Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Monitoring

Subclass of:

379 - Telephonic communications

379100010 - DIAGNOSTIC TESTING, MALFUNCTION INDICATION, OR ELECTRICAL CONDITION MEASUREMENT

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
379320040 Subscriber line 26
379035000 Listening-in or eavesdropping type 5
20090041205Methods, systems, and computer program products for detecting and mitigating ping call events in a communications network - Methods, systems, and computer program products for detecting and mitigating a ping call event in a communications system is described. In one embodiment, the method includes receiving a plurality of call signaling messages. The plurality of call signaling messages are analyzed and a determination is made as to whether at least a portion of the plurality of call signaling messages indicates a ping call event. In response to determining that the at least a plurality of call signaling messages indicates a ping call event, a mitigating action is performed.02-12-2009
20120069971SYSTEM AND METHOD FOR SECURELY AUTHENTICATING AND LAWFULLY INTERCEPTING DATA IN TELECOMMUNICATION NETWORKS USING BIOMETRICS - A system and method for securely authenticating and lawfully intercepting data in a telecommunication network using biometrics is disclosed. In one embodiment, in a method for securely authenticating and lawfully intercepting data using biometrics, one or more persons associated with a law enforcement agency (LEA) are authenticated by a telecommunication network provider. The authentication is performed upon receiving a request for lawful interception of data from the one or more persons associated with the LEA. Then, the lawful interception request associated with a registered telecommunication network user is activated to obtain the data. The data is intercepted user upon a successful match with a requested registered telecommunication network user by the LEA. Further, intercepted data along with the biometric information associated with the registered telecommunication network user is sent to the authenticated one or more persons associated with the LEA via the telecommunication network.03-22-2012
20130121480APPARATUS AND METHOD FOR PERFORMING LAWFUL INTERCEPT IN GROUP CALLS - An apparatus and method for performing lawful intercept in group calls is described herein. When a group call is established having a monitoring target as a member, a monitoring component obtains signaling, location, and data related to the monitoring target, correlates this information, and provides it to a call intercept component.05-16-2013
20090074156METHODS AND APPARATUS FOR CALL SURVEILLANCE IN INTERNET PROTOCOL COMMUNICATION NETWORKS - Methods and apparatus for call surveillance in Internet protocol communication networks are disclosed. An example method to perform call surveillance in a communication network disclosed herein comprises determining an overall path delay measurement associated with using a first media server to perform surveillance of a call between a first user device and a second user device in an Internet Protocol Multimedia Subsystem network, and determining whether to perform surveillance of the call with one of the first media server or a second media server based on the overall path delay measurement.03-19-2009
20110026686USE OF UNIQUE REFERENCES TO FACILITATE CORRELATION OF DATA RETENTION OR LAWFUL INTERCEPTION RECORDS - The invention relates to a method of providing call- or service-related information to a Lawful Interception (LI) system or to a Data Retention (DR) system in a telecommunications network. In the method, a node is provided, which is in communication with an interception requesting element of the LI/DR system. At the node, a record relating to a communication involving a target user is generated and finally sent to the interception requesting element. Before sending the record, at the node it is checked whether a unique reference univocally identifying the communication involving the target user is already available to the node and, if not, such unique reference is generated by the node. Finally, the unique reference is included in the record, which can then be sent to the interception requesting element.02-03-2011
379033000 Alarm or emergency (e.g., cut line) 4
20100074417SYSTEMS AND METHODS FOR MONITORING VOICE SERVICE FEATURE FAILURES IN A TELECOMMUNICATION NETWORK - A method includes receiving multiple alarm messages, each being associated with a failure associated with a service feature available within a telecommunication network. A failure rate for a type of failure having a common set of service feature failure characteristics is determined from the alarm messages received. When the failure rate exceeds a threshold, a maintenance ticket is generated automatically.03-25-2010
20080279343TELEPHONE WITH EMERGENCY LIGHTING FEATURE - A telephone of the corded or portable type includes a light source. The light source may or may not have an ability to be pivoted or swiveled to illuminate a desired portion of a room. In the case of a corded telephone, the light source may be detachable from the telephone. The light source may be automatically activated to provide emergency illumination when a power failure condition exists in a building. The light source may also be manually activated to provide a convenient illumination source for the user.11-13-2008
20100054426SYSTEMS AND METHODS FOR MONITORING TELEPHONE LINES - Systems and methods for monitoring a telephone line connected to a port of a voice gateway are described. In one embodiment, the method includes: obtaining a value representing an electrical characteristic of the port of the voice gateway; determining whether the value is within an acceptable range; determining whether a call originating from, or terminated at, a device connected to the telephone line completed successfully; and in response to determining that the call completed successfully, creating a new acceptable range based, at least in part, on the obtained value.03-04-2010
20110103557Overload detection on multi-CPU system - The preferred embodiment involves a multi-CPU system capable of determining whether the system as a whole is overloaded and whether each individual CPU (core) is overloaded by a single application thread. The preferred method involves sampling total CPU usage in the system by at least one software process; checking the total CPU usage for each application thread belonging to the at least one software process against at least one high water mark level if the total CPU usage in the system by the at least one software process is at or above the at least one high water mark level; indicating an overload level if the at least one high water mark level is met or exceeded by any application thread; designating the system to be in the overload level corresponding to the highest of the at least one high water mark level met or exceeded; utilizing a set of rejection rules to throttle traffic in the system based on the overload level; and beginning normal processing of traffic in the system if total CPU usage by each application thread falls to or below a low water mark level.05-05-2011
379320020 Trunk or long line 2
