Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 7755. Отображено 100.
05-01-2012 дата публикации

Method and system to identify a source of signal impairment

Номер: US20120005331A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method and system for managing performance of over a multimedia content distribution network (MCDN), such as a digital subscriber line network, involves receiving an indication of an impairment in network performance from an MCDN client. The MCDN node associated with the client may be identified and a community of MCDN clients coupled to the MCDN node may be further identified. Impairment information, representative of MCDN equipment, may be collected for each of the MCDN clients. Detailed network diagnostics and field service may be performed for MCDN clients based on a characterization of the impairment parameters. After remediation of the MCDN node, collection of the impairment information may be terminated.

Подробнее
19-01-2012 дата публикации

Methods and Systems for Controlling the Blocking of Telephone Calls

Номер: US20120014517A1
Принадлежит: Individual

Computer-implemented systems and methods for controlling the blocking of telephone calls are disclosed. A person, for example, bothered by calls from a prison inmate may desire to block future call attempts from that inmate or even desire to block all calls from the confinement/correctional institution at which the inmate is housed. To reduce accidental and fraudulent call blocking, various techniques are used to verify that the party requesting the block is, in fact, the party in control of the telephone number requested to be blocked. Embodiments herein enable call blocking using systems that require little or no human interaction to process a block request, reduce or eliminate accidental blocks via a callback confirmation process, create a documentation trail via the use of a profile and PIN system used for the processing of a block, and/or reduce fraudulent blocks by parties other than those authorized to do so via CNAM (Caller ID) verification.

Подробнее
16-02-2012 дата публикации

Intelligent Loop Diagnostics for Digital Subscriber Line Services to Support a Service Assurance System

Номер: US20120039187A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A method of diagnosing a transmission loop in an Internet protocol television (IPTV) network includes configuring the loop as an open loop and performing a single-ended loop test (SELT), configuring the loop as a terminated-loop and performing another SELT, subtracting a trace of the first SELT from a trace of the second SELT, and determining the length of the loop from the result. A service assurance system in an IPTV network includes a test module and a DSLAM coupled to a residential gateway by a transmission loop. The test module operates to determine that a fault condition on the IPTV network is caused by a fault in the loop, direct the DSLAM to perform an open loop SELT and a terminated-loop SELT on the loop, receive the results of the SELTs, and determine a location of a tap on the loop based upon the results.

Подробнее
15-03-2012 дата публикации

Apparatus for a Receiving Party

Номер: US20120064871A1
Автор: Timo Tokkonen
Принадлежит: Nokia Oyj

Apparatus comprising at least one processor configured to compare an identifier of a calling party with one or more contacts of a receiving party to determine privilege information associated with the calling party, the privilege information providing one or more authorised receiving party location-based responses. The apparatus further comprising at least one processor configured to determine a location of the receiving party and provide an associated authorised response to the calling party.

Подробнее
22-03-2012 дата публикации

Seamlessly conferencing a previously-connected telephone call

Номер: US20120069983A1
Автор: Bouna Sall
Принадлежит: International Business Machines Corp

An already-connected telephone call is conferenced in a seamless manner that is transparent to the call participants, after which one or more additional participants may join the conference. The existing call is preferably moved to a conference bridge responsive to an existing call participant either logging on to a network-accessible user interface (such as a web page or portal-type page) or entering some special key or key combination using the participant's phone (which may be a software application that provides phone-like services). The participant requesting the move may be authenticated, and the authorization of the participant to request the move may be verified, before moving the call.

Подробнее
16-08-2012 дата публикации

Method for providing clean endpoint addresses

Номер: US20120207285A1
Принадлежит: Twilio Inc

A method for providing clean endpoints including managing a collection of endpoints; testing communication of an endpoint of the collection of endpoints; and generating a cleanliness score for the endpoint according to results of the test. The method functions to create a metric that can be used to evaluate undesired communication activity and functionality of an endpoint. The method may be implemented by any suitable platform providing endpoint addresses to clients, which may include service providers, internet-telephony platforms, or any suitable entity. The method is preferably applied to telephony endpoints used in internet-telephony applications, but may be used in any suitable application.

Подробнее
06-09-2012 дата публикации

Systems and methods for handling crosstalk vectoring failures in multi-card vectoring groups

Номер: US20120224674A1
Принадлежит: Individual

A communication system comprises a plurality of line cards having transceivers coupled to a plurality of subscriber lines. Each line card has at least one active transceiver within the same vectoring group, and each line card also has vector logic capable of cancelling crosstalk induced by an active transceiver that is a member of the vectoring group. In the event of a vectoring fault that prevents a line card from receiving vectoring information from at least on other line card, the vector logic is configured to disable vectoring for the interferers affected by the error in order to prevent vectoring operations based on obsolete vectoring coefficients from adversely affecting the quality of the communicated signals. The transceivers communicating signals affected by the suspended vectoring operations are also configured to adjust their constellation density profiles, thereby reducing their data rates, to accommodate the increased noise level resulting from the loss of vectoring. By handling the vectoring fault in such manner, communication can continue without requiring a retrain.

Подробнее
06-09-2012 дата публикации

Systems and methods selectively excluding tones from vectoring

Номер: US20120224683A1
Принадлежит: Individual

A discrete multi-tone (DMT) transceiver communicates tones across a subscriber line. Vectoring is employed in an effort to reduce the effects of crosstalk. However, for some tones, such as tones significantly affected by radio frequency interference (RFI) or other forms of alien noise, vectoring may actually introduce distortions such that the vectoring degrades rather than improves overall signal quality. Control logic of the DMT transceiver is configured to sense when tones are affected by significant levels of alien noise and to exclude such tones from vectoring, thereby improving signal quality for such tones. The control logic also may lower the constellation densities of such tones in order to accommodate the vectoring exclusions applied to such tones.

Подробнее
13-09-2012 дата публикации

Anonymous communication method

Номер: US20120231767A1
Автор: Natsuko Kagawa
Принадлежит: NEC Corp

An anonymous communication establishing device establishes a communication session between a first communication terminal and a second communication terminal if the anonymity level of a calling party terminal, designated in a communication connection request received from the first communication terminal, is allowable for a communication from the first communication terminal to the second communication terminal. Then, when the anonymous communication establishing device receives, from the second communication terminal, a communication transfer request designating the first communication terminal as the calling party terminal and designating a third communication terminal as a transfer destination communication terminal, the anonymous communication establishing device determines whether or not the anonymity level of the first communication terminal as the calling party terminal, designated in the communication transfer request, is allowable for a communication from the first communication terminal to the third communication terminal. If the anonymity level is not allowable, the anonymous communication establishing device determines an anonymity level of the first communication terminal allowable for the communication from the first communication terminal to the third communication terminal, and performs transfer control of the communication session with use of the determined anonymity level.

Подробнее
13-09-2012 дата публикации

Intelligent Policy Deployment

Номер: US20120233216A1
Автор: Keng Lim
Принадлежит: Nextlabs Inc

In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant.

Подробнее
29-11-2012 дата публикации

Circuit switching user agent system, communicating device, and service providing method used therefor

Номер: US20120302238A1
Принадлежит: NEC Corp

A circuit switching user agent system includes a service processing device arranged in a home network of an IMS (IP Multimedia Subsystem)/MMD (Multi-Media Domain). The circuit switching user agent system also includes a communication device arranged in a visited network where a mobile terminal has visited, the communication device having a function of interconversion between a UNI (User-Network Interface) signal in a circuit switching network to which the mobile terminal is connected and a signal used in the IMS/MMD.

Подробнее
03-01-2013 дата публикации

Implementing method and system for terminal communications, and implementing method for terminal location update

Номер: US20130005334A1
Принадлежит: ZTE Corp

An implementing method and system for terminal communication are disclosed, the method includes: a first visitor location register judging, according to an identifier of a first terminal which initiates a communication, whether the first terminal has registered first real name system information in a network, wherein, the first visitor location register is the location register which is currently visited by the first terminal, the communication is initiated by the first terminal to a second terminal, the first real name system information includes the identifier of the first terminal and subscriber identity information of the first terminal, and the subscriber identity information corresponds to the identifier of the first terminal; and in a case when the first visitor location register determines that the first terminal has not registered the first real name system information in the network, terminating the communication initiated by the first terminal.

Подробнее
03-01-2013 дата публикации

Teleconferencing adjunct and user interface to support temporary topic-based exclusions of specific participants

Номер: US20130007635A1
Принадлежит: Avaya Inc

An aspect associates people participating in a conference with one or more specific topics. This association can limit a particular participant's participation to specific topic(s) they are associated with, the one or more media streams for the other topics excluded from viewing and/or listening. For example, if a participant is to provide a presentation for Item 4, and that is the only item the participant should be participating in, that participant could be allowed to join the conference with a status message being provided to the participant as the conference progresses through Items 1-3. An “on-deck” message can be provided to the meeting participant indicating their agenda item is almost ready for discussion, and when Item-4 is selected to be discussed, the participant is provided with one or more appropriate media streams for the conference. The media for the other media streams blocked from the participant for the other items.

Подробнее
10-01-2013 дата публикации

Estimating Pair Symmetry Status for a Communication Line

Номер: US20130010931A1
Принадлежит: Telefonaktiebolaget LM Ericsson AB

An apparatus for estimating pair symmetry status for a communication line (C i ). The apparatus is configured to: obtain a value set indicative of a signal to noise ratio for the communication line (C i ) and at a receive band frequency (f); determine a crosstalk coupling length (L i ) for the communication line (C i ); and estimate the pair symmetry status, based on the obtained value set indicative of the signal to noise ratio (SNR i (f)), the crosstalk coupling length (L i ) and a predetermined symmetry indicator-value (q max ; k i,max ). Related method and computer readable medium are also described.

Подробнее
17-01-2013 дата публикации

Intelligent parental controls for wireless devices

Номер: US20130017806A1
Принадлежит: Qualcomm Inc

Methods, systems and devices for controlling mobile device functions via a combination of parental control settings set by a parent-user and parental control settings set by a third party-user. A parental control server receives parental control settings and context criteria from a parent-user, and parental control settings from a third party user. The parental control server receives authorization from the parent-user to allow third party parental controls to control a child's device. When the context criteria identified by the parent is present (e.g., child device is in identified location, time of day, day of week, etc.), a combination of parental controls designated by the parent-user and the third party control the mobile device.

Подробнее
24-01-2013 дата публикации

Phone test set modem

Номер: US20130022177A1
Принадлежит: Fluke Corp

A phone test set provides modem capability in a hand held device, enabling bi-directional data communications. Demodulation is provided by sampling digitized incoming phone line signals at 4 times carrier frequency, and employing values representing 0 and 90 degree samples to extract the information signal.

Подробнее
24-01-2013 дата публикации

Controlling the use of a wireless mobile communication device

Номер: US20130023263A1
Автор: Mark A. Weinzierl
Принадлежит: Enfora LP

A controlling party can set limitations on a controlled party's access to applications operating on the controlled party's wireless mobile communication device. The controlling party can effectuate these limitations via various different mechanisms. In one instance, the controlling party uses another wireless communication device to effectuate the limitations. In another instance, the limitations are effectuated by the controlling party's operation of a data apparatus connected by a wired data communication bus to the controlled party's wireless mobile communication device. In a still further instance, the controlling party effectuates the limitations by accessing a website supported by a web server.

Подробнее
31-01-2013 дата публикации

Computer telephony

Номер: US20130028252A1
Принадлежит: British Telecommunications plc

Computer-telephony events are initiated by a user operating a computer terminal to control, through a computer-telephony controller, operation of a communications terminal. The computer-telephony controller receives from a first computer terminal a request for a first computer-telephony event; in which the request for the first computer-telephony event comprises a label value. The computer-telephony controller refers to a mapping between the label value and an identifier of a communications terminal; and initiates the requested first computer-telephony event controlling operation of the communications terminal. The computer-telephony controller then receives, from second computer terminal 2 B, a request for the label value. The computer-telephony controller authenticates the label value request and provides to second computer terminal the requested label value. The computer-telephony controller then receives from second computer terminal a request for a second computer-telephony event, in which the request for the second computer- telephony event comprises the label value. The computer-telephony controller refers to the mapping; and initiates the requested second computer telephony event controlling operation of the communications terminal.

Подробнее
21-02-2013 дата публикации

Access Level Control Method And Related Service System

Номер: US20130045718A1
Автор: Ju-Ting Yang
Принадлежит: HTC Corp

An access level control method for an EVVM client in a service system is disclosed. The access level control method comprises applying a plurality of access levels on a message corresponding to a plurality of recipients; and forwarding the message to the plurality of recipients.

Подробнее
07-03-2013 дата публикации

Voice authentication system and method using a removable voice id card

Номер: US20130060569A1
Принадлежит: International Business Machines Corp

A voice authentication system using a removable voice ID card comprises: at server side, a voiceprint database for storing the voiceprints of all authorized users; a voiceprint updating means for updating the voiceprints in said voiceprint database; and a voiceprint digest generator for generating a voiceprint digest according to a request from a client; at client side, a voice ID card for storing the voiceprint of an authorized user; a validation means for validating the voiceprint in the voice ID card on the basis of the voiceprint digest from the server; an audio device for performing voice interaction with a user; and a voice authentication means for determining whether the voiceprint from said voice ID card is of the same speaker as the voice from said audio device.

Подробнее
14-03-2013 дата публикации

Methods and Systems for Managing An Inventory Of Telephone Numbers

Номер: US20130066909A1
Принадлежит: VERIZON PATENT AND LICENSING INC

A system and method in accordance with exemplary embodiments may include storing telephone number inventory data using a database associated with a network, receiving, from a user system, a request for telephone number forecast data, forecasting future telephone number usage based on at least a history of telephone number inventory data, and providing, to the user system, telephone number forecast data based on at least the forecast of future telephone number usage.

