Abstract:
An IP telephony communication being conducted by a user telephony device is transitioned from an IP based communications path to a cellular based voice or video communications path if a quality of the telephony communication falls below a threshold level. The user telephony device and/or elements of an IP telephony system handling the call could detect when the quality is below the threshold level. The communication might also be transitioned to a cellular based voice or video communications channel if the strength of a wireless connection between the user telephony device and a wireless access point providing access to a data network falls below a threshold level.
Abstract:
System and method for determining whether an incoming call originates from inside or outside of a mobile carriers network and indicates the result to the subscriber. An example system performs a GTT (global title translation) on an incoming number to determine the hosting carrier of any mobile phone number. When the result matches the subscriber's carrier, the mobile device then indicates to the subscriber (i.e. mobile device) that the call is an "in network call." Results of the comparison are stored and used for later incoming calls. The stored results are refreshed every time or periodically.
Abstract:
System and method for determining whether an incoming call originates from inside or outside of a mobile carriers network and indicates the result to the subscriber. An example system performs a GTT (global title translation) on an incoming number to determine the hosting carrier of any mobile phone number. When the result matches the subscriber's carrier, the mobile device then indicates to the subscriber (i.e. mobile device) that the call is an "in network call." Results of the comparison are stored and used for later incoming calls. The stored results are refreshed every time or periodically.
Abstract:
A method and system for allowing a subscriber of equipment to control the content of a Ring Back Tone (RBT) (i) based on a restriction level or maturity rating, or (ii) dynamically, during the process of connecting a call. More specifically, during call setup, (a) provisioned or subscribed RBT control can be based on maturity level and (b) dynamic RBT control, includes the ability to: override subscribed/provisioned restriction level, block RBT content being played permanently or skip RBT content being played during current call set up time.
Abstract:
Methods, systems, and computer program products for detecting fraudulent message service message traffic are disclosed. According to one method, message service messages are monitored. It is determined that the message service message traffic indicates that the message service message traffic is fraudulent based on detection of at least one of: 1) message service message traffic received at a first network from a second network, where the traffic includes at least one message with an SCCP calling party address internal to the first network, 2) a volume of message service message traffic received at the first network from the second network that exceeds the volume of message service message traffic sent by the first network to the second network by a threshold amount, and 3) message service message traffic that is sent to a dark number. In response to detecting fraudulent message service message traffic, a mitigating action is performed.
Abstract:
The invention relates to a system, device, computer readable medium, and process for populating a contact list using a client device with service provider contact information based on location information.
Abstract:
The invention relates to a method and system for establishing a telephone connection between a first subscriber device (A-subscriber device) and a second subscriber device (B- subscriber device) in a telephone system. The telephone system is arranged for connecting the A-subscriber device (the calling party) and the B-subscriber device (the called party). The method includes receiving a request from the A-subscriber device to establish a connection with the B-subscriber device and also receiving a personal identity code of a user of said A- subscriber device. The connection can be established between the A-subscriber device and the B-subscriber device only after having received said personal identity code of said user of said A-subscriber device.