H04M2203/6027

REPUTATION MANAGEMENT PLATFORM AND METHODS THEREOF

A system for assigning reputation scores is provided. The system includes a first database, a second database, and a registrar server. The first database stores first data corresponding to at least one telecommunications identifier. The second database stores second data corresponding to the at least one telecommunications identifier. The registrar server is structured to: access and interpret the first data and the second data to determine one or more attributes for the at least one telecommunications identifier; determine a reputation score for the at least one telecommunications identifier; and transmit the reputation score.

RESTRICTING ACCESS BASED ON VOICE COMMUNICATION PARAMETERS

Methods and systems are described herein for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters. In particular, when a communication is detected from one device to another device, that communication may be risky. Thus, the risk is mitigated by giving a user information about the source of the communication to give a user a chance to reject the communication. In addition, in instances where the user accepts the communication, the system enables monitoring the communication and restricting any accounts that are disclosed within the communication.

Delayed interactive auto attendant

Aspects of the subject disclosure may include, for example, a method of receiving, by a processing system including a processor, a call for a subscriber; determining, by the processing system, that the call is from an interactive voice response (IVR) system; determining whether the IVR system is providing a query that requires a response; and responsive to a first determination that the IVR system requires the response, providing the response. Other embodiments are disclosed.

UTILIZING VOIP CODEC NEGOTIATION DURING A CONTROLLED ENVIRONMENT CALL
20220337653 · 2022-10-20 · ·

Controlled-environment communication systems are increasingly using voice over internet protocol (VoIP) to serve their users. VoIP allows voice to be sent in packetized form, where audio is encoded using one of several codecs. Because of bandwidth constraints, particularly during peak call times, codecs may be used which sacrifice audio quality for bandwidth efficiency. As a result, several features of communication systems, including critical security features. The present disclosure provides details for systems and methods by which a controlled-environment communication system may shift between codecs to perform security-related features or to alleviate bandwidth considerations. This involves the special formatting of control-signaling messages, including session initiation protocol (SIP) and session description protocol (SDP) messaging.

SPOOF CALL DETECTION IN TELEPHONE NETWORK
20220337701 · 2022-10-20 ·

Computer-implemented methods of placing and processing calls in a communications network are provided. The computer-implemented method of processing calls in a telephone network comprises: identifying a plurality of calls that have been made by a particular telephone number to telephone numbers in the telephone network; determining whether a sequence in which the calls were placed corresponds to a correct order for calling those telephone numbers, the correct order being determined based on a predetermined order for calling telephone numbers in the telephone network; and determining that one or more of the calls were made by spoofing the particular telephone number if the sequence in which the calls were placed does not correspond to a correct order.

Method and system for automatically detecting and blocking robocalls
11483428 · 2022-10-25 ·

A method and system for automatically detecting and blocking robocalls. A robocall application on a server network device detects whether incoming calls from a first network device requesting a connection to a second network device are live voice calls are robocalls including natural synthesized voice data or artificial synthesized voice data. The robocall application on a server network device also detects whether incoming or outgoing calls from a third-party network device used to connect the first network device to the second network device are live voice calls or are robocalls including natural synthesized voice data or artificial synthesized voice data. Robocalls are automatically detected and blocked.

Method and apparatus for threat identification through analysis of communications signaling events, and participants
11445060 · 2022-09-13 · ·

Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.

Call data management platform
11445066 · 2022-09-13 · ·

A device may receive voice call data indicating that a voice call has been initiated between a first device and an interactive voice response device. The device may obtain, based on the voice call data, a user account identifier identifying a user account and obtain, based on the user account identifier, user account data including user authentication data. The device may receive user input provided by the first device during the voice call and determine, based on the user authentication data, that the user input fails to authenticate a user associated with the user account. The device may receive data indicating that the voice call has terminated and identify, based on the user input failing to authenticate the user, a second device. The device may perform an action based on the second device and the voice call data.

VERIFYING INCOMING COMMUNICATIONS
20220263863 · 2022-08-18 ·

Disclosed are systems, methods, and non-transitory computer-readable media for verifying an incoming communication. A recipient client device receives an incoming communication including an identifier identifying a second client device as having initiated the incoming communication. A verification service installed on the recipient client device queries a call placement service directory based on the first identifier. The call placement service directory maintains a listing of identifiers for client devices and corresponding communication providers that manage the identifiers. The call placement service directory returns information identifying the communication provider that manages the identifier. In turn, the verification service transmitting a request to the communication provider to confirm whether the second client device initiated the incoming communication. The verification service processes the incoming communication based on the response from the communication provider indicating whether the second client device initiated the incoming communication.

METHOD OF VERIFICATION
20220255949 · 2022-08-11 · ·

The present invention relates to a method of verification of a communicating party. In particular, the invention relates to a method of verifying the identity of a communicating party at a user device, the method comprising the steps of receiving a communication at the user device, wherein the communication comprises information identifying the communicating party; determining whether the information identifying the communicating party comprises a variable authentication sequence indicative of the identity of the communicating party; and comparing the authentication sequence against at least one pre-determined criteria to determine whether the authentication sequence is valid, thereby to verify the identity of the communicating party.