20080317217SYSTEM AND METHOD FOR DETERMINING AND OPTIMIZING RESOURCES OF A DATA PROCESSING SYSTEM UTILIZED BY A SERVICE REQUEST - A computer-implemented method for determining resources utilized by a service request in a data processing system. The method includes determining monitored relationship types from monitoring data, determining relationship domains, determining intra-domain relationships from relationships that are internal to the relationship domains and determining cross-domain relationships from the intra-domain relationships that are linked between pairs of the relationship domains, and determining resources utilized by the service request from the intra-domain and cross-domain relationships. The domains are derived from one of the relationship types that is monitored by a single monitoring application.12-25-2008
20120069970SYSTEMS AND METHODS OF MASKING NON-SERVICE AFFECTING ALARMS IN A COMMUNICATION SYSTEM - According to one embodiment, a method may include detecting existence of an alarm-triggering event associated with a service at a maintenance level. The method may also include analyzing one or more parameters associated with carrier traffic for the service. The method may additionally include determining whether a data path for carrier traffic associated with the service is operational based on the analysis of the one or more parameters. The method may further include masking or downgrading an alarm triggered by the alarm-triggering event in response to a determination that the data path is operational.03-22-2012
379320050 Call tracing 2
20090147927Method and system for call tracing - The present invention is drawn to a call trace system and method that is simple to establish in a short amount of time. The call trace is implemented through a Web browser page which remotely programs central offices to trace calls to particular number. When a trace is established a message is sent back to the Web browser which displays the calling number, the called number and the central office detecting the call. Also, a page is sent to a pager which displays the traced information.06-11-2009
20090185666METHOD, SYSTEM AND SERVER FOR TRACING SERVICES - A method, system and device for tracing services are provided. The method includes includes: receiving a service tracing request message which carries information on the service to be traced and the callback information; tracing the service according to the information on the service to be traced and obtaining the feedback service tracing data; and sending the feedback service tracing data according to the callback information. Through the present invention, the service tracing data is fed back effectively in time after the service tracing requester sends a service tracing request.07-23-2009
Entries
DocumentTitleDate
20130028393Methods and Systems for Maintaining Diversity for Telecommunications Services - Diversity among telecommunications circuits is maintained by analyzing factors including whether synchronization leads are shared by diverse circuits, whether violations of diversity are brought about by new orders that have been placed, and whether improper personnel have been assigned to monitor diverse circuits. Diversity is further maintained by reporting within a graphical user interface those circuits that are subject to diversity and reporting violations of diversity that exist for those circuits. The graphical user interface may provide various controls for dictating which violations are displayed for which circuits. Additionally, diversity is maintained by providing search options that allow the circuits subject to diversity to be narrowed depending upon user-specified criteria.01-31-2013
20130028394METHOD AND SYSTEM FOR A MULTITENANCY TELEPHONE NETWORK - A method and system for operating a multitenancy telephony system including a call queue that stores call requests received from a plurality of users; an expandable and contractible telephony resource cluster that establishes call sessions for call requests; a analysis system that calculates capacity requirements of the system; a resource allocator that manages the scaling and operation of the telephony resource cluster; and a plurality of telephony network channels that are used as telephony communication channels for call sessions.01-31-2013
20090154658DYNAMIC VOCODER ASSIGNMENT IN A COMMUNICATION SYSTEM - An apparatus and method for dynamic vocoder assignment in a communication system that supports multiple vocoders includes a first step (06-18-2009
20100040206SYSTEM AND METHOD FOR CONTROLLING COMMUNICATION FLOW RATES - A system and method are provided for providing access communications between customer locations and a core network service edge. Access flows are handled as carrier-tagged flows through a packet switched network comprising network elements that interpret and manipulate carrier tag values associated with traffic-bearing data frames. In accordance with a preferred embodiment, a discard eligibility indication may be provided with the data frames.02-18-2010
20130089187DEVICE, SOFTWARE MODULE OR SYSTEM FOR GLOBAL REAL-TIME TELECOMMUNICATION - A telecommunication device for real-time communication at a border between a global transport network and a local area network may allow traffic using real-time communication protocols to traverse a firewall, classified real-time traffic over best effort traffic for prioritization over the global transport network, measure and collection information about an application, its usage and prioritization used over the global transport network, create call detail records that can be used by a service provider for billing purposes; and deliver the call detail records to the service provider.04-11-2013
20100266106METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR REMOTELY EVALUATING AND CONTROLLING VOICE OVER IP (VoIP) SUBSCRIBER TERMINAL EQUIPMENT - Methods, systems, and computer readable media for remotely evaluating and controlling VoIP subscriber terminal equipment using test calls, status queries, and usage statistics are disclosed. In one embodiment, a method includes initiating test calls with VoIP subscriber terminal equipment and obtaining test call results. The method further includes analyzing usage information regarding the VoIP subscriber terminal equipment and determining subscriber terminal device usage results. The method also includes remotely querying the VoIP subscriber terminal device and determining subscriber terminal equipment state information. The method further includes determining, based on the subscriber terminal equipment test call results, the subscriber terminal equipment usage results, and the subscriber terminal equipment state information, whether to initiate a remote control action for the VoIP subscriber terminal equipment and in response to determining to initiate a remote control action, initiating the remote control action to effect a change in state of the VoIP subscriber terminal equipment.10-21-2010
20130058464DETECTION OF DOUBLE TALK IN TELECOMMUNICATIONS NETWORKS - In one embodiment, the presence of double talk (DT) is detected in a telecommunications network having a near-end user and a far-end user. The energies of both (1) a signal received from the far-end user by the near-end user and (2) a signal to be communicated from the near-end user to the far-end user are computed. An echo return loss (ERL) estimate is calculated based on the energy calculations, and a preliminary decision is made as to whether DT is present based on the ERL estimate and the energy calculations. If DT is detected, then a counter is set to a hangover value. If DT is not detected, then the counter is reduced. This process is repeated, and, for each iteration, a final decision as to whether DT is present is made based on the counter value.03-07-2013