Подробнее
21-03-2013 дата публикации

NETWORK TESTING

Номер: US20130070908A1

The present invention provides a method of testing a transmission line from a copper access network. The transmission line is tested to generate values for a plurality of network parameters. Using previously determined test results, it is possible to calculate an estimate of the length of the transmission line based on the values of each of the measured parameters. These estimates of the transmission line length can then be used to compute a weighted average of the transmission line length. An inference of the condition of the transmission line can be made by comparing the estimates of the length of the transmission line with the weighted average length. 1. A method of testing a transmission line in a communications network , the communications network comprising a local exchange and a plurality of transmission lines connected to the local exchange , the method comprising the steps of: 'it) determining an estimate for the length of the transmission line for each of the plurality of transmission line parameters based on the associated value measured in step i) and a pre-determined further value associated with each of the plurality of transmission line parameters;', 'i) measuring a value for each of a plurality of transmission line parameters;'}iii) determining a weighted average transmission line length based on the plurality of transmission line length estimates determined in step ii); andiv) inferring the condition of the transmission line based on the weighted average determined in step iii) and the plurality of transmission line length estimates determined in step ii).2. A method according to claim 1 , wherein in step iv) the ratio of the estimated transmission line length to the weighted average transmission line length is determined for each of the plurality of transmission line parameters and the condition of the transmission line is inferred in accordance with the plurality of ratios.3. A method according to claim 2 , wherein in step iv) claim 2 , the ...

Подробнее
21-03-2013 дата публикации

METHOD AND SYSTEM FOR PROCESSING APPLICATION LOGS

Номер: US20130070917A1
Принадлежит: AT&T Intellectual Property I, L.P.

A method and system for processing application logs describing transactions in a computer telephony integration (CTI) environment is disclosed. The CTI environment includes a plurality of CTI servers configured to execute CTI applications. Numerous instances or types of CTI applications may be executed. A user may request information for a transaction performed in the CTI environment. The relevant application logs indicating the transaction may be determined and output. Information indicating the relevant application logs may be output to the user. 124-. (canceled)25. A computer-implemented method for processing application logs , the method comprising:responsive to receiving a request for information associated with a specific transaction performed in a computer telephony integration environment, retrieving a first plurality of transaction logs from a respective first plurality of applications in the computer telephony integration environment wherein the transaction logs include log data indicative of when and where phone calls have been processed;identifying a second plurality of transaction logs comprising those of the first plurality of transaction logs that include an indication of the specific transaction; anddisplaying information indicative of the second plurality of transaction logs.26. The method of claim 25 , wherein the information displayed includes information indicative of a second plurality of applications corresponding to the second plurality of transaction logs.27. The method of claim 25 , wherein the first plurality of applications includes applications executing on different servers in the computer telephony integration environment.28. The method of claim 25 , wherein retrieving includes logging on to a server in the computer telephony integration environment.29. The method of claim 25 , wherein the specific transaction is a phone call processed in the computer telephony integration environment claim 25 , and wherein the phone call is an incoming ...

Подробнее
28-03-2013 дата публикации

Voice instant messaging

Номер: US20130080550A1
Автор: James Crawford, Shuwu Wu
Принадлежит: Facebook Inc

Systems and techniques for transferring electronic data include enabling instant messaging communication between a sender an at least one recipient through an instant messaging host. In addition, voice communication is enabled between the sender and the recipient through the instant messaging host.

Подробнее
04-04-2013 дата публикации

Systems and methods for presenting end to end calls and associated information

Номер: US20130083903A1
Автор: Patrick M. Peterson
Принадлежит: Raytheon BBN Technologies Corp

Systems and methods that analyze and monitor the performance of a call center including performance of the interactive voice response systems, call center agents, and other components. The systems and methods record characteristics of the call such as the audio data, and analyze that record to identify the events that take place during the call. These events may be defined as customer/call center interactions, such as dropped calls, logic errors or other event. A call center administrator may also identify a set of metrics, such as the number of dropped calls that occur during a day, that may be monitored by the systems described herein. The data collected about these events and metrics may be stored in a database and provided to the administrator through a user interface that allows the administrator to browse through the collected metric and recorded call data and directly review relevant portions of a call.

Подробнее
11-04-2013 дата публикации

METHODS, SYSTEMS, AND DEVICES FOR PROVIDING VOICE-CALL SERVICES RESPONSIVE TO A DIALED SEQUENCE

Номер: US20130089191A1
Автор: Lin Shiejye Geoffrey
Принадлежит: AT&T Intellectual Property I, L.P.

A connection is established in a communications network responsive to receiving a Dual Tone Multi-Frequency (DTMF) signal at a port having an assigned sequence associated therewith. A dialed sequence corresponding to the received DTMF signal is identified. If the dialed sequence is associated with a request for a specified service, first and second fields of a packet-switched signaling protocol message are populated with the assigned sequence associated with the port. The populated packet-switched signaling protocol message is transmitted over a packet-switched network to request the specified service, and a connection is established to provide the specified service through the port. Related systems and devices are also discussed. 1. A method of establishing a connection between a public-switched telephone network and an internet protocol network , the method comprising:receiving a dual tone multi-frequency signal corresponding to a dialed sequence at a port of a network access device, wherein the dialed sequence is a shorter numerical sequence than a first numerical sequence associated with the port;identifying the dialed sequence as a request for a specified service that is different than a connection with another port associated with the dialed sequence;populating a destination field of a session initiation protocol message with a second numerical sequence that is different from the dialed sequence responsive to identifying the dialed sequence as the request for the specified service; andtransmitting the session initiation protocol message from the network access device to a server to request the specified service.2. The method of claim 1 , further comprising:populating the destination field of the session initiation protocol message with the dialed sequence when the dialed sequence is not associated with a request for the specified service.3. The method of claim 1 , wherein the specified service comprises a voice-call service.4. The method of claim 1 , further ...

Подробнее
25-04-2013 дата публикации

METHOD AND SYSTEM FOR DETERMINING AUTHORIZATION LEVELS IN A VIRTUAL PRIVATE NETWORK (VPN)

Номер: US20130101105A1
Принадлежит: AT&T Intellectual Property I, L.P.

Example methods, apparatus and articles of manufacture to determine authorization levels in a virtual private network are disclosed. A disclosed example method includes determining whether a call originated from an originating station associated with a virtual private network, the call originating via a private branch exchange associated with the virtual private network by a first user of a plurality of users associated with the virtual private network, querying a private-number table based on at least one of a switch identifier representing a service switching point, a trunk group identifier representing the private branch exchange, or an originating station identifier representing the originating station to obtain a private number assigned to the first user, and providing an authorization level associated with the private number to the service switching point, the service switching point to process the call according to the authorization level. 1. A method comprising:determining whether a call originated from an originating station associated with a virtual private network, the call originating via a private branch exchange associated with the virtual private network, the call originating on behalf of a first user of a plurality of users associated with the virtual private network;querying, with a service switching point, a private-number table based on a trunk group identifier representing the private branch exchange and an originating station identifier representing the originating station to obtain a private number assigned to the first user; andproviding an authorization level associated with the private number to the service switching point, the service switching point to process the call according to the authorization level.2. The method of claim 1 , wherein the private-number table associates the switch identifier and the trunk group identifier with the private number.3. The method of claim 1 , wherein the private-number table associates a switch identifier ...

Подробнее
02-05-2013 дата публикации

Methods and apparatus to test a subscriber line for a broadband access service

Номер: US20130108258A1
Автор: JIN Wang, Kapil Shrikhande
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Methods and apparatus to test a subscriber line for a broadband access service are disclosed. An example network interface device (NID) comprises a tone generator to transmit a tone on a subscriber line to characterize the subscriber line while a DSL modem is providing a DSL service via the subscriber line, the tone having a frequency occurring within a range of frequencies in use by the DSL modem to provide the DSL service, and a pair of terminals to couple the DSL modem and the tone generator to the subscriber line.

Подробнее
23-05-2013 дата публикации

METHOD AND SYSTEM FOR A MULTITENANCY TELEPHONE NETWORK

Номер: US20130128743A1
Принадлежит: TWILIO, INC.

A method and system for operating a multitenancy telephony system including a call queue that stores call requests received from a plurality of users; an expandable and contractible telephony resource cluster that establishes call sessions for call requests; a analysis system that calculates capacity requirements of the system; a resource allocator that manages the scaling and operation of the telephony resource cluster; and a plurality of telephony network channels that are used as telephony communication channels for call sessions. 1. A method for multitenant calls communication comprising:at a multitenant telephony resource cluster, receiving an outbound call request submitted to a multitenant application programming interface (API), wherein the telephony resource cluster can communicate calls over a public switched telephony network (PSTN), and the telephony resource cluster is limited in call capacity.queuing the outbound call request;dequeuing the queued call request from a plurality of queued call requests, and dequeuing at a dequeueing rate not exceeding the capacity of the telephony resource cluster; andservicing the dequeued call request with the communication resource cluster.2. The method of claim 1 , wherein the call capacity is limited by the number of concurrent calls handled by a fixed number of telephony channels of the telephony resource cluster.3. The method of claim 1 , wherein the call capacity is limited by processing capacity of the telephony resource cluster.4. The method of claim 1 , further comprising dequeuing at least a second call request at substantially the same time as dequeuing the queued call request; and servicing the second dequeued call request at substantially the same time as servicing the dequeued call request.5. The method of claim 1 , the dequeuing rate is a user rate limit.6. The method of claim 1 , wherein queuing the call request includes queuing the call in a queue with call requests from a plurality of users.7. The ...

Подробнее
06-06-2013 дата публикации

CLEARINGHOUSE SERVER FOR INTERNET TELEPHONY AND MULTIMEDIA COMMUNICATIONS

Номер: US20130142041A1
Принадлежит: TransNexus, Inc.

A clearinghouse server for routing multi-media communications, including telephony calls, between a source device and a destination device via a distributed computer network, such as the global Internet. The clearinghouse server can authorize the completion of a communication from a source device to a destination device and collect usage-related information for the completed communication. In response to an authorization request issued by an enrolled source device, the clearinghouse server can identify one or more available destination devices available to accept a communication from an authorized source device. The clearinghouse server can provide a list of the identified destination devices, typically organized in a rank order, by sending an authorization response to the source device. In turn, the source device can use this list to select a destination device and contact that selected device via the computer network to complete the communication. 140-. (canceled)41. A method for authorizing and routing a communication with a clearinghouse server between a source device and a destination device , comprising the steps of:receiving an authorization request from a source device;determining a communication route for completing a communication originating at the source device;identifying one or more destination devices available to complete the communication;balancing use of the one or more destination devices with the clearinghouse server by ranking the one or more destination devices with weighted values which are assigned to each destination device;generating a list comprising the ranked destination devices;forwarding the list to the source device; andreceiving a selection of a destination device from the list.42. The method of claim 41 , wherein each device comprises a Voice over Internet Protocol device.43. The method of claim 41 , wherein ranking the one or more destination devices comprises applying an algorithm that determines the weighted values.44. The method ...

Подробнее
20-06-2013 дата публикации

TRANSPARENT VOICE REGISTRATION AND VERIFICATION METHOD AND SYSTEM

Номер: US20130156166A1
Автор: Gilbert Mazin
Принадлежит: AT&T Intellectual Property I, L.P.

A method includes receiving a communication from a party at a voice response system and capturing verbal communication spoken by the party. Then a processor creates a voice model associated with the party, the voice model being created by processing the captured verbal communication spoken by the party. The creation of the voice model is imperceptible to the party. The voice model is then stored to provide voice verification of the party during a subsequent communication. 1. A method comprising:receiving a communication from a party at a voice response system;capturing verbal communication spoken by the party;creating, with a processor, a voice model associated with the party, the voice model being created by processing the captured verbal communication spoken by the party; andstoring the created voice model to provide voice verification of the party during a subsequent communication,wherein the creating of the voice model is imperceptible to the party.2. The method according to claim 1 , further comprising:receiving a communication from a requester;prompting the requester for information;capturing speech of the requester;processing the captured speech of the requester; andcomparing the processed speech of the requester with the stored voice model.3. The method according to claim 2 , further comprising determining whether the processed speech of the requester matches the stored voice model.4. The method according to claim 3 , further comprising granting the requester access to account information when the processed speech of the requester matches the stored voice model.5. The method according to claim 3 , further comprising denying the requester access to account information when the processed speech of the requester fails to match the stored voice model.6. The method according to claim 3 , further comprising screening the requester when the processed speech of the requester fails to match the stored voice model.7. The method according to claim 3 , further ...

Подробнее
04-07-2013 дата публикации

DIAGNOSTICS PRIMITIVES ON L2/ERB NORMALIZED ERROR SAMPLES

Номер: US20130170628A1
Принадлежит: IKANOS COMMUNICATIONS, INC.

Derivations of new PHY layer diagnostics primitives are based on the normalized error samples collected through G.993.5. The processing uses the ERB and L2 Ethernet packet encapsulation of these ERB data in order to abstract the processing from the PHY layer device dependency, as well as to allow a local and remote processing of the primitives for diagnostics purposes. 1. A method implemented in a communications system , comprising:receiving error packets related to line conditions in a path in the communications system; andmonitoring the line conditions using the received error packets, the monitoring being performed by one or more of customer premises equipment (CPE), a vector control entity (VCE) and a diagnostics application that is remote from the CPE and VCE.2. The method of claim 1 , where monitoring line conditions comprises deriving diagnostic physical (PHY) layer primitives from data in the error packets.3. The method of claim 1 , wherein the error packets include normalized error data samples.4. The method of claim 3 , wherein the error packets comprise ERB as provisioned in ITU-T G.993.5.5. The method of claim 2 , wherein the error packets include normalized error data samples.6. The method of claim 5 , wherein the error packets comprise ERB as provisioned in ITU-T G.993.5.7. The method of claim 1 , wherein the communications system is a very high bit rate digital subscriber line (VDSL) system.8. The method of claim 1 , wherein the path is a downstream path.9. The method of claim 7 , wherein the path is a downstream path.10. The method of claim 1 , further comprising forwarding the error packets to the remote diagnostics application via a network.11. The method of claim 10 , wherein forwarding comprises Ethernet tunneling.12. The method of claim 10 , wherein forwarding comprises proxying.13. The method of claim 12 , wherein proxying includes encapsulating the error packets in an IP frame.14. The method of claim 1 , wherein monitoring includes:extracting ...

