERS
A method including: receiving a user report dataset indicating fraudulent activity corresponding to a phone number; responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number; and tagging the record to identify the phone number as being associated with fraudulent activity.
Global Dialing Format
Described herein is at least one non-transitory computer-readable medium comprising instructions to direct at least one processor to utilize a global dialing format. The at least one processor is directed to retrieve a phone number saved on a communication device. The retrieved phone number is converted to the global dialing format by a reformatting sequence or a manual intervention sequence and the reformatted phone number thereby obtained is saved to a contacts list on the communication device. A QR code is created for contact sharing. A local phone number is retrieved from the reformatted phone number when a user selects the reformatted phone number for dialing. The local phone number is in a destination country. A call logic sequence is initiated to assemble the dialing protocol necessary to complete the phone call. An authentication process is executed to verify that the local phone number is an actual phone number in the destination country. The authentication process results in an authenticated local phone number which is concatenated with the dialing protocol assembled by the call logic sequence. A concatenated phone number is obtained. The local phone number is saved to a call log in the global dialing format. The concatenated phone number is contacted, i.e., called or texted.