20120224675System and Method for Auditing Route Parameters in a Network - A method includes collecting route parameters from a first intermediate node and a second intermediate node that can be configured to communicatively couple a source node to the destination node, determining at least a first route through the first intermediate node and a second route through the second intermediate node, and determining which route among the first route and the second route is optimal according to one or more criteria.09-06-2012
20120201360SYSTEM AND METHOD FOR MONITORING A CONNECTION OF AN END-USER DEVICE TO A NETWORK - A method of monitoring the connection of a first end-user device to a network includes determining the amount of bandwidth present, tracking the amount of bandwidth in use by different classes of traffic, and tracking performance of the connection to detect when a threshold crossing has been reached. The method also includes transmitting a query to the first end-user device in response to the determined reaching of the threshold, the query requesting from a user of the first end-user device a communication action to perform based on the threshold being reached. The method further includes changing the communications session between the first end-user device and the network in accordance with the received communication action.08-09-2012
20090310757Performance Monitoring in a Telephone Network - A method of monitoring performance of a telephone network, wherein the telephone network includes at least one exchange configured for collecting signaling messages, which are received at the at least one exchange and/or which are generated at the at least one exchange. The method includes acquiring from the exchange a set of signaling messages indicating unsuccessful call setup procedures relative to calls addressed to a plurality of destinations associating with each signaling message of the set of signaling messages respective destination information which is indicative of the destination of the unsuccessful call which generated the signaling message; and processing the set of signaling messages and the corresponding associated destination information, thus obtaining information relative to the unsuccessful call setup procedures according to call destinations.12-17-2009
20110150189INTEGRATED TESTING PLATFORM FOR CONTACT CENTRES - A contact centre (06-23-2011
20090285368Cost-effective, multichannel digital logger - A digital logger system includes a multichannel interface circuit that: 11-19-2009
20090285367Purposeful Receive-Path Audio Degradation for Providing Feedback about Transmit-Path Signal Quality - A technique applicable to a telecommunications system is disclosed that provides quality-related information in a receive path, in which the information serves as feedback about the call quality that is present in the corresponding transmit path. It is recognized that when a first party on a call hears degradation, he tends to change the way that he speaks or reacts to a second party. Based upon this recognition, the present invention addresses the problem of one-way degradation by providing a feedback signal to the first party, in the form of intentional degradation of the voice signals that he is receiving from the second party. The degradation that is introduced by the disclosed data-processing system is based on the current quality of the voice path from the first party to the second party (i.e., the transmit path), instead of the other way around (i.e., the receive path).11-19-2009
20090296895METHODS AND APPARATUS FOR REDUCING DATA CAPTURE AND STORAGE REQUIREMENTS FOR CALL AND TRANSACTION RELATED MESSAGE MONITORING AND FRAUD DETECTION - Systems for monitoring, storage, and analysis of information in signaling messages, communicated from originating networks to a destination network through one or more intermediate networks are described. Correlation and comparison between signaling messages of interest sent from an origination network to signaling messages received by the destination network allows for the detection of inconsistent information, e.g., information fields in a communicated message that have been altered, either intentionally or unintentionally, by an intermediate carrier. The introduction of an additional communications path over which notification messages are forwarded from signaling monitoring equipment in the origination network to signaling monitoring equipment in the destination network allows for a significant reduction in the memory storage requirements at the destination network and in the amount of processing required to match, compare, and evaluate signaling messages. In addition, the reduction in stored messages and processing time allows the monitoring system to operate in near-real time allowing for fraud detection while a call is still in progress.12-03-2009
20090129560METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING TRAFFIC CONGESTION IN A NETWORK THROUGH DETECTION OF A SOURCE OF EXCESSIVE CALL VOLUME - A communication network that includes a signaling system seven (SS7) network is operated by associating call release messages, which are indicative of call failures in the communication network, with an originating point code (OPC) and/or a calling number. The rate at which calls originating from the originating point code and/or the calling number are admitted to the network may be adjusted based on the association between the call release messages and the originating point code and/or the calling number.05-21-2009
20090290687SYSTEM AND METHOD FOR POOLED IP RECORDING - Embodiments of the present invention provides systems and methods for pooled IP recording. An exemplary method of the present invention comprises monitoring a user's logon, associating a communication device to the user, assigning an interface to a recorder associated with the communication device, and recording data from the communication device sent over the interface. Another exemplary method of the present invention comprises detecting a recorder failure and dynamically routing an interface associated with the failed recorder to at least one other recorder.11-26-2009
20090041204Methods, Systems, and Computer-Readable Media for Facility Integrity Testing - Methods, systems, and computer-readable media provide for facility integrity testing. According to embodiments, a method for populating a watch list with circuits of a communications network to be monitored for repeat failures is provided. According to the method, a trouble ticket associated with one of the circuits and a trouble code and analysis code (TC/AC) combination associated with the trouble ticket is retrieved. Whether the trouble ticket meets a watch list criterion is determined. In response to determining that the trouble ticket meets the watch list criterion, the trouble ticket and the TC/AC combination are added to the watch list.02-12-2009
20120294429Multiple Carriers in Secure Environment - Systems and methods which facilitate selection of communication carriers for communications made in association with a controlled environment facility by a party to the communications are shown. Embodiments allow for a calling party and/or a called party to select a preferred communication carrier from a plurality of communication carriers for a current communication and/or one or more future communications. A party's carrier selection may be stored by a communication processing system for use with respect to a plurality of communication sessions. Embodiments provide a conflict resolution algorithm to arbitrate conflicting carrier selections where both a calling party and a called party to select a carrier for a communication session. Embodiments provide a premise based communication processing system, a centralized communication processing system, or a distributed configuration comprising a hybrid of the foregoing premise based and centralized configurations.11-22-2012
