Patent classifications
H04M2203/6027
Voice and video watermark for exfiltration prevention
A legitimate voice or video communication application modifies data in a communication session to produce a watermark. The watermark is a piece of information that is part of a communication session that is not readily observable, but can be verified later on. The purpose of a watermark is to verify that the communication session is a legitimate communication session and does not pose a security breach. The video or audio communication session is monitored for a watermark. In response to determining that the communication session contains the watermark, the communication session is allowed continue. In response to determining that the communication session does not contain the watermark, the communication session is identified as a potential security breach. If the communication session is identified as a potential security breach, the communication session can be dropped and a user can be notified of the potential security breach.
Telephone call screener based on call characteristics
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a telephone call screener are disclosed. In one aspect, a method includes the actions of receiving a telephone call. The actions further include determining characteristics of the telephone call. The actions further include, based on the characteristics of the telephone call, determining a level of screening to apply to the telephone call. The actions further include determining screening data based on screening the telephone call according to the level of screening. The actions further include providing, for output, the screening data.
DIALER HAVING INTEGRATED SCAM PROTECTION
Methods, devices, media, and systems are provided for scam protection. In aspects, a first device transmits an audio or textual communication to a recipient device. The recipient device may display identification data associated with the first device, such as a telephone number, location data, hardware information, and carrier information, for example. The identification data may be compared to authentication identification data and scam identification data stored in a central database and generated from reports from a plurality of user devices to determine an identity of the first device. As such, the recipient device may also display the determined identity of the first device (e.g., “IRS Scam”). Further, the recipient device may display a selectable icon, wherein a selection of the selectable icon causes a transmission of information relating to the identification data or the identity of the first device to a server.
TELEPHONE NUMBER BASED INFORMATION LOADING METHOD AND DEVICE
Disclosed are a telephone-number-based information loading method and device, wherein the method comprises steps of: detecting a telephone number in current display contents on a terminal side; determining whether the telephone number carries a feature identifier; and if yes, then generating a dial option control that is based on the telephone number in the current display contents, and/or invoking entry information of a webpage type service previously associated with the telephone number. According to the present invention, it is possible to conserve bandwidth resources, while preventing the occurrence of a situation in which a user mistakenly enters a dangerous website because of a search error, resulting in a security threat or other losses.
METHOD AND APPARATUS FOR CALL CORRELATION
There is provided a method of correlating a telephone call between a first party and a second party with information that is to be used in a third party service implemented in relation to the telephone call. The method comprises routing telephone calls involving the first party via a third party service system that implements the third party service. The method further comprises, at a communication management system of the first party, determining call identification data for the telephone call and session data associated with a session of the third party service to be implemented in relation to the telephone call, and sending the call identification data and the session data to the third party service system; and, at the third party service system, receiving the call identification data and the session data from the communication management system, using the received call identification data to identify the telephone call, using the received session data to determine the information that is be used in the third party service, and correlating the information with the identified telephone call.
Using calling party number for caller authentication
Embodiments include a system, method, and computer program product that authenticates a caller using calling party information. In an embodiment, an authentication device receives the call request and associated calling party information that includes a calling party number. The authentication device retrieves parameters associated with the calling party number, where a retrieved parameter is a number of accounts linked to the calling party number. The authentication device determines whether the number of accounts is between one and a threshold value, inclusive, and verifies that the call request originates from a location or a device associated with the calling party number. Based on the verifying and determining, the authentication device generates an authentication result that indicates whether the calling party number is authenticated. Then, the authentication device sends the authentication result to a call processing device that processes the call request from the caller according to the authentication result.
DYNAMICALLY PROVIDING SAFE PHONE NUMBERS FOR RESPONDING TO INBOUND COMMUNICATIONS
A system and method for dynamically providing safe call back numbers to use to respond to an inbound communication, the method comprising parsing message records from a message server, analyzing the message records for untrustworthy phone numbers by comparing content of the message records to a reference data set that is retrieved from a database, the reference data set including genuine and fraud data wherein the genuine and fraud data includes entities and contact information corresponding to the entities, determining untrustworthy phone numbers in the message records from the analysis, and generating remedy actions based on the determination of the untrustworthy phone numbers.
Detection of Spoofed Calls Using Call Header
Implementations described herein relate to methods, systems, and computer-readable media to label incoming phone calls. A method to label an incoming phone call includes detecting the incoming phone call associated with a caller identifier (ID), determining a location associated with the call, and analyzing a call header of the call to determine one or more call characteristics. The method further includes determining, based on the location and the call characteristics, if the location is spoofed and determining, based on the caller ID and the call characteristics, if an access network associated with the call is spoofed. The method further includes applying a trained machine learning model to determine whether the call is a robocall. The method further includes assigning a label to the call that indicates whether the call is a spoofed call or is the robocall and sending the label to a callee device associated with the call.
Detecting SS7 redirection attacks with audio-based distance bounding
Disclosed are various embodiments for detecting Signaling System 7 (SS7) redirection attacks by measuring call audio round trip times between phones. Such redirection attacks force calls to travel longer physical distances than usual, thereby causing longer end-to-end delay. Accordingly, various embodiments implement a distance bounding-inspired protocol that allows for securely characterizing the round trip time between two call endpoints. As a result, telephone users can reliably detect SS7 redirection attacks and protect the information contained in their calls.
METHOD AND APPARATUS FOR IDENTIFYING A FAKE VIDEO CALL
A method and apparatus for identifying a faked video is provided herein. During operation, when a video, or video call is received from a device, a simultaneous audio call is placed to the device (i.e., the video call and audio call take place simultaneously in time). The audio streams on both the video and audio call are compared, and a difference between the audio streams is identified. The video is deemed a potential fake if the difference between the audio streams is above a particular threshold.