Abstract:
Systems and methods for deriving contact information for a calling party analyze all or a portion of the audio of the telephone call to derive such contact. Likewise, all or a portion of a voice message left by a calling party could be analyzed to obtain contact information for the calling party.
Abstract:
Systems and methods performed by an IP telephony system allow a user to request that his IP telephony device be set into a conference calling mode for an indefinite period of time. When the user's IP telephony device is in the conference calling mode, all parties that attempt to call the user's IP telephony device are added to a conference bridge tied to the user's IP telephony device. All incoming calls are treated in this fashion until the user cancels the conference calling mode and returns to a normal calling mode.
Abstract:
A proxy server of an Internet protocol (IP) telephony system determines when a call setup message generated by a first of the IP telephony system's customers is directed to a second of the IP telephony system's customers. When that occurs, the call setup message is forwarded directly to a call cluster operated by the IP telephony system and that services the second customer. As a result, the call is handled internally by the IP telephony system, and there is no need to involve a second telephony system in conducting the requested call. The proxy server may also insert information into the call setup messaging to flag the call as an internal call between two customers of the IP telephony system.
Abstract:
A method and apparatus for user location registration comprising determining, by a first network service provided by a first network, subscriber location information associated with a first user communication device registered with the first network, wherein the subscriber location information includes a network identifier of the first device, and wherein the network identifier is not obtained via session initiation protocol (SIP) messaging received from the first device; receiving, by the first network service, a broadcast location request for the subscriber location information in response to a call initiated from a second user communication device wherein receiving the broadcast location request further includes determining subscriber identity information from the broadcast location request, and determining that the subscriber identity information is associated with the subscriber location information; and sending, by the first network service, the determined subscriber location information in response to the broadcast location request.
Abstract:
A system and method for controlling how images are displayed on a display screen of a portable computing device changes the orientation of the images on the display screen when the orientation of the portable computing device changes. The portable computing device is determined to have changed its orientation when it tilts beyond a reference angle that separates a first orientation from a second orientation. If the portable computing device is rapidly tilting back and forth across the reference angle, the value of the reference angle is changed to be either larger or smaller. This prevents the images from rapidly switching back and forth between two different display orientations on a display screen of the portable computing device.
Abstract:
A system and method are disclosed herein for providing mitigation of VoIP PBX fraud while having minimal impact on authorized VoIP PBX users. The method includes a system for detecting potential fraud based on multiple and configurable fraud indicators as well as historical data, which can be customized for individual users or groups, which in turn can trigger the other parts of the system to mitigate fraud. The system can terminate in-process calls that are potentially fraudulent and reset the network access credentials for the user accounts or device(s) that have been potentially compromised. The system can use historical data to block further calls from the compromised user accounts or devices to specific locations where the presumed fraudulent calls were directed. In a further aspect, the system and method can automatically reset the network access credentials for authorized users with minimal down time.