20090190727Detecting and reporting a loss of connection by a telephone - There is provided a method of detecting and reporting poor voice quality for use by a gateway device. The method comprises facilitating a connection between a telephone and a remote telephone via a network, and detecting a poor voice quality indictor during the connection. The method further comprises capturing, for a pre-determined period of time, telephone voice data being exchanged between the gateway and the telephone, network voice data being exchanged between the gateway and the network, and gateway parameters. The method also comprises packetizing the telephone voice data, the network voice data and the gateway parameters into a plurality packets having a network address of a network storage, and transmitting the plurality packets destined for the network storage via the network. In one aspect, the poor voice quality indictor may be generated by a user of the telephone in response to a poor voice quality of the connection.07-30-2009
20090161836METHOD OF VEHICLE NOTIFICATION OF CALL CENTER SERVICE INTERRUPTIONS - A method of regulating data transmissions used with telematics-equipped vehicles. The steps include establishing a period of anticipated call center service outage, notifying a plurality of telematics units of the period of anticipated call center service outage, storing that outage information at the plurality of telematics units, and then when a call from the vehicle to the call center is desired during the service outage, the process implements a call handling procedure that delays most calls until the call center is available, but that provides alternative call solutions for urgent or occupant-placed calls. Once the call center is available, postponed calls can be staggered to avoid a large initial spike in calls received at the call center.06-25-2009
20130216027MITIGATING DENIAL OF SERVICE ATTACKS ON CALL CENTERS - A device receives, from a user device, a call destined for a call center, and provides an audio CAPTCHA (Completely Automated Public Turing test to Tell Computer and Humans Apart) to the user device in response to the call. The device also receives, from the user device, a response to the audio CAPTCHA, and determines whether the response is correct. The device forwards the call to the call center when the response is correct, and drops the call when the response is incorrect.08-22-2013
20120140903DETECTING FALSE ANSWER SUPERVISION - A method and corresponding apparatus are provided to detect false answer supervision by determining false answer supervision as either as a function of a number of completed calls of short duration or as a function of a distribution of differences between timestamps of alert signals and timestamps of connect signals used to complete calls, detecting false answer supervision based on the indicator of false answer supervision determined by either functions separately or in combination, and affecting a decision in response to the detecting.06-07-2012
20120140902System and Method for Managing a Network - A system and method that may include placing a first telephone call from a data network to a target phone number using a trusted carrier; recording the first telephone call in a reference audio data file; placing a second telephone call from the data network to the target phone number using a suspect carrier; recording the second telephone call in a test audio data file; and comparing the test audio data file to the reference audio data file.06-07-2012
20100135470CALL IMPACT DETERMINATION TOOL - A method for monitoring call dispositions for a mass calling application at a voice over internet protocol platform includes receiving calls at the voice over internet protocol platform. The method includes processing each of the calls according to application-specific requirements for each call. The method includes aggregating error information for each of the calls in categories based on call dispositions. The method also includes displaying the aggregated error information categorized based on call dispositions for each of the applications that provide services for the calls for which error information is aggregated.06-03-2010
20110019803Method and device for presenting reason prompt for video call failure - A method for presenting a reason prompt for a video call failure includes: acquiring, by a network-side entity, a value of reason for a video call failure determined by an originating switch, with which a calling terminal is communicated; determining a reason prompt corresponding to the value of the reason for the video call failure; and presenting the reason prompt to the calling terminal. An embodiment of the present disclosure further provides a device for presenting a reason prompt for a video call failure and an originating switch apparatus. Reason prompts for video call failures can be updated dynamically at the network side, thereby guaranteeing the accuracy of reason prompts for video call failures presented to a calling subscriber, and improving the experience of the subscriber. Meanwhile, the operator can update a reason prompts for a video call failure in time, and the flexibility in operation at the operator side is enhanced.01-27-2011
20110044431Communications History Log System - A method is provided in which information about one or more telecommunications session characteristics is stored in a communications history log. A prediction is then made for the occurrence of telecommunications session characteristic in the future on the basis of the information stored in the communications history log.02-24-2011
20110176664COMMUNICATION DATA USING WIDEBAND COMMUNICATIONS - This disclosure relates to varying load and modulation applied to each of multiple frequency subchannels based on anticipated attenuation experienced by those subchannels. Communicating data includes identifying a static component of a transmission medium for wideband communications having at least two subchannels determining a function of noise is attenuation versus frequency for the static component selecting wideband modulation schemes for the subchannels based on the function determined and communicating a data signal over the subchannels. The transmission medium includes a medium other than a copper telephone wire between and including a carrier facility and a termination of the copper telephone wire at an access point at a user premise and copper telephone wire in a cable riser in multitenant units and multi-dwelling buildings. Independent demodulation functions may be applied to at least two of the subchannels.07-21-2011
20110249809Telephony Content Signal Discrimination - A method for discriminating a telephony content signal into a first category or a second category is described. The method comprises a filtering procedure for obtaining from the telephony content signal a band signal set comprising one or more band signals, each band signal being associated with a respective frequency band at least one of said band signals being a sub-band signal (n) associated with a sub-band of an overall frequency band of the telephony content signal. Furthermore a determination procedure is provided for determining a band signal variation value (LLn) and a band signal strength value (TLn) for each band signal (n) of said band signal set. Finally, a discrimination procedure discriminates whether the telephony content signal is of the first category or of the second category. The discrimination procedure comprises one or both of an unconditional and a conditional step for evaluating a relationship of the band signal variation value (LLn) and said band signal strength value (TLn) for said sub-band signal (n).10-13-2011
