H04M7/0078

Method and System for Transmission of a Session Initiation Protocol (SIP) Identity Header in an Out-of-band Verification Network
20220070300 · 2022-03-03 ·

A computer-implemented network verification system includes a second device situated in a terminating call network and configured to receive a call signal from a first device situated in an originating network. The first device is coupled to a first registry that stores originating call records. The first registry is configured to obtain, from the first device, and store call data and a SIP identity header associated with the call signal. The system also includes a second registry coupled to the second device and configured to receive, from the first registry over an out-of-band verification network, a first verification request that contains the originating call record, including the SIP identity header associated with the call signal. The second registry is further configured to send the SIP identity header contained in the first verification request to the second device.

INCOMING CALL PROCESSING METHOD, MOBILE TERMINAL, AND COMPUTER STORAGE MEDIUM
20210329117 · 2021-10-21 ·

Disclosed is an incoming call processing method, applied to a mobile terminal and including: after receiving an incoming call carrying an INVITE signaling, determining, according to the INVITE signaling, a type of a calling number corresponding to the incoming call; determining whether the incoming call is a malicious call based on the type of the calling number; and intercepting the incoming call when it is determined that the incoming call is a malicious call. Also disclosed are a mobile terminal and a computer storage medium.

SYSTEM AND METHOD FOR PRE-AUTHENTICATION OF CUSTOMER SUPPORT CALLS
20210328802 · 2021-10-21 · ·

A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication to reduce the potential for malicious third-party impersonation of the client. Pre-authorized customer support calls are intelligently and efficiently routed in a manner that reduces the opportunity for malicious call interference and information theft.

System and methods for managing communications events
11144851 · 2021-10-12 · ·

An example communications routing system includes a prediction engine to, for each user account, generate a predicted cost of communications events using a gamma-gamma cost model, generate a predicted revenue of presented advertisements using a gamma-gamma revenue model, generate a margin based on the predicted cost and the predicted revenue, and, when the margin for a given user account is below a margin threshold, restrict a status associated with the given user account.

DETECTING A SPOOFED CALL
20210314436 · 2021-10-07 ·

A system can be operable to receive a call from a communication device and identify whether the call is a spoofed based on, for example, whether a caller party user equipment associated with a caller identification number (caller ID number) is in an “idle” status, whether there are inconsistencies in the geographic location associated with a calling party's network and the geographic location determined to be associated with the caller ID number presented, and whether the phone number presented as the caller ID number is registered with a calling party's network.

SYSTEMS AND METHODS FOR DETECTING CALL PROVENANCE FROM CALL AUDIO

Various embodiments of the invention are detection systems and methods for detecting call provenance based on call audio. An exemplary embodiment of the detection system can comprise a characterization unit, a labeling unit, and an identification unit. The characterization unit can extract various characteristics of networks through which a call traversed, based on call audio. The labeling unit can be trained on prior call data and can identify one or more codecs used to encode the call, based on the call audio. The identification unit can utilize the characteristics of traversed networks and the identified codecs, and based on this information, the identification unit can provide a provenance fingerprint for the call. Based on the call provenance fingerprint, the detection system can identify, verify, or provide forensic information about a call audio source.

METHOD AND SYSTEM FOR PREVENTING ILLICIT USE OF A TELEPHONY PLATFORM
20210306363 · 2021-09-30 ·

A system and method for preventing illicit use of a telephony platform that includes enrolling a plurality of accounts on a telecommunications platform, wherein an account includes account configuration; at a fraud detection system of the telecommunications platform, receiving account usage data, wherein the usage data includes at least communication configuration data and billing configuration data of account configuration and further includes communication history of the plurality of accounts; calculating fraud scores of a set of fraud rules from the usage data, wherein at least a sub-set of the fraud rules include conditions of usage data patterns between at least two accounts; detecting when the fraud scores of an account satisfy a fraud threshold; and initiating an action response when a fraud score satisfies the fraud threshold.

System and method for handling data transfers

Systems and methods for managing data transfers between a secure location and a less secure location. A data transfer checker operating on a mobile device determines whether an attempted data transfer between two locations is permitted. If it is not permitted, then the data transfer is prevented and the user may be notified of the data transfer prevention.

Method and system for preventing illicit use of a telephony platform

A system and method for preventing illicit use of a telephony platform that includes enrolling a plurality of accounts on a telecommunications platform, wherein an account includes account configuration; at a fraud detection system of the telecommunications platform, receiving account usage data, wherein the usage data includes at least communication configuration data and billing configuration data of account configuration and further includes communication history of the plurality of accounts; calculating fraud scores of a set of fraud rules from the usage data, wherein at least a sub-set of the fraud rules include conditions of usage data patterns between at least two accounts; detecting when the fraud scores of an account satisfy a fraud threshold; and initiating an action response when a fraud score satisfies the fraud threshold.

SYSTEM AND METHOD FOR REAL TIME FRAUD ANALYSIS OF COMMUNICATIONS DATA

A telecommunications service provider's real time analysis system analyzes communications data to detect potentially fraudulent communications data, where the analysis is performed in real time in the routing path of the communications data. The communications data may include calls (e.g., SS7, VoIP, etc. based calls) and messages (e.g., SMS, MMS, etc.). The real time analysis system rejects potentially fraudulent communications data and non-fraudulent communications data in order to be used in real time in the routing path of the communications data. A rejection by the real time analysis system may cause non-fraudulent communications data to still be sent to the intended destination of the communications data. The real time analysis system can be in the routing path of the communications data without further routing non-fraudulent communications data traffic to the next appropriate hop in the routing path.