Patent classifications
H04M15/47
PAIR-THE-PLAN SYSTEM FOR DEVICES AND METHOD OF USE
A computer-implemented method and system are disclosed for connecting one or more devices to subscriptions and cellular or other wireless billing plans. The method includes enrolling the one or more devices enabled for connectivity to cellular or other wireless service in a cellular or other wireless subscription and associated billing plan, wherein the enrollment includes providing an identifier for the one or more devices to a cellular or other wireless service provider chosen by a second user, and allowing the second user to use capabilities of the one or more devices governed by the cellular or other wireless subscription and an associated billing plan chosen by the second user; while the one or more devices are also configured to allow a first user to use capabilities of the one or more devices as governed by the cellular or other wireless subscription and an associated billing plan of the first user's choice.
USING MACHINE LEARNING FOR DETECTING SOLICITATION OF PERSONALLY IDENTIFIABLE INFORMATION (PII)
Systems and methods for identifying solicitations of personally identifiable information (PII) are disclosed. An example method includes generating training data based on historical transcript data corresponding to solicitations of PII in historical support call transcripts, training a neural network, using the training data, to identify solicitations of PII in support call transcripts, and processing the trained neural network for deployment.
Network-based protection against scam applications
Outgoing communications from a user device are monitored following a notification that an application is installed on a user device. When a number of the outgoing communications to a premium-rate number during a predetermined period of time exceeds a corresponding quantity threshold, the pattern of the outgoing communications may be ascertained to be anomalous. A user device is directed to present a prompt that requests an input as to whether the outgoing communications are authorized. In response to a first input that the outgoing communications are unauthorized, additional outgoing communications from the user device to the premium-rate number are blocked for a predesignated amount of time. Further, the first input is stored as a corresponding vote that the application is malicious. In response to a second input that the outgoing communications are authorized, the second input is stored as a corresponding vote that the application is non-malicious.
Method and system for transmission of a session initiation protocol (SIP) identity header in an out-of-band verification network
A computer-implemented network verification system includes a second device situated in a terminating call network and configured to receive a call signal from a first device situated in an originating network. The first device is coupled to a first registry that stores originating call records. The first registry is configured to obtain, from the first device, and store call data and a SIP identity header associated with the call signal. The system also includes a second registry coupled to the second device and configured to receive, from the first registry over an out-of-band verification network, a first verification request that contains the originating call record, including the SIP identity header associated with the call signal. The second registry is further configured to send the SIP identity header contained in the first verification request to the second device.
Method and Apparatus for Detecting SMS Parameter Manipulation
System and method for detecting SMS parameters manipulation. A first SMS registry is coupled to a first Short Message Service Center (SMSC) and optionally to other SMS registries. The first SMSC is within a terminating telephone network. The first SMS registry receives first and second information about an SMS message that was sent from another telephone network or from an External Short Messaging Entity (ESME) and is destined to the first SMSC. The first and second information represent status of the SMS message respectively before and after the SMS message enters the terminating telephone network. The first SMS registry or a firewall automatically compares at least corresponding portions of the first and second information. As a result of the comparison, in response to detecting a difference between the at least portions of the first and second information, the first SMS registry automatically sends a signal indicating SMS parameter manipulation.
Method and System for Transmission of a Session Initiation Protocol (SIP) Identity Header in an Out-of-band Verification Network
A computer-implemented network verification system includes a second device situated in a terminating call network and configured to receive a call signal from a first device situated in an originating network. The first device is coupled to a first registry that stores originating call records. The first registry is configured to obtain, from the first device, and store call data and a SIP identity header associated with the call signal. The system also includes a second registry coupled to the second device and configured to receive, from the first registry over an out-of-band verification network, a first verification request that contains the originating call record, including the SIP identity header associated with the call signal. The second registry is further configured to send the SIP identity header contained in the first verification request to the second device.
System and method for carrier settlement using blockchain
A framework is provided for blockchain-based customer dispute management of wholesale telecommunications claims. A network device receives a telecommunication claim to dispute an invoice from a provider network. The provider network and a partner network that includes the network device are related through a wholesale telecommunications agreement. The network device validates the telecommunication claim based on information in a distributed ledger of the distributed consensus network. The distributed ledger includes transaction information generated by the provider network for the partner network under the wholesale telecommunications agreement. The network device adjudicates the telecommunication claim based on information in the distributed ledger and instructions in a contract and updates the distributed ledger with the adjudicated claim.
METHOD AND SYSTEM FOR PREVENTING ILLICIT USE OF A TELEPHONY PLATFORM
A system and method for preventing illicit use of a telephony platform that includes enrolling a plurality of accounts on a telecommunications platform, wherein an account includes account configuration; at a fraud detection system of the telecommunications platform, receiving account usage data, wherein the usage data includes at least communication configuration data and billing configuration data of account configuration and further includes communication history of the plurality of accounts; calculating fraud scores of a set of fraud rules from the usage data, wherein at least a sub-set of the fraud rules include conditions of usage data patterns between at least two accounts; detecting when the fraud scores of an account satisfy a fraud threshold; and initiating an action response when a fraud score satisfies the fraud threshold.
Method and system for revenue maximization in a communication network
Method and system for revenue maximization in a communication network. This invention relates to management of communication networks and more particularly to monitoring information of a subscriber of a communication network. Embodiments herein enable the network operator to collect and profile usage information of a subscriber on a User Equipment (UE) with the intention of using the information for revenue maximization applications and preventing fraud for a network operator, wherein revenue maximization applications include but are not limited to fraud management, revenue assurance, churn management, customer experience management, credit risk management and partner settlement.
BLOCKCHAIN-BASED DATA VERIFICATION SYSTEM AND METHOD, COMPUTING DEVICE AND STORAGE MEDIUM
The present specification provides a blockchain-based data verification system and method, a computing device, and a storage medium. The blockchain-based data verification system includes: a first verification system, a second verification system, and a first blockchain node and a second blockchain node on a blockchain network; the first verification system is configured to: collect first service data based on a predetermined condition and generate a first verification file including the first service data, and send a verification request to the second verification system; the second verification system is configured to: receive the verification request, verify the first service data with second service data in a local database of the second verification system, generate and send a verification result notification to the first verification system, and send successfully verified second service data in the local database to the first blockchain node on the blockchain network; wherein the first verification system is further configured to: receive the verification result notification, and send successfully verified first service data to the second blockchain node on the blockchain network.