20100310055CALL SECURITY SYSTEM - A method and apparatus for reducing the vulnerability of the telecommunications system to unauthorized use that is easy to implement and that can reduce the instances of unauthorized access even during periods when telecommunications personnel are not able to give attention to the traffic on the system. The telecommunications system collects statistics of each user's pattern of telecommunications usage. Typically, these statistics will be in the form of, say, the average number of calls per day or the average number of calls per day on given days of the week. It may also include the mean busy hour for the given days of the week. Moreover, daily averages may be taken not only for all calls but also for all calls of a particular type, e.g., of all international calls. These statistics are taken for a reference period, such as the preceding thirty days, and the corresponding quantity for the current day is also computed. If the current statistics are not excessive as compared with the reference statistics, then access to a communications resource—e.g., an outgoing trunk line—is granted to the call without any supplemental access restrictions. But if a predetermined deviation is detected between the current statistics and the reference statistics, then a supplemental restriction is placed upon the call.12-09-2010
20100322388CALL MANAGEMENT - A system may include a destination device that receives information about a caller via a first outgoing leg and exchanges content with the caller via the first outgoing leg. The system may further include a network device that receives an incoming call from the caller, establishes the first outgoing leg, connects the incoming call to the first outgoing leg so the content can be exchanged, monitors the first outgoing leg, selectively establishes a second outgoing leg in response to the monitoring, and connects the incoming call to the second outgoing leg.12-23-2010
20110051905METHOD OF AND A DEVICE FOR QUANTIFYING A TONE SIGNAL RECEIVED IN A TELECOMMUNICATIONS NETWORK - A tone signal received in a telecommunications network is bandpass filtered based on an identified type of the received tone signal, providing a bandpass filtered tone signal. The tone signal is also bandstop filtered based on the identified type of the received tone signal, providing a bandstop filtered tone signal. The bandpass filtered tone signal and the bandstop filtered tone signal are analysed and the received tone signal is quantified based on the analysis result.03-03-2011
20110051904Facility Outage Restoration Simulator Inquiry Tool - Methods, systems, and computer-readable media for preparing for a service disruption are provided. Information relating to an activity at a target location is received. Upon receiving information relating to at least the activity at the target location, stored data related to the activity and the target location are gathered. A probability of a service disruption at the target location based on at least the stored data related to the activity and the target location is assessed and the target location is monitored. Upon detecting a change in services associated to the target location, an alert is generated.03-03-2011
20110188641METHOD AND APPARATUS FOR REMOVING NOISE SIGNAL FROM INPUT SIGNAL - A method for removing a noise signal from an input signal that is received. In the method, the amount of energy of the input signal is detected, a noise signal included in the input signal is estimated, an intermediate output signal is generated by removing the estimated noise signal from the input signal, and a final output signal is generated by amplifying the amount of energy of the intermediate output signal based on a difference between the amount of energy of the intermediate output signal and the amount of energy of the input signal.08-04-2011
20110188643METHOD AND APPARATUS FOR PROVIDING QUEUE DELAY OVERLOAD CONTROL - A method and apparatus for handling an overload condition in a communication network are disclosed. For example, the method calculates a call target rate by at least one core signaling network element for at least one edge signaling network element. The method then sends the call target rate by the at least one core signaling network element to the at least one edge signaling network element, when a total queueing delay of the at least one core signaling network element exceeds a predefined high threshold in a measurement interval, wherein the call target rate is used by the at least one edge signaling network element in an overload control that throttles signaling traffic.08-04-2011
20110188642METHOD AND APPARATUS FOR PROVIDING RETRY-AFTER-TIMER OVERLOAD CONTROL - A method and apparatus for handling an overload condition in a communication network are disclosed. For example, the method calculates a retry-after-timer parameter by at least one core signaling network element for at least one edge signaling network element. The method then sends the retry-after-timer parameter by the at least one core signaling network element to the at least one edge signaling network element, when a total queueing delay of the at least one core signaling network element exceeds a predefined high threshold in a measurement interval, wherein the retry-after-timer parameter is used by the at least one edge signaling network element in an overload control that throttles signaling traffic.08-04-2011
20100020940FAR-END SOUND QUALITY INDICATION FOR TELEPHONE DEVICES - A sound quality metric may be determined at a near-end telephone system, the sound quality metric associated with far-end sound quality received at a far-end telephone system. A signal adjustment may be determined, based on the sound quality metric. The signal adjustment may thus be provided at an earpiece of the near-end telephone system. In this way, a user of the near-end telephone system may be alerted that the sound quality of a far-end user is unacceptably low, so that the near-end user may take corrective action at the near end to improve the far-end sound quality.01-28-2010
20110216887FACSIMILE APPARATUS, FAILURE DETECTION METHOD, AND COMPUTER READABLE MEDIUM - A facsimile apparatus includes a first detecting unit and a second detecting unit. The a first detecting unit detects whether a facsimile communication is established or not with a communication destination in a prescribed time after a selection signal is sent to the communication destination with a communication line held. The second detecting unit detects a state of the communication line with the communication line held when the first detecting unit detects that a facsimile communication is not established.09-08-2011
20120099711TELECOMMUNICATION FRAUD PREVENTION SYSTEM AND METHOD - A system for monitoring of telephone calls on a plurality of inbound and outbound voice channels made to and originating from a common private branch exchange (PBX) to detect fraudulent activity. Monitors and detects audio data on two or more of the voice channels. Includes analysis of binary data streams on at least one inbound voice channel and at least one outbound voice channel and comparing said streams by a sliding window to slide a sample frame of one channel binary data stream backwards and/or forwards relative to the other binary data stream to synchronize the inbound voice channel and outbound voice channel. The comparison determines if a data match is present between the compared inbound channel and the outbound channel and blocks the at least one outbound voice channel, if a data match is found with at least one inbound voice channel.04-26-2012
