H04M15/48

COMPUTER SYSTEM SECURITY VIA DEVICE NETWORK PARAMETERS
20220237603 · 2022-07-28 ·

Device identification data, network connection data, and other related data may be analyzed to determine an account classification, particularly before the account has even been used (or before extensive use has occurred). Computer system security may be improved via an intelligent engine that detects certain device and network connection factors in association with particular user actions, such as account creation. Monitoring be performed over a period of time for subsequent analysis.

BLOCKCHAIN FOR COMMUNICATION OF SUBSCRIBER DATA RECORDS BETWEEN PUBLIC LAND MOBILE NETWORKS

Mechanisms for implementing a billing process between a first Public Land Mobile Network (PLMN1) and a second Public Land Mobile Network (PLMN2) for a subscriber of the PLMN1 that visits the PLMN2. A method comprises establishing a smart contract between the PLMN1, the PLMN2, and a Data Clearance House (DCH). The method comprises sending a subscriber usage record, represented by a distributed ledger, of the subscriber from the PLMN2 to the DCH using a blockchain upon the subscriber having visited the PLMN2, wherein the blockchain is based on the smart contract. The method comprises sending the subscriber usage record from the DCH to the PLMN1 using the blockchain.

MULTIFUNCTION WIRELESS DEVICE

A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.

BLOCKCHAIN-BASED DATA VERIFICATION SYSTEM AND METHOD, COMPUTING DEVICE AND STORAGE MEDIUM
20230245121 · 2023-08-03 ·

The present specification provides a blockchain-based data verification system and method, a computing device, and a storage medium. The blockchain-based data verification system includes: a first verification system, a second verification system, and a first blockchain node and a second blockchain node on a blockchain network; the first verification system is configured to: collect first service data based on a predetermined condition and generate a first verification file including the first service data, and send a verification request to the second verification system; the second verification system is configured to: receive the verification request, verify the first service data with second service data in a local database of the second verification system, generate and send a verification result notification to the first verification system, and send successfully verified second service data in the local database to the first blockchain node on the blockchain network; wherein the first verification system is further configured to: receive the verification result notification, and send successfully verified first service data to the second blockchain node on the blockchain network.

Cryptographically managing telecommunications settlement
11308468 · 2022-04-19 · ·

Described is cryptographically managed telecommunications settlement occurring in real time with generation and termination of a telecommunications channel. Upon the generation of a communications channel, a contract fund is established between two or more telecommunications services and recorded on a cryptographic ledger. Over the course of regular intervals of channel service, cryptocurrency is released from the contract fund. Upon termination of the communications channel, the released amount of the contract fund is transferred to the receiving provider telecommunications, the remainder back to the requesting telecommunications service. Transactions between cryptocurrency wallets are all published to the cryptographic ledger.

Blockchain for communication of subscriber data records between public land mobile networks

Mechanisms for implementing a billing process between a first Public Land Mobile Network (PLMN1) and a second Public Land Mobile Network (PLMN2) for a subscriber of the PLMN1 that visits the PLMN2. A method comprises establishing a smart contract between the PLMN1, the PLMN2, and a Data Clearance House (DCH). The method comprises sending a subscriber usage record, represented by a distributed ledger, of the subscriber from the PLMN2 to the DCH using a blockchain upon the subscriber having visited the PLMN2, wherein the blockchain is based on the smart contract. The method comprises sending the subscriber usage record from the DCH to the PLMN1 using the blockchain.

TECHNIQUES FOR CALL AUTHENTICATION

Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.

Multifunction wireless device

A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.

BLOCKCHAIN NODES AND METHODS FOR FACILITATING SPECTRUM SHARING

Blockchain nodes and methods for facilitating spectrum sharing are disclosed. The blockchain node is configured to: determine a spectrum price for a spectrum transaction between a service provider and a mobile network operator based on performance functions of the service provider and the mobile network operator; record spectrum transaction information based on the spectrum price in a blockchain, including: verifying back-block data of a block generated by a leader node in a blockchain network, the block recording the spectrum transaction information based on the spectrum price, the back-block data including only a part of the block; and adding the block generated by the leader node into the blockchain in response to the back-block data passing the verification.

Techniques for call authentication

Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.