| 12309282 |
Validating and securing caller identification to prevent identity spoofing |
Lulia Ann Barakat, Duncan ARCHER, Michael Stovenour, Tolga Asveren |
2025-05-20 |
| 12177380 |
Systems and methods for indicating and managing a validation of a caller identification to prevent identity spoofing |
Alejandro Lopez, Lulia Ann Barakat |
2024-12-24 |
| 11824994 |
Validating and securing caller identification to prevent identity spoofing |
Lulia Ann Barakat |
2023-11-21 |
| 11792327 |
Ringless voicemail attempt detection |
Kent Lanier Hallford, Jr., Nayankumar Patel, Lulia Ann Barakat |
2023-10-17 |
| 11770475 |
Computerized system and method for robocall steering |
John Hans Van Arkel, Karl Stang, Katrina Marie Kutchko, Lulia Ann Barakat, Joe B. Thornton |
2023-09-26 |
| 11343376 |
Computerized system and method for robocall steering |
John Hans Van Arkel, Karl Stang, Katrina Marie Kutchko, Lulia Ann Barakat, Joe B. Thornton |
2022-05-24 |
| 11303754 |
Ringless voicemail attempt detection |
Kent Lanier Hallford, Jr., Nayankumar Patel, Lulia Ann Barakat |
2022-04-12 |
| 11133938 |
Validating and securing caller identification to prevent identity spoofing |
Lulia Ann Barakat, Duncan ARCHER, Michael Stovenour, Tolga Asveren |
2021-09-28 |
| 11018872 |
Validating and securing caller identification to prevent identity spoofing |
Lulia Ann Barakat |
2021-05-25 |
| 10951770 |
Systems and methods for utilizing machine learning to detect and determine whether call forwarding is authorized |
Lulia Ann Barakat |
2021-03-16 |
| 10165117 |
Call handling based on augmented caller information |
Lulia Ann Barakat |
2018-12-25 |
| 10116792 |
Adding additional information to caller ID information |
Regina A. Chiurco, Heath W. Hendrickson, Lulia Ann Barakat |
2018-10-30 |
| 10009458 |
Analyzing call forwarding activity |
Thomas A. Gallant, Heath W. Hendrickson, Lulia Ann Barakat |
2018-06-26 |
| 9948759 |
Network based call authentication |
Joseph G. Oleska, Vincent Lally, Heath W. Hendrickson, Kevin V. Bohn |
2018-04-17 |
| 9774731 |
Adding additional information to caller ID information |
Regina A. Chiurco, Heath W. Hendrickson, Lulia Ann Barakat |
2017-09-26 |
| 9667775 |
Analyzing call forwarding activity |
Thomas A. Gallant, Heath W. Hendrickson, Lulia Ann Barakat |
2017-05-30 |
| 9628566 |
Communication of data of a web real-time communication via a carrier-grade environment |
Brian Somes, Heath W. Hendrickson |
2017-04-18 |
| 9338194 |
Video conference service |
Heath W. Hendrickson, Jeffrey J. Reger, Mark E. Stallcup |
2016-05-10 |
| 9143620 |
Multiparty service access in a network with autonomous nodes |
Brian Somes, Rachel Lee Scarbrough, Heath W. Hendrickson |
2015-09-22 |
| 9113031 |
Call control for conferencing calls |
Jeffrey J. Reger, Mark E. Stallcup |
2015-08-18 |
| 9071683 |
Methods and systems for determining whether an identity associated with a telephone call is fake |
Brian Somes, Thomas A. Gallant |
2015-06-30 |
| 8913493 |
Obtaining and using confidence metric statistics to identify denial-of-service attacks |
— |
2014-12-16 |
| 8881259 |
Network security system with customizable rule-based analytics engine for identifying application layer violations |
Shawn Ferdinand, Rachel Lee Scarbrough, Mark A. Nicholson |
2014-11-04 |
| 8860777 |
Multi-enterprise video conference service |
Heath W. Hendrickson, Jeffrey J. Reger, Mark E. Stallcup |
2014-10-14 |
| 8503437 |
Integrated customer premises equipment device |
Joel M. Krause, G. Lance Lockhart, John Truetken, Christopher Martin |
2013-08-06 |