摘要:
When a failure notification is received that was transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with a communication network, device information, network data, and a user profile associated with the wireless communication device is retrieved and processed to generate a network access score for the wireless communication device. If the network access score exceeds a priority threshold, a priority notification is transferred instructing the service node to bypass the authentication for the wireless communication device. If the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, an access notification is transferred instructing the service node to bypass the authentication for the wireless communication device, and subsequent usage of the wireless communication device is monitored for fraudulent activity. If the network access score does not exceed the legitimate user threshold, a suspect notification is transferred instructing the service node to maintain the authentication for the wireless communication device.
摘要:
A method, system, and medium are provided for facilitating message recalls. One embodiment includes receiving an indication that a message has been communicated in association with a user device. A confirmation message is communicated to the user device. The confirmation message includes a recall option that, if selected, initiates a recall of the voice message. An indication of a user selection of the recall option is received and, thereafter, a recall of the message is initiated.
摘要:
What is disclosed is a method of operating a communication system to reconfigure a wireless communication device. The method includes, in the wireless communication device, optically receiving image data. The method also includes processing the image data to display a configuration interface, and receiving an instruction into the configuration interface to reconfigure the wireless communication device.
摘要:
A method, system, and medium are provided for applying call events in association with user devices based on priority levels is provided. One embodiment of the method includes referencing an active event level associated with a user device. The active event level indicates an extent of call events, such as dropped calls and/or blocked calls, in association with the user device. When it is determined that the active event level is unacceptable, a priority level associated with the user device is adjusted based on the active event level to reconcile the unacceptable active event level.
摘要:
Embodiments of the present invention provide systems, methods, and computer-readable media for providing supplemental information to callers during a call. In embodiments, a call is initiated between a first caller and a second caller. Information communicated during the call is monitored to determine that a keyword has been spoken. Supplemental information associated with the keyword is identified, and the supplemental information is provided to the first caller during the call.
摘要:
Embodiments of the present invention provide systems, methods, and computer-readable media for generating a voice characteristic profile based on detected sound components. In embodiments, a call is initiated between a first caller and a second caller. Information communicated during the call is monitored to determine that sound components have been spoken by the first caller. The sound components are determined to be associated with a language dialect. Further, the sound components are stored in association with the first caller. In particular, the sound components are stored in association with the first caller in a voice characteristic profile of the first caller.
摘要:
Computer-readable media and methods are provided for identifying a mobile device as a legitimate subscriber to a communications network or as a clone device. A clone device is not legitimately subscribed to the network but poses as a legitimate device to gain usage of the legitimate mobile device's subscribed services. An application on the legitimate mobile device tracks call detail data for calls of the mobile device. The mobile device has a unique identifier. A network server compares the tracked call detail data against a master list of call detail data for the unique identifier. A mismatch between the mobile device's call detail data and the master list indicates a potential clone. A mobile device using the unique identifier but not providing substantially matching call detail data is identified as a clone. Countermeasures are provided to defeat the clone's usage of the network.
摘要:
A method, system, and medium are provided for identifying participants of video conference sessions. One embodiment of the method includes receiving enhanced video content that identifies one or more participants at a particular location of a video conference session. Each participant may be associated with a mobile device. Video conference participants are identified based on wireless communications from the mobile device, which has an electronic module, that is associated with the corresponding participant. The enhanced video content is displayed on a display screen. Such enhanced video content includes video content captured by a video camera that is aggregated with participant data that provides an indication of at least one participant.
摘要:
Computer-readable media and methods are provided for utilizing analytics collected by a mobile device to inform a user and to implement rules that instruct the mobile device on handling of calls. Analytics that include data about calls made and received by the mobile device are collected by the mobile device. An application on the mobile device uses the analytics to rank callers and provides the rankings to the user. A rule is received by the mobile device that indicates how to handle inbound and outbound calls based at least on the rankings. The analytics and rules are also useable for promotional purposes and can be shared with other services.
摘要:
Systems, methods, and computer media are provided for preserving network address translation (NAT) state for a wireless device across wireless sessions. In response to a state preservation request received during a first wireless session, a device account is created for the wireless device, the account storing NAT state that defines approved content providers from whom inbound data traffic is permitted for the wireless device. Upon determining that the first wireless session has ended and that the wireless device has established a second wireless session, the stored NAT state for the wireless device is activated such that the NAT state of the first wireless session is preserved for the second wireless session. New unsolicited data traffic from approved content providers received during the second wireless session is subsequently permitted and forwarded to the wireless device.