Abstract:
In embodiments of the present invention methods and systems are described for utilizing usage patterns of mobile communication facilities within various geographic locations to target the mobile communication facilities with relevant sponsored content.
Abstract:
An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
Abstract:
An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. A threshold period is received, wherein the threshold period indicates the maximum allowable time period for a participant of a conference call to enter the conference call prior to the entry of the moderator of the conference call. A monitor detects the entry of the moderator into the conference call and entry of the participants into the conference call. A waiting period is determined for one or more of the participants, wherein the waiting period represents the time period between the entry of the moderator and the entry of the participant. A processor compares the waiting period to the threshold period. If the threshold period exceeds the waiting period, the conference call is allowed to continue. In at least one embodiment, actions are performed with the processor if the waiting period exceeds the threshold period.
Abstract:
An approach is provided for selectively receiving communication from a sender. After the communication platform receives a communication from a user device, the communication platform generates a request for an action to be performed by a user via the user device and transmits the request to the user device. Then, the communication platform receives, from the user device, a response relating to the action, and evaluates the response for treatment of the communication.
Abstract:
Systems and methods for visualization of call center performance are provided. An exemplary method includes the steps of: obtaining quality performance of agents data that includes information on the quality of service and quality characteristics of the agent, obtaining call center operations data that includes information on statistics and details of a call center, correlating the quality performance of agents data and the call center operations data, identifying correlation-based discovery, and optimizing call center performance based on the correlation-based discovery.
Abstract:
Methods, systems, and computer program products for determining routings of communications. Methods include receiving a communication for a receiving party and determining one or more potential locations of the receiving party. A probability that the receiving party is at each of the potential locations is calculated based on a statistical model. It is determined which of the potential locations has the highest probability. Routing of the communication to the potential location with the highest probability is initiated.
Abstract:
A traffic monitoring system (10) monitors traffics flowing through a network (100); when an abnormal traffic is detected, identifies an attack source network, a source of an attack, on the basis of attack source information indicating a source device from which the abnormal traffic is transmitted, which is obtained by an analysis of the abnormal traffic, and also identifies an attack destination network, a destination of the attack, on the basis of attack destination information indicating a destination device to which the abnormal traffic is to be transmitted, which is obtained by the analysis of the abnormal traffic; notifies an administrator of the attack source network of the attack source information by acquiring administrator information corresponding to the identified attack source network; and notifies an administrator of the attack destination network of the attack destination information by acquiring administrator information corresponding to the identified attack destination network.
Abstract:
A communication control device executes a call-out process of calling out a recipient telephone device while specifying an importance level via a telephone network in response to a request from a transmitter telephone device. A recipient received a call operates a mobile communication terminal after a telephone call ends, accesses an information providing server via a wireless LAN access point and the Internet, and inputs information evaluating whether or not an importance level specified for the received call is appropriate. The information providing server provides the input evaluation information to a storage device. The communication control device determines whether or not to execute a call-out process based on the evaluation information stored in the storage device when there is a call-out request from a transmitter.
Abstract:
Methods and systems are provided for determining whether a cellular telephone chip is dormant. Determinations are drawn from testing telephone numbers associated with chips and data collected is used to generate statistics. Methods are provided for determining the percentage of a wireless service provider's subscriber-base that consists of abandoned, or non-revenue-generating, customers.
Abstract:
Methods and systems are provided for routing callers to agents in a call-center routing environment. An exemplary method includes identifying caller data for at least one of a set of callers on hold and causing a caller of the set of callers to be routed to an agent based on a comparison of the caller data and the agent data. The caller data and agent data may be compared via a pattern matching algorithm and/or computer model for predicting a caller-agent pair having the highest probability of a desired outcome. As such, callers may be pooled and routed to agents based on comparisons of available caller and agent data, rather than a conventional queue order fashion. If a caller is held beyond a hold threshold the caller may be routed to the next available agent. The hold threshold may include a predetermined time, “cost” function, number of times the caller may be skipped by other callers, and so on.