作者: Vlad Vendrow
DOI:
关键词:
摘要: Examples of inbound call identification and management are described including a system that includes one or more repositories can include data representing action policies attributes associated with the caller devices callee devices. Further, computing identifier (“IDer”) configured to characterize form characterized attributes, controller match against routing criteria specified in policies, router route calls from responsive between criteria.