Подробнее
11-07-2013 дата публикации

METHODS AND APPARATUS FOR AUTHORIZATION AND/OR ROUTING OF OUTDIAL COMMUNICATION SERVICES

Номер: US20130177146A1
Принадлежит: AT&T Intellectual Property l, L.P.

Example methods disclosed herein include parsing a request to obtain input criteria associated with the request, the request for authorizing an outdial communication service call initiated by a message center. Such example methods also include retrieving authorization rules correlating the input criteria to an authorization result for the outdial communication service call, the input criteria comprising a first input criterion having one of at least two values, a first value indicating that the outdial communication service call is for a real-time outdial service initiated in response to an indial communication service received at the message center, a second value indicating that the outdial communication service call is for a non-real-time outdial service initiated by an application server associated with the message center. Such example methods further include evaluating the authorization rules using the input criteria to determine whether the outdial communication service call is authorized. 1. A method to authorize an outdial communication service call , the method comprising:parsing a request to obtain input criteria associated with the request, the request for authorizing the outdial communication service call initiated by a message center;retrieving authorization rules correlating the input criteria to an authorization result for the outdial communication service call, the input criteria comprising a first input criterion having one of at least two values, a first value indicating that the outdial communication service call is for a real-time outdial service initiated in response to an indial communication service received at the message center, a second value indicating that the outdial communication service call is for a non-real-time outdial service initiated by an application server associated with the message center; andevaluating the authorization rules using the input criteria to determine whether the outdial communication service call is authorized.2 ...

Подробнее
18-07-2013 дата публикации

USER-BASED AUTHENTICATION FOR REALTIME COMMUNICATIONS

Номер: US20130182832A1
Принадлежит: MICROSOFT CORPORATION

Architecture for a communications system enabling a user to provision a telephone at a new location without network administrative pre-configuring. An input component (e.g., keypad) receives a numeric extension and PIN. The extension is a telephone extension of the user and the PIN can be administratively assigned. A location component provides location information of an enterprise communications server to the telephone based on the extension. The telephone uses the location information to send messages to the enterprise communications server. A registration component registers the telephone with the enterprise communications server based on the numeric extension. A telephony address is returned to the telephone. An authentication component authenticates the telephone based on the PIN. Upon authentication, the extension is assigned to the telephone, and telephone communications can be sent and received from that location. 1. A method of communications , the method comprising acts of:initiating a request via a telephone for access to a communications network, the request comprises a telephone number and a personal identification number (PIN);discovering the communications network via the telephone based on the request;authenticating the telephone of a user to the communications network using the telephone number and the PIN;issuing a certificate to the telephone based on the telephone number and the PIN;registering the telephone to the communications network using the certificate; andconfiguring a microprocessor to execute instructions associated with at least one of the acts of initiating, discovering, authenticating, issuing, or registering.2. The method of claim 1 , further comprising provisioning a cell phone claim 1 , as the telephone claim 1 , using at least one of the acts of initiating claim 1 , discovering claim 1 , authenticating claim 1 , issuing claim 1 , or registering.3. The method of claim 1 , further comprising discovering a communications server of ...

Подробнее
12-09-2013 дата публикации

Modular Unit For Simulating Performance In Multi-Lines Digital Subscriber Line (xDSL) System

Номер: US20130238308A1
Автор: Renato Grosso
Принадлежит: Telefonaktiebolaget LM Ericsson AB

According to embodiments of the present invention, a multi-lines cable simulator is provided which is able to simulate also crosstalk between lines. The multi-lines cable simulator is comprised in a modular unit configured to simulate increased number of lines by means adding further modular units. According to further embodiments, the modular unit is configured to also simulate increased line length by means of adding further modular units.

Подробнее
26-09-2013 дата публикации

Cloud computing call centers

Номер: US20130251129A1
Принадлежит: Bolder Thinking Communications Inc

Embodiments of the present invention generally relate to a cloud computing call center that may provide a multi-tenanted platform for scalable, dynamic allocation of telephony, PBX, and call center capabilities. Embodiments of the invention include implementations of a software telephony switch in a cloud computing environment that may dynamically allocate software based PBXes, virtual interactive voice responses (IVRs), and other system components to particular calls.

Подробнее
26-09-2013 дата публикации

System and Method for Control of Communications Connections and Notifications

Номер: US20130251130A1
Принадлежит: Gryphon Networks Corp.

A method and system for selectively establishing a communications connection between an origin and destination in a communications network based on one or mediations rules and one or more lists of prohibited and exempted destination identifiers including preferences either in real-time using a control unit or with a pre-check using an analysis unit while also providing notification messages associated with the allowed or designated allowed communications connections. 1. Apparatus for selectively prohibiting a communications connection between an origin and destination in a communications network , comprising:an interface unit that receives or initiates a connection request for a communication connection between an origin and destination, the request including a destination identifier and a target preference, wherein the target preference is a preference selected as criteria for exempting the destination identifier from a list of otherwise prohibited destinations;a control unit that prohibits or allows the requested communications connection based on lists of prohibited and exempted destination identifiers wherein exempted destinations are determined based on a corresponding preference designation, the control unit determining whether to allow the communications connection depending on the target preference matching at least one of the preference designations.2. The apparatus of wherein the interface unit is any one of an Interactive Voice Response application claim 1 , a predictive dialer server claim 1 , a distributed predictive dialer system claim 1 , a switch claim 1 , a router claim 1 , and an electronic mail server.3. The apparatus of wherein the destination identifier is a telephone number.4. The apparatus of wherein the destination identifier is a facsimile number.5. The apparatus of wherein the destination identifier is an electronic mail address.6. The apparatus of wherein the control unit is a computer server that resides on the premises of any one of a ...

Подробнее
17-10-2013 дата публикации

METHOD FOR TESTING ELEVATOR EMERGENCY PHONES AND ELEVATOR EMERGENCY COMMUNICATION SYSTEM

Номер: US20130272506A1
Принадлежит:

A method is provided for testing an elevator emergency phone, which emergency phone is either VoIP compliant and connected to a WAN or is connected with a mobile connection module for operation in a mobile network. In the method, the phone is periodically initiated to be registered in the corresponding communication network. The registration attempt is monitored by a reporting device. The status data of the registration attempt is communicated by the reporting device to a monitoring center, which itself is connected to the communication network, which monitoring center takes necessary action when either a registration attempt is not being executed within a set time period or if the result of at least one registration attempt has been communicated as failed. 1. A method for testing an elevator emergency phone , which emergency phone is either VoIP compliant and connected to a WAN or is connected with a mobile connection module for operation in a mobile network , said method comprising the steps of:periodically initiating the phone to be registered in the corresponding communication networkmonitoring the registration attempt by a reporting device; and,communicating status data of the registration attempt by the reporting device to a monitoring center, which itself is connected to the communication network, which monitoring center takes necessary action when either a registration attempt is not being executed within a set time period or if the result of at least one registration attempt has been communicated as failed.2. The method according to claim 1 , wherein the status data comprise the time and/or the success of a registration attempt.3. The method according to claim 1 , wherein only failed registration attempts and successful registration attempts following a failed registration attempt are communicated to the monitoring center.4. The method according to claim 1 , wherein the reporting device further communicates an ID of the corresponding emergency phone to the ...

Подробнее
24-10-2013 дата публикации

Telecommunications Network and Method for Time-Based Network Access

Номер: US20130281061A1

The invention relates to a telecommunications network configured for providing access to a plurality of terminals is proposed and a method therefore. Each terminal comprises a unique identifier for accessing the telecommunications network. The telecommunications network comprises a register, an access request receiver and an access module. The register is configured for storing the unique identifier of at least one terminal in combination with at least one grant access time interval, or an equivalent thereof, during which access for the terminal is permitted. The access request receiver is configured for receiving the access request and the unique identifier for accessing the telecommunications network from the terminal. The access module is configured for denying access for the terminal if the access request is received outside the time interval, or the equivalent thereof.

Подробнее
14-11-2013 дата публикации

Disabling Operation Of Features On A Handheld Mobile Communication Device Based Upon Location

Номер: US20130303149A1
Принадлежит: BlackBerry Ltd

Methods and devices for implementing subsystem or functional aspect restrictions on a wireless handheld communication device. Data defining geographical boundaries of a restricted operating area is stored on the device. The present position of the device is ascertained and a determination is made whether the device is located within the restricted operating area. A restriction on the subsystem or functional aspect is imposed when it is determined the device is within the restricted operating area. The subsystem or functional aspect restriction can be communicated to the device via a wireless communication network. Additionally, the restrictions and boundaries can be communicated to the device as part of an IT security policy.

Подробнее
12-12-2013 дата публикации

Telecommunication Call Management and Monitoring System With Voiceprint Verification

Номер: US20130329867A1
Автор: Hodge Stephen Lee
Принадлежит: Value-Added Communications, Inc.

A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party. 1. A call management system for detecting an unauthorized party , comprising: store voiceprints;', 'monitor audio information of a telephone conversation between a local user and a remote user to detect a presence of a first characteristic;', 'search of the stored voiceprints for a matching voiceprint containing a second characteristic that substantially matches the first characteristic;', 'wherein the stored voiceprints include voiceprints of inmates and voiceprints of called parties., 'a control platform configured to2. The system of claim 1 , wherein the control platform is further configured to analyze the audio information to detect the presence of the first characteristic.3. The system of claim 1 , wherein each of the first characteristic and the second characteristic is at least one of a pitch claim 1 , a loudness claim 1 , a frequency or a timbre.4. The system of claim 1 , wherein the control platform is further configured to take an action based on a result of the search of the stored records.5. The system of claim 1 , wherein the control platform is further configured to request an audio sample from the called party claim 1 , ...

Подробнее
26-12-2013 дата публикации

Telephony Equipment Migration

Номер: US20130343527A1
Автор: Colin Tregenza Dancer
Принадлежит: Metaswitch Networks Ltd

A telephony equipment migration arrangement is provided. The telephony equipment migration arrangement includes legacy telephony equipment located in one or more equipment bays, at least one transport cable, with one or more connectors, to provide external carrier connectivity, replacement telephony equipment located in one or more equipment bays remote from the legacy telephony equipment, and at least one remote coupling cable, with one or more connectors, connected to the replacement telephony equipment. The connector(s) of the remote coupling cable are mounted in a location having a predetermined locational relationship with the equipment bay in which the legacy telephony equipment is located, and the transport cable is communicatively coupled to the remote coupling cable.

Подробнее
26-12-2013 дата публикации

VOICE TRAFFIC GATEWAY

Номер: US20130343531A1
Принадлежит: BAE SYSTEMS plc

A voice traffic gateway including: a voice traffic input, a voice traffic output, a first domain router, non-secure warning (NSW) tone application apparatus and a signalling filter. The input receives voice traffic including voice messages and signalling messages from a first traffic domain. The output delivers output voice messages and signalling messages to a second, different traffic domain. The first domain router routes voice messages to the NSW apparatus and routes signalling messages to the signalling filter. The NSW apparatus applies a NSW tone to a received voice message to form an output voice message. The signalling filter compares a feature of a received signalling message with a reference feature. The signalling filter will pass a signalling message if the signalling message feature is the same as the reference feature and will block a signalling message if the signalling message feature is not the same as the reference feature. 116-. (canceled)17. A voice traffic gateway comprising:a voice traffic input arranged to receive voice traffic from a first traffic domain of a communications network, the voice traffic including voice messages and signalling messages;a voice traffic output arranged to deliver output voice messages and output signalling messages to a second, different traffic domain of the communications network;a first domain router coupled to the voice traffic input and configured to route voice messages received from the first traffic domain to a non-secure warning tone application apparatus and to route signalling messages received from the first traffic domain to a signalling filter;wherein the non-secure warning tone application apparatus is configured to apply a non-secure warning tone to each voice message that it receives to form a respective output voice message; andthe signalling filter is configured to compare a feature of each signalling message that it receives with a reference feature, to pass said signalling message as an output ...

Подробнее
26-12-2013 дата публикации

METHOD AND APPARATUS FOR PROVIDING SPECIAL CALL HANDLING FOR VALUED CUSTOMERS OF RETAILERS

Номер: US20130343533A1
Принадлежит: AT&T INTELLECTUAL PROPERTY II, L.P.

The present invention enables users of a network service to register with the network as valued shoppers, thereby allowing them to receive specialized treatment when calling registered retailers. The present invention enables retailers to register with the network, thereby allowing them to set preferred service logic for handling valued customer calls by the network. 1. A method for processing a call setup message in a communication network , comprising:receiving, by a processor in the communication network, the call setup message from an endpoint device of a calling party to a called party;verifying, by the processor, the calling party is associated with a valued customer status and the called party is a registered retailer based upon the call setup message; andprocessing, by the processor, the call setup message in accordance with a registered service logic when the calling party is associated with the valued customer status and the called party is the registered retailer instead of processing the call setup message in accordance with a service logic associated with a regular customer status, wherein the registered service logic directs a call to a live attendant.2. The method of claim 1 , wherein the communication network is a voice over internet protocol network.3. The method of claim 1 , further comprising:registering a phone number of the calling party as being associated with the valued customer status; andregistering a phone number of the called party as being associated with the registered retailer.4. The method of claim 3 , wherein the phone number of the called party is a toll-free phone number.5. The method of claim 3 , wherein the phone number of the called party is a toll phone number.6. The method of claim 1 , wherein the calling party being associated with the valued customer status is selectively set by the calling party.7. The method of claim 1 , wherein the calling party being associated with the valued customer status is selectively set by the ...

