H04M15/48

System, method, and computer program for providing device centric payment authorization in roaming conditions
10587760 · 2020-03-10 · ·

A system, method, and computer program product are provided for providing device centric payments in roaming conditions. In operation, a device requests service from a visiting communication network. The device provides an identity associated with the device. The device records an amount of service utilized (e.g. utilizing blockchain technology, etc.). The device submits the amount of service utilized to the visiting network or to a blockchain, such that the visiting network is capable of determining whether the amount of service utilized recorded by the device is similar to an amount of service usage measured by the visiting network (e.g. when an established credit limit available has been utilized, etc.).

Message Processing for Subscriber Sessions which stretch over different Network Domains
20200067893 · 2020-02-27 ·

A technique for hiding topological information in a message that leaves a trusted network-domain is presented. The message pertains to a subscriber session and comprises a Fully Qualified Domain Name (FQDN) of a message originator. The originator is located in a first network domain, and the message is directed towards a destination in a second network domain. A method aspect comprises the steps of receiving the message, determining the FQDN comprised in the message and determining an identifier associated with the message. The identifier comprises at least one of a subscriber identifier, a session identifier and a destination identifier. Further, the method comprises applying a cryptographic operation on the FQDN and the identifier, or on information derived therefrom, to generate a cryptographic value. The message is then processed by substituting at least a portion of the FQDN with the cryptographic value prior to forwarding the message towards the second network domain.

CRYPTOGRAPHICALLY MANAGING TELECOMMUNICATIONS SETTLEMENT
20200065788 · 2020-02-27 ·

Described is cryptographically managed telecommunications settlement occurring in real time with generation and termination of a telecommunications channel. Upon the generation of a communications channel, a contract fund is established between two or more telecommunications services and recorded on a cryptographic ledger. Over the course of regular intervals of channel service, cryptocurrency is released from the contract fund. Upon termination of the communications channel, the released amount of the contract fund is transferred to the receiving provider telecommunications, the remainder back to the requesting telecommunications service. Transactions between cryptocurrency wallets are all published to the cryptographic ledger.

Methods and systems for providing subsidized access to network content by way of a secure connection

An exemplary method includes a subsidized access management system detecting a request provided by an access device associated with a user to access network content by way of a secure connection within a network provided by a network service provider, the network content associated with a content provider and maintained by a content provider system, determining that a data usage charge for access by the user to the network content by way of the secure connection within the network is subsidized by the content provider in accordance with a subsidized access arrangement between the content provider and the network service provider, and providing the user with subsidized access to the network content by way of the secure connection within the network in accordance with a rule set associated with the subsidized access arrangement. Corresponding methods and systems are also disclosed.

SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
20200036832 · 2020-01-30 · ·

A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.

Multicomputer System for User Data Authentication and Processing

Aspects of the disclosure relate to multicomputer processing and authentication of user data associated with telephone calls. A call security assessment computing platform may receive data associated with a telephone call made from a user computing device. Subsequently, the call security assessment computing platform may parse the received data to identify header information in a Session Initial Protocol (SIP) header. The platform then may analyze the header information to generate a call fingerprint for the telephone call. This call fingerprint may then be transmitted to one or more call authentication computing platforms, which return one or more call security responses that may further characterize security features of the telephone call. The call fingerprint and the call security responses may then be used to determine a call security score, which may be transmitted in a notification to a call handling system in order to adjust how the call is handled.

Method and apparatus of secure charging for device-to-device service
10536583 · 2020-01-14 · ·

A method of secure charging for a device-to-device service may comprise: recording charging information of a device-to-device service between a first user equipment and a second user equipment, wherein the charging information is associated at least with the first user equipment; generating a first report comprising the charging information, wherein the first report is protected by a security key of the first user equipment; and sending the first report to a network node by the first user equipment, wherein the first report is used for charging for the device-to-device service together with a second report generated at the second user equipment, and wherein the second report comprises charging information associated at least with the device-to-device service of the second user equipment and is protected by a security key of the second user equipment.

Display control method, display control device, and recording medium

A non-transitory computer-readable recording medium stores a display control program that causes a computer to execute a process. The process includes, receiving a notification from a terminal in one-way communication, when identification information included in the received notification is detected, extracting data included in the notification, and updating display contents of a display device from first display contents to second display contents based on the extracted data.

Cryptographically managingtelecommunications settlement
10504080 · 2019-12-10 · ·

Described is cryptographically managed telecommunications settlement occurring in real time with generation and termination of a telecommunications channel. Upon the generation of a communications channel, a contract fund is established between two or more telecommunications services and recorded on a cryptographic ledger. Over the course of regular intervals of channel service, cryptocurrency is released from the contract fund. Upon termination of the communications channel, the released amount of the contract fund is transferred to the receiving provider telecommunications, the remainder back to the requesting telecommunications service. Transactions between cryptocurrency wallets are all published to the cryptographic ledger.

Techniques for call authentication

Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.