Patent classifications
H04M7/0078
Centralized validation of network call parameters on distributed networks using probability models
Systems and methods are provided for centralized validation of potential network calls, such as calls proposing database transactions, on a distributed system. The distributed system may include multiple systems that apply independent criteria for validating proposals, which criteria may not be available external to the individual systems. Moreover, the systems may lack an ability to validate proposals prior to submitting such proposals for commitment. A centralized network call parameter validation system as disclosed herein may validate potential network calls with high confidence by applying probability models of data pattern and hashing digit checksum to potential network call parameter values, which models are generated based on statistical analysis of historical network call values.
System and method for handling data transfers
Systems and methods for managing data transfers between a secure location and a less secure location. A data transfer checker operating on a mobile device determines whether an attempted data transfer between two locations is permitted. If it is not permitted, then the data transfer is prevented and the user may be notified of the data transfer prevention.
End-to-end management of authenticated communications
Disclosed herein are systems and methods for providing mobile call authentication. For instance, a token indicative of a call request can be received from a calling party. The token can include a called party number and a time of the request. A subscriber database can be accessed to determine identifying information associated with the calling party based at least in part on the token. The token can be authenticated based at least in part on the identifying information and using one or more predefined authentication protocols. The token can be stored in a call session registry storing data indicative of a plurality of active telephone call events. A verification request for the call request can be received from the called party. The call request can be verified based at least in part on the token. The called party can be notified that the call request has been verified.
UTILIZING VOIP CODEC NEGOTIATION DURING A CONTROLLED ENVIRONMENT CALL
Controlled-environment communication systems are increasingly using voice over internet protocol (VoIP) to serve their users. VoIP allows voice to be sent in packetized form, where audio is encoded using one of several codecs. Because of bandwidth constraints, particularly during peak call times, codecs may be used which sacrifice audio quality for bandwidth efficiency. As a result, several features of communication systems, including critical security features. The present disclosure provides details for systems and methods by which a controlled-environment communication system may shift between codecs to perform security-related features or to alleviate bandwidth considerations. This involves the special formatting of control-signaling messages, including session initiation protocol (SIP) and session description protocol (SDP) messaging.
Method and apparatus for threat identification through analysis of communications signaling events, and participants
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
System and method for real time fraud analysis of communications data
A telecommunications service provider's real time analysis system analyzes communications data to detect potentially fraudulent communications data, where the analysis is performed in real time in the routing path of the communications data. The communications data may include calls (e.g., SS7, VoIP, etc. based calls) and messages (e.g., SMS, MMS, etc.). The real time analysis system rejects potentially fraudulent communications data and non-fraudulent communications data in order to be used in real time in the routing path of the communications data. A rejection by the real time analysis system may cause non-fraudulent communications data to still be sent to the intended destination of the communications data. The real time analysis system can be in the routing path of the communications data without further routing non-fraudulent communications data traffic to the next appropriate hop in the routing path.
Utilizing VoIP coded negotiation during a controlled environment call
Controlled-environment communication systems are increasingly using voice over internet protocol (VoIP) to serve their users. VoIP allows voice to be sent in packetized form, where audio is encoded using one of several codecs. Because of bandwidth constraints, particularly during peak call times, codecs may be used which sacrifice audio quality for bandwidth efficiency. As a result, several features of communication systems, including critical security features. The present disclosure provides details for systems and methods by which a controlled-environment communication system may shift between codecs to perform security-related features or to alleviate bandwidth considerations. This involves the special formatting of control-signaling messages, including session initiation protocol (SIP) and session description protocol (SDP) messaging.
METHODS AND SYSTEMS FOR RELAYING A SENSITIVE INFORMATION DETAIL DURING A TELEPHONE CALL BETWEEN A USER'S TELEPHONE AND A RECIPIENT'S TELEPHONE
There is provided a method for relaying a sensitive information detail during a telephone call between a user's telephone and a recipient's telephone, the user's telephone storing the sensitive information detail therein, the method comprising: initiating a telephone call between the user and the recipient; the user's telephone receiving a predetermined input; during the telephone call, the user's telephone accessing the sensitive information detail stored in the user's telephone based on the predetermined input; and the user's telephone audibly relaying to the recipient the accessed sensitive information detail, wherein audibly relaying to the recipient the accessed sensitive information detail comprises the user's telephone converting, using at least one text-to-speech algorithm, the accessed sensitive information detail to an audible message containing the sensitive information detail and audibly relaying the audible message during the telephone call.
Voice over long-term evolution (VoLTE) call normalization and alert policy system
The present disclosure describes techniques that facilitate detecting a Voice over Long-Term Evolution (VoLTE) call request with a recipient call number that lacks a country code. The VoLTE call request may be initiated by a subscriber device while roaming in a VPLMN. Specifically, a Normalization and Alert Policy (NAP) system is described that is configured to analyze the VoLTE call request and determine an intended country code and adjust the recipient call number to include the country code. Further, the NAP system may analyze the adjusted recipient call number to determine whether initiating a VoLTE call in response to the VoLTE call request may trigger an alert condition. An alert condition may relate to determining that the VoLTE call request may initiate a cost-prohibitive VoLTE communication or that the VoLTE call request relates a fraudulent communication.
MANAGING SPOOFED CALLS TO MOBILE DEVICES
Methods and apparatuses for managing spoofed calls to a mobile device are described, in which the mobile device receives a call transmitted over a cellular or mobile network. The call may include a set of information associated with the network, such as a geological location of a device that generated the call, a hardware device identifier corresponding to the device, an internet protocol (IP) address associated with the device, or a combination thereof. The mobile device may determine whether the call is spoofed or genuine based on the set of information. Subsequently, the mobile device may assist a user of the mobile device to manage the call, such as blocking the call from reaching the user, informing the user that the call is spoofed, facilitating the user to report the call as spoofed to an authority and/or a service provider of the network.