Подробнее
02-01-2014 дата публикации

Method And Apparatus For Providing Telephone Service

Номер: US20140004819A1
Автор: Kenneth W. Brent
Принадлежит: Alcatel Lucent USA Inc

A telephony kiosk and method of providing communications services using a telephony kiosk. A preferred telephony kiosk includes a cabinet on which are mounted a user interface and an operator interface, as well as a number of handsets. The handsets preferably include a minimal number of components so that they cost less than fully-functional personal communications devices and to provide a disincentive for theft. Inside the cabinet in this embodiment is an RF module containing a plurality of RF chains that each including a transceiver for sending and receiving communications between one or more handset and a communications network (or networks). A handset manager bridges the handset cord to the RF module. The kiosk is preferably portable.

Подробнее
02-01-2014 дата публикации

Mobility call management

Номер: US20140004833A1
Принадлежит: Aegis Mobility Inc

A mobility call management service is disclosed that provides enhanced call management functionality for a wireless mobile terminal (MT). Incoming and/or outgoing calls are managed based on an assessment of the degree of motion of the MT, or other available data pertinent to the MT's physical situation, such as but not limited to its location, movement, or rate of movement. The degree of motion or other assessment may be used to determine whether a communication can safely terminate on, originate from, or continue safely on the MT, so as to reduce or remove driver distraction.

Подробнее
16-01-2014 дата публикации

Systems and methods for facilitating conference calls using security keys

Номер: US20140018043A1
Принадлежит: BlackBerry Ltd

Systems and methods are described that facilitate a conference call between a plurality of communication devices. The method may comprise: providing a first primary communication device; providing a second primary communication device; providing a conference call controller; establishing a first control link between the first primary communication device and the conference call controller; communicating first identification data between the first primary communication device and the conference call controller via the first control link; establishing a media link between the first and second primary communication devices via the conference call controller. In certain embodiments, the first identification data corresponds to at least one participation level of the first primary communication device with respect to the media link. The method may further comprise establishing a second control link between the second primary communication device and the conference call controller; communicating second identification data between the second primary communication device and the conference call controller via the second control link; wherein the second identification data establishes a participation level of the second primary communication device with respect to the media link.

Подробнее
30-01-2014 дата публикации

SYSTEMS AND METHODS FOR USING THE ADVANCED INTELLIGENT NETWORK TO REDIRECT DATA NETWORK TRAFFIC

Номер: US20140029740A1
Принадлежит: Verizon Services Corp.

A method and system are disclosed for providing a low cost mechanism for remotely rerouting queries in a telecommunications network. A service control point (SCP) executes an application which causes a queries to be launched over a LAN or WAN to a remotely located data center. The system contains a primary and secondary data center, in which the secondary data center operations on a ‘hot-standby’ basis. Based on a manually provided indication, maintenance personnel may telephone and interact with a voice response unit or a web-based interface, which indicates that the SCP or SCP application should route queries to the secondary data center. Similarly, the same mechanism can be used to indicate that queries should be re-routed back to the primary data center. This allows remote management for controlling the queries without having to extensively modify the related infrastructure. 1. A method comprising:receiving, at a web server, as part of a switchover from a primary data center to a secondary data center, a request from a user indicating that redirection of a query to the secondary data center be initiated at a service control point;transmitting, using an IP based communication protocol, an indication from the web server to the service control point that the query should be transmitted to the secondary data center; andascertaining, at the service control point, an IP address associated with the secondary data center to be used for transmitting said query.2. The method of claim 1 , further comprising:transmitting the query from the service control point to the secondary data center using the IP address associated with the secondary data center.3. The method of claim 1 , further comprising:routing the query from the service control point over a data communications network to the secondary data center using the IP address.4. The method of claim 2 , further comprising the steps of:receiving a user identifier and a password from the user;verifying the user identifier ...

Подробнее
13-03-2014 дата публикации

Voice over ip based voice biometric authentication

Номер: US20140075530A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

A request from a party is received by a receiver from a remote system. The request from the party is received when the party attempts to obtain a service using the remote system. A selective determination is made to request, over a network, authentication of the party by a remote biometric system. A request is sent to the remote system for the party to provide a biometric sample responsive to determining to request authentication of the party. The service is provided contingent upon authentication of the party by the remote biometric system.

Подробнее
27-03-2014 дата публикации

Detecting faults affecting communications links

Номер: US20140086295A1
Принадлежит: Aware Inc

A modem or associated computing or testing device is configured to detect the presence of one or more faults that affect DSL communications, and upon their detection, generate, for example, an indication, communication or message that recommends corrective action. In this context, a fault is generally caused by one or more unfiltered devices, impulsive noises, malfunctioning modems, or other factor that does not affect measured attenuation or measured noise, but does affect the signal-to-noise ratio (SNR) of the link. In addition to being able to generate a message guiding a user through corrective action, the system can estimate the rate impact of the detected fault.

Подробнее
03-04-2014 дата публикации

Interjurisdictional recording mechanism

Номер: US20140093055A1
Автор: William J. Dawson
Принадлежит: Veridicom SA de CV

The present invention provides a system for recording an interaction including, a telephone call between a caller and a digital processing system placed over an interjurisdictional boundary, and may include a telephone call placed to at least one called recipient. For example, a caller may place a telephone call over an interjurisdictional boundary to a remote computer server. The server may use an interactive voice response (IVR) unit to obtain caller identification information, provide recording identification information to the caller, and receive authorization from the caller to record an interaction between the caller and a call recipient. The server can also obtain testamentary intent information. A telephone call may then be placed by the server to the recipient, and a two-party digital voice recording can be made on the remote server of a three-way telephone call, in which the server is one of the parties.

Подробнее
10-04-2014 дата публикации

CONTROLLING HOLD QUEUE POSITION ADJUSTMENT

Номер: US20140098944A1

A computer system detects a call from a caller at a hold queue, wherein an identity of the caller is authenticated according to a voice identity of the caller. The computer system accesses a caller profile according to the identity of the caller, wherein the caller profile comprises at least one previously earned advancement token. The computer system offers the caller an option of redeeming the previously earned advancement token for adjustment of a position of the caller in the hold queue. 1. A method for call queue management of advancement tokens , comprising:receiving, by a computer system, a call from a caller at a hold queue, wherein an identity of the caller is authenticated according to a voice identity of the caller;accessing, by the computer system, a caller profile according to the identity of the caller, wherein the caller profile comprises at least one previously earned advancement token; andoffering, by the computer system, the caller an option of redeeming the previously earned advancement token for adjustment of a position of the caller in the hold queue.2. The method according to claim 1 , further comprising:publishing, by the computer system, a question of a second caller from among a plurality of callers waiting in the hold queue;responsive to the caller indicating a readiness to answer to the question, connecting, by the computer system, the second caller with the caller; andresponsive to the caller answering the question, awarding, by the computer system, the caller the advancement token and storing the advancement token in the caller profile for redemption by the caller.3. A method for call queue management of advancement tokens claim 1 , comprising:receiving, by a computer system, a call from a caller at a hold queue, wherein an identity of the caller is authenticated according to a voice identity of the caller;detecting, by the computer system, a characteristic of the caller for which an automatic advancement token is granted; ...

Подробнее
01-01-2015 дата публикации

DATA COMMUNICATION

Номер: US20150003596A1
Принадлежит:

A method and corresponding device for determining a data connection profile for a data connection () between one of a plurality of end-user devices () and an aggregation transceiver device (), the data connection belonging to one of a plurality of predetermined categories, each category being associated with one of a plurality of service providing entities (), the method comprising receiving performance data indicative of the performance of a data connection; receiving an entity identifier indicative of one of said plurality of service providing entities, and determining in dependence thereon the category to which the data connection belongs; and determining a data connection profile for the data connection in dependence on the performance data and on the category so-determined, the data connection profile specifying a set of values for one or more parameters associated with the data connection. 1. A method of determining a data connection profile for a data connection between one of a plurality of end-user devices and an aggregation transceiver device at which data connections in respect of a plurality of end-user devices are aggregated for onward connection through an access network , the data connection being one of a plurality of data connections belonging to one of a plurality of predetermined categories , each category being associated with one of a plurality of service providing entities , each of the plurality of data connections belonging to one of the plurality of predetermined categories , the method comprising , in respect of one of said data connections:receiving performance data indicative of the performance of the data connection;receiving an entity identifier indicative of one of said plurality of service providing entities, and determining in dependence thereon the category to which the data connection belongs; anddetermining a data connection profile for the data connection in dependence on the performance data and on the category so-determined, ...

Подробнее
06-01-2022 дата публикации

Door-Knocking For Teleconferencing

Номер: US20220006975A1
Автор: Ghafran ABBAS
Принадлежит: Vitalchat Inc

A method for teleconferencing between a monitoring device and a user device includes establishing an audio channel connection between the user device and the monitoring device of a remote user; displaying an entry code on a display of the monitoring device; obtaining from a user of the monitoring device a verbal confirmation of the entry code; and, in response to receiving the entry code from the remote user, enabling a camera of the monitoring device. In response to the verbal confirmation, the entry code is sent to the remote user. Enabling the camera of the monitoring device establishes an audio-visual connection between the user device and the monitoring device.

Подробнее
05-01-2017 дата публикации

Reducing the Feedback Overhead During Crosstalk Precoder Initialization

Номер: US20170005700A1
Принадлежит:

An apparatus comprising a receiver coupled to a digital subscriber line (DSL) between an exchange site and a customer premise equipment (CPE) and configured to send a feedback error message to train a precoder coupled to the exchange site, wherein the feedback error message comprises a plurality of error components and an indication of a quantity of bits per error component, a quantization accuracy per error component, or both. Included is a method comprising sending an error feedback message to a DSL crosstalk precoder to train the crosstalk precoder, wherein the error feedback message comprises an error vector and a quantization scaling factor of the error vector. 1. An apparatus comprising:a receiver coupled to a digital subscriber line (DSL) between an exchange site and a customer premise equipment (CPE) and configured to send a feedback error message to train a precoder coupled to the exchange site,wherein the feedback error message comprises a plurality of error components and an indication of a quantity of bits per error component, a quantization accuracy per error component, or both.2. The apparatus of claim 1 , wherein the error components correspond to a plurality of tones in a received pilot symbol.3. The apparatus of claim 2 , wherein the error components comprise a real error component and an imaginary error component for each one of the tones.4. The apparatus of claim 2 , wherein the exchange site comprises a very high bit rate DSL (VDSL) transceiver office unit (VTU-O) that is configured to transmit the pilot symbol to the CPE.5. The apparatus of claim 1 , wherein the CPE comprises a very high bit rate DSL (VDSL) transceiver remote unit (VTU-R) that is configured to determine the quantity of bits per error component claim 1 , the quantization accuracy per error component claim 1 , or both claim 1 , and transmit the error feedback message to the exchange site.6. The apparatus of claim 1 , wherein the precoder is a crosstalk precoder claim 1 , and ...

Подробнее
07-01-2016 дата публикации

DETECTION OF DOUBLE TALK IN TELECOMMUNICATIONS NETWORKS

Номер: US20160006480A1
Автор: Tan Mizhou
Принадлежит:

In one embodiment, the presence of double talk (DT) is detected in a telecommunications network having a near-end user and a far-end user. The energies of both (1) a signal received from the far-end user by the near-end user and (2) a signal to be communicated from the near-end user to the far-end user are computed. An echo return loss (ERL) estimate is calculated based on the energy calculations, and a preliminary decision is made as to whether DT is present based on the ERL estimate and the energy calculations. If DT is detected, then a counter is set to a hangover value. If DT is not detected, then the counter is reduced. This process is repeated, and, for each iteration, a final decision as to whether DT is present is made based on the counter value. 1. One or more machine-readable storage media comprising a plurality of instructions stored thereon that , when executed , cause a controller to:generate a measure of average energy of a near-end signal in the telecommunications network;generate a measure of average energy of a far-end signal in the telecommunications network;generate a double-talk (DT) decision statistic based on the near-end average energy measure and the far-end average energy measure, wherein to generate the DT decision statistic comprises to (i) generate an estimate of echo return loss (ERL) based on the near-end average energy measure and the far-end average energy measure and (ii) generate the DT decision statistic based on the ERL estimate, the near-end average energy measure, and the far-end average energy measure; andgenerate a DT decision as to whether or not double talk is present in the telecommunications network based on the DT decision statistic.2. The one or more machine-readable storage media of claim 1 , wherein to generate the measure of average energy of the near-end signal in the telecommunications network comprises to generate a weighted moving average of instantaneous near-end energy measures claim 1 , andwherein to generate ...

Подробнее
05-01-2017 дата публикации

Multi-operator vectoring in digital subscriber line modems

Номер: US20170006154A1
Принадлежит: Ikanos Communications Inc

Methods, systems, and devices are described for wired communication. A first distribution point uses sets of modems to communicate with a second distribution point over a crosstalk link to exchange information and coordinate the use of multiple sets of frequency bands. In some cases, the first distribution point may share a cable binder with the second distribution point and detect crosstalk on the subscriber lines in the cable binder. Based at least in part on the crosstalk detected by the first distribution point, the first and second distribution points may communicate over a crosstalk link between sets of lines in the binder. The distribution points may use one or more sets of predefined tones within the multiple sets of frequency bands to exchange messages, where the messages may include synchronization information, operating parameters, or control and data information.

Подробнее
05-01-2017 дата публикации

Telecommunication Call Management and Monitoring System With Voiceprint Verification

Номер: US20170006155A1
Автор: Hodge Stephen Lee
Принадлежит: Globel Tel*Link Corp.

