Abstract:
An apparatus and a method for managing a spam number in a mobile communication terminal are provided. The method includes determining a spam index for each of at least one phone number using a reception record by phone number, and determining spam number registration or non-registration for each phone number depending on the spam index.
Abstract:
Methods and apparatus for providing monitoring of voice quality and diagnostic data related to voice quality on a wireless device. Monitoring thresholds can be implemented that allow for additional precautionary measures and/or further monitoring to occur if a threshold level of voice quality performance is experienced. The results of the voice and diagnostic monitoring can be communicated to the service provider who can then collect, analyze and generate reports to assess and determine quality-related problems experienced by the communication network.
Abstract:
A dial tone generator outputs a particular dial tone to a party to indicate that a call block feature is enabled for the party. The call block feature is disabled for the party in response to a number of incoming calls for the party being greater than or equal to a threshold.
Abstract:
A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, scan of other alternate telecommunication devices is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If an alternate telecommunication device is available to receive the communication, then the communication is rerouted to the preferred alternate telecommunication device based on the alternate telecommunication device being a mutual contact of the contact list of the caller telecommunication device and the mapping profile of the intended receiving telecommunication device.
Abstract:
Techniques for dispatching one or more services requests to one or more agents are provided. The techniques include obtaining one or more attributes of each service request, obtaining one or more attributes of each agent, obtaining feedback from each of one or more agent queues, and using the one or more attributes of each service request, the one or more attributes of each agent and the feedback from each of the one or more agent queues to determine one or more suitable agents to receive a dispatch for each of the one or more service requests. Techniques are also provided for generating a database of one or more attributes of one or more service requests and one or more attributes of one or more agents.
Abstract:
An electronic communication device, such as a cellphone (including, but not limited to PDA's, I-PODs, BLACKBERRYs, PALMs), is programmed to use GPS, and/or a cell tower triangulation signal, collected data to monitor device motion, or lack of motion, for the purpose of controlling (e.g., stopping, starting, changing, adjusting) use of the device or any device option, saving and transmitting all collected data, including dates and times of any changes and/or adjustments, to a third-party (e.g., police, school officials, insurance agents, etc.) for viewing, processing, and/or storing. Any feature the device offers (including, but not limited to, making or receiving voice or data phone calls, text messaging, video, camera, picture viewer, game, navigation, music, MP3 players, speaker, Windows Professional, Internet Explorer, spreadsheets, BlueTooth and/or any sound, pitch, tone, vibration, or volume for hearing or feeling the device ring to recognize the cell phone was in use is controllable by this technology.
Abstract:
The current application comprises four major processors for determining network abnormalities. The major difference between the current invention and all other existing systems that are being used by the network operators is that the current invention detects abnormalities by comparing with a baseline statistical model. This baseline model represents typical network traffic characteristics. When a traffic characteristic exceeds or falls outside of the baseline model, an abnormality is identified.
Abstract:
Methods are disclosed for routing callers to agents in a contact center, along with an intelligent routing system. One or more agents are graded on achieving an optimal interaction, such as increasing revenue, decreasing cost, or increasing customer satisfaction. Callers are then preferentially routed to a graded agent to obtain an increased chance at obtaining a chosen optimal interaction. In a more advanced embodiment, caller and agent demographic and psychographic characteristics can also be determined and used in a pattern matching algorithm to preferentially route a caller with certain characteristics to an agent with certain characteristics to increase the chance of an optimal interaction.
Abstract:
A system and a method generate a recommendation on a mobile device. The system and the method may use a time, a location, a venue and/or an event to generate the recommendation. Further, the system and the method may use an event database to determine current interests of the user. Still further, the system and the method for generating a recommendation on a mobile device may use a transactional history of the user and/or behavior of other users to generate the recommendation. The system and the method may recommend, for example, digital media, news and event information, editorial content and/or physical or digital merchandise. As a result, the system and the method may generate a recommendation that corresponds to the current interests of the user.
Abstract:
The present invention is related to telecommunications, and in particular to systems and methods of using telecommunication services for user authentication. Account information is stored for a user, the account information including at least a first phone number associated with the user. A user order is received. A verification phone call is received from the user, the call including charge phone number information. The charge number information is compared to the first phone number to authenticate that the user is associated with the first phone number. Based at least in part on the comparison, the user order is selectively caused to be fulfilled.