Patent classifications
H04L63/304
Controlled Recorded 3-Way Calling
Agencies issue recording devices to personnel for administrating and monitoring controlled calls during the course of their duties. To provide flexible capabilities to agencies, a virtual number is provisioned and configured to enable an operator to administrate controlled calls without dedicated recording devices. Using the virtual number, the operator may setup a controlled call between a victim and a baddie. The victim is contacted via the virtual number by the operator and optionally informed about the controlled call process. In turn, the baddie is contacted using number information of the victim's phone and connected with the victim. Call audio between the victim and baddie is transmitted to the operator. When necessary, the operator may terminate the call remotely from the telephonic device the operator used to setup the call.
Lawful interception for 2G/3G equipment interworking with evolved packet system
A method, system, and a computer program product for reducing consumption of resources for lawful interception or retention data related to traffic concerning a 2G/3G target mobile connected to a telecommunications network interworking with Evolved Packet System is provided. A first parameter value in traffic for which lawful interception or data retention has been activated is detected at a first node. Based on at least the first parameter value, whether the traffic will be intercepted or retained at a second node crossed by the traffic is evaluated. If the second node will intercept or retain the traffic, the first node foregoes a lawful interception request or retention of intercepted data.
Apparatus and method for Cross-Carrier Quasi Co-Location Signaling in a new carrier type (NCT) wireless network
Generally, this disclosure provides devices, systems and methods for Cross-Carrier Quasi Co-Location Signaling in an NCT Wireless Network. A UE device may include a receiver circuit to receive a QCL signaling message from a primary cell, the QCL signaling message for a configured secondary cell to identify a primary or one or more secondary cells that are Quasi Co-located with the secondary cell for which the message is provided. The UE device may also include a QCL signal decoding module to decode the QCL signaling message and to determine QCL synchronization parameters. The UE device may further include a synchronization module to synchronize the UE with the primary or one or more secondary cells based on the QCL synchronization parameters obtained from the QCL message received from the primary cell.
Monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks
Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.
Stand alone solution for location of a cellular phone
A method for locating of a wireless device, performed by a third party, comprising: communicating with the wireless device in a silent call, to compel the wireless device to continuously emit signals; activating a monitoring apparatus to monitor the signals emitted from the wireless device; resetting an idling timer means of the wireless device, such that the silent call is not ended by the wireless device; identifying a relative location from which the signals become stronger and locating the wireless device; and terminating the silent call.
INTERCEPTION AWARE ACCESS NODE SELECTION
In some example embodiments, there may be provided an apparatus including at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to at least: obtain information to enable selection of an access node for a non-GPP access; query a server to determine whether the country at which the access node is located requires lawful interception of communications; and select, based at least on the obtained information and/or a response to the query, the access node for the non-3GPP access. Related systems, methods, and articles of manufacture are also described.
Methods for providing regulation compliant privacy and related apparatuses
A method of operating a network device in a serving network for providing regulation compliant privacy in a communications network is provided. Operations of such methods include obtaining a concealed subscription identifier from a user equipment, UE, that is associated with a home network, HN, obtaining a permanent subscription identifier that is associated with the concealed subscription identifier from the HN, determining whether the concealed subscription identifier from the UE corresponds to the permanent subscription identifier from the HN, and responsive to determining that the concealed subscription identifier from the UE corresponds to the permanent subscription identifier from the HN, performing further operations to provide service to the UE.
MONITORING AND DETECTION OF FRAUDULENT OR UNAUTHORIZED USE IN TELEPHONE CONFERENCING SYSTEMS OR VOICE NETWORKS
Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.
System and method for decrypting communication exchanged on a wireless local area network
Systems and methods for obtaining authentication vectors issued, for use by a mobile communication terminal, by a Home Location Register (HLR) that serves a cellular communication network independently of any cooperation with the cellular network. Further to obtaining the authentication vectors, a terminal is caused to communicate over a WiFi WLAN using an encryption key derived from the obtained authentication vectors, e.g., per the EAP-SIM or EAP-AKA protocol. Since the encryption key is known, communication from the terminal is decrypted. The authentication vectors may be obtained by (i) an “impersonating” Visitor Location Register (VLR) server that does not serve the cellular network; (ii) an interrogation device which, by imitating a legitimate base station serving the cellular network, solicits the mobile communication terminal to associate with the interrogation device; or (iii) an SS7 probe, which obtains authentication vectors communicated from the HLR server to other entities on the SS7 network.
System and method for tracking and archiving mobile communications
A method and system for tracking electronic communications between a customer phone and a user mobile device for compliance with regulations are provided. The system includes a server configured to send an email to an Enterprise Information Archiving system capable of archiving the email for at least one of eDiscovery and compliance with one or more regulations. The server can associate a virtual phone number with a mobile app residing on a user mobile device and to either: (i) receive a communication originated from the mobile app and intended for a customer phone, and send the communication the customer phone; or (ii) receive a communication originated from a customer phone and sent by the customer phone to the virtual phone number, and send the communication to the mobile app. The server also is configured to include content from the communication in the email.