H04M1/68

Systems and methods for detecting call provenance from call audio

Various embodiments of the invention are detection systems and methods for detecting call provenance based on call audio. An exemplary embodiment of the detection system can comprise a characterization unit, a labeling unit, and an identification unit. The characterization unit can extract various characteristics of networks through which a call traversed, based on call audio. The labeling unit can be trained on prior call data and can identify one or more codecs used to encode the call, based on the call audio. The identification unit can utilize the characteristics of traversed networks and the identified codecs, and based on this information, the identification unit can provide a provenance fingerprint for the call. Based on the call provenance fingerprint, the detection system can identify, verify, or provide forensic information about a call audio source.

Systems and methods for detecting call provenance from call audio

Various embodiments of the invention are detection systems and methods for detecting call provenance based on call audio. An exemplary embodiment of the detection system can comprise a characterization unit, a labeling unit, and an identification unit. The characterization unit can extract various characteristics of networks through which a call traversed, based on call audio. The labeling unit can be trained on prior call data and can identify one or more codecs used to encode the call, based on the call audio. The identification unit can utilize the characteristics of traversed networks and the identified codecs, and based on this information, the identification unit can provide a provenance fingerprint for the call. Based on the call provenance fingerprint, the detection system can identify, verify, or provide forensic information about a call audio source.

Method to authenticate with a mobile communication network
10986481 · 2021-04-20 · ·

Apparatuses, methods, and systems are disclosed for authenticating with a mobile communication network. One apparatus (300) includes a processor (305), a first transceiver (325) that communicates with a mobile communication network via a first access network, and a second transceiver (330) that communicates with the mobile communication network via a second access network. The processor (305) sends (710) a request to start authentication via the second access network and receives (715) an extensible authentication protocol (“EAP”) request with a first expanded type via the second access network. The processor (305) sends (720) an EAP response via the second access network, the EAP response comprising the first expanded type, a first set of parameters, and a first message. Here, the first message is a same type of message usable to establish a connection with the mobile communication network over the first access network.

Control method for terminal, terminal, intelligent wearable device, and system

In a control method relating to the field of electronic device control technologies, and in particular, to a technology for controlling terminal state switching, when receiving a state switching instruction in a lock screen state, a terminal obtains motion data within a predetermined lime period of the terminal and an intelligent wearable device bound to the terminal. When a deviation between two groups of motion data is less than a deviation threshold, the terminal performs state switching. The terminal state switching is implemented through cooperation of the intelligent wearable device, and therefore a possibility of leakage of information in the terminal can be reduced.

Blockchain-based NB-IoT devices

Various implementations disclosed herein enable blockchain programming in NB-IoT devices. In various implementations, a method of blockchain authentication is performed by a computing device including one or more processors, and a non-transitory memory. In various implementations, the method includes maintaining a blockchain for a machine-to-machine network, wherein the machine-to-machine network is a narrowband internet of things network. In some implementations, the method includes receiving a request for a first set of data from the blockchain by a second device. In some implementations, the method includes determining based on the request, the first set of data from the blockchain by traversing a series of blocks from the blockchain. In some implementations, the method includes packaging the first set of data from the blockchain according to a protocol into a packaged data unit and transmitting the packaged data unit to the second device.

INTER-CHANNEL LEVEL DIFFERENCE BASED ACOUSTIC TAP DETECTION

A system configured to detect a tap event on a surface of a device only using microphone audio data. For example, instead of using a physical sensor to detect the tap event, the device may detect a tap event in proximity to a microphone based on a power level difference between two or more microphones. When a power ratio exceeds a threshold, the device may detect a tap event and perform an action. For example, the device may output an alarm and use a detected tap event as an input to delay or end the alarm. In some examples, the device may detect a tap event using a plurality of microphones. Additionally or alternatively, the device may distinguish between multiple tap events based on a location of the tap event, enabling the device to perform two separate actions depending on the location.

Method of batch automatic network configuration of WiFi devices, terminal equipment and storage medium

The present disclosure discloses a method of batch automatic network configuration of WiFi devices, terminal equipment and storage medium. The method comprises: deploying a network configuration AP hotspot for configuration and distribution and releasing a network configuration signal; searching the network configuration signal after the device to be configured enters network configuration state, and calculating whether the AP hotspot currently searched is the network configuration AP hotspot by adopting key conversion algorithm; if yes, the device to be configured connecting to the network configuration AP hotspot; downloading network configuration data in the network configuration AP hotspot through file transfer protocol, decrypting and verifying the network configuration data, updating network configuration settings, and completing the network configuration after the device to be configured successfully connects to the network configuration AP hotspot. The present disclosure can automatically configure multiple WiFi devices quickly and efficiently at one time.

Virtual numbers for intelligence operations

Systems, methods, and computer readable storage mediums are configured for implementing virtual numbers (VN) for intelligence operations involving source-handler communications in support of an agency. Example embodiments implementing virtual numbers eschew the requirement of the agency to maintain and configure dedicated hardware switches that contain SIM card pairs to manage the transfer of source-handler calls in a compliant fashion. Rather than maintaining physical SIMs for each handler and each source with dedicated hardware, each source and each handler are assigned a virtual number for communicating in a compliant fashion. A source communicates with the handler through the handler VN and the hander communicates with the source through the source VN, and communications completed through the VNs are logged for compliance. Communications between a handler and a source may be permitted only when an association of their VNs exists in a mapping table to prevent unauthorized contact through the VNs.

Operation related to user equipment using secret identifier

A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.

Method and apparatus for securing voice over IP telephone device
10873659 · 2020-12-22 · ·

A security implant device and a method of operation of the security implant, for securing Voice over IP (VoIP) phone, the implant device disables audio input and output components of the VoIP phone in order to prevent audio eavesdropping.