H04M15/00

MULTIVARIATE RISK ASSESSMENT VIA POISSON SHELVES

Detecting fraudulent activity can be a complex, manual process. In this paper, we adapt statistical properties of count data in a novel algorithm to uncover records exhibiting high risk for fraud. Our method identifies shelves, partitioning data under the counts using a Student's t-distribution. We apply this methodology on a univariate dataset including cumulative results from phone calls to a customer service center. Additionally, we extend this technique to multivariate data, illustrating that the same method is applicable to both univariate and multivariate data.

MULTIVARIATE RISK ASSESSMENT VIA POISSON SHELVES

Detecting fraudulent activity can be a complex, manual process. In this paper, we adapt statistical properties of count data in a novel algorithm to uncover records exhibiting high risk for fraud. Our method identifies shelves, partitioning data under the counts using a Student's t-distribution. We apply this methodology on a univariate dataset including cumulative results from phone calls to a customer service center. Additionally, we extend this technique to multivariate data, illustrating that the same method is applicable to both univariate and multivariate data.

METHODS AND SYSTEMS OF USING REMOTE SUBSCRIBER IDENTIFICATION MODULES AT A DEVICE

The present invention discloses methods and systems for communicating at a cellular router between a first wireless communication module and a first subscriber identity module (SIM). The cellular router receives a first request from a first wireless communication module and encapsulates the first request in a first modified request. The cellular router then sends the first modified request to a first SIM card in a first communication apparatus and waits for a first modified reply. While waiting for the first modified reply the cellular router sends at least one halt message to the first wireless communication module after a first time threshold. After receiving the first modified reply, the cellular router decapsulates the first modified reply to retrieve a first reply and sends the first reply to the first wireless communication module where the first modified reply is a reply to the first modified request.

INFORMATION PROCESSING TERMINAL
20230239411 · 2023-07-27 ·

An information processing terminal allowing a user to view a content stored in an external server via contracted communication lines comprises a communication data amount management unit configured to manage an amount of data communicated via a high-speed communication line of the communication lines, and a display control unit configured to execute display control, and in a case where there is a possibility that an amount of data necessary for viewing of the content is about to exceed an amount of data remaining within a contracted amount of data, the communication data amount management unit calculates, as a purchase price, a price to additionally purchase a predetermined amount of data of the high-speed communication line based on a predetermined condition, and the display control unit displays the calculated purchase price.

TELEPHONY APPLICATION SERVER CHARGING FOR EVOLVED PACKET SYSTEM FALLBACK
20230239665 · 2023-07-27 ·

A server of a fifth generation (5G) network can provide substantially real-time charges for a UE during fallback to another network. A Telephony Application Server (TAS) in an IP Multimedia Subsystem (IMS) can identify Evolved Packet System Fallback (EPSFB) and report the EPSFB to a charging system to cause the charging system to generate accurate charges for user equipment communicating over the 5G network and the other network. The TAS can comprise logic to identify a change in P-Access-Network-Information associated with each network, and generate a call detail records for billing, or real-time communication via an online charging and/or offline charging for the served UE. Information (a user profile, call detail records, instance of EPSFB, etc.) associated with the TAS can be used to make network improvements that decrease instances of EPSFB and increase an amount of new radio services available to UEs.

Method, apparatus and system for data connection management
11570842 · 2023-01-31 · ·

Embodiments of the present disclosure provide a method, an apparatus and a system for data connection management. The method for data connection management includes: obtaining, by a user equipment UE, first instruction information, wherein the first instruction information is used for instructing to close or open a data connection; and transmitting, by the UE, the first instruction information to a packet data network gateway P-GW, for enabling the P-GW to stop or start data transmission of at least one bearer of the UE according to the first instruction information.

Service design center for device assisted services

A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.

Techniques for implementing phone number-based user accounts with permissions to access varying levels of services utilizing visible and hidden contact addresses
11716426 · 2023-08-01 · ·

This application sets forth techniques for managing phone number-based user accounts. According to some embodiments, a server computing device can be configured to carry out the steps of (1) receiving, from a first client computing device, a request to create a user account based on a phone number, (2) in response to authenticating that the first client computing device is associated with the phone number: creating the user account based on the phone number, creating a hidden contact address based on the phone number, and assigning the hidden contact address to the user account, and (3) in response to receiving a notification that a second client computing device is associated with the phone number: requiring the user account to be updated to be based on a different phone number, or assigning, to the user account, a visible contact address based on the phone number.

System and method for identifying unwanted communications using communication fingerprinting

A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.

Device deactivation based on behavior patterns

Embodiments are described for a pattern-based control system that learns and applies device usage patterns for identifying and disabling devices exhibiting abnormal usage patterns. The system can learn a user's normal usage pattern or can learn abnormal usage patterns, such as a typical usage pattern for a stolen device. This learning can include human or algorithmic identification of particular sets of usage conditions (e.g., locations, changes in settings, personal data access events, application events, IMU data, etc.) or training a machine learning model to identify usage condition combinations or sequences. Constraints (e.g., particular times or locations) can specify circumstances where abnormal pattern matching is enabled or disabled. Upon identifying an abnormal usage pattern, the system can disable the device, e.g., by permanently destroying a physical component, semi-permanently disabling a component, or through a software lock or data encryption.