20110007880Call Setup Penalty Cost Categorization - Embodiments of systems and methods presently disclosed generally relate to categorizing penalty costs associated with calls. More specifically, embodiments relate to identifying penalty costs generated in response to setting up calls in a network and determining one or more reasons for the penalty costs. Further still, embodiments relate to generating one or more reports of penalty costs. Further yet, embodiments relate to notifying specified personnel of the penalty cost report(s).01-13-2011
20100322387ENDPOINT ECHO DETECTION - Architecture that employs a signal (e.g., audible or inaudible sounds) to detect if endpoints of a communications session are sufficiently close to each other to induce echo, and then control (e.g., muting) is applied to one or more of the endpoints to prevent echo. The signals can be played and detected from the endpoints or a central conferencing component such as a multiple control unit (MCU). The MCU can provide support for legacy endpoints as well. When echo is detected, the offending endpoint(s) can be controlled to mute one or more onboard devices such as a speaker or microphone. The device(s) can be muted from a remote component or for a local component or locally by the endpoint user. A notification can be sent that notifies the endpoint user that the mute operation has been applied or should be applied to one or more of the local devices.12-23-2010
20080285726IP Voice Call Surveillance Through Use Of Non-Dedicated IP Phone With Signal Alert Provided To Indicate Content Of Incoming Call Prior To An Answer As Being A Monitored Call - Surveillance of IP telephony may be performed through the use of conventional telephone equipment, according to principles of the invention while preventing giving indication to the monitored phone by alerting the user of the monitoring phone to such surveillance use prior to pick up by an agent for engagement of the monitoring phone in response to the alert. Such alerts may assume many forms such as ringing, visual indicators, data readouts, activating ancillary equipment, various flags, etc. This alert prior to surveillance is distinct from alerts used for normal non-surveillance calls, which the monitoring phone is capable of receiving.11-20-2008
20120014514METHOD OF INDICATING PRESENCE OF TRANSIENT NOISE IN A CALL AND APPARATUS THEREOF - A method and an apparatus for indicating presence of a transient noise in a call are provided. The method comprises the steps of determining activity at an endpoint of the call by monitoring presence of a signal input from the endpoint into the call and monitoring presence of a potential source of transient noise at the endpoint. Further, based on the activity determination and the monitoring of the presence of a potential source of transient noise, a signal representative of the presence of a transient noise in the call is sent. The present invention is advantageous in that it enables improvement of the quality of the call.01-19-2012
20120057683Call Re-Establishment - Method and user terminal for handling a call over a communications network between a first user terminal, usable by a first user, and at least one other user terminal, usable by a respective at least one other user, wherein a client is executed at the first user terminal for participation in the call. The client determines a condition of a respective at least one network connection used in the call between the first user terminal and the at least one other user terminal over the communications network. The client also determines that the call has been dropped, and responsive to the determination that the call has been dropped, the client automatically attempts to re-establish the call in dependence upon the determined condition of the at least one network connection.03-08-2012
20120063572DELAY ESTIMATOR - The present invention provides a method and apparatus for finding an estimate of the delay of a signal travelling between two points. A quantity is evaluated from the signal at a final number of time instants, at both a reference point and a reception point. The values are quantized by comparison with a threshold adapted to a typical magnitude of the quantity. If the quantized values from the reception point are shifted back by the true delay with respect to the quantized values from the referenced point, then certain co-occurrences of quantized values have very low probability. Hence, the best delay estimate is that shift which yields the least number of low-probability co-occurrences.03-15-2012
20120155619INBOUND PHONE CONTROL - A method, including receiving at a network element, from a first telecommunications enabled device, a control connection request directed to a second telecommunications enabled device, connecting a control connection to the second telecommunications enabled device wherein the control connection is connected without requiring user input at the second telecommunications enabled device to answer the control connection request, and providing access to one or more functionalities of the second telecommunications enabled device to the first telecommunications enabled device through the control connection.06-21-2012
20100091952Monitoring a Call Forwarded to a Network-Based Voice Mail System - An apparatus, system and method for monitoring calls that have been forwarded to a network-based voice mail system (VMS). The VMS receives the forwarded call and sends a start of greeting signal at the beginning and an end of greeting signal at the completion of the voice message greeting to the central office switch. The switch sends an activate call monitoring data message and a call monitoring alert signal to the customer premises equipment (CPE). If the CPE is adapted for call monitoring and includes a speaker assembly, then the speaker assembly is engaged in response to the activate call monitoring data message, thereby allowing hands-free call monitoring. If the CPE does not include a speaker assembly, then the called party may activate call monitoring by lifting the handset in response to detecting a call monitoring alert from the CPE. While monitoring the call, the called party may intercept the call to speak with the calling party.04-15-2010
20120128136Telecommunications Patching System That Facilitates Detection and Identification of Patch Cords - A telecommunications patching system includes a patch panel comprising a plurality of connector ports and a plurality of patch cords configured to selectively interconnect pairs of the connector ports. Each patch cord has opposite ends and a respective connector secured to each end that is configured to be removably secured within a connector port. The connectors of a respective patch cord have the same unique identifier associated therewith. A first sensor is located at each connector port and detects when a patch cord connector is inserted within, and removed from, a respective connector port. A second sensor is located at each connector port and reads the identifier of a patch cord connector inserted within a respective connector port. The first and second sensors are in communication with a controller that monitors and logs patch cord interconnections with the connector ports.05-24-2012