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters. 1. A system comprising: store biometric data of a plurality of users;', 'store first identifying information associated with the plurality of users in correspondence with the biometric data; and, 'a database configured to [ receive second biometric data associated with a calling party;', 'receive second identifying information related to the calling party;', 'find in the database third identifying information from among the first identifying information that matches the second identifying information received from the calling party;', 'retrieve from the database third biometric data associated with the third identifying information;', 'compare the second biometric data received from the calling party with the third biometric data retrieved from the database; and', 'authenticate the calling party based on the comparison; and, 'prior to a call, acquire and store biometric information of the called party;', 'acquire, at regular intervals, biometric information of a person speaking;', 'compare the acquired biometric information of the person speaking to at least one of the stored third ...

Подробнее
07-01-2016 дата публикации

METHOD AND APPARATUS FOR CONTROLLING A DEVICE

Номер: US20160007199A1
Автор: MONONEN Jari
Принадлежит:

In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising a memory configured to store a time parameter defining a locking period, processing circuitry configured to determine, using the time parameter, whether the locking period has elapsed, the processing circuitry being further configured to, responsive to a determination that the locking period has elapsed, cause a locking feature to be disabled, wherein the locking feature is, when enabled, configured to restrict use of the apparatus to use with identity modules of a first type. The locking period may comprise an exclusivity period. The identity module may comprise a subscriber identity module. 123-. (canceled)24. An apparatus , comprising:a memory configured to store a time parameter defining a locking period;processing circuitry configured to determine, using the time parameter, whether the locking period has elapsed; 'wherein the locking feature is, when enabled, configured to restrict use of the apparatus to use with identity modules of a first type.', 'the processing circuitry being further configured to, responsive to a determination that the locking period has elapsed, cause a locking feature to be disabled,'}25. An apparatus according to claim 24 , wherein the time parameter comprises at least one of a length of time and an end time.26. An apparatus according to claim 25 , wherein the end time comprises an end date.27. An apparatus according to claim 24 , wherein the processing circuitry is further configured to begin the locking period as part of an initial setup procedure of the apparatus.28. An apparatus according to claim 24 , wherein the locking feature is enabled during the locking period.29. An apparatus according to claim 24 , wherein the processing circuitry is comprised in a secure processing environment in the apparatus.30. An apparatus according to claim 24 , wherein the processing circuitry is configured to claim 24 , responsive to ...

Подробнее
04-01-2018 дата публикации

AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION

Номер: US20180007194A1
Автор: Hodge Stephen Lee
Принадлежит:

An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use. 1. A method , comprising:interfacing an incoming communication processing system to an outgoing communication processing system, wherein the outgoing communication processing system includes hardware separate from the incoming communication processing system;receiving an incoming communication, wherein the incoming communication includes an inmate identification;determining an inmate communication device associated with the inmate identification using inmate communication device information stored by the outgoing communication processing system; androuting the incoming communication to the determined inmate communication device based on the determining.2. The method of claim 1 , wherein the incoming communication includes a text component and a video component.3. The method of claim 1 , wherein the inmate communication device is a personal wireless device.4. The method of claim 1 , further comprising:monitoring biometric information included in the incoming communication to detect a presence of an unauthorized party.5. The method of claim 1 , wherein the inmate communication device information includes routing rules configured to route the incoming communication based on identification information related to an outside party originating the incoming communication.6. The method of claim 5 , wherein the determining claim 5 , further comprises:searching a block list based on the identification information; ...

Подробнее
03-01-2019 дата публикации

SYSTEMS AND METHODS FOR GENERATING APPLICATION DATA FROM CALL DATA

Номер: US20190007551A1
Принадлежит: RINGCENTRAL, INC.

Systems and methods are provided for generating application data from call data. In one implementation, a method includes acquiring call data from a call-data source with a call-data aggregator; modifying a portion of the call data with a call-data modifier; and generating application data from the portion of the call data. Application data may be configured for diagram generation. The diagram may graphically indicate call volume in branches of an interactive voice response (IVR) system map. The diagram may be a flow diagram including a connector associated with a branch of the IVR system map and the connector may have a width proportional to a call volume in the branch of the IVR system map. The diagram may indicate call-portion durations, which may be associated with a phase of a call and which may have a color associated with a phase of a call. 1. A computer-implemented method for generating application data from call data , the method comprising:acquiring, with one or more call-data aggregators, call data from at least one call-data source;modifying at least a portion of the call data with a call-data modifier;generating application data from the portion of the call data, wherein the application data is configured for diagram generation; andgenerating a diagram based on the application data, wherein the diagram indicates volumes of calls in branches of an interactive voice response (IVR) system map.2. (canceled)3. The method of claim 1 , wherein the diagram comprises a flow diagram comprising a connector associated with a branch of the IVR system map and wherein the connector has a width proportional to a volume of calls in the branch of the IVR system map.4. The method of claim 3 , wherein the connector has a color associated with a branch of the IVR system map.5. The method of claim 3 , wherein the connector has a color associated with an endpoint of a branch of the IVR system map.6. (canceled)7. (canceled)8. A system for generating application data from call ...

Подробнее
14-01-2016 дата публикации

Telecommunication call management and monitoring system with voiceprint verification

Номер: US20160014270A1
Автор: Stephen Lee Hodge
Принадлежит: Global Tel Link Corp

A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.

Подробнее
14-01-2021 дата публикации

CROSSTALK MITIGATION

Номер: US20210013925A1
Принадлежит:

Methods and devices are provided for estimating crosstalk from a legacy line to a vectored line. 1. A method , comprising:estimating crosstalk from at least one first communication line not operating according to a vector standard to at least one second communication line operating according to a vector standard, andadapting a vectoring based on the estimated crosstalk.2. The method of claim 1 , wherein estimating crosstalk comprises transmitting a probe signal from a central office device on the at least one first communication line.3. The method of claim 2 , further comprising aligning the probe signal with synchronization symbols on the at least one second communication line.4. The method of claim 3 , wherein communication via the at least one first communication line is a multitone communication claim 3 , wherein sending the probe signal comprises transmitting predetermined data on a subset of tones of the multitone modulation.5. The method of claim 4 , further comprising at least one of adding artificial noise to the tones of the selected tones claim 4 , exclusion of the tones from a supported set of tones claim 4 , exclusions of the tones by a mask parameter or excluding the tones from communication by modifying a communication device coupled to the at least one first communication line.6. The method of claim 3 , wherein the probe signal is orthogonal to crosstalk estimation signals transmitted on the at least one second communication line.7. The method of claim 3 , wherein a synchronization signal comprises the probe signal.8. The method of claim 1 , wherein estimating crosstalk comprises estimating crosstalk from the at least one first line to the at least one second line based on uncorrelated data symbols on the at least one first line.9. The method of claim 8 , wherein estimation of crosstalk is performed prior to training of the at least one first line.10. The method of claim 1 , further comprises re-using previously estimated crosstalk.11. A ...

Подробнее
09-01-2020 дата публикации

LOAD COIL MEASUREMENT IN A NETWORK USING A PSEUDORANDOM BINARY SEQUENCE (PRBS) BASED TECHNIQUE

Номер: US20200014795A1
Принадлежит: VIAVI SOLUTIONS INC.

A test device for measuring load coils in a network using a pseudorandom binary sequence (PRBS) based technique is disclosed. The test device may comprise a transmitter to transmit a plurality of test signals at a test point in a network. The test device may comprise a receiver to receive a plurality of response signals at the test point. The test device may also comprise a processor to analyze the plurality of response signals and perform at least one load coil measurement. The processor may achieve this by applying a transformation calculation to generate a plurality of terms of the transformation calculation simultaneously, converting the plurality of terms of the transformation calculation into a plurality of impedances, converting the plurality of impedances into polynomials using a conversion technique, analyzing the polynomials for poles and zeros, and estimating at least one load coil measurement based on the poles and zeros of the polynomials. 1. A test device comprising:a transmitter to transmit a plurality of test signals at a test point in a network, wherein the test signal is a test-ready pseudorandom binary sequence (PRBS) signal converted from a PRBS signal based on a frequency domain;a receiver to receive a plurality of response signals at the test point; and applying a transformation calculation to generate a plurality of terms of the transformation calculation simultaneously;', 'converting the plurality of terms of the transformation calculation into a plurality of impedances, wherein the plurality of impedances is represented as a function of frequency;', 'converting the plurality of impedances into polynomials using a conversion technique;', 'analyzing the polynomials for poles and zeros; and', 'estimating at least one load coil measurement based on the poles and zeros of the polynomials., 'a processor to analyze the plurality of response signals and perform at least one load coil measurement by2. (canceled)3. The test device of claim 1 , wherein ...

Подробнее
21-01-2016 дата публикации

Telecommunication call management and monitoring system with voiceprint verification

Номер: US20160021242A1
Автор: Stephen Lee Hodge
Принадлежит: Global Tel Link Corp

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

Подробнее
21-01-2016 дата публикации

Telecommunication call management and monitoring system with voiceprint verification

Номер: US20160021243A1
Автор: Stephen Lee Hodge
Принадлежит: Global Tel Link Corp

A secure telephone call management system is provided for authenticating users of a telephone system in an institutional facility. Authentication of the users of the telephone call management system is accomplished by using a personal identification number, biometric means, and/or radio frequency means. The secure telephone call management system includes accounting software capable of limiting access to the system based on funds in a user's account, and includes management software capable of implementing widespread or local changes to the system. The system monitors a conversation in the telephone call to detect a presence of a first characteristic in audio of the conversation, and terminates the telephone call if the first characteristic does not match a second characteristic of biometric information of a user or a called party.

Подробнее
22-01-2015 дата публикации

Telephone system, apparatus, and method for providing enhanced privacy features

Номер: US20150023485A1
Принадлежит:

A telephone system for enhanced privacy management includes a telephone switch, a rejected call handler, a user preference database, and an internet app privacy manager, whereby an incoming call can be assigned to a calling class, and routed according to a calling rule associated with the calling class. Using an interactive voice response menu or an application portal, the user can assign callers to calling classes and specify call handling rules and schedules. A rejected call handler includes a voice interface, a switch control, a voicemail, interactive voice response, call progress simulator, in-message options, in-call options, post-call options, and other components. Further disclosed is a method for determining a calling rule, including determining the caller id status, querying a calling rules table, and determining a calling rule. 2. The telephone system for enhanced privacy management of claim 1 , further comprising a user preference database claim 1 , wherein the rejected call handler stores and retrieves the calling rules in the user preference database.3. The telephone system for enhanced privacy management of claim 2 , wherein the rejected call handler is further comprising an interactive voice response component claim 2 , wherein the interactive voice response component controls touch-tone based privacy rule set-up processing claim 2 , and stores the results of the users selections in the user preference database.4. The telephone system for enhanced privacy management of claim 2 , further comprising an internet app privacy manager claim 2 , wherein the internet app privacy manager stores the results of user selections in the user preference database claim 2 , and the internet app privacy manager controls functions provided by the rejected call handler.5. The telephone system for enhanced privacy management of claim 1 , wherein the media traffic further comprises a telephone call.6. The telephone system for enhanced privacy management of claim 1 , ...

Подробнее
22-01-2015 дата публикации

TELEPHONIC COMMUNICATION REDIRECTION AND COMPLIANCE PROCESSING

Номер: US20150023486A1
Принадлежит:

Processing telephonic communication is disclosed. A request to establish communication is received from a first communication participant. A first identifier associated with the request is mapped to a second identifier associated with a second communication participant. The second identifier is used to establish communication between the first and the second participant in a manner that allows at least a portion of the communication between the first and second participants to be monitored. Compliance processing is performed with respect to at least a portion of said at least a portion of the communication between first and the second participant. The first identifier is made available to the first participant in a manner that causes the first participant to associated the first identifier with the second participant, the first identifier cannot be used to reach the second participant directly, and the second identifier is not provided to the first participant. 1. A method of processing a communication , comprising:receiving from a first communication device a request to establish communication with a particular second communication device;establishing a communication session terminated between the first communication device and a compliance system prior to the request being allowed to trigger an indication available to a human user associated with the second communication device, the indication indicating that the request is received;mapping a first identifier included in the request to a second identifier not included in the request, wherein the first identifier is used by the first communication device to specify the second communication device to establish communication with, and wherein the first identifier cannot be used to reach the second communication device directly;using the second identifier to conference the second communication device in to the established communication session terminated between the first communication device and the compliance system ...

Подробнее
22-01-2015 дата публикации

VECTORED DSL CROSSTALK CANCELLATION

Номер: US20150023494A1
Принадлежит:

A vector DSL system includes a plurality of modems, which may be multi-port devices. Unprocessed user data is extracted from the modems and passed through a private vectoring data routing apparatus to one or more vectoring modules, such as vectoring cards. Each vectoring module includes one or more vector processors that include processing units configured to process the unprocessed user data on the basis of all modems' data for a given DSL tone grouping. Processing of the unprocessed user data removes the effects of FEXT from upstream and downstream user data and returns the processed user data to the modems using the vectoring data routing apparatus, which can be a specialized data transmission network utilizing one or more vector routers. 1. A method for removing crosstalk interference in a vectored digital subscriber line (DSL) system , the method comprising:extracting unprocessed user data from a vectoring group comprising a plurality of DSL ports implemented by one or more upstream-end DSL modems, wherein the unprocessed user data comprises frequency domain data in one or more DSL ports;transmitting the extracted unprocessed user data over a vector data network to a vectoring control entity (VCE), wherein transmitting includes routing the extracted unprocessed user data between a vector router pair in the vector data network, the vector router pair comprising vector routers respectively associated with the vectoring group and the VCE;generating, by the VCE, processed user data by processing the unprocessed user data to perform crosstalk cancellation using far-end crosstalk (FEXT) cancellation data and the unprocessed user data for the vectoring group; andtransmitting the processed user data via the vector data network from the VCE to the plurality of DSL ports from which the unprocessed user data was extracted, wherein the steps of extracting and transmitting are performed with new unprocessed user data each discrete multitone (DMT) symbol period of the ...

