摘要:
A system is configured to receive a request to set up a first video conference and another request to set up a second video conference, where the request is received from a client device and where the other request is received from another client device; obtain first information associated with an enterprise with which the client device is associated and second information associated with another, different enterprise with which the other client device is associated; determine whether the first information permits the client device to set up the first video conference and whether the second information permits the other client device to set up the second video conference; establish the first video conference when the first information permits the client device to set up the first video conference; and establish the second video conference when the second information permits the other client device to set up the second video conference.
摘要:
A device receives call information associated with a call from a first user device to a second user device, where the first user device is associated with a first network, and the second user device is associated with a second network separate from the first network. The call information includes a caller identification and is received via an originating network device of the first network. The device determines whether the caller identification is verified, and adds authentication information to the call information when the caller identification is verified. The device receives the call information and the authentication information from a terminating network device of the first network, and removes the authentication information from the call information. The device adds a cryptographic signature to the call information, and causes the call information and the cryptographic signature to be provided to the second network for routing to the second user device.
摘要:
A device receives call information associated with a call from a first user device to a second user device, where the first user device is associated with a first network, and the second user device is associated with a second network separate from the first network. The call information includes a caller identification and is received via an originating network device of the first network. The device determines whether the caller identification is verified, and adds authentication information to the call information when the caller identification is verified. The device receives the call information and the authentication information from a terminating network device of the first network, and removes the authentication information from the call information. The device adds a cryptographic signature to the call information, and causes the call information and the cryptographic signature to be provided to the second network for routing to the second user device.
摘要:
A device receives, from a server device, a request to determine whether a call is authorized to be forwarded, where the call is intended to be established between the server device and a first client device via a network, and the call is forwarded from the first client device to a second client device. The device receives, from the network, network data associated with the call and account data associated with a first user of the first client device. The device determines that the call is forwarded based on the network data, and processes the account data and information indicating that the call is forwarded, with a machine learning model, to determine a score indicating whether the call is authorized to be forwarded. The device provides the score to the server device to cause the server device to perform one or more actions.
摘要:
A device receives call information associated with a call from a first user device to a second user device, where the first user device is associated with a first network, and the second user device is associated with a second network separate from the first network. The call information includes a caller identification and is received via an originating network device of the first network. The device determines whether the caller identification is verified, and adds authentication information to the call information when the caller identification is verified. The device receives the call information and the authentication information from a terminating network device of the first network, and removes the authentication information from the call information. The device adds a cryptographic signature to the call information, and causes the call information and the cryptographic signature to be provided to the second network for routing to the second user device.
摘要:
A device may receive a first query from a terminating device. The first query may be based on the terminating device having received, from a calling party device, a request to establish a connection with a called party device. The first query may be based on information associated with the calling party device. The device may send, to a caller information device, a second query based on the first query. The device may receive, from the caller information device, caller information based on the second query. The device may compare the caller information to a criterion. The device may modify the caller information, to create modified caller information, when the caller information satisfies the criterion. The device may send the modified caller information to the terminating device for forwarding to another device to support determining how to handle, for the called party device, the request to establish the connection.
摘要:
A device may receive, from a network device, call information associated with a call. The call may be from a calling party device. The call may appear to be intended for a destination device. The call information may be received, from the network device, based on the network device having routed the call. The device may determine, based on the call information, that the call appears to have been forwarded to a called party device that is different from the destination device. The device may determine, based on the call information, a forwarding characteristic for the call. The device may determine that the forwarding characteristic satisfies a criterion. The device may send an output message based on the forwarding characteristic satisfying the criterion to support responding to call forwarding activity that has the forwarding characteristic.
摘要:
A device can receive a call from a calling party device to a called party device, and can determine caller information based on the call from the calling party device. The device can determine that the caller information satisfies a criterion, and can modify the caller information to create modified caller information, the caller information being modified based on the caller information satisfying the criterion. The device can compare the modified caller information to a data structure that includes information associated with multiple call handling decisions. The device can identify a call handling decision, of the multiple call handling decisions, based on comparing the modified caller information to the data structure that includes the plurality of call handling decisions, and can cause the call handling decision to be implemented.
摘要:
A device may receive a first query from a terminating device, The first query may be based on the terminating device having received, from a calling party device, a request to establish a connection with a called party device. The first query may be based on information associated with the calling party device. The device may send, to a caller information device, a second query based on the first query. The device may receive, from the caller information device, caller information based on the second query. The device may compare the caller information to a criterion. The device may modify the caller information, to create modified caller information, when the caller information satisfies the criterion. The device may send the modified caller information to the terminating device for forwarding to another device to support determining how to handle, for the called party device, the request to establish the connection.
摘要:
A network traffic monitoring system detects an identity associated with a telephone call that enters a network and queries a first identity source list that includes entries representative of illegitimate identities and a second identity source list that includes entries representative of legitimate identities to determine whether the detected identity associated with the telephone call matches an entry included in the first identity source list or an entry included in the second identity source list. If the detected identity matches the entry included in the first identity source list, the network traffic monitoring system automatically determines that the detected identity is fake. If the detected identity matches the entry included in the second identity source list, the network traffic monitoring system analyzes one or more attributes of the telephone call other than the detected identity to determine whether the detected identity is fake.