20120314846METHODS AND APPARATUS TO DISPLAY SERVICE QUALITY TO A USER OF A MULTIPLE MODE COMMUNICATION DEVICE - Methods and apparatus that relate to the display of network availability and quality of service (QoS) to a user of a multiple mode communication device are disclosed. An example method includes measuring, at a communication device, a quality of service metric from a call registration response message for a call, the call registration response message being a response to a call registration message routed through a first communication provider to a second communication provider, comparing the quality of service metric to a time interval in which the call registration response message is to expire, and selectively displaying a representation of the quality of service metric for the first communication provider to a user at the communication device based on the comparison.12-13-2012
20120257728Methods, Systems, and Computer-Readable Media for Facility Integrity Testing - Methods, systems, and computer-readable media provide for facility integrity testing. According to embodiments, a method for populating a watch list with circuits of a communications network to be monitored for repeat failures is provided. According to the method, a trouble ticket associated with one of the circuits and a trouble code and analysis code (TC/AC) combination associated with the trouble ticket is retrieved. Whether the trouble ticket meets a watch list criterion is determined. In response to determining that the trouble ticket meets the watch list criterion, the trouble ticket and the TC/AC combination are added to the watch list.10-11-2012
20120250830CONFERENCE SIGNAL ANOMALY DETECTION - Detecting at least one of an echo detector and a noise detector based on analysis of audio streams transmitted to and received from each endpoint of a conference. When certain characteristics of the respective audio streams for a given endpoint are classified as significant against certain criteria, a determination is made as to whether that endpoint is a source of echo and/or noise. Subsequent actions are taken to alert users and/or prevent broadcast of impaired signals.10-04-2012
20120328083Methods, Computer Program Products, And Systems For Managing Voice Over Internet Protocol (VOIP) Network Elements - Methods, computer program products, and systems for managing VoIP network elements are provided. Methods include receiving call details records (CDRs) from a plurality of network elements. The received CDRs including disconnect cause codes and telephone call correlation identifiers. The received CDRs are correlated to telephone calls based on the telephone call correlation identifiers. Two CDR records are associated with the same telephone call when their telephone call correlation identifiers are the same. A master correlated CDR is created for each telephone call. The creating includes assigning a correlated disconnect cause code and classifying the telephone call. The assigning and classifying are responsive to the received CDRs associated with the telephone call. The master correlated CDR includes the correlated disconnect cause code and the telephone call classification. A threshold crossing alert (TCA) is generated in response to a threshold for the correlated disconnect cause code being reached.12-27-2012
20120328084TECHNIQUES FOR TRANSFER ERROR RECOVERY - Techniques for transfer error recovery are described. A system may comprise a context generator module operative to record context information for a first call session between a first call terminal and a call system resource, and store the context information with a context identifier in a context table. The system may include a transfer error context module to couple to the context generator module, the transfer error context module operative to generate transfer error context information having the context identifier. The system may include a call transfer module to couple to the transfer error context module, the call transfer module operative to send the transfer error context information to the first call terminal for use in case of a transfer failure event. Other embodiments are described and claimed.12-27-2012
20110222669METHOD FOR ESTIMATING THE QUALITY OF EXPERIENCE OF A USER IN RESPECT OF AUDIO AND/OR VIDEO CONTENTS DISTRIBUTED THROUGH TELECOMMUNICATIONS NETWORKS - A method for estimating a quality of experience of a user receiving an information content stream distributed through a telecommunications network, includes: collecting a plurality of measures of at least one characteristic parameter of the information content stream during the distribution thereof through a telecommunications network; deriving from the collected measures an abstract representation in terms of gaps in the information content stream, wherein a gap corresponds to a value of a collected measure below a predetermined threshold; determining a temporal distribution of the gaps in the information content stream; and calculating an index of perceived quality of experience based on the temporal distribution of the gaps in the information content stream, wherein the index of perceived quality is related in a non-linear way to the temporal distribution of the gaps.09-15-2011
20120321052SYSTEM AND METHOD FOR SELECTING A CONTENT DELIVERY NETWORK - A system and method for selecting a data delivery network. A determination is made of user information associated with a communication from a user. A determination is made of performance information for multiple data delivery networks. The data delivery network is selected for the communication from the multiple data delivery networks.12-20-2012
20100202595System and method for detecting three-way call circumvention attempts - Disclosed is a three-way call detection system and method for use with a telephone management system. Specifically, a three-way call detection system and method for detecting continuous noise indicative of an attempt to mask a three-way call attempt. The continuous noise detection system and method may be stand alone or used in conjunction with any existing three-way call detection system and method.08-12-2010
20130010932METHOD AND APPARATUS FOR PROCESSING OF A TOLL FREE CALL SERVICE ALARM - A method and apparatus for automatic processing of toll free call service alarms are disclosed. For example, the method receives a trouble ticket by a service provider for a toll free call service alarm, and retrieves a calling to number and a calling from number from the trouble ticket. The method determines if the service provider is a responsible organization for the toll free call service for the calling to number, and determines if a customer network for the toll free call service is active if the service provider is the responsible organization for the toll free call service. The method notifies a work center if the customer network is not active.01-10-2013
20130101095Internet Phone Trainer - A training system is disclosed. The training system includes a server. The server includes a processor, data storage, a data input/output interface, and a voice interface. The data input/output interface is configured to provide a web-based interface to a data terminal and to receive, from the data terminal and via the web-based interface, both an identifier identifying at least one voice terminal and at least one response. The voice interface is configured to transmit at least one audio test signal corresponding to at least one audio test to the at least one voice terminal. The response is a response to the at least one audio test. In one embodiment, the voice terminal and the data terminal are combined in a single device.04-25-2013
