Patent classifications
H04M3/42
METHODS AND SYSTEMS FOR DETECTING CALL SPOOFING IN A TELECOMMUNICATION NETWORK
Embodiments herein disclose methods and systems for detecting call spoofing in a telecommunication network. The system includes a memory , at least one processor , a call spoofing controller connected to the memory and the processor configured to: create a mirror of signaling protocols for an incoming call from first a user device . The call spoofing controller is further configured to determine if a caller phone number belongs to a network operator using a source Internet Protocol (IP) address in an incoming INVITE/Iniytial Address Message (IAM). The call spoofing controller is further configured to determine the incoming call as a spoofed call, if the source IP address does not match a Session Border Controller/Service Switching Point (SBC/SSP) of the network operator.
METHOD, ELECTRONIC DEVICE AND STORAGE MEDIUM FOR REMOTE DAMAGE ASSESSMENT OF VEHICLE
A method for remote damage assessment of a vehicle is provided. The present disclosure relates to the technical field of artificial intelligence, in particular to the technical field of image and text recognition. An implementation solution is: performing data collection on a target vehicle to determine damage information of the target vehicle; obtaining call content of an insurance claiming call for the target vehicle, and extracting accident-related information from the call content, wherein the accident-related information includes named entities in the call content and a relationship between the named entities; and determining a first fraud probability corresponding to the target vehicle at least based on the damage information and the accident-related information.
Call protect geolocator display for 5G or other next generation network
Call spoofing can be mitigated by providing geolocation information to the called device. For example, when a call rings, a geolocator can be invoked and the incoming call display screen can show a carrier logo and/or a geolocator globe illustrating the location of the call originator. The geolocation session initiation protocol data can be confirmed by a network device and compared against carrier specific data of the calling device to authenticate voice calls for called devices. In one embodiment location data of the calling device can purposely be shared in order to facilitate the mitigation of call spoofing.
Dynamic message processing and aggregation of data in messaging
A network device (e.g., a user's mobile phone) may be used to make a telephone call to a landline telephone associated with a client device (e.g., a business's device). If the telephone call is terminated, either the network device or the client device may generate a text message to the other and establish a communication session. The client device may present a variety of options to the network device of service requests that may be completed by text message. The network device may transmit the service request and the service request may be fulfilled by the client.
Communication management system
A communication management system manages the exchange of messages between devices using different communication networks and/or protocols. A sender device may transmit a message (e.g., a short message service “SMS” message) to a destination associated with a traditional “landline” phone number. The message may be delivered over a traditional landline phone network. The communication management system can receive the message via the phone network, process the message, and provide the message to one or more electronic devices over a packet switched network, such as a local area network or the Internet. The electronic devices may use chat-based application software to process and display the message, provide robust message handline functionality, and facilitate responses to the message.
Communication transfer between devices
A method may include obtaining an indicator that a first device is in a location of a second device and in response to obtaining the indicator, sending a redirect request to a communication service provider of the first device to direct, to the second device, incoming communication requests handled by the communication service provider that are directed to the first device. The method may further include after sending the redirect request and after a communication request to a communication session is directed to the first device, obtaining, at the second device, a communication indication to participate in the communication session. The method may further include directing audio of the communication session to a transcription system and obtaining, at the second device, the transcription of the audio from the transcription system. The method may also include presenting, by the second device, the audio and the transcription.
Location determination and telephone number distribution for emergency calls
Location determination and telephone number distribution for emergency calls is enabled by a telephony system which maintains multiple pools of telephone numbers. Each pool corresponds to a different region such that the pools of telephone numbers are defined at the region-level rather than at the site-level. The telephony system determines the location of a calling device initiating an emergency call regardless of whether the calling device is at a known site. Based on the determined location of the calling device, one of the pools of telephone numbers which corresponds to that location is selected. The telephony system thereafter distributes a telephone number for the calling device to use for the emergency call from that selected pool of telephone numbers to facilitate an emergency call between the calling device and a local public safety answering point.
FRAUD DAMAGE PREVENTION SYSTEM, FRAUD DAMAGE PREVENTION METHOD, CALL PROCESSING SERVER, ENUM / DNS SERVER, AND PROGRAM
A fraud damage prevention system (1000) includes a call processing server (20) and an ENUM/DNS server (10). The call processing server (20) includes: a fraud determination requesting unit that transmits a fraud number determination request, to which a call originating number of a call originating device (4) is affixed, to the ENUM/DNS server (10), and that receives the determination result as to whether or not the call originating number is a fraud number; and a fraud prevention processing unit that performs a predetermined fraud damage prevention process. The ENUM/DNS server (10) includes: a storage unit that stores fraud number information (100); and a fraud determination unit that references the fraud number information (100) using the call originating number, determines that the call originating number is a fraud number in the case where a number that is the same as the call originating number is registered, and transmits the determination result to the call processing server (20).
SYSTEMS AND METHODS FOR PROCESSING CALLS
Methods and systems are described for processing calls. An example method may comprise receiving a message for establishing a call. Identification information in the message may be compared to screening data. If a match is found, the message may be forwarded to a screening server. The screening server may establish a call based on the session and provide information indicative of a level of trust associated with the call.
Interactive routing of data communications
Certain aspects of the disclosure are directed to monitoring user-data communications corresponding to a user-generated message. According to a specific example, user-data communications, which are addressed to a client among a plurality of remotely-situated client entities, are directed to a message recording system. Each of the plurality of remotely-situated client entities are respectively configured and arranged to interface with a data communications server providing data communications services on a subscription basis. During recording of a message associated with the user-data communications and on the message recording system, speech characteristic parameters of the message may be analyzed, and a sentiment score and a criticality score for the message, may be determined. During the recording of the message, the user-data communications may be routed based on the determined sentiment score and criticality score.