Patent classifications
H04M3/436
NUISANCE CALL COUNTERMEASURE APPARATUS, METHOD AND PROGRAM
A spam call prevention apparatus 11 includes: a response unit 111 configured to convey, to a phone terminal of a sender of a call, a response that, in a case where the call from the sender is evaluated as a spam or a fraud by a receiver of the call, the sender is billed a sum of money corresponding to a probability of being evaluated as the spam or the fraud; a notification unit 112 configured to notify, when the sender has requested, in responding to the response, the call to the receiver, a phone terminal of the receiver of a request for returning an evaluation result of evaluating the call from the sender after the call between the sender and the receiver has ended; and a determination unit 114 configured to determine, when the call from the sender has been evaluated as the spam or the fraud in the evaluation result, the sum of money corresponding to the probability of being evaluated as the spam or the fraud, as a sum of billing.
NUISANCE CALL COUNTERMEASURE APPARATUS, METHOD AND PROGRAM
A spam call prevention apparatus 11 includes: a response unit 111 configured to convey, to a phone terminal of a sender of a call, a response that, in a case where the call from the sender is evaluated as a spam or a fraud by a receiver of the call, the sender is billed a sum of money corresponding to a probability of being evaluated as the spam or the fraud; a notification unit 112 configured to notify, when the sender has requested, in responding to the response, the call to the receiver, a phone terminal of the receiver of a request for returning an evaluation result of evaluating the call from the sender after the call between the sender and the receiver has ended; and a determination unit 114 configured to determine, when the call from the sender has been evaluated as the spam or the fraud in the evaluation result, the sum of money corresponding to the probability of being evaluated as the spam or the fraud, as a sum of billing.
METHODS AND SYSTEMS FOR DETECTING CALL SPOOFING IN A TELECOMMUNICATION NETWORK
Embodiments herein disclose methods and systems for detecting call spoofing in a telecommunication network. The system includes a memory , at least one processor , a call spoofing controller connected to the memory and the processor configured to: create a mirror of signaling protocols for an incoming call from first a user device . The call spoofing controller is further configured to determine if a caller phone number belongs to a network operator using a source Internet Protocol (IP) address in an incoming INVITE/Iniytial Address Message (IAM). The call spoofing controller is further configured to determine the incoming call as a spoofed call, if the source IP address does not match a Session Border Controller/Service Switching Point (SBC/SSP) of the network operator.
METHODS AND SYSTEMS FOR DETECTING CALL SPOOFING IN A TELECOMMUNICATION NETWORK
Embodiments herein disclose methods and systems for detecting call spoofing in a telecommunication network. The system includes a memory , at least one processor , a call spoofing controller connected to the memory and the processor configured to: create a mirror of signaling protocols for an incoming call from first a user device . The call spoofing controller is further configured to determine if a caller phone number belongs to a network operator using a source Internet Protocol (IP) address in an incoming INVITE/Iniytial Address Message (IAM). The call spoofing controller is further configured to determine the incoming call as a spoofed call, if the source IP address does not match a Session Border Controller/Service Switching Point (SBC/SSP) of the network operator.
SYSTEM AND METHOD FOR GENDER BASED AUTHENTICATION OF A CALLER
A system and method for authenticating a caller may include receiving an incoming call from the caller, determining a gender of the caller, and selecting, based on the determined gender, to search for the caller in one of: a watchlist of untrustworthy female callers, and a watchlist of untrustworthy male callers.
SYSTEM AND METHOD FOR GENDER BASED AUTHENTICATION OF A CALLER
A system and method for authenticating a caller may include receiving an incoming call from the caller, determining a gender of the caller, and selecting, based on the determined gender, to search for the caller in one of: a watchlist of untrustworthy female callers, and a watchlist of untrustworthy male callers.
Call protect geolocator display for 5G or other next generation network
Call spoofing can be mitigated by providing geolocation information to the called device. For example, when a call rings, a geolocator can be invoked and the incoming call display screen can show a carrier logo and/or a geolocator globe illustrating the location of the call originator. The geolocation session initiation protocol data can be confirmed by a network device and compared against carrier specific data of the calling device to authenticate voice calls for called devices. In one embodiment location data of the calling device can purposely be shared in order to facilitate the mitigation of call spoofing.
FRAUD DAMAGE PREVENTION SYSTEM, FRAUD DAMAGE PREVENTION METHOD, CALL PROCESSING SERVER, ENUM / DNS SERVER, AND PROGRAM
A fraud damage prevention system (1000) includes a call processing server (20) and an ENUM/DNS server (10). The call processing server (20) includes: a fraud determination requesting unit that transmits a fraud number determination request, to which a call originating number of a call originating device (4) is affixed, to the ENUM/DNS server (10), and that receives the determination result as to whether or not the call originating number is a fraud number; and a fraud prevention processing unit that performs a predetermined fraud damage prevention process. The ENUM/DNS server (10) includes: a storage unit that stores fraud number information (100); and a fraud determination unit that references the fraud number information (100) using the call originating number, determines that the call originating number is a fraud number in the case where a number that is the same as the call originating number is registered, and transmits the determination result to the call processing server (20).
SYSTEMS AND METHODS FOR PROCESSING CALLS
Methods and systems are described for processing calls. An example method may comprise receiving a message for establishing a call. Identification information in the message may be compared to screening data. If a match is found, the message may be forwarded to a screening server. The screening server may establish a call based on the session and provide information indicative of a level of trust associated with the call.
SYSTEMS AND METHODS FOR PROCESSING CALLS
Methods and systems are described for processing calls. An example method may comprise receiving a message for establishing a call. Identification information in the message may be compared to screening data. If a match is found, the message may be forwarded to a screening server. The screening server may establish a call based on the session and provide information indicative of a level of trust associated with the call.