Patent classifications
H04M17/00
Fraud detection on a communication network
A method and corresponding apparatus for automatically detecting and preventing fraudulent calls on a communication network. At least one example embodiment may include collecting CDRs on the communication network for a given time period, aggregating the plurality of call features for each of the collected call detail records by destination number, and utilizing machine learning to generate a decision model for determining if a destination number and/or a call to that destination number may be fraudulent. According to another aspect of the example embodiment, the decision model may be implemented on the communication network to detect and prevent fraudulent calls.
Authorization token including fine grain entitlements
A method of interpreting an authorization token is described herein. The service can receive an authorization token from a client device, and validate a signature of the authorization token. The service can identify an allowed function value associated at least part of an entitlement representation contained in a body of the authorization token. The service can convert the allowed function value to an allowed function bitmask that includes bits at a plurality of bit positions that are set to values indicating whether the subscriber element has attributes associated with each of the plurality of bit positions on a predefined attribute list. The service can determine whether the allowed function bitmask indicates that the subscriber element has one or more qualifying attributes that entitle a user of the client device to access the service.
System and method for provisioning temporary telephone numbers
Systems, methods, and computer program products for provisioning a temporary disposable number are described. A user can be provided with a pool of available temporary disposable numbers that have a limited shelf life. The user can select one of the available temporary disposable numbers while submitting a permanent phone number associated with a communications device (e.g., mobile phone, home phone, business phone, etc.). Prior to activating the selected temporary disposable number, the temporary disposable number is linked to the permanent phone number. After activation, when an incoming call to the temporary disposable number is received, the permanent phone number is identified to be associated with the temporary disposable number being called. The incoming call is then forwarded to the communications device on which the permanent phone number is established.
Method and Apparatus for Information Exchange in Online Charging
A method and an apparatus for information exchange in online charging in order to reduce frequency of information exchange between a Charging Trigger Function (CTF) device and an Online Charging System (OCS), and reduce a pressure of information transmission between the CTF device and the OCS, where the method includes receiving, by a CTF device, a credit control answer (CCA) message that carries a non-real-time Trigger and sent by an OCS, recording, by the CTF device, charging information before and after a corresponding event of the non-real-time Trigger happens each time before sending a credit control request (CCR) message to the OCS next time, and sending, by the CTF device, the CCR message to the OCS.
System and method for detecting and alerting risks of inputting incorrect account information in refill transactions
Apparatus and method are disclosed for detecting a risk in a refill transaction. The method may include receiving, from a user, a request for refilling an account, the request including account information associated with the account. The method may also include acquiring a contact information set corresponding to the user. The method may further include determining whether the contact information set includes the account information by searching in the contact information set for information matching the account information. In addition, the method may include providing a risk alert to the user if it is determined that the contact information set does not include the account information.
MANAGING METERING FOR DISTRIBUTED IOT APPLICATIONS
The present disclosure relates to methods of metering, and in particular to methods of metering activities of applications in distributed networks. More particular, the disclosure concerns a method for metering the operation of distributed Internet of Things, IoT devices. This disclosure relates to a method for metering activities of an application in a data processing system, wherein said data processing system comprises resource nodes configured to perform activities executed as actors in the respective resource nodes; and wherein the actors are controlled by one or more runtimes in the data processing system. The method comprises tracing, by a runtime, information related to activities executed by actors controlled by the runtime, and metering, by the runtime, the operation of the application based on the part of the traced information, which is related to activities of actors being used by the metered application. Furthermore, the disclosure relates to corresponding apparatuses and computer programs.
Feature management of a communication device
A system and method for the real-time management of a device, and more particularly to the establishment and enforcement of policies or rules associated with the feature or functions that may be performed with the device, such as making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. If a child or employee is using the device, there may be a need to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.
Feature management of a communication device
A system and method for the real-time management of a device, and more particularly to the establishment and enforcement of policies or rules associated with the feature or functions that may be performed with the device, such as making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. If a child or employee is using the device, there may be a need to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.
System and method for authentication of a registered mobile subscriber
Briefly, in accordance with one or more embodiments, for example, a method and/or system is provided to at least authenticate a mobile subscriber that has been registered via a registration process comprising. A current international mobile subscriber identifier (IMSI) associated with a mobile telephone number received electronically via a network is queried. A database entry created via the registration process including an IMSI associated with a received mobile telephone number at the time of mobile subscriber registration is also queried. At least the current IMSI and the IMSI of the database entry are compared. Account status of the mobile subscriber based at least in part on a match between the current IMSI and the IMSI of the database entry is verified. Verifying the account status includes determining creditworthiness with respect to the account of the mobile subscriber.
Method and system for remote management of access to appliances
Embodiments described herein include methods and systems for remotely managing appliances, including enabling communication between a user of the appliance and third party systems. The third party systems can include any entity that has a relationship with the user of the appliance, such as a payment infrastructure handling incremental payments for the appliance, and managing access to the appliance accordingly. In some embodiments, the appliance being controlled is a mobile phone that also includes third party operating system software. Various methods for preventing alteration or replacement of the third party operating system are also described.