Patent classifications
H04M15/48
COMMUNICATION MANAGEMENT SYSTEM FOR SECURED FACILITY
Methods for managing data communications with a secured facility are disclosed herein. In various aspects, the methods include the step of communicating data between a communication device located within the secured facility and an object located external of the secured facility via a communication pathway. The methods include the step of controlling the communicating of the data between the communication device and the object by a vendor included in the communication pathway, and the step of collecting at least portions of data communicated between the communication device, the vendor, and the object by an auditor into an auditor CDR independent of the vendor, the auditor being in communication with the communication pathway. Related apparatus and compositions of matter are also disclosed herein.
Multicomputer system for user data authentication and processing
Aspects of the disclosure relate to multicomputer processing and authentication of user data associated with telephone calls. A call security assessment computing platform may receive data associated with a telephone call made from a user computing device. Subsequently, the call security assessment computing platform may parse the received data to identify header information in a Session Initial Protocol (SIP) header. The platform then may analyze the header information to generate a call fingerprint for the telephone call. This call fingerprint may then be transmitted to one or more call authentication computing platforms, which return one or more call security responses that may further characterize security features of the telephone call. The call fingerprint and the call security responses may then be used to determine a call security score, which may be transmitted in a notification to a call handling system in order to adjust how the call is handled.
SMART CASCADING SECURITY FUNCTIONS FOR 6G OR OTHER NEXT GENERATION NETWORK
In a 6G network, microservices can be utilized in the absence of a core network. For example, after a mobile device has authenticated, through its carrier network, with a transport service layer, microservices can be allocated to the mobile device without having to be transmitted via the core network. Thus, removing the core network from the process can generate a direct line of microservices from the transport layer to the end-user. Furthermore, additional microservices and/or resources can be access through a microservices library. Consequently, packets can be securely transmitted be a wireless network facilitating sending packet profile data from one to many node devices in anticipation of the packet traversing the various node devices.
Multifunction wireless device
A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.
Wireless Service Card Having Machine Readable Codes and Device and Process for Use Therewith
A process for authorizing wireless service includes providing a generally rectangular flat form factor card having a first surface and opposing second surface. The process further includes providing a machine-readable activation code arranged on the first surface, wherein the machine-readable activation code is configured to authorize the wireless service when provided to a system associated with a wireless service provider, receiving the machine-readable activation code in a server, the machine-readable activation code being captured by a wireless device, and provisioning the wireless service to the wireless device from a wireless network when the machine-readable activation code is provided to the system associated with the wireless network.
Inserting value into customer account at point of sale using a customer account identifier
A method of adding a value to a customer account is provided. A request to add a value to a customer account of a customer is received from a point of sale terminal. The request may comprise value identification data associated with the value and account identification data associated with the customer account. The customer account identification data may be entered at the point of sale. The request may be associated with a purchase of the value. The value may be caused to be added to the customer account. During subsequent value purchase transactions, additional value may be added to the account.
Wireless service provider system for selling and/or activating wireless services for a wireless device
A method and system for the purchase and activation of services on a wireless device are provided. The method and system include the use of an airtime card with a near field communication tag with a unique identifier code used to improve a user's experience and ease of activation/provisioning of services for the wireless device. In some aspects, the unique identifier may be generated during the activation and purchase of the wireless service and it is not required that the unique identifier code be recorded in a backend system of the wireless provider prior to activation. The services to be purchased and activated may include at least one of the following: out of the box activation, device upgrades, device reactivations, wireless number changes, wireless number porting, and the addition or purchasing of services including airtime, data, and/or SMS enrollments or data content.
Techniques for call authentication
Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.
METHOD AND DEVICE FOR ENCRYPTING AND DECRYPTING SOFTPHONE, AND COMPUTER-READABLE STORAGE MEDIUM
Disclosed are a method and a device for encrypting and decrypting softphone, as well as a computer-readable storage medium. The method for encrypting and decrypting softphone includes: in response to a softphone call instruction, obtaining a phone number corresponding to the call instruction, and encrypting the phone number to generate a cipher text phone number; sending the cipher text phone number to the phone-platform server for the phone-platform server to return the cipher text phone number to the local-system server through a private network; decrypting the cipher text phone number to obtain a plaintext phone number at local-system server, and sending the plaintext phone number to the phone-platform server through the private network.
Wireless service card having machine readable codes and device and process for use therewith
A process for authorizing wireless service includes providing a generally rectangular flat form factor card having a first surface and opposing second surface. The process further includes providing a machine-readable activation code arranged on the first surface, wherein the machine-readable activation code is configured to authorize the wireless service when provided to a system associated with a wireless service provider, receiving the machine-readable activation code in a server, the machine-readable activation code being captured by a wireless device, and provisioning the wireless service to the wireless device from a wireless network when the machine-readable activation code is provided to the system associated with the wireless network.