Abstract:
A system and method are disclosed herein for providing mitigation of VoIP PBX fraud while having minimal impact on authorized VoIP PBX users. The method includes a system for detecting potential fraud based on multiple and configurable fraud indicators as well as historical data, which can be customized for individual users or groups, which in turn can trigger the other parts of the system to mitigate fraud. The system can terminate in-process calls that are potentially fraudulent and reset the network access credentials for the user accounts or device(s) that have been potentially compromised. The system can use historical data to block further calls from the compromised user accounts or devices to specific locations where the presumed fraudulent calls were directed. In a further aspect, the system and method can automatically reset the network access credentials for authorized users with minimal down time.
Abstract:
A system and method is provided for two-tiered load balancing on a hosted voice-over Internet protocol (VoIP) private branch exchange (PBX). The system includes a plurality of client devices, at least one device load balancer, and at least one call load balancer. The device load balancer identifies a device group to which each client device belongs; and a cluster of computing resources for processing calls for the device group. The cluster is assigned to the device group based on prescribed conditions. In response to a communications request, call load balancers in communication with the device load balancers dynamically determine if predefined conditions are currently being met within an identified cluster of computing resources. If the predefined conditions are currently being met, then the communications request for a primary client device associated with the request is established via one of a plurality of server nodes within the cluster of computing resources.
Abstract:
Methods and system for automating conferencing in a communication session are provided herein. In some embodiments, a method for automating conferencing in a communication session includes establishing a communication session between a first end-user device and a second end-user device; receiving a first notification message from the first end-user device indicating that the communication session is at least one of visible or joinable by one or more devices associated with the first end-user device, wherein the one or more devices are associated with the first end-user device when the one or more devices are one of (i) pre-registered and stored with an association to the first end-user device, (ii) pre-authenticated to tether the one or more devices to the first end-user device, or (iii) pre-associated with a same user account profile; and sending a second notification message to the one or more devices associated with the first end-user device.
Abstract:
Methods and system for automating conferencing in a communication session are provided herein. In some embodiments, a method for automating conferencing in a communication session includes establishing a communication session between a first end-user device and a second end-user device; receiving a first notification message from the first end-user device indicating that the communication session is at least one of visible or joinable by one or more devices associated with the first end-user device, wherein the one or more devices are associated with the first end-user device when the one or more devices are one of (i) pre-registered and stored with an association to the first end-user device, (ii) pre-authenticated to tether the one or more devices to the first end-user device, or (iii) pre-associated with a same user account profile; and sending a second notification message to the one or more devices associated with the first end-user device.
Abstract:
A system and method are disclosed herein for providing mitigation of fraud in a hosted messaging service while having minimal impact on authorized messaging users. The method includes a system for detecting potential fraud based on multiple and configurable fraud indicators as well as historical data, which can be customized for individual users or groups. The system can terminate in-process messages that are potentially fraudulent and reset the network access credentials for the affected user accounts or devices that have been potentially compromised. The system uses historical data to block further messages from the compromised user accounts or devices to specific destination addresses where the presumed fraudulent messaging activity was directed. In a further aspect, the system and method can automatically reset the network access credentials for authorized users with minimal downtime.