24 patents
Utility
Techniques for detecting calling anomalies in inbound call traffic in telecommunications networks
19 Dec 23
Methods identifying inbound call traffic anomalies in a telecommunications system are provided.
Dane Linsky, Geoff Garrido, Paul Washburn
Filed: 12 Sep 23
Utility
Techniques for using call metadata as an indicator for calling party authenticity
12 Sep 23
Techniques are disclosed to determine one or more specific data points that may be found in or added to call metadata that will assist and/or enhance confidence score algorithms.
William Gentry, Mark Greene, Elijah Tirrell Robertson, Alexander Weston Green, Nayan Raj Jogithaya
Filed: 12 Apr 23
Utility
Techniques for registering an internet protocol (IP) endpoint for emergency services calling
22 Aug 23
Techniques are described for obtaining current location data for a non-traditional telephony endpoint for emergency calling purposes.
Daniel Pereira, Larry Reeder, Lydia Runnels, Adam Covati
Filed: 8 Mar 23
Utility
Techniques for Registering An Internet Protocol (IP) Endpoint For Emergency Services Calling
20 Jul 23
Techniques are described for obtaining current location data for a non-traditional telephony endpoint for emergency calling purposes.
Daniel Pereira, Larry Reeder, Lydia Runnels, Adam Covati
Filed: 8 Mar 23
Utility
Techniques for registering an internet protocol (IP) endpoint for emergency services calling
18 Apr 23
Techniques are described for obtaining current location data for a non-traditional telephony endpoint for emergency calling purposes.
Daniel Pereira, Larry Reeder, Lydia Runnels, Adam Covati
Filed: 14 Jan 22
Utility
Core network bypass for toll-free calling
6 Dec 22
Techniques are described for determining when and how to re-route toll-free calls around a core telephony network experiencing significant disruptions.
William Gentry, Julie Barghouthi, Scott Mullen
Filed: 16 Aug 22
Utility
Software development systems for creation and testing of voice and messaging applications and related methods and computers
18 Oct 22
A software development system is provided for creating and testing applications.
Daniel Pereira
Filed: 17 Sep 21
Utility
Methods, systems and computer program products for processing unwanted text messages
4 Oct 22
Some embodiments of the present inventive concept provide methods for processing unwanted text messages based on reporting of sending telephone in a telecommunications system.
Stephanie Lashley
Filed: 16 Jun 22
Utility
Techniques for managing an aging telephone number before returning to active service
30 Aug 22
Techniques are described for managing out of service telephone numbers (TNs) before returning them to active service.
Annalyce Grogan, Robert Brezina, Lisa Jill Freeman
Filed: 24 Jan 22
Utility
Methods, systems and computer program products for determining root causes of detected anomalies in a telecommunications network
16 Aug 22
Methods for determining a cause of a detected anomalous event in a telecommunications system are provided.
Ethan Wicker
Filed: 31 Mar 22
Utility
Techniques for vetting inbound calls in a telecommunication network
3 May 22
Techniques are described for vetting unwanted calls.
Srikanth Rao
Filed: 21 Sep 21
Utility
Techniques for managing a 933 test call pertaining to emergency services
26 Apr 22
Techniques for customizing an audio response to emergency test calls are provided.
Larry Reeder
Filed: 16 Dec 21
Utility
Techniques for routing messages through a message delivery network
11 Jan 22
Disclosed are techniques for routing messages from a message delivery network (MDN) to one of a plurality of end user carriers, wherein there are a plurality of message routes capable of servicing each end user carrier.
Roman Shcherbakov
Filed: 28 Jul 21
Utility
Methods for emergency response location (ERL) correction in a voice over internet protocol (VoIP) 911 server and related systems and computer program products
26 Oct 21
Methods for ERL Correction are provided including receiving a VoIP emergency call from an emergency caller.
Thomas Ginter
Filed: 25 May 21
Utility
Techniques for allocating and managing telecommunication resources
31 Aug 21
In some implementations, a computer may during a repeating interval in a local GCAC node: (a) receiving and storing key data from one or more other GCAC nodes, the key data indicative of resource usage data for each key in the respective one or more other GCAC nodes wherein each key is associated with an allocation limit equal to a number of resources it may use at any given time across all GCAC nodes; (b) storing current key data, the current key data indicative of the resource usage data for each key in the local GCAC node; (c) determining estimated network-wide key data, the estimated network-wide key data indicative of an estimated network-wide resource usage across all GCAC nodes for each key, the estimated network-wide key data based on a combination of the current key data for the local GCAC node and a weighted multiple of the key data in each of the one or more other GCAC nodes; (d) storing the estimated network-wide key data for each key; and (e) repeating steps (a)-(d) during each interval.
Michael Nelson, Nicholas Porillo, Luther Wright
Filed: 5 Mar 21
Utility
Techniques for managing and using telecommunication carrier deactivation lists
3 Aug 21
Techniques are described for managing the recipients of application-to-person (A2P) short message service (SMS) messages.
Brad Roldan, Mark Macchioni
Filed: 23 Apr 21
Utility
Methods, systems and computer program products for detecting anomalies in a telecommunications network
29 Jun 21
Methods for detecting anomalies in a telecommunications network are provided.
Ethan Wicker
Filed: 10 Mar 21
Utility
Techniques for routing messages in a communications network
2 Mar 21
A message delivery network may receive a message from a sending message service provider.
Roman Shcherbakov, Emma Bradley, Matt Garcia, David Ress
Filed: 22 Jul 20
Utility
Techniques for correlating delivery receipt messages in a communications network
7 Dec 20
Techniques are disclosed for correlating delivery receipt (DLR) messages with short message service (SMS) messages sent in an application-to-person (A2P) manner through a messaging network comprising multiple data centers.
Syed Mohsin Reza Zaidi, Bryan C. Turner, Alan Woodrow Bevier, Jeremy Howard
Filed: 27 Jul 20
Utility
Techniques for providing SOS call routing for emergency calls
12 Oct 20
Techniques for providing SOS call routing for emergency calls are disclosed.
Thomas Ginter, Daniel C. Tolbert
Filed: 27 Jul 20