H04M15/47

CERTIFICATION AND ACTIVATION OF USED PHONES ON A WIRELESS CARRIER NETWORK
20170324872 · 2017-11-09 ·

Telecommunication services systems and methods are disclosed. The telecommunication services systems and methods preferably enable a buyer to certify and activate a used wireless telecommunications device. The systems and methods may also be employed to provide the buyer with specialized pricing options and other customized services.

Monitoring of signalling traffic

Signalling messages may be monitored in a telecommunications network by receiving an indication of a signalling message for a network entity of the telecommunications network, the signalling message comprising a signalling dialog identifier. The signalling dialog identifier of the received signalling message is compared with a list of known signalling dialog identifiers relating to the network entity and the signalling message is categorized based on a result of the step of comparing, for example as suspicious. If a number of signalling messages for a network entity of the telecommunications network categorized as suspicious and having a common additional characteristic is at least a threshold value, an alert may be generated.

System and method for secure payment processing using subscriber identity module cards
09760877 · 2017-09-12 ·

The present disclosure relates generally to electronics systems, and more specifically to mobile communications systems and devices and including subscriber identification modules to which mobile currency, i.e. airtime minutes converted into mobile currency in pre-paid denominations from a telecommunications service provider, may be uploaded and used for payment transactions in a manner that is easier and more secure by providing a system and method related to a mobile phone having one or more subscriber identification module cards.

COMPUTER SYSTEM SECURITY VIA DEVICE NETWORK PARAMETERS
20220237603 · 2022-07-28 ·

Device identification data, network connection data, and other related data may be analyzed to determine an account classification, particularly before the account has even been used (or before extensive use has occurred). Computer system security may be improved via an intelligent engine that detects certain device and network connection factors in association with particular user actions, such as account creation. Monitoring be performed over a period of time for subsequent analysis.

Throttling based on phone call durations

According to examples, an apparatus may include a processor and a computer readable medium on which is stored machine readable instructions that may cause the processor to determine a call duration threshold assigned to an entity, in which a phone number may be associated with the entity. The processor may also track durations of one or more calls placed to the phone number, determine whether the tracked durations of the one or more calls placed to the phone number meet or exceed the call duration threshold, and based on a determination that the tracked durations meet or exceed the call duration threshold, throttle placement of an additional call to the phone number.

METHOD AND USER EQUIPMENT FOR DETECTING A POTENTIALLY FRAUDULENT CALL

A method and a User Equipment, UE (120) for detecting that the UE has received a fraudulent missed call, e.g. from a non-legitimate device (150). When receiving a missed call which is ended before a user of the UE has answered the incoming call, the UE determines the duration of the missed call, and indicates, e.g. to a user of the UE, the 5 duration of the missed call. The missed call may be determined as potentially fraudulent if the duration of the missed call is below or equal to a predetermined threshold.

Method and system for identification of a remote host in an out-of-band verification network
11196873 · 2021-12-07 · ·

A system detects abnormalities in a call signal indicative of call fraud. The system includes a first device situated in an originating call network and configured to send call signals to a second device situated in a terminating call network. The first device is coupled to a first registry to which it sends the call data from the sent signals for storage as originating call records. The second device is coupled to a second registry to which it sends the call data from the received signals for storage as terminating call records. The first and second registries exchange verification requests and responses to detect whether discrepancies exist between the stored originating call records in the first registry and stored terminating call records in the second registry. The registries generate alerts based on detected discrepancies, which may be used by the devices to block the call fraud.

SYSTEM AND METHOD FOR DETECTING FRAUD IN INTERNATIONAL TELECOMMUNICATION TRAFFIC
20220182486 · 2022-06-09 ·

A system for detecting fraud in international telecommunication traffic, includes: a transactions registry accessible by multiple operators and/or carriers; a logging module installed with multiple operators and/or carriers configured to add an entry in the transactions registry by an operator and/or carrier handling a call, wherein an entry comprises the calling number, the called number and timing information for the call; a fraud detection and classification module configured to: select from the transactions registry a group of correlated entries representing the call; compare the correlated entries to detect an anomaly due to fraud and to classify the call into a fraud type.

Call processing system for modifying inmate communication limits
11349998 · 2022-05-31 · ·

A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.

INFORMATION VERIFICATION METHOD AND RELATED DEVICE

An information verification method and a related device are disclosed. The method includes: receiving, by a first profile server, a remote profile management request sent by a remote profile management server, where the remote profile management request includes a first profile owner identifier; obtaining a second profile owner identifier in profile information; determining whether the first profile owner identifier is the same as the second profile owner identifier; and sending a remote profile management command to user equipment when the first profile owner identifier is the same as the second profile owner identifier. In this way, a loss caused to an operator or a profile owner due to a user's access to an invalid network or random profile unlocking is avoided, network security is improved, and a waste of network resources is reduced.