Patent classifications
H04M15/06
Blocked device checking in roaming scenarios
In certain cellular communication systems, a roaming communication device may attempt to establish a connection with a visited wireless communication network. Before allowing the connection, the visited network may check to see whether the International Mobile Equipment Identity (IMEI) of the device has been listed in an Equipment Identity Register (EIR) as being blocked, and may refuse the connection if the IMEI is listed as being blocked. In addition, when the home network of the device receives a request to authorize usage of the device, the home network may also check its own EIR to determine whether the IMEI has been blocked. If the IMEI has been blocked in the EIR of the home network, the home network indicates to the visited network that the connection should be refused.
CUSTOMIZATION OF CNAM INFORMATION FOR CALLS PLACED TO MOBILE DEVICES
One example method of operation may include identifying a call from a calling device destined for a mobile device, responsive to identifying a calling device number assigned to the calling device, accessing a call content application programming interface (API), operated by a content delivery device, configured to deliver to the mobile device a first caller identification name (CNAM) or a second CNAM, assigned to the calling device number, determining a context assigned to a mobile device number assigned to the mobile device, selecting one of the first CNAM and the second CNAM based on the context, and assigning the selected CNAM to the call.
OVER THE TOP NETWORK TRAFFIC CLASSIFICATION
A system and method is disclosed to transform Over-The-Top (OTT) call log data collected by telecommunications network operators into a peer-to-peer log in order to determine more accurate information. In this method the IP addresses in the call log records are compared to a list of known mediator server IP addresses and the records in the log that contain mediator server IP addresses are removed from the log to create a peer-to-peer log containing only those records that contain peer IP addresses. The data in the peer-to-peer log can then be categorized with confidence to determine network performance information as well as, for example, the percentage of traffic to a particular country. Conclusions may then be inferred regarding the removed data records based upon the data found in the peer-to-peer log.
Post-page caller name identification system
Caller Name Identification, or CNAM Caller ID, is a telecommunication end-user feature that appeared for PSTN landline customers in the late 1980s. The rapid development of cellular mobile and VOIP telephony systems lead to the frequent omission of the CNAM Caller ID feature. Described is an independent end-user system that obtains the CNAM Caller ID after the call page transmission. The system operates on the user's smartphone or on a TCP/IP connected computer. A user with multiple telephone devices (i.e. a smartphone, landline, and VOIP line) may share use of this system between all devices.
Methods and systems for authenticating a user on a call
Methods and systems described in this disclosure allow customers to quickly be authenticated. In some embodiments, a device and a user verifier are associated with a user profile. When a call is received from the device, the user may be requested to input the user verifier. After verifying that the device is unique to the user and that the user verifier matches the user verifier associated with the user profile, the user may be authenticated to the call or activity.
Method and system for identification of a remote host in an out-of-band verification network
A system detects abnormalities in a call signal indicative of call fraud. The system includes a first device situated in an originating call network and configured to send call signals to a second device situated in a terminating call network. The first device is coupled to a first registry to which it sends the call data from the sent signals for storage as originating call records. The second device is coupled to a second registry to which it sends the call data from the received signals for storage as terminating call records. The first and second registries exchange verification requests and responses to detect whether discrepancies exist between the stored originating call records in the first registry and stored terminating call records in the second registry. The registries generate alerts based on detected discrepancies, which may be used by the devices to block the call fraud.
Authentication and control of incoming communication
An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.
APPARATUS, METHODS, AND ARTICLES OF MANUFACTURE FOR FILTERING CALLS AND REDUCING SPOOFING AND SPAMMING
Unsolicited electronic communications such as robocalls and person-initiated solicitation calls are reduced by imposing tolls for completion of the connections to the called parties, and refunding the tolls to the entities indicated by the electronic communications as the calling parties. In this way, a dishonest originator of a spoofed call bears the cost of the toll, and the toll is not refunded to the dishonest originator. On the other hand, the toll collected from an honest originator of a non-spoofed call is refunded to the honest originator, making the toll transparent to the honest originator and avoiding annoyance of the honest caller caused by the toll. Unsolicited calls may be subjected to filtering, particularly filtering based on the indications of the origins of the calls.
System and method for facilitating communications between inmates and non-inmates
A system and method for incoming and outgoing RCS messages with inmates includes a database including a plurality of user records, wherein the user records include a plurality of user profiles and a plurality of inmate profiles, wherein each of the user profiles includes a user ID, a mobile ID, a carrier, and at least one inmate account number. Each of the inmate profiles includes an inmate user ID, a carrier, a current account balance, and at least one user account number. The system and method also includes an application server including a processor programmed to receive a RCS message from a new user profile, determine a carrier of the user profile, process the new user profile based on the carrier, wherein the carrier is determined by a triggering event, and send the new user profile to an appropriate list for future RCS messaging.
System and method for facilitating communications between inmates and non-inmates
A system and method for incoming and outgoing RCS messages with inmates includes a database including a plurality of user records, wherein the user records include a plurality of user profiles and a plurality of inmate profiles, wherein each of the user profiles includes a user ID, a mobile ID, a carrier, and at least one inmate account number. Each of the inmate profiles includes an inmate user ID, a carrier, a current account balance, and at least one user account number. The system and method also includes an application server including a processor programmed to receive a RCS message from a new user profile, determine a carrier of the user profile, process the new user profile based on the carrier, wherein the carrier is determined by a triggering event, and send the new user profile to an appropriate list for future RCS messaging.