Abstract:
A system and method for dynamically changing contact information is presented. The system and method includes receiving a contact information change associated with a contact in a first contact list, determining that the contact is also in a second contact list and modifying the second contact list based on the contact information change.
Abstract:
A method and apparatus for user location registration comprising determining, by a first network service provided by a first network, subscriber location information associated with a first user communication device registered with the first network, wherein the subscriber location information includes a network identifier of the first device, and wherein the network identifier is not obtained via session initiation protocol (SIP) messaging received from the first device; receiving, by the first network service, a broadcast location request for the subscriber location information in response to a call initiated from a second user communication device wherein receiving the broadcast location request further includes determining subscriber identity information from the broadcast location request, and determining that the subscriber identity information is associated with the subscriber location information; and sending, by the first network service, the determined subscriber location information in response to the broadcast location request.
Abstract:
Methods and apparatus for verifying authenticity of device information of an end-user device are provided herein. In some embodiments, a method for verifying authenticity of device information of an end-user device may include sending a request to verify device information of an end-user device receiving, responsive to the request, verification information regarding the device information sent, and performing a verification analysis on the verification information received.
Abstract:
Systems and methods performed by an IP telephony system are designed to determine when two parties to a recently terminated telephony communication are simultaneously calling each other in an attempt to re-establish a telephony communication. When the IP telephony system determines that this situation is occurring, the IP telephony system acts to connect the two parties, rather than have both of them see their new call setup attempt fail because the other party's telephony device is indicated to be busy.
Abstract:
Methods and system for routing first communication session data between a first device and at least one participant device via a first communication session are provided herein. In some embodiments, a method for routing first communication session data between a first device and at least one participant device includes receiving a request to establish a second communication session with at least one discovered extension device proximate to the first device, routing at least a portion of the communication session data to the discovered extension device via the second communication session and synchronizing the communication session data routed via the first communication session, and the at least a portion of the communication session data routed via the second communication session.
Abstract:
Methods and apparatus for verifying authenticity of device information of an end-user device are provided herein. In some embodiments, a method for verifying authenticity of device information of an end-user device may include sending a request to verify device information of an end-user device receiving, responsive to the request, verification information regarding the device information sent, and performing a verification analysis on the verification information received.
Abstract:
A method and system for routing communications includes building a first user profile for a first user based on a history of communications associated with a plurality of communication identifiers associated with a first user to route inbound communications. A first communication identifier of the plurality of communication identifiers is associated with the first user and subsequently, the first communication identifier may be assigned to a second user. A second communication identifier is assigned to the first user such that a received inbound communication is directed towards the first communication identifier. The method routes the inbound communication based on an analysis of the first user profile of the first user.
Abstract:
A system and method for making a VoIP-based and other types of group calls includes a user interface adapted for use by a group call administrator via the Internet, a database manager connected to the user interface, and a database connected to the database manager. In one embodiment, the group call administrator identifier and one or more group call invitee identifiers is a telephone number. The server responds to a group call request by initiating a first group call connection and initiating at least one or more second group call connections to join a group call administrator and at least one group call invitee. A method includes using call information from a database to initiate conference call connections and an administrator call connection to facilitate a conference call in which the administrators call connections and the participants connections are joined to allow communications between the participants and the administrator.
Abstract:
The disclosed subject matter addresses the problem of spoofing by directly and transparently communicating with the apparent sender of the potentially spoofed incoming message or with the communications network handing the communication of the potentially spoofed incoming message. The address of the recipient device of the potentially spoofed incoming message is compared with addresses of communication sent from the apparent sender. As a result of this comparison, it may be determined whether the phone call or message was sent from the apparent source or was spoofed. The times associated with messages sent from the indicated sender and times associated with the incoming message may also be used to determine the authenticity of the apparent sender. The recipient is of the incoming message is notified of a spoofed message.
Abstract:
Methods and system for automating conferencing in a communication session are provided herein. In some embodiments, a method for automating conferencing in a communication session includes detecting an established communication session between a first end-user device and a second end-user device, notifying a third end-user device associated with the first user device that the established communication session is available to be joined, receiving a request from the third end-user device to join the communication session, and establishing a conference session with the first end-user device, the second-end user device, and the third end-user device.