Patent classifications
H04M2203/6027
METHOD AND USER EQUIPMENT FOR DETECTING A POTENTIALLY FRAUDULENT CALL
A method and a User Equipment, UE (120) for detecting that the UE has received a fraudulent missed call, e.g. from a non-legitimate device (150). When receiving a missed call which is ended before a user of the UE has answered the incoming call, the UE determines the duration of the missed call, and indicates, e.g. to a user of the UE, the 5 duration of the missed call. The missed call may be determined as potentially fraudulent if the duration of the missed call is below or equal to a predetermined threshold.
Fraud Detection System and Method
A method, computer program product, and computing system for performing an assessment of initial input information, concerning a communication from a caller, to define an initial fraud-threat-level; if the initial fraud-threat-level is below a defined threat threshold, providing the communication to a recipient so that a conversation may occur between the recipient and the caller; performing an assessment of subsequent input information, concerning the conversation, to define a subsequent fraud-threat-level; and effectuating a targeted response based, at least in part, upon the subsequent fraud-threat-level, wherein the targeted response is intended to refine the subsequent fraud-threat-level.
Method and system for identification of a remote host in an out-of-band verification network
A system detects abnormalities in a call signal indicative of call fraud. The system includes a first device situated in an originating call network and configured to send call signals to a second device situated in a terminating call network. The first device is coupled to a first registry to which it sends the call data from the sent signals for storage as originating call records. The second device is coupled to a second registry to which it sends the call data from the received signals for storage as terminating call records. The first and second registries exchange verification requests and responses to detect whether discrepancies exist between the stored originating call records in the first registry and stored terminating call records in the second registry. The registries generate alerts based on detected discrepancies, which may be used by the devices to block the call fraud.
Robocall detection
A method of detecting robocalls includes generating at least one of an identification (ID) spoofing score, a number similarity score, and a call length prediction request for a telephone call request. The method further includes generating a robocall predictor score based at least in part on the call length prediction score and the ID spoofing score, and rejecting the telephone call request when the robocall predictor score indicates the telephone call request is invalid.
Control information for public switched telephone network (PSTN) using blockchain system
Signaling system for public switched telephone network (PSTN) using a blockchain system. In one embodiment, a method is provided. The method includes determining that a phone call related operation between a first telecommunications operator and a second telecommunications operator was requested. A public switched telephone network (PSTN) comprises the first telecommunications operator and the second telecommunications operator. The method also includes updating, by a node of a blockchain system, a distributed ledger to indicate that the phone call related operation between the first telecommunications operator and the second telecommunications operator was requested. The method further includes analyzing the distributed ledger to determine if the phone call related operation was approved. The method further includes executing the phone call related operation in response to determining that the phone call related operation was approved.
SYSTEM AND METHOD FOR DETERMINING UNWANTED CALL ORIGINATION IN COMMUNICATIONS NETWORKS
A method and system for discovering and locating the source of unwanted communication origination in a communications network, the method comprising compiling a communication campaign database storing data of one or more communication campaigns along with automatically identified instances of those campaigns, and simultaneously or sequentially matching those instances against known communication traffic of a set of cooperating telecommunication carriers. The one or more communications campaigns include a grouping of related fingerprints and patterns that identify a sequence of characters, audio or video associated with instances of a same likely campaigns, either legitimate or illegitimate/fraudulent.
Message back system
Disclosed is a message back system that can provide a means for a recipient of robo messages or spam messages to take action. The message back system includes a mobile device operating in conjunction with a server to activate the system and initiate one or more texts to be sent to the source phone number. The server can be programmed to try to send many texts to the source phone number to try to swamp the phone number with texts. The system may provide satisfaction to the user as a tool to respond to these on-going nuisances.
FRAUD DETECTION SYSTEM
A fraud detection system receives incoming calls and determines a fraud score indicating the likelihood that the incoming call is from a fraudulent or malicious caller. The system is able to determine the age of a telephone number of an incoming call and from it determine a fraud score for the call.
Clearing House Validation
In one embodiment, a network interface receives a communication request. A processor then verifies caller information in the communication request with a certification procedure. The processor obtains a first indicator based on the certification procedure. The first indicator includes information associated with a first certificate management procedure. The processor generates a second indicator based on the first indicator. The second indicator includes information associated with a second certificate management procedure.
CALL ORIGINATION VALIDATION FOR INCOMING CALLS WITHIN A WIRELESS COMMUNICATION NETWORK
A computer-implemented method for validating the origination of an incoming customer call on a wireless communication network may include receiving a SIP invite message at the wireless communication network when the call is initiated, determining whether the SIP invite message includes one or more indicators indicating that the call originated within the wireless communication network from a device with a SIM registered in the wireless communication network, and writing a classification code to a database indicating that the call is validated if the SIP invite message includes the one or more indicators. The method may further include receiving the call at an agent computer device with caller identification information, querying the database via the agent computer device according to the caller identification information to obtain the classification code of the customer call, and suppressing a step used for call authentication if the classification code indicates that the call is validated.