Подробнее
21-01-2021 дата публикации

SYSTEM AND METHOD FOR ASSESSING SECURITY THREATS AND CRIMINAL PROCLIVITIES

Номер: US20210021703A1
Автор: VOLKART Mitch
Принадлежит: Global Tel*Link Corporation

A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts. 1. A threat prediction system for predicting a threat potential of an inmate , the system comprising:one or more circuits and/or processors configured to:receive a previously-stored inmate communication;receive a plurality of topics and a plurality of topic weights that correspond to the plurality of topics;determine one or more topics present in the previously-stored inmate communication;assign a topic score to each of the determined one or more topics;retrieve previously-stored threat information of the inmate;compare the received topics to the previously-stored threat information; andassign a threat score to the inmate based on the comparison.2. The threat prediction system of claim 1 , wherein the one or more circuits and/or processors are further configured to scale the topic weights by a number of data points examined for the inmate;3. The threat predication system of claim 2 , wherein the one or more circuits and/or processors are further configured to normalize the scaled weights based on scaled weights of other ...

Подробнее
21-01-2021 дата публикации

SYSTEM AND METHOD FOR ELECTRONIC NOTIFICATION IN INSTITUTIONAL COMMUNICATIONS

Номер: US20210021708A1
Автор: SEYFETDINOV Serge
Принадлежит: Value-Added Communications, Inc.

Disclosed is a multi-mode communication notification system and method for improving communication between an inmate and a third party by enabling a third party to send a web-initiated contact request for a specific inmate and further allowing the inmate to check his/her contact requests or be automatically notified of contact requests. Additionally, the system electronically notifies the third party when the specific inmate has been notified of the contact request. Further, the system notifies the third party if they have missed a call from the specific inmate. 1. A call management system for a correctional institute that provides web-initiated contact requests , the system comprising:a telephonic instrument located at the correctional institute and associated with an inmate of the correctional institute;a router coupled to the telephonic instrument and configured to route telephonic communications to and from the telephonic instrument, the telephonic communications being between a local user using the telephonic instrument and a remote user located outside the correctional institute; and receive a call attempt from an external caller directed to the inmate;', 'determine that the inmate is unavailable to receive the call;', 'terminate the call attempt; and', 'transmit a notification message to the inmate, notifying the inmate of the missed call attempt., 'a control platform configured for monitoring, recording, controlling, storing, and billing related to the telephonic communications, the control platform comprising one or more processors and/or circuits configured to2. The call management system of claim 1 , wherein the control platform is further configured to transmit claim 1 , in response to transmitting the notification message to the inmate claim 1 , a message to the external caller that informs the external caller that the inmate has been notified of the missed call attempt.3. The call management system of claim 1 , wherein the control platform is further ...

Подробнее
28-01-2016 дата публикации

SYSTEM AND METHOD TO REDUCE CROSSTALK OF DIGITAL SUBSCRIBER LINES

Номер: US20160028436A1
Принадлежит:

A method includes identifying, at a processor, a set of communication lines from a plurality of communication lines, the set of communication lines including a first communication line and a second communication line. A first crosstalk characteristic of the first communication line is correlated with a second crosstalk characteristic of the second communication line. The method also includes modifying, at the processor, a first signal corresponding to the first communication line based on a second signal corresponding to the second communication line. 1. A method comprising:identifying, at a processor, a set of communication lines from a plurality of communication lines, the set of communication lines including a first communication line and a second communication line, wherein a first crosstalk characteristic of the first communication line is correlated with a second crosstalk characteristic of the second communication line; andmodifying, at the processor, a first signal corresponding to the first communication line based on a second signal corresponding to the second communication line.2. The method of claim 1 , further comprising rearranging a termination of a particular communication line at an access node claim 1 , wherein the particular communication line includes the first communication line or the second communication line.3. The method of claim 2 , wherein rearranging the termination comprises:disconnecting the particular communication line from a first port of the access node; andconnecting the particular communication line to a second port of the access node.4. The method of claim 2 , wherein rearranging the termination comprises electronically switching the particular communication line from a first port of the access node to a second port of the access node.5. The method of claim 1 , wherein the second signal causes interference to the first signal claim 1 , and wherein the first crosstalk characteristic is determined based on a measurement of the ...

Подробнее
26-01-2017 дата публикации

Methods and apparatus for operating an access network

Номер: US20170026257A1
Автор: Ian Edwin Horsley
Принадлежит: British Telecommunications plc

Methods and apparatus are disclosed for operating an access network including data connections ( 19 ) between end-user devices ( 12, 14, 16, 18 ) and an aggregation transceiver ( 20 ) at which connections ( 19 ) are aggregated for onward connection through the network. The method comprises, for each connection, obtaining connection data for each of a plurality of monitoring periods, each comprising shorter periods, the connection data comprising performance and user activity indications for each shorter period; monitoring the performance of the connection in order to estimate a measure of its performance during a particular monitoring period that discounts performance indications obtained in respect of shorter periods within that monitoring period when the user was inactive unless activity indications in respect of corresponding shorter periods within other monitoring periods indicate that such user inactivity is anomalous; and applying a profile to the connection that is dependent on the measure of performance of the data connection.

Подробнее
26-01-2017 дата публикации

Digital subscriber line profile selection method and apparatus

Номер: US20170026522A1
Автор: Ian HORSLEY, Trevor Linney
Принадлежит: British Telecommunications plc

An Initial Profile Application Apparatus (IPAA) is operable to apply an initial profile to a modem pair connection system, the modem pair connection system comprising a first modem, a corresponding second modem and a metallic wire connection, wherein the first and second modems are operable to establish a data connection between themselves over the metallic wire connection. The IPAA comprises: a receiver; an evaluator; a line database; a comparator; a determiner; and an applicator.

Подробнее
28-01-2016 дата публикации

Method and apparatus for gauge identification based on single ended line testing (selt)

Номер: US20160028866A1
Принадлежит: Ikanos Communications Inc

The present invention relates generally to characterizing loops in a communication system, and more particularly to methods and apparatuses for loop gauge identification. In accordance with certain aspects, embodiments of the invention extract some information from the SELT signal. From SELT, the loop impedance, or equivalently input impedance, is determined. This information is then used for gauge identification.

Подробнее
25-01-2018 дата публикации

SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING DSL LINE FAULT DETERMINATION AND LOCALIZATION VIA SELT, DELT, AND MELT DIAGNOSTICS

Номер: US20180027113A1
Принадлежит:

In accordance with embodiments disclosed herein, there are provided apparatus, systems and methods for implementing DSL line fault determination and localization via SELT, DELT, and MELT diagnostics. For example, such a system or computer implemented method may include means for: receiving Metallic Loop/Line Testing (MELT) test output from applying a MELT test to a DSL line; receiving Dual-End Line Testing (DELT) test output from applying a DELT test to the DSL line; receiving Single-Ended Loop Testing (SELT) test output from applying a SELT test to the DSL line; determining one or more faults are present on the DSL line by comparing the MELT test output, the DELT test output, and the SELT test output; and localizing the one or more determined faults by comparing the MELT test output, the DELT test output, and the SELT test output. Other related embodiments are disclosed. 1. A method comprising:receiving Metallic Loop/Line Testing (MELT) test output from applying a MELT test to a DSL line;receiving Dual-End Line Testing (DELT) test output from applying a DELT test to the DSL line;receiving Single-Ended Loop Testing (SELT) test output from applying a SELT test to the DSL line;determining one or more faults are present on the DSL line by comparing the MELT test output, the DELT test output, and the SELT test output; andlocalizing the one or more determined faults by comparing the MELT test output, the DELT test output, and the SELT test output.2. The method of :wherein the MELT test output indicates a potential fault is detected on the DSL line via the MELT testing, an estimated distance to the fault, and a corresponding fault type based on the MELT test output;wherein the DELT test output indicates the potential fault is detected on the DSL line via the DELT testing and a corresponding fault type based on the DELT test output; andwherein the SELT test output indicates the potential fault is detected on the DSL line via the SELT testing, an estimated distance to the ...

Подробнее
25-01-2018 дата публикации

TOLL-TREE NUMBERS METADATA TAGGING, ANALYSIS AND REPORTING

Номер: US20180027129A1
Автор: Sharma Sriram
Принадлежит:

A toll-free tagging service is provided that includes a subscription-based service that is made available to responsible organizations, consumers and businesses. The toll-free tagging service may provide the ability to tag a toll-free number (or group of numbers), and once a number is tagged, to track updates to that number that may then be distributed to customers through emails/text messages or other means. Subscribers of the toll-free tagging service may also have the ability to create, view, update and delete tags through a web application, mobile application, or some other user interface. 1. A method comprising:receiving data relating to at least one of a dip rate or dip volume that is associated with a toll-free telecommunications number;receiving identity data relating to usage of the toll-free telecommunications number;analyzing the combined data and identity data to create a fraud rating metadata tag that is associated with the toll-free telecommunications number, wherein the fraud rating metadata tag is a quantitative summary of the suspicious call activity associated with the toll-free telecommunications number; anddistributing a communication to an entity regarding the suspicious call activity associated with the toll-free telecommunications number.2. The method of claim 1 , wherein the identity data is CNAM data.3. The method of claim 1 , wherein the tag includes data related to a category of toll-free number.4. The method of claim 3 , wherein the category related to an industry segment.5. The method of claim 1 , wherein the tag includes data relating to popularity as derived at least in part from the search history associated with the toll-free number.6. The method of claim 1 , wherein the tag includes location information associated with the toll-free number.7. The method of claim 1 , wherein the tag includes financial information associated with the toll-free number.8. The method of claim 1 , wherein the social media data includes data relating to a ...

Подробнее
29-01-2015 дата публикации

METHOD AND APPARATUS FOR DESIGNING AN IMPROVED TRANSMIT SIGNAL FOR USE IN A SINGLE ENDED LINE TEST (SELT)

Номер: US20150030137A1
Принадлежит:

The present invention relates to methods and apparatuses of using a novel transmit signal that can be used to improve performance of various loop diagnostic features of SELT. In embodiments, a novel transmit signal uses a wide contiguous band of tones that includes frequencies in both upstream and downstream bands. In these and other embodiments of the invention, the SELT transmit signal is designed such that any crosstalk noise in adjacent lines appears as a burst of noise that falls within the limits of the FEC settings of the system such that it can be fully corrected without harming the performance of modems connected on the adjacent lines. 1. A method for examining a line coupled to a modem in a discrete multi-tone (DMT) communications system , comprising:transmitting from the modem a test signal using tones in both upstream and downstream frequency bands of the DMT communications system;receiving a reflection of the test signal at the modem; andanalyzing the reflection to identify impairments in the line.211. A method according to claim 1 , wherein the reflection comprises frequency domain S data.3. A method according to claim 1 , further comprising converting the reflection to a set of time domain data.4. A method according to claim 3 , wherein analyzing includes identifying peaks in the set of time domain data.5. A method according to claim 1 , wherein the modem is a CPE modem and the upstream and downstream bands are two or more adjacent bands in a xDSL system frequency band plan.6. A method according to claim 5 , wherein the test signal comprises a symbol constructed using tones in the upstream and downstream bands.7. A method according to claim 6 , wherein the tones are a contiguous set of tones spanning the upstream and downstream bands.8. A method according to claim 5 , wherein the xDSL system is a vectored DSL system claim 5 , and wherein transmitting is performed while one or more other lines in a vectored group including the line are operating in ...

Подробнее
29-01-2015 дата публикации

METHOD AND APPARATUS FOR DETECTING AND LOCATING LOOP IMPAIRMENTS

Номер: US20150030138A1
Автор: Kalavai Raghunath
Принадлежит:

According to certain aspects, the present invention relates to methods and apparatuses to identify and locate a line-cuts in a loop that may or may not also contain bridgetaps. In embodiments, different bands of SELT signal data are analyzed separately using a TDR method, to effectively detect any potential bridgetaps. In these and other embodiments, by combining information from the separate bands, bridgetap locations and lengths are determined. Methodology is also established to distinguish legitimate line cut or bridgetap signal data from spurious data. According to certain aspects, embodiments of the invention also incorporate baselining, which includes tests to make sure that there are no inconsistencies or imperfections that can corrupt the SELT data.

Подробнее
24-01-2019 дата публикации

EVOLVING RULE BASED CONTACT EXCHANGE

Номер: US20190028486A1
Принадлежит:

Methods and systems are described for managing a user's contact data which use evolving sequential sets of rules where the applicability of each set depends upon adherence or proper application of a prior set. In an embodiment, an initial set of restrictions are generated based on input from a first user, the restrictions relating to contact made by a second user to the first user. These initial restrictions are subsequently modified in response to the second user contacting the first user based on the contact made and a characteristic of the contact. The methods may apply to any form of contact between the first and second users and in an embodiment applies to contact made by the second user to a cellular telephone number belonging to the first user. 1. A method , comprising:receiving, from a user device of a first user of a communication system, initial access right data corresponding to contact information of the first user, the initial access right data including at least one condition associated with a second user connecting with the first user via the communication system;receiving a first contact from a user device of the second user and via the communication system, the first contact associated with the contact information;determining that the first contact comprises an initial request by the second user to connect with the first user via the communication system; andgenerating modified access right data associated with a subsequent use of the contact information by the second user of the communication system.2. The method according to claim 1 , further comprising receiving the contact information from the user device of the first user of the communication system claim 1 , the contact information enabling the second user to connect with the first user via the communication system.3. The method according to claim 1 , further comprising generating the contact information including temporary contact details.4. The method according to claim 3 , further ...

