H04M15/755

SYSTEMS AND METHODS FOR TAGGING FRAUDULENT PHONE NUMBERS

A method including: receiving a user report dataset indicating fraudulent activity corresponding to a phone number; responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number; and tagging the record to identify the phone number as being associated with fraudulent activity.

EMBEDDED SUBSCRIBER IDENTITY MODULE BOOTSTRAP BROKER FOR EMBEDDED SUBSCRIBER IDENTITY MODULE BASED SERVICES
20230108644 · 2023-04-06 ·

An embedded subscriber identity module (eSIM) bootstrap broker for eSIM based services is presented herein. A system generates and stores different international mobile subscriber identity (IMSI) profiles corresponding to mobile devices to facilitate respective accesses of network services based on the different IMSI profiles, and sends portions(s) of the different IMSI profiles to an eSIM service. The eSIM service generates respective eSIM bootstrap profiles comprising the different IMSI profiles and allocates the respective eSIM bootstrap profiles to respective device manufactures of the mobile devices for storage of the respective eSIM bootstrap profiles in the mobile devices. In response to matching an IMSI profile that has been included in a request for an access of the network services that has been received from a mobile device with a stored IMSI profile of the stored IMSI profiles, the system enables the access for the mobile device.

SYSTEMS AND METHODS FOR PHONE NUMBER FRAUD PREDICTION

A method including: receiving one or more datasets indicating call activity corresponding to a phone number; analyzing the one or more datasets to identify unusual call activity; and generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES DIRECTLY TO RECORD OBJECTS OF SYSTEMS OF RECORD WITH NODE PROFILES

The system described herein can automatically match, link, or otherwise associate electronic activities with one or more record objects. For an electronic activity that is eligible or qualifies to be matched with one or more record objects, the system can identify one or more set of rules or rule sets. Using the rule sets, the system can identify candidate record objects. The system can then rank the identified candidate record objects to select one or more record objects with which to associate the electronic activity. The system can then store an association between the electronic activity and the selected one or more record objects.

SYSTEMS AND METHODS FOR CLASSIFYNG ELECTRONIC ACTIVITIES BASED ON SENDER AND RECEPIENT INFORMATION

The system and methods described herein can classify electronic activities based on sender and recipient information. The system can determine a relationship between a sender of an electronic activity and at least one recipient of the electronic activity using a sender node profile and a recipient node profile. The system can assign a tag to the electronic activity based on the relationship between the sender and one or more recipients of the electronic activity. The system can process the electronic activity based on the assigned tag.

Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
11256875 · 2022-02-22 · ·

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.

COMMUNICATION DATA ACCOUNT PROCESSING METHOD AND DEVICE THEREOF
20170251110 · 2017-08-31 ·

A communication data account processing method is disclosed. The method includes: establishing a communication data account associated with a terminal user for the terminal user, and storing communication data resource information corresponding to the communication data account; receiving an operation instruction of the terminal user for the communication data account, the operation instruction including a mobile communication identifier; identifying a communication service provider corresponding to the mobile communication identifier; establishing a connection with a system interface of the communication service provider, and sending the mobile communication identifier and the operation instruction of the user to the system interface of the communication service provider; receiving response information of the system interface of the communication service provider; and performing an operation on the communication data account according to the response information. By using the present disclosure, a data allotment can be transferred conveniently without suffering any limitation due to an operator.

SYSTEMS AND METHODS FOR IDENTIFYING A SEQUENCE OF EVENTS AND PARTICIPANTS FOR RECORD OBJECTS
20220038548 · 2022-02-03 · ·

Methods, systems, and storage media for identifying a sequence of events and participants for record objects are disclosed. Exemplary implementations may: access record objects of a system of record; identify a subset of record objects associated with a group entity and having a first record object status; identify one or more electronic activities linked to the record objects; determine an event-participant pattern based on the electronic activities linked to the record object; identify electronic activities linked with a second record object; determine that a first event is performed by the a participant type and a second event is not yet performed by a second participant type; generate a content item identifying an action to trigger a performance of the second event; and transmit the content item to a device of a participant of at least one electronic activity linked with the second record object.

Method and apparatus for verifying the correctness of a roaming account balance

This application discloses a roaming charging method and apparatus. A blockchain network stores information related to roaming fee settlement, to reduce a possibility that the information related to roaming fee settlement is tampered with. In addition, a digital signature algorithm is used to sign roaming service statistics to generate an abstract, to further prevent the roaming service statistics from being tampered with. In this way, when a home carrier verifies a roaming account balance by using the roaming service statistics and a roaming charging rule, accuracy of a verification result can be ensured, and the home carrier can obtain an accurate roaming fee of a user.

Method for providing internet access to a customer of a service provider and computer program

A method for providing Internet access to a customer of a service provider wherein the service provider takes over the costs for the customer's Internet use. The method includes the customer's user equipment generating a service start notification message to a server of the service provider in response to the customer agreeing to the service and commencement of use of the service. The service start notification message triggers sending a query to a database of the service provider containing customer data, and confirming the customer has access rights for getting Internet access at the service provider's expenses. The service provider generates and sends out a request message to the mobile communication provider of the customer and requests an intermediate change of the customer's mobile communication contract so the costs for loading Internet data on the customer's user equipment will be temporarily charged to the service provider rather than the customer.