摘要:
A virtual bearer channel platform (150) includes a plurality of transaction processing units (161-164). Each transaction processing unit processes one or more service requests received as a call on a bearer channel. The call data is distributed to individual transaction processing units using a high-speed network such as a SONET-type network (215). In one embodiment, the standard SONET format is modified to eliminate fields which contain data of no significance to the present environment. In another embodiment, the standard SONET format, itself, is used. The platform includes a resource manager for allocating the newly received calls to individual transaction processing units. The resource manager (560) sets up outbound calls when requested by a transaction processing unit. A gateway interfaces (550) with the resource manager and the external communication network for assisting in call setup in both inbound and outbound directions.
摘要:
A system and method for providing operator and customer services for automated telecommunication services on an intelligent overlay network (104). Operator and customer services are provided by an intelligent network (102) comprising an automated call distributor (116), an application processor (118), a plurality of enhanced operator consoles (126), an advanced intelligent network gateway (120), and a validation gateway (122). The advanced intelligent network gateway (120) provides the intelligent network (102) with an interface to the intelligent overlay network (104). This allows components within the intelligent network (102) to communicate with components in the intelligent overlay network (104), and vice-versa. The validation gateway (122) provides the intelligent network (102) with an interface to credit card validation systems (114), and is used to apply charges to customer credit cards. The enhanced operator consoles (126) provide for efficient and seamless integration of operator and customer services to automated services running on the intelligent overlay network (104). Such enhanced operator consoles (126) are provided in the form of customized application programs that are executed by the enhanced operator consoles (126) based on the context of calls that are transferred from the intelligent overlay network (104).
摘要:
A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as, for example, a rules-based thresholding engine and a profiling engine. The detection layer can include an AI-based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases. The analysis layer preferably generates a probability of fraud for each fraud case. The expert systems layer receives fraud cases and automatically initiates actions for certain fraud cases. The presentation layer also receives fraud cases for presentation to human analysts. The presentation layer permits the human analysts to initiate additional actions.
摘要:
The present invention is a system and method for continuing a telephone call placed by a caller (102) to a call center (120) in a telecommunications network (100). When a caller attempts to make a call to the call center that is unavailable, the system obtains callback information for the caller including a telephone number where the caller can be reached. The call is then ended. When the call center is again available, the system continues the call by placing a call to the caller at said telephone number, placing a call to the destination, and joining the two calls.
摘要:
System and method for monitoring calls parked on one or more automatic call distributors (ACDs). A communications-interface process (262) provides for external communications between a call park server (CPS) platform (260) and an external agency. Calls parked on an ACD are monitored through the use of the CPS that maintains a relational database. The relational database includes a call-leg information table and a method table. The call-leg information table is used to track and maintain the status of each call-leg parked on an ACD. The method table includes predetermined methods that can be executed in response to a change in status of the parked call-legs. DB process (264) provides instructions to a park select (PSEL) process (266). PSEL process (266) functions as a manager for a series of agent processes or tasks (268) that carry out the methods to be applied to the parked call-legs.
摘要:
A system and method for making a call from a dual mode mobile station (305) functioning in either a PCS mode or a cellular mode permits PCS communication if the station receives a beacon of sufficient strength in a PCS frequency band, and alternatively permits cellular communications if the station (305) does not receive a sufficient strength in the PCS frequency band. In order for the dual mode mobile station (305) to perform in both a cellular mode and a PCS mode, a single service provider will attempt to provide both types of services. The reseller must ensure that a call can be properly billed to a mobile station (305) for both a call received at the dual mode mobile station (305) and a call transmitted from the dual mode mobile station (305). Accordingly, methods and systems are provided for controlling cellular service access to and from the mobile station (305).
摘要:
A system and method for providing security in data communication systems where multiple users are coupled to a common receiving system. The data (402) is encrypted (404) or otherwise encoded by a sender using a key. The encrypted data is then scrambled (408) or otherwise encoded, and transmitted (412) by the sender. The transmitted data is received (416) at a receiver where it is descrambled (420) or otherwise decoded. An authorized user decrypts or otherwise decodes (424) the descrambled data using a key to retrieve clear data (428). The key itself is encrypted by the sender using an asymmetric encryption algorithm, and is then transmitted by the sender. The authorized user decrypts the encrypted key using the asymmetric encryption algorithm, and uses the key to decrypt the encrypted key.
摘要:
A system, and methods for billing clients of services providers are presented (fig. 4). Calls to the services providers are received at a prepaid calling center where the clients are prompted to provide an indentification mumber (step 410). The prepaid calling center then debits the prepaid account at a prescribed billing rate until the telephone call is terminated (steps 455-465).
摘要:
A network architecture and service platform for providing virtual private network ("VPN") over an ATM network (110). The architecture provides services for voice, video and data traffic among multiple VPN customers over a shared ATM network by implementing intelligent control devices (150a) to perform enhanced processing of ATM call set-up messages, including validations and routing translations. Hierarchical routing mechanism provided by ATM, along with customized customer addressing schemes, are used to overlay customer VPNs (115a) as higher-level networks onto the shared ATM network. The control devices translate customer ATM VPN address to internal ATM network addresses. The ATM switch (120a) network then performs lower-level network processing, using internal network addressing to set-up a virtual connection for a VPN call. The intelligent control devices may also explicitly state the end-to-end route.
摘要:
An interactive computer-based training (ICBT) system operable over a computer network for training users. The ICBT system is provided with interdependant, state-machine-based hardware and software simulators for emulating hardware and software functionality associated with a piece of equipment on which the users are to receive interactive training. The state transition method effectuated in a computer-readable memory system includes the steps of: identifying a current state of the state machine wherein a transition is to be effectuated; determining if there is a state immediately prior to the current state, and if so, determining whether there is a dependency of the current state on the immediately prior state, the dependency being characterized as a first order dependency; inferring a reference value associated with the current state based on the first order dependency; and determining a future state of the state machine based on the inferred reference value.