Подробнее
24-01-2019 дата публикации

MANAGEMENT OF TOLL-FREE NUMBER MISUSE AND FRAUD DETECTION

Номер: US20190028595A1
Автор: Chauhan Sanjeev
Принадлежит:

Methods and systems for providing a rating system that allow for customers to create a database of toll-free numbers that are abused by malicious consumers which may be cloud-based and allow for service providers to dip prior to completing or accepting calls. 120.-. (canceled)21. A method comprising:providing a user interface for presentation on a remote client device;receiving data related to utilization of a toll-free number from at least one party affiliated with a toll-free telecommunication network;collecting the data related to the utilization of the toll-free number in a data store;modeling the collected data relating to toll-free number utilization to derive a toll-free call activity trend; andreceiving a request from the remote client device to present expected usage of the toll-free number from the derived toll-free call activity trend through the user interface.22. The method of wherein the at least one party affiliated with a toll-free communication network is at least one of a service control point claim 21 , a toll-free service provider claim 21 , a call center or an interexchange carrier.23. The method of wherein the step of collecting the data comprises the step of grouping the data based on the toll-free number and another relevant parameter.24. The method of wherein the relevant parameter is at least one parameter selected from call origination location claim 23 , call originating area of service claim 23 , call originating NPA claim 23 , or call originating AM.25. The method of wherein the step of collecting the data comprises calculating and collecting call counts for high priority numbers.26. The method of wherein the step of collecting the data comprises calculating and collecting toll-free number call duration information.27. The method of wherein the step of collecting the data comprises the step of storing the data in a NoSQL data store.28. The method of wherein the step of collecting the data further comprises:pre-processing the collected ...

Подробнее
23-01-2020 дата публикации

MANAGEMENT OF TOLL-FREE NUMBER MISUSE AND FRAUD DETECTION

Номер: US20200028974A1
Автор: Chauhan Sanjeev
Принадлежит:

Methods and systems for providing a rating system that allow for customers to create a database of toll-free numbers that are abused by malicious consumers which may be cloud-based and allow for service providers to dip prior to completing or accepting calls. 1. A method comprising:creating at least two call routing tables based on an outage recovery criterion, wherein a first call routing table is utilized when a plurality of calls occur within a telecommunications carrier network in an absence of an outage, and a second call routing table is utilized when the plurality of calls occur within the telecommunications carrier network during an outage;providing the first and second call routing tables to at least one service control point that is associated with the telecommunications carrier network;monitoring the plurality of calls occurring within the telecommunications carrier network;receiving at least one datum indicative of an occurrence of an outage matching the outage recovery criterion; andinstructing the at least one service control point to switch from using the first call routing table to the second call routing table.2. The method of claim 1 , wherein the outage recovery criterion comprises an infrastructure upgrade.3. The method of claim 1 , wherein the outage recovery criterion comprises a platform transition.4. The method of claim 1 , wherein the outage recovery criterion comprises a natural disaster.5. The method of claim 1 , wherein the at least one service control point is at least one hundred miles from a source of the outage.6. The method of claim 1 , wherein the at least one service control point is a dedicated disaster recovery site.7. A system comprising:at least one computer comprising at least one processor and at least one memory, the at least one processor configured to:create at least two call routing tables based on an outage recovery criterion, wherein a first call routing table is utilized when a plurality of calls occur within a ...

Подробнее
02-02-2017 дата публикации

SYSTEMS AND METHODS FOR ESTABLISHING A DIAGNOSTIC TRANSMISSION MODE AND COMMUNICATING OVER THE SAME

Номер: US20170034343A1
Принадлежит:

Upon detection of a trigger, such as the exceeding of an error threshold or the direction of a user, a diagnostic link system enters a diagnostic information transmission mode. This diagnostic information transmission mode allows for two modems to exchange diagnostic and/or test information that may not otherwise be exchangeable during normal communication. The diagnostic information transmission mode is initiated by transmitting an initiate diagnostic link mode message to a receiving modem accompanied by a cyclic redundancy check (CRC). The receiving modem determines, based on the CRC, if a robust communications channel is present. If a robust communications channel is present, the two modems can initiate exchange of the diagnostic and/or test information. Otherwise, the transmission power of the transmitting modem is increased and the initiate diagnostic link mode message re-transmitted to the receiving modem until the CRC is determined to be correct. 1. A diagnostic link system for communicating data between modems using multicarrier modulation comprising:an initiate diagnostic mode trigger that instructs a transmitting modem to forward an initiate diagnostic mode message to a receiving modem;a message determination device that determines a diagnostic link message; anda receiving modem diagnostic device that receives the diagnostic link message and determines the accuracy of the diagnostic link message.243-. (canceled) This application is a continuation of U.S. application Ser. No. 14/153,282, filed Jan. 13, 2014, now U.S. Pat. No. 8,929,423, which is a continuation of U.S. application Ser. No. 13/004,254, filed Jan. 11, 2011, now U.S. Pat. No. 8,634,449, which is a continuation of 12/779,708, filed May 13, 2010, now U.S. Pat. No. 7,889,784, which is a continuation of U.S. application Ser. No. 12/477,742, filed Jun. 3,2009, now U.S. Pat. No. 7,835,430, which is a continuation of U.S. application Ser. No. 10/619,691, filed Jul. 16, 2003, now U.S. Pat. No. 7,570, ...

Подробнее
02-02-2017 дата публикации

METHODS, SYSTEMS, AND COMPUTER READABLE STORAGE DEVICES FOR DETERMINING WHETHER TO HANDLE A REQUEST FOR COMMUNICATION SERVICES BY A PHYSICAL TELEPHONE NUMBER MAPPING SERVICE OR A VIRTUAL TELEPHONE NUMBER MAPPING SERVICE

Номер: US20170034346A1
Принадлежит: AT&T Intellectual Property I, L.P.

A determination is made whether to handle a request associated with a specific number range by a physical telephone number mapping service instance provisioned for handling the request for the specific number range or a virtual telephone number mapping service instance provisioned for handling the request for the specific number range. If it is determined that the request should be handled by the physical telephone number mapping service instance, forwarding of the request from the physical telephone number mapping service instance to the virtual telephone number mapping service instance is prevented. If it is determined that the request should be handled by the virtual telephone number mapping service instance, forwarding of the request from the virtual telephone number mapping service instance to the physical telephone number mapping service instance is prevented. 1. A method , comprising:determining, by a processor, whether a request associated with a specific number range should be handled by a physical telephone number mapping service instance provisioned for handling the request for the specific number range or a virtual telephone number mapping service instance provisioned for handling the request for the specific number range;responsive to determining that the request should be handled by the physical telephone number mapping service instance, preventing, by the processor, forwarding of the request from the physical telephone number mapping service instance to the virtual telephone number mapping service instance; andresponsive to determining that the request should be handled by the virtual telephone number mapping service instance, preventing, by the processor, forwarding of the request from the virtual telephone number mapping service instance to the physical telephone number mapping service instance.2. The method of claim 1 , wherein preventing forwarding of the request to the virtual telephone number mapping service instance comprises instructing a ...

Подробнее
02-02-2017 дата публикации

Method and apparatus for controlling visitor call in home network system

Номер: US20170034689A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

Disclosed is a technology for a sensor network, machine to machine (M2M), machine type communication (MTC), and internet of things (IoT). The present disclosure can be used for intelligent services (for example, services related to a smart home, smart building, smart city, smart car, connected car, health care, digital education, retail business, security, and safety) based on the technology. A method of controlling a visitor's call by a first terminal in a home network system includes: reading home information pre-stored in the communication module when communication with a communication module installed inside the home is possible; transmitting a visit request message including the home information and identification information of the first terminal to the smart home server or a at least on second terminal from among a plurality of second terminals; and communicating with the at least one second terminal when at least one of the plurality of second terminals accepts communication with the first terminal.

Подробнее
04-02-2016 дата публикации

Usage Parameters for Communication Content

Номер: US20160036986A1
Принадлежит:

In one aspect, a method related to data management. In addition, other method, system, and program product aspects are described in the claims, drawings, and/or text forming a part of the present application. 1134-. (canceled)135. A system comprising:circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction;circuitry for determining one or more network communications channels associated with at least one voice conference enabling substantially live discourse involving one or more recipient devices; andcircuitry for transmitting the at least one content item and the associated usage parameter indicating the at least one usage restriction to the one or more recipient devices via the one or more network communications channels associated with the at least one voice conference.136. The system of claim 135 , wherein the circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction comprises:circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction, the at least one content item including at least some substantially live discourse.137. The system of claim 135 , wherein the circuitry for determining one or more network communications channels associated with at least one voice conference enabling substantially live discourse involving one or more recipient devices comprises:circuitry for determining one or more network communications channels associated with at least one internet-based voice conference enabling substantially live discourse involving one or more recipient devices.138. The system of claim 135 , wherein the circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage restriction comprises:circuitry for receiving at least one content item and an associated usage parameter indicating at least one usage ...

Подробнее
04-02-2016 дата публикации

AUTO-DIALER DETECTOR FOR INTER-CARRIER NETWORK SWITCH

Номер: US20160036991A1
Принадлежит:

To maximize efficiencies and to reduce termination costs of inter-carrier exchanges, an auto-dialer detection system enables an inter-carrier network switch to detect, in real-time or in near real-time, calls that are originated by auto-dialers. A call router of the switch may receive an incoming call attempt that includes a particular Automatic Number Identification (ANI). The auto-dialer detection system allows for a real-time or near-real time determination, based on the ANI and contents of a cache during a sliding window of time coincident with the reception of the origination, whether or not the call should be routed through the switch. Further, the auto-dialer detection system provides a real-time or a near real-time update to the cache contents to enable further real-time or near-real time detection and blocking of auto-dialed calls. Overrides to the cache (e.g., to always allow and/or to always block calls that include certain ANIs) may be provided. 1. A method for detecting auto-dialed calls in real-time or near real-time , the method comprising:receiving, at a call router of an inter-carrier network switch communicatively connected to a data storage device storing call data records (CDRs), an indication of an incoming call received at the inter-carrier network switch and including an Automatic Number Identification (ANI);based on the reception of the indication of the incoming call, causing an indication of a call attempt corresponding to the ANI to be stored in a cache;determining, by the call router, whether to allow or to deny the incoming call based on contents of the cache;when the incoming call is determined to be allowed, processing the incoming call through a Private Packet Network Backbone Exchange (PPNBE) of the inter-carrier network switch to a terminating exchange, and causing a call data record for the incoming call to be stored in the CDR data storage device; andwhen the incoming call is determined to be denied, not processing the incoming ...

Подробнее
30-01-2020 дата публикации

DIAGNOSTIC TRAFFIC GENERATION FOR AUTOMATIC TESTING AND TROUBLESHOOTING

Номер: US20200036573A1
Принадлежит:

A framework in a cloud network that may allow for debugging at multiple vantage points at different layers (e.g., layer 2, layer 3, etc.). The methods may provide tracer or measurement services that filter, capture, or forward flows that may include packets, calls, or protocols to look for particular signatures. 1. An apparatus comprising:a processor; and instantiating a virtual machine (VM) on one or more devices communicatively connected with a system;', 'injecting test traffic into network traffic to proactively test the system, wherein the network traffic comprises normal traffic;', 'capturing the network traffic using the VM;', 'separating the test traffic and the normal traffic using the VM; and', 'based on the separated test traffic, determining a health of the system., 'a memory coupled with the processor, the memory comprising executable instructions stored thereon that when executed by the processor cause the processor to effectuate operations comprising2. The apparatus of claim 1 , wherein the processor effectuates further operations comprising instantiating one or more virtual network functions (VNFs) on the one or more devices.3. The apparatus of claim 2 , wherein the processor effectuates further operations comprising creating a library for the one or more VNFs.4. The apparatus of claim 3 , wherein the one or more VNFs incorporate test traffic generation on command using the library.5. The apparatus of claim 1 , wherein the system is tested periodically using the test traffic.6. The apparatus of claim 1 , wherein determining a health of the system comprises:determining a possible problem with the system based on the separated traffic; andproviding a solution to the possible problem.7. The apparatus of further comprising a display claim 1 , wherein the displays the health of the system.8. The apparatus of claim 1 , wherein the VM is configured to generate one or more types of test traffic.9. The apparatus of claim 1 , wherein the VM is configured to ...

Подробнее
30-01-2020 дата публикации

SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT

Номер: US20200036832A1
Автор: HODGE Stephen
Принадлежит: Global Tel*Link Corporation

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified. 1. A call processing platform for processing telecommunications of a controlled environment , comprising:one or more circuits and/or processors configured to:set up a user account, the setup including:communicating with an application running on a mobile device associated with a user, the call processing platform configured to handshake with the application;receiving an image of a personal physical printed document of the user via the application;extracting personal verification information printed on the personal physical printed document from the image; andregister the user by storing the personal verification information included in the image in association with an identifier of the mobile device.2. The call processing platform of claim 1 , wherein the image of the personal physical printed document is an image of a physical printed document that includes a plurality of pieces of personal information of the user.3. The call processing platform of claim 2 , wherein the one or more circuits and/or processors are further configured to extract the pieces of personal information from the image.4. The call ...

