H04M3/42008

AUTHENTICATION USING DTMF TONES
20230283711 · 2023-09-07 · ·

A method of obtaining and automatically providing secure authentication information includes registering a client device over a data line, storing information and a changeable value for authentication in subsequent telephone-only transactions. In the subsequent transactions, a telephone call placed from the client device to an interactive voice response server is intercepted and modified to include dialing of a delay and at least a passcode, the passcode being based on the unique information and the changeable value, where the changeable value is updated for every call session. The interactive voice response server forwards the passcode and a client device identifier to an authentication function, which compares the received passcode to plural passcodes generated based on information and iterations of a value stored in correspondence with the client device identifier. Authentication is confirmed when a generated passcode matches the passcode from the client device.

TRACKING DEVICE LOCATION AND COORDINATION

Communication between an owner of a lost tracking device and a finder of a lost tracking device is established. A tracking system receives an identifier of a tracking device and a request for a web page from a mobile device that has captured an image of a smart code on the tracking device. The smart code is embedded with a URL to the web page. The system displays the web page on the mobile device and prompts the user to provide a location of the mobile device. The location is associated with the identifier of the tracking device. A notification indicating the location of the tracking device is generated for the owner. The owner is prompted to provide information to establish contact with the finder of the device, and the web page is populated with the owner's provided information for display on the finder's mobile device.

METHOD OF REPORTING AN UNSOLICITED CALL TO A NETWORK OPERATOR, AND USER EQUIPMENT, NETWORK ENTITIES AND TELECOMMUNICATIONS NETWORKS FOR PERFORMING THE METHOD
20230370545 · 2023-11-16 ·

Detecting, reporting and reducing unsolicited calls in a telecommunications network. Reporting an unsolicited call to a network operator of a telecommunications network. Receiving a message at a user equipment, UE, 500 of the telecommunications network. The message comprises: a unique identifier corresponding to a call to the UE 500 that has been initiated, and one or more pre-defined responses. Receiving at the UE 500 a selected a response of the one or more predefined responses indicating that the call is an unsolicited call. Sending a report to the network operator, the report comprising the unique identifier and the selected response.

Systems and methods for programming, controlling and monitoring wireless networks
11812258 · 2023-11-07 ·

A system for programming, controlling and monitoring wireless networks enabling a wireless device (Dev) being utilized and integrated into car electronic control module or home (or business) alarm/security system. This system also presents a general control (robotic) device, which controls general input and output functions, where plurality of cellular handsets, internet devices can co-control, monitor, share and exchange information through the cellular, the internet networks and other wire/wireless network.

METHOD OF PRE-VERIFYING PHONE NUMBERS FOR CALL ATTESTATION
20230370544 · 2023-11-16 ·

A system and method of determining pre-verification information for use by a certification authority to verify and attest phone numbers associated with healthcare facilities is provided. The method includes receiving an unverified phone number and determining, using one or more matching operations, whether the unverified phone number is associated with a healthcare facility. In response to such determination, the unverified phone number and a facility name associated with the healthcare facility is sent to a certification authority server to be used to verify the unverified phone number. Other embodiments are described and claimed.

MAINTAINING ACCESS TO SERVICES VIA SIM CARD

Implementations of the subject technology provide for storing a temporary certificate on a mobile device for accessing services in association with a primary number. A device determines that a first subscriber identity module (SIM) card, previously used by the device, is not available for use by the device. The device determines that a second SIM card is available for use by the first device within a predetermined time period after the first SIM card is determined to be not available for use by the device. The device confirms that a communication identifier of the first SIM card is strongly tied to a user account associated with the device. The device stores a temporary certificate that attests to continued ownership of the communication identifier by the device and allows the device to access at least one service in association with the communication identifier.

Methods, systems, and devices for masking content to obfuscate an identity of a user of a mobile device

Aspects of the subject disclosure may include, for example, identifying a first user associated with a first mobile device, and determining a first user type associated with the first user. Further embodiments can include identifying a first identity associated with the first user based on the first user type and identifying a second identity associated with the first user based on the first user type. Additional embodiments can include providing first alternate content to the first mobile device to mask the first identity and providing second alternate content to the first mobile device associated with the second identity. Other embodiments are disclosed.

SYSTEMS AND METHODS FOR HANDLING A TELEPHONY COMMUNICATION SETUP REQUEST
20220394125 · 2022-12-08 ·

Systems and methods for setting up a telephony communication include an operating system of a user telephony device diverting a call setup request made via a native dialer of the user telephony device to a telephony software application on the user telephony device. The telephony software application then sets up the requested telephony communication using a telephony communication application programming interface (API). The telephony communication may be setup in a way that results in the called party not receiving information about the calling party or the calling party's telephone number.

SPECIALLY PROGRAMMED COMPUTING DEVICES BEING CONTINUOUSLY CONFIGURED TO ALLOW UNFAMILIAR INDIVIDUALS TO HAVE AN INSTANTANEOUS, IN-PERSON MEETING INVOLVING COLOR

In some embodiments, the present invention provides for a computer system which includes at least the following components: a plurality of computing devices associated with a plurality of users associated with a plurality of users; where each computing device of the plurality of computing devices is configured to: electronically receive software which, when being executed, cause such computing device to display a plurality of instances of a specifically programmed graphical user interface (GUI); where each instance of the GUI is configured to display a real-time updatable meeting information representative of a direct electronic proximity-based communication between at least two computing devices associated with at least two users who desire to meet at a particular location to engage in a transaction of at least one good, at least one service, or both, whose marketable value lasts for a period of 30 seconds to 60 minutes.

NETWORK SERVICE SYSTEM, COMPUTER STORAGE MEDIUM FOR COMMUNICATION, AND NETWORK SERVICE METHOD
20220279025 · 2022-09-01 ·

A network service system, a computer storage medium for communication, and a network service method are provided. The system includes: a communication module and a data processor, the data processor including a storage module, the storage module storing an identification code; and the communication module is configured to receive a communication request from a user terminal, the communication request including the identification code; and the communication module is further configured to establish a communication connection to a target terminal according to the identification code set by the network service system and a target code, the target code enabling the target terminal to communicate with the user terminal in real time by using an Internet Protocol (IP) network.