20110249810DELAY ESTIMATOR - The present invention provides a method and apparatus for finding an estimate of the delay of a signal travelling between two points. A quantity is evaluated from the signal at a final number of time instants, at both a reference point and a reception point. The values are quantized by comparison with a threshold adapted to a typical magnitude of the quantity. If the quantized values from the reception point are shifted back by the true delay with respect to the quantized values from the reference point, then certain co-occurrences of quantized values have very low probability. Hence, the best delay estimate is that shift which yields the least number of low-probability co-occurrences.10-13-2011
20130148789System facilitating meeting device interactions and methods thereof - The present disclosure relates to unified communications, and more particularly, to a system facilitating meeting device interactions and methods thereof. In an illustrative embodiment, the system can include a calendar booking tool and private branch exchange (PBX) to provide meeting information and telephony capabilities to an open device. Basic meeting information can be provided through the PBX to the device. This information can include a time, date, host and guests of the meeting. The PBX can reuse existing functionality and features for the meeting and provide them to the open device. These features can include, but are not limited to, displaying updates, populating keys and dynamically creating groups. The system can offer intuitive meeting functions on telephony devices having a display with self-labeling keys. Touch screen devices including soft phones can provide these features. The concepts can be extended to touch screen application capable phones.06-13-2013
20120275574Network Fault Detection - According to a first aspect of the present invention there is provided a method of detecting faults within a telecommunications network, said telecommunications network comprising a plurality of entities. The method comprises grouping said entities into one or more groups based on the call traffic handled by said entities or on the call traffic said entities are configured to handle, for at least one of said groups, monitoring the call length pattern of a plurality of grouped entities of said group, and for at least one of said grouped entities, comparing the monitored call length pattern of the grouped entity with the monitored call length pattern of one or more of the other grouped entities to determine if the behaviour of said grouped entity is indicative of a fault. The entities may comprise nodes of the network or hardware elements within one or more nodes of the network.11-01-2012
20120275573SYSTEMS, DEVICES AND METHODS OF ESTABLISHING A CLOSED FEEDBACK CONTROL LOOP ACROSS MULTIPLE DOMAINS - The various embodiments include methods, computers and communication systems for establishing a closed feedback loop across multiple heterogeneous networks within a telecommunications system, which may include measuring a first attribute of a communication in a first telecommunications domain and sending a first request message including information relating to the measured first attribute to a server. The server may receive the first request message, identify a second telecommunications domain involved in the communication based on information in the first request message, generate a second request message that includes information for adjusting a second attribute of the communication, and send the second request message to the second telecommunications domain. A computing device in the second telecommunications domain may receive the second request message and adjust the second attribute of the communication to alter the first attribute of the communication in the first telecommunications domain.11-01-2012
20120275572SECURITY APPARATUS AND METHOD - A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.11-01-2012
20100316195LAWFUL INTERCEPTION OF NON-LOCAL SUBSCRIBERS - The present application relates to monitoring non-local originating calls in a telecommunication system having a local network part and a non-local network part. A monitoring centre is attached to an Intercept Access Point in the local network part. A monitoring request comprising an external target identification is received from the monitoring centre to the Intercept Access point. A call is set-up of from an originating subscriber in the non-local network part, towards the local network part. An Initial Address Message comprising the originating subscriber's identity is received to the Intercept Access point from the non-local network part. A match is found between the Initial Address Message and the received target identification. Monitoring information related to the matched target is transferred from the Intercept Access Point to the monitoring centre.12-16-2010
20120281818SYSTEM AND METHOD FOR DETECTING ANOMALIES ALONG TELECOMMUNICATION LINES - An anomaly detection system comprises an echo canceler and anomaly detection logic. The echo canceler has a plurality of taps respectively associated with a plurality of tap coefficients. The anomaly detection logic is configured to determine a difference between a new tap coefficient associated with one of the taps and a previous tap coefficient associated with the one tap. The anomaly detection logic is configured to perform a comparison between the difference and a threshold and to detect an anomaly along a telecommunication line based on the comparison.11-08-2012
20090323903METHOD AND APPARATUS FOR ANALYZING AND MITIGATING NOISE IN A DIGITAL SUBSCRIBER LINE - Data indicative of a level of stability of a DSL link is received. Based on the received data, it is determined whether the data indicates a level of stability of the DSL link that is above or below a minimum threshold. If the level of stability of the DSL link is below the minimum threshold, die noise associated with the DSL link before the time of failure is compared with the noise associated with the DSL link after the time of failure. If the difference between the noise before and after the time of failure exceeds a threshold, then the difference in noise is characterized as a stationary noise associated with the DSL link. However, if the difference between the noise before and after the time of failure is below the threshold, a determination is made whether the failure is associated with a loss of power to the DSL link or a severe impulse noise event—the difference in noise is characterized accordingly. Finally, the characterization of the noise associated with the DSL link is preserved for subsequent possible reconfiguration of the DSL link to improve link stability.12-31-2009
20130202095Systems, Methods, and Computer Programs for Transitioning from a Phone-Only Mode to a Web Conference Mode - Various embodiments of systems, methods, and computer programs are disclosed for transitioning from a phone-only mode to a web conference mode. One embodiment is a method for participating in an audio conference comprising: a conferencing system establishing an audio conference between a plurality of participants via a communication network, at least one of the participants participating in the audio conference in a phone-only mode; and a server in communication with the conferencing system presenting to the phone-only participant, via a user interface on a computing device, a phone-only control menu for enabling the phone-only participant to selectively transition from the phone-only mode to a web conferencing mode.08-08-2013

Patent applications in class Monitoring

Patent applications in all subclasses Monitoring