Подробнее
12-02-2015 дата публикации

APPARATUS, SYSTEMS AND METHODS OF COMMON-MODE REJECTION RATIO BASED DIAGNOSTICS

Номер: US20150043720A1

In accordance with embodiments disclosed herein, there are provided apparatus, systems and methods for detecting a boundary condition via common mode diagnostics; and to apparatus, systems and methods for detecting a fault condition via common-mode rejection ratio diagnostics. For example, in one embodiment such means include, means for injecting differential mode signal probes onto two conductors of a Digital Subscriber Line (DSL line); means for measuring a common-mode rejection ratio (CMRR) of the differential mode signal probes; means for measuring impedance of the differential mode signal probes; and means for identifying which of an asymmetric fault condition or a symmetric fault condition is present on the line based on both: (a) the measured CMRR of the differential mode signal probes and (b) the measured impedance of the differential mode signal probes. 1. A method comprising:injecting differential mode signal probes onto two conductors of a Digital Subscriber Line (DSL line);measuring a common-mode rejection ratio (CMRR) of the differential mode signal probes;measuring impedance of the differential mode signal probes; andidentifying which of an asymmetric fault condition or a symmetric fault condition is present on the line based on both: (a) the measured CMRR of the differential mode signal probes and (b) the measured impedance of the differential mode signal probes.2. The method of claim 1 , wherein injecting the differential mode signal probes onto the two conductors of the DSL line comprises injecting inversed differential mode signal probes onto the two conductors of the DSL line.3. The method of claim 1 , wherein measuring the impedance of the differential mode signal probes comprises measuring a reflectometry waveform.4. The method of claim 1 , wherein measuring CMRR of the differential mode signal probe comprises converting the measured CMRR to detect the reflectometry waveform.5. The method of claim 1 , wherein measuring the impedance of the ...

Подробнее
04-02-2021 дата публикации

METHOD AND NETWORK ANALYZER OF EVALUATING A COMMUNICATION LINE

Номер: US20210037131A1
Принадлежит: NOKIA SOLUTIONS AND NETWORKS OY

The method includes obtaining a loop length of a terminal section of the communication line; determining whether there is an impairment in the communication line; if no impairment, classifying the communication line into the first group; if impairment is determined, perform obtaining a location of the impairment in the communication line; determining whether the impairment is located in the terminal section of the communication line based on the loop length; if so, classifying the communication line into a second group; else, classifying the communication line into the first group; wherein, in the first group, it is qualified for an new broadband communication service, and if in the second group, it is not qualified, and wherein, the new broadband communication service is to be deployed over the terminal section of the communication line. 2. A method according to claim 1 , wherein claim 1 , step b) further comprises requesting the access node and the end-user CPE to perform a Dual End Line Testing claim 1 , DELT claim 1 , over the communication line to detect whether there is an impairment in the communication line.3. A method according to claim 1 , wherein claim 1 , prior to step b) claim 1 , the method further comprises: if so, the method going on with step b);', 'else, classifying the communication line into the first group., 'determining whether a stability and/or a performance of the communication line suggests an impairment;'}4. A method according to claim 1 , wherein claim 1 , step c) further comprises requesting the access node and/or the end-user CPE to perform Single End Line Testing claim 1 , SELT claim 1 , over the communication line to locate the impairment in the communication line.5. A method according to claim 4 , wherein claim 4 , step c) further comprises requesting the access node to perform the SELT with the end-user CPE connected.6. A method according to claim 1 , wherein claim 1 , the impairment is at least one of a Bridge Tag claim 1 , BT ...

Подробнее
04-02-2021 дата публикации

Call Processing System for Modifying Inmate Communication Limits

Номер: US20210037141A1
Автор: Stephen Lee Hodge
Принадлежит: Global Tel Link Corp

A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.

Подробнее
04-02-2021 дата публикации

TOLL-FREE TELECOMMUNICATIONS AND DATA MANAGEMENT PLATFORM

Номер: US20210037142A1
Принадлежит:

A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity. 1. A method comprising:receiving a user report dataset indicating fraudulent activity corresponding to a phone number;responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number; andtagging the record to identify the phone number as being associated with fraudulent activity.2. The method of claim 1 , wherein the user report dataset is manually generated.3. The method of claim 2 , wherein the user report dataset is manually generated via a telecommunications services management platform that provides one or more services for the phone number.4. The method of claim 1 , wherein the user report dataset is automatically generated.5. The method of claim 1 , wherein the fraudulent activity is at least one of:spoofing; ortraffic pumping.6. The method of further comprising:providing one or more services for the phone number via a telecommunications services management platform in electronic communication with the database;wherein the user report dataset is received at the telecommunications services management platform.7. The method of further comprising:in response to tagging the record, assigning, via the telecommunications services management platform, a call route to the phone number.8. The method of claim 1 , wherein the user report dataset corresponds to at least one of:a telephone service provider;a toll-free number operator; ora Responsible Organization (RespOrg).9. The method of claim 1 , wherein tagging of the record indicates a frequency that the phone number is abused.10. A method ...

Подробнее
09-02-2017 дата публикации

PERFORMING UPSTREAM SYMBOL ALIGNMENT UNDER FEXT

Номер: US20170041045A1
Автор: Liang Haixiang, Liu Yixian
Принадлежит:

A method for implementing an upstream symbol alignment within a network component, the method comprising receiving an upstream sync signal via an initializing digital subscriber line (DSL) during a channel discovery phase from a customer premise equipment (CPE), determining a corrected upstream symbol alignment value based upon the upstream sync signal, and transmitting the corrected upstream symbol alignment value to the CPE, wherein the upstream symbol alignment value determines an upstream symbol alignment for one or more upstream transmissions, and wherein the corrected upstream symbol alignment value is determined before receiving a plurality of upstream data signals within the data symbol positions during the channel discovery phase. 1. An apparatus comprising:a first transceiver unit (TU) for coupling to a first initializing digital subscriber line (DSL);a memory; and receive an upstream sync signal via the first TU;', 'determine a correction value that corresponds to an upstream symbol alignment for the first initializing DSL using the upstream sync signal; and', 'transmit the correction value in a downstream direction via the first TU,, 'a processor coupled to the memory and the first TU, wherein the memory includes instructions that when executed by the processor cause the apparatus to perform the followingwherein the correction value is determined prior to receiving a plurality of upstream signals located in a plurality of data symbol positions.2. The apparatus of claim 1 , wherein the upstream sync signal comprises an upstream sync symbol modulated by a probe sequence and a plurality of quiet symbols located within the upstream data symbol positions.3. The apparatus of claim 1 , wherein the correction value adjusts a time gap between the end of receiving a downstream transmission and the start of an upstream transmission claim 1 , and wherein the time gap is used to perform the upstream symbol alignment.4. The apparatus of claim 1 , wherein the ...

Подробнее
18-02-2021 дата публикации

TELEPHONE SERVICE DELAY AND CONNECTION SYSTEM

Номер: US20210051171A1
Автор: Mehta Vijesh
Принадлежит:

A denial of service (DoS) detection and circumvention system is described herein. The DoS detection and circumvention system can track phone calls that are initiated and store a list of phone numbers that are called. The DoS detection and circumvention system can also track the number of carrier congestion messages over a certain time window. Using the list of called phone numbers and the tracked number of carrier congestion messages, the DoS detection and circumvention system can identify excessive congestion. If the DoS detection and circumvention system identifies excessive congestion, the DoS detection and circumvention system can delay calls so as to prevent a possible DoS condition. 120.-. (canceled)21. A system comprising computer-readable storage and one or more computer processors in communication with the computer-readable storage , wherein the system is configured to at least:receive, via a phone network, a first phone call directed to a first destination phone number, wherein the first destination phone number is associated with a first telephone switch of a plurality of telephone switches;receive a carrier congestion message in response to attempting to connect the first phone call to the first telephone switch;determine that a number of carrier congestion messages, associated with the first telephone switch and received within a first time period, exceeds a threshold value;determine to delay a second attempt to connect the first phone call to the first telephone switch;receive, via the phone network, a second phone call directed to a second destination phone number associated with the first telephone switch, wherein the second phone call is received during a second time period beginning after the carrier congestion message is received;determine, based at least partly on the second phone call being received during the second time period, to delay an initial attempt to connect the second phone call to the first telephone switch;determine that the second ...

Подробнее
06-02-2020 дата публикации

Method for verifying the validity of a telephone line of a user of a service or of a software application

Номер: US20200045543A1
Автор: Taig Khris
Принадлежит: ONOFF TELECOM

Verification of the validity of a telephone line of a user likely to use a service or a software application, the verification process can include: the allocation to said validation procedure, by a validation system, of a temporary validation telephone number that has a predetermined validity duration; the generation of a call by the communication terminal of the user, via a telephone communication network, to the temporary validation telephone number; the verification of the correspondence between the temporary validation telephone number called and the validation procedure; and the validation of the telephone line of the user insofar as the correspondence between the temporary validation telephone number called by the communication terminal of the user and the validation procedure has been verified in the preceding step, such that the client system is able to authorise the user to use the service or software application.

Подробнее
16-02-2017 дата публикации

Telecommunication Call Management and Monitoring System With Voiceprint Verification

Номер: US20170048384A1
Автор: Hodge Stephen Lee
Принадлежит: Globel Tel*Link Corp.

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters. 1. A call management system for controlling access to a communication network , the system comprising:a telephone terminal;a biometric sensor;a central site server including a memory that stores a plurality of inmate data records, each inmate data record containing a corresponding first identifier and a corresponding biometric baseline sample of a corresponding inmate, prompt the user to input a second identifier using the telephone terminal;', 'select an inmate data record from among the plurality of inmate data records whose first identifier matches the second identifier;', 'prompt the user to provide a biometric sample using the biometric sensor;', 'compare the biometric sample only to the biometric baseline sample of the selected inmate data record;', 'determine that the biometric sample matches the biometric baseline sample with a predetermined degree of similarity; and', 'grant the user access to the communication network to attempt to place a telephone call based on the determining., 'the central site server configured to, during each attempt to access the communication network by ...

Подробнее
08-05-2014 дата публикации

SYSTEM AND METHOD OF DISTRIBUTED MAINTENANCE OF CONTACT CENTER STATE

Номер: US20140126711A1
Автор: BARINOV Vitaly Y.

A system and/or a method of distributed maintenance of contact center state including the state of contact center objects which may include directory numbers and agents. Device controllers and call controllers are used to monitor device and call information. Data aggregation nodes are connected to the device controllers and call controllers. The data aggregation nodes share directory number state information and agent state information via a publish-subscribe bus, and aggregate state information to form full state information. 1. A system , comprising:a plurality of controllers configured to generate data updates for a plurality of contact center objects, the contact center objects comprising a plurality of directory numbers and a plurality of agents;a plurality of data aggregation nodes; monitor one or more of the plurality of controllers; and', 'maintain partial directory number state information received from the controllers monitored by the data aggregation node; and, 'each data aggregation node in a first subset of the plurality of data aggregation nodes being configured to 'merge partial directory number state information obtained from data aggregation nodes of the first subset of the plurality of data aggregation nodes to form aggregated directory number state information.', 'each data aggregation node in a second subset of the plurality of data aggregation nodes being configured to2. The system of claim 1 , wherein the aggregated directory number state information is partially aggregated directory number state information.3. The system of claim 1 , wherein each data aggregation node in the second subset of the plurality of data aggregation nodes is configured to:own one or more of the plurality of directory numbers; andmerge partial directory number state information obtained from data aggregation nodes of the first subset of the plurality of data aggregation nodes to form full directory number state information for the directory numbers owned by the data ...

Подробнее
15-02-2018 дата публикации

MANAGING ACCESS TO A CONFERENCE CALL

Номер: US20180048684A1

Managing access to a conference call includes obtaining, via a calendar application, a list of participants, the list of participants includes a number of participants to be included in a conference call, identifying, from the list of participants, a first portion of the participants that have personal passcodes, generating guest passcodes for a second portion of the participants associated with the list of participants that do not have the personal passcodes, and permitting, based on the personal passcodes or the guest passcodes, each of the participants to participate in the conference call. 1. A system for managing access to a conference call , the system comprising a computer implementing a managing system , the computer comprising a network interface and being programmed to:obtain, via a calendar application, a list of participants to be included in a conference call;identify, from the list of participants, a first portion of the participants that have personal passcodes and a second portion of the participants that do not have a personal passcode;generate a guest passcode for each of the participants that do not have a personal passcode; andpermit each of the participants presenting either a personal passcode or a guest passcode to participate in the conference call;wherein each guest passcode is unique and generating the guest passcodes comprises:designating each of the participants that do not have a personal pass code as a frequent guest or an infrequent guest;retrieving a corresponding electronic mail (email) addresses for each of the frequent guests;storing, in a library, the guest passcode as a personal passcode for each of the frequent guests along with the corresponding email address for that frequent guest.2. The system of claim 1 , the computer comprising a network interface further being programmed to identify claim 1 , based on a passcode entered by a participant claim 1 , to which of a plurality of conference calls the participant is to be joined. ...

Подробнее
15-02-2018 дата публикации

METHODS AND SYSTEMS FOR INBOUND AND OUTBOUND CALL CONTROL

Номер: US20180048759A1
Автор: Sharpe Benjamin
Принадлежит:

An indication of an outgoing call may be received at a call control unit communicatively coupled to, and/or resident within, a telephone. The indication may include identification information for the outgoing call. It may be determined whether additional information regarding a called party associated with the identification information exists, and if so, a first operation may be performed on the incoming call responsively to the additional information, otherwise, a second operation may be performed on the incoming call responsively to an absence of the additional information. The additional information my include a user-configurable list of desired callers (e.g., a whitelist) and/or undesired callers (e.g., a blacklist). The additional information may also include caller identification information and/or a spam score. The first operation may be blocking the incoming call, forwarding the incoming call to a voice mailbox, transmitting the incoming call to the telephone, enabling the telephone to receive the incoming call, and/or answering the incoming call and then terminating the incoming call. In some embodiments, the first and/or second operations performed on the incoming call is/are user configurable. 1. A method comprising:receiving an indication of an outgoing call at a call control unit communicatively coupled to, or resident within a telephone, the indication including identification information for the outgoing call; anddetermining whether additional information regarding a called party associated with the identification information exists, and if so, performing a first operation on the outgoing call responsively to the additional information, otherwise, performing a second operation on the outgoing call responsively to an absence of the additional information.2. The method of claim 1 , wherein determining whether additional information regarding a called party associated with the identification information exists is performed at the call control unit using ...

Подробнее