Patent classifications
H04M3/436
Method and user equipment for detecting a potentially fraudulent call
A method and a User Equipment, UE (120) for detecting that the UE has received a fraudulent missed call, e.g. from a non-legitimate device (150). When receiving a missed call which is ended before a user of the UE has answered the incoming call, the UE determines the duration of the missed call, and indicates, e.g. to a user of the UE, the 5 duration of the missed call. The missed call may be determined as potentially fraudulent if the duration of the missed call is below or equal to a predetermined threshold.
System and method for determining unwanted call origination in communications networks
A method and system for discovering and locating the source of unwanted communication origination in a communications network, the method comprising compiling a communication campaign database storing data of one or more communication campaigns along with automatically identified instances of those campaigns, and simultaneously or sequentially matching those instances against known communication traffic of a set of cooperating telecommunication carriers. The one or more communications campaigns include a grouping of related fingerprints and patterns that identify a sequence of characters, audio or video associated with instances of a same likely campaigns, either legitimate or illegitimate/fraudulent.
System and method for determining unwanted call origination in communications networks
A method and system for discovering and locating the source of unwanted communication origination in a communications network, the method comprising compiling a communication campaign database storing data of one or more communication campaigns along with automatically identified instances of those campaigns, and simultaneously or sequentially matching those instances against known communication traffic of a set of cooperating telecommunication carriers. The one or more communications campaigns include a grouping of related fingerprints and patterns that identify a sequence of characters, audio or video associated with instances of a same likely campaigns, either legitimate or illegitimate/fraudulent.
Customization of CNAM information for calls placed to mobile devices
One example method of operation may include identifying a call from a calling device destined for a mobile device, identifying a calling device number associated with the calling device and a mobile device number associated with the mobile device, determining whether a stored calling relationship exists between the calling device number and the mobile device number, and appending one of a plurality of caller identification names (CNAM) to the call based on the determination as to whether there is a stored calling relationship.
Customization of CNAM information for calls placed to mobile devices
One example method of operation may include identifying a call from a calling device destined for a mobile device, identifying a calling device number associated with the calling device and a mobile device number associated with the mobile device, determining whether a stored calling relationship exists between the calling device number and the mobile device number, and appending one of a plurality of caller identification names (CNAM) to the call based on the determination as to whether there is a stored calling relationship.
Managing spoofed calls to mobile devices
Methods and apparatuses for managing spoofed calls to a mobile device are described, in which the mobile device receives a call transmitted over a cellular or mobile network. The call may include a set of information associated with the network, such as a geological location of a device that generated the call, a hardware device identifier corresponding to the device, an internet protocol (IP) address associated with the device, or a combination thereof. The mobile device may determine whether the call is spoofed or genuine based on the set of information. Subsequently, the mobile device may assist a user of the mobile device to manage the call, such as blocking the call from reaching the user, informing the user that the call is spoofed, facilitating the user to report the call as spoofed to an authority and/or a service provider of the network.
Managing spoofed calls to mobile devices
Methods and apparatuses for managing spoofed calls to a mobile device are described, in which the mobile device receives a call transmitted over a cellular or mobile network. The call may include a set of information associated with the network, such as a geological location of a device that generated the call, a hardware device identifier corresponding to the device, an internet protocol (IP) address associated with the device, or a combination thereof. The mobile device may determine whether the call is spoofed or genuine based on the set of information. Subsequently, the mobile device may assist a user of the mobile device to manage the call, such as blocking the call from reaching the user, informing the user that the call is spoofed, facilitating the user to report the call as spoofed to an authority and/or a service provider of the network.
USER INTERFACE FOR FRAUD ALERT MANAGEMENT
A system for a graphical user interface for fraud detection for a call center system includes a processor and a visual display in communication with the processor. The processor causes the visual display to present an identifier corresponding to a communication received; a graphical representation of a threat risk associated with the identifier; a numeric score associated with the threat risk, wherein the numeric score is a weighted score based on a plurality of predetermined factors updated substantially continuously.
USER INTERFACE FOR FRAUD ALERT MANAGEMENT
A system for a graphical user interface for fraud detection for a call center system includes a processor and a visual display in communication with the processor. The processor causes the visual display to present an identifier corresponding to a communication received; a graphical representation of a threat risk associated with the identifier; a numeric score associated with the threat risk, wherein the numeric score is a weighted score based on a plurality of predetermined factors updated substantially continuously.
SYSTEMS AND METHODS FOR AUTHENTICATION USING BROWSER FINGERPRINTING
Embodiments described herein provide for authenticating callers to call centers using browser fingerprinting. A call center system or third-party analytics system includes a server that transmits notifications to a caller device that includes an interactive hyperlink or URL to a particular webpage. When a browser of the caller device navigates to the webpage, the server captures certain types of information about the caller device and generates a browser fingerprint for the caller device. The browser fingerprint is compared against a database of registered browser fingerprints to verify that the caller device of the current call is the registered, expected caller device. The server transmits the notification via any number of communication channels and protocols, such as text messages (e.g., SMS messages, MMS messages), emails, and push notifications associated with client-side software, among others.