Patent classifications
H04M3/2254
METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
Telephony equipment migration
A telephony equipment migration arrangement is provided. The telephony equipment migration arrangement includes legacy telephony equipment located in one or more equipment bays, at least one transport cable, with one or more connectors, to provide external carrier connectivity, replacement telephony equipment located in one or more equipment bays remote from the legacy telephony equipment, and at least one remote coupling cable, with one or more connectors, connected to the replacement telephony equipment. The connector(s) of the remote coupling cable are mounted in a location having a predetermined locational relationship with the equipment bay in which the legacy telephony equipment is located, and the transport cable is communicatively coupled to the remote coupling cable.
CONTINUOUS CALL RECORDING
In order to allow for redundant call recording, a first message is received by a first media recorder indicating that a second media recorder is recording a media stream of a communication session between a plurality of communication devices. The first message includes a unique identifier for the communication session between the plurality of communication devices. A determination is made that the second media recorder is unable to continue to record the media stream. In response to determining that the second media recorder is unable to record the media stream, the first media recorder sends a second message, to a Session Border Controller (SBC), that includes the unique identifier for the communication session between the plurality of communication devices. The SBC streams the media stream to the first media recorder. The first media recorder receives the media stream and records the media stream.
Minimizing interference between communication networks
Methods, systems, and devices are described for minimizing mutual interference between networks that implement different protocols. In one embodiment, a first network device of a first network may exchange coexistence information with a second network device of a second network to determine whether to share resources or reduce transmit power based, at least in part, on the interference detected at the first network device from a transmission of the second network device. In one embodiment, both the first and the second network devices may independently and iteratively reduce their respective transmit power to minimize interference between the interfering networks. The first network device may reduce its transmit power based on an interference of the second network device and vice versa. In another embodiment, the network device with a lower priority may minimize its transmit power to reduce interference with the network device with a higher priority.
METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
SYSTEM FOR EVALUATING CROSS-NETWORK VOICE PERFORMANCE
A system to determine a network responsible for cross-network voice call drop events. In some cases, the system may determine the responsible party for each voice call drop event between users of different networks and provide data associated with the voice call drop events to a customer service system.
Systems, methods, and apparatus to monitor mobile internet activity
Systems, methods, and apparatus to monitor mobile Internet activity are disclosed. An example apparatus includes at least one memory, machine-readable instructions, programmable circuitry to execute the machine-readable instructions to at least assign a first port of a proxy server to a mobile device associated with a panelist, cause transmission of configuration data to the mobile device to instruct the mobile device to transmit future requests the first port of the proxy server, obtain a first request for media on the first port originating from the mobile device, and after a determination that the first request originated from an Internet Protocol (IP) address associated with an IP address range representative of devices on a cellular network, service the first request, generate a data association, request the media from an Internet media provider identified in the first request, and cause transmission of the media to the mobile device.
Customization of CNAM information for calls placed to mobile devices
One example method of operation may include identifying a call from a calling device destined for a mobile device, identifying a calling device number associated with the calling device and a mobile device number associated with the mobile device, determining whether a stored calling relationship exists between the calling device number and the mobile device number, and appending one of a plurality of caller identification names (CNAM) to the call based on the determination as to whether there is a stored calling relationship.
SYSTEMS, METHODS, AND APPARATUS TO MONITOR MOBILE INTERNET ACTIVITY
Systems, methods, and apparatus to monitor mobile Internet activity are disclosed. An example apparatus includes at least one memory, machine-readable instructions, programmable circuitry to execute the machine-readable instructions to at least assign a first port of a proxy server to a mobile device associated with a panelist, cause transmission of configuration data to the mobile device to instruct the mobile device to transmit future requests the first port of the proxy server, obtain a first request for media on the first port originating from the mobile device, and after a determination that the first request originated from an Internet Protocol (IP) address associated with an IP address range representative of devices on a cellular network, service the first request, generate a data association, request the media from an Internet media provider identified in the first request, and cause transmission of the media to the mobile device.
CUSTOMIZATION OF CNAM INFORMATION FOR CALLS PLACED TO MOBILE DEVICES
One example method of operation may include identifying a call from a calling device destined for a mobile device, identifying a calling device number associated with the calling device and a mobile device number associated with the mobile device, determining whether a stored calling relationship exists between the calling device number and the mobile device number, and appending one of a plurality of caller identification names (CNAM) to the call based on the determination as to whether there is a stored calling relationship.