Abstract:
A telecommunication system enables a server to receive a request from a calling external telecommunication device (CTD) for a telecommunication connection with a receiving external telecommunication device (RTD), establish data connection with CTD in response to request, receive from CTD a receiver identifier (RID) and store RID, establish a data connection with RTD using RID, transmit to RTD, after data connection is established, a server identifier (SID), close data connection with RTD after transmission, receive a request for a telecommunication connection from RID via SID within a time slot after said closing, check, in response to request for a telecommunication connection from RTD via SID, if RID of RTD matches stored RID, and establish a telecommunication connection through server between CTD and RTD if RID matches stored RID.
Abstract:
A computer-implemented technique can include joining, by a computing device having one or more processors, a conference session hosted by a server via a wireless computing network. In response to joining the conference session, the computing device can receive, from the server via the wireless computing network, a dial-in telephone number for reconnecting to the conference session. The computing device can detect a trigger condition indicative of a need to reconnect to the conference session via a cellular telephone network. In response to detecting the trigger condition, the computing device can initiate a telephone call to the dial-in telephone number via the cellular telephone network. In response to the server obtaining authentication of a caller identification of the computing device, the computing device can rejoin the conference session via the cellular telephone network.
Abstract:
This document discusses, among other things, limiting contact to a networked contact center that is a host to multiple tenants. In an example embodiment, a communication is received by a networked contact center. In determining whether to allow the communication to reach contact center resources, a contact rate value may be examined. The contact rate value may represent an allowable quantity of contact within a time interval. For some example embodiments, a determination of whether the network contact center is to accept or reject the communication is made based on the contact rate value.
Abstract:
Systems and methods of routing calls may include receiving a plurality of calls, and for each of the plurality of calls, determining a threshold time that may be a maximum service time for the call, estimating an expected service time for the call, comparing the threshold time with the expected service time for the call, and assigning the call into one of a plurality of queues based upon the comparing. The method of routing may further include prioritizing the plurality of queues based upon the expected service time for each call in each of the plurality of queues, directing each call in a first queue of the plurality of queues to a first group of agents, and providing a callback prompt to each call in a second queue of the plurality of queues, wherein a priority of the first queue is higher than a priority of the second queue.
Abstract:
A system registers participant information and inter-participant relationship information, and then, at variable times, selects two or more participants with a pre-existing relationship and attempts to establish a communication link between them. At least one of the participants is notified that the communication link will be attempted, shortly before the attempt is made. The identities of the selected participants are withheld from at least one of the participants (and potentially from all of the participants), so the call is a partial surprise (i.e., the participant may know the set of possible people from whom the call could be, but does not know exactly which person or people are calling until he answers the call). A number of applications are described and claimed.
Abstract:
Phone call tracing is a law enforcement tool best known for its use by the Federal Bureau of Investigation in trying to catch kidnappers. Tracing a call is useful for law enforcement and intelligence agencies in order to capture potentially dangerous people. Although useful, tracing a phone call has one drawback: time. It takes time to trace a call. Because of the time it takes to trace a call, the phone is usually hung up or turned off before a trace can be completed. Since there is no way for the trace to be hurried, I propose a phone app that when uploaded to a phone will prevent the phone from disconnecting from the network. This app would upload on the electrical signal carrying the audio and/or video signal. The app will upload into the phone and interfere with the phones ability to terminate the call without indicating that the phone is still connected to the network. With the app downloaded, the app will keep the phone call active so that the trace can then be completed.
Abstract:
A blacklist of known harassing or non-legitimate emergency calls is maintained. An incoming emergency call is checked against emergency call records to determine if multiple emergency calls have been made recently, from the same general location, and destined to the same PSAP. Feedback is provided regarding the number of recent calls made and the possibility of a false positive, based on call history from known handsets in the area, including the possibility of a phone with a known MEID/ESN, when powered up, receiving the same 911-xxx-xxxx. Blacklisting may be approved or not based on the feedback. A telephone number or MIN may be placed on a “blacklist” with a ‘timer’. Subsequent calls to that phone number will be assigned a different SIP URI (a unique URI per destination determined prior to lookup on the blacklist) and be directed elsewhere. The call may be completed to an administrative line.
Abstract:
Example embodiments of the present invention may include a method that includes collecting caller response timings to each of a plurality of dialog states conducted during a call, and estimating a plurality of parameters based on the caller response timings. The method may also include selecting a response completeness value responsive to the estimated plurality of parameters, the response completeness value is used to calculate at least one optimal timeout value. The method may also include selecting the at least one optimal timeout value, and setting the at least one optimal timeout value for each of the corresponding dialog states. The timeout value(s) may be used for subsequent calls to provide optimal user satisfaction and call success rates.
Abstract:
Disclosed are method, device and system for processing a calling requires message of a mobile terminal, the method comprising: triggering a pre-embedded blocking program in the calling process; upon detecting a calling request message, the blocking program acquires an incoming call number in the calling request message; the blocking program determines whether the incoming call number is a call number defined by a preset rule, if the incoming call number is a call number defined by the preset rule, then delaying the ring of the phone number defined by the preset rule. The present invention protects a user from the harassment of a malicious harassing call, thus avoiding unnecessary financial loss.
Abstract:
Provided are a Voice over Internet Protocol (VoIP) gateway device, a control method thereof, and a VoIP gateway system. The VoIP gateway device includes: a connector which is connected to a first terminal; a communication unit which communicates with a proxy server that relays a VoIP communication; a storage unit which stores a ringtone corresponding to a call received by a call back function; and a controller which transmits an invite message to the proxy server for connecting a call from a first terminal to a second terminal corresponding to the call back function upon request from the first terminal for the call back function, and transmits the stored ringtone to the first terminal upon receiving a ringing message from the proxy server in response to the invite message.