Patent classifications
H04M2203/6027
CALL SCREENING SERVICE FOR DETECTING FRAUDULENT INBOUND/OUTBOUND COMMUNICATIONS WITH SUBSCRIBER DEVICES
An example method of operation may include one or more of identifying an inbound call intended for a mobile device subscribed to a protected carrier network, determining the inbound call is assigned an origination telephone number that is subscribed to the protected carrier network, determining whether an inbound call origination source location indicates the protected carrier network or an out-of-network carrier network based on one or more call parameters received with the inbound call, and determining whether to transmit an indication to the mobile device that the inbound call has an elevated likelihood of being a scam call based on the inbound call origination source location.
Call Authentication Service Systems and Methods
A system for authenticating the calling device used to place a call to an enterprise call center. The system uses a premise component, a cloud-based Call Authentication Service (CAS), and orchestration between these two components. The premise component includes a number of sub-components including servers and probes. The CAS includes a Decision Engine that utilizes a number and variety of authentication plugins. The disclosed system may be used independently or as part of a multi-factor authentication strategy with other techniques such as reduced Knowledge-Based Authentication or voice biometrics.
Detecting and preventing fraud and abuse in real time
A system and method for detecting and preventing PSTN fraud and abuse in real time includes a detection engine and a call management engine. The system includes at least one user record, at least one call data record, at least one fraud score record, and at least one remediation record. A call management engine enables users to establish VoIP calls connections to destination phone numbers. A fraud detection engine screens VoIP call connections to detect potential fraud and generates fraud records and remediation records when potential fraud is detected. The fraud detection engine may additionally direct the call management to terminate a VoIP call connection.
Method and Device for Controlling Call Forwarding
A method and device for controlling call forwarding are provided. In the method for controlling call forwarding, a call request is received, where the call request is sent when a second terminal takes a first terminal as a call forwarding destination; whether the first terminal permits reception of the call request forwarded from the second terminal or not is judged; and under a condition that a judgment result is that the first terminal does not permit the reception of the call request forwarded from the second terminal, the call request is denied.
System and method for determining unwanted call origination in communications networks
A method and system for discovering and locating the source of unwanted communication origination in a communications network, the method comprising compiling a communication campaign database storing data of one or more communication campaigns along with automatically identified instances of those campaigns, and simultaneously or sequentially matching those instances against known communication traffic of a set of cooperating telecommunication carriers. The one or more communications campaigns include a grouping of related fingerprints and patterns that identify a sequence of characters, audio or video associated with instances of a same likely campaigns, either legitimate or illegitimate/fraudulent.
Method and system for fraud clustering by content and biometrics analysis
A computer-implemented method for proactive fraudster exposure in a customer service center according to content analysis and voice biometrics analysis, is provided herein. The computer-implemented method includes: (i) performing a first type analysis to cluster the call interactions into ranked clusters and storing the ranked clusters in a clusters database; (ii) performing a second type analysis on a predefined amount of the highest ranked clusters, into ranked clusters and storing the ranked clusters; the first type analysis is a content analysis and the second type analysis is a voice biometrics analysis, or vice versa; (iii) retrieving from the ranked clusters, a list of fraudsters; and (iv) transmitting the list of potential fraudsters to an application to display to a user said list of potential fraudsters via a display unit.
Securing identities of chipsets of mobile devices
A method of verifying IMEIs and chipset S/Ns of devices within a wireless communication network. The method comprises receiving a request from a device to access the wireless communication network and receiving an international mobile equipment identity (IMEI) and serial number (S/N) from the device, wherein the IMEI and S/N are included on a chipset of the device, and wherein the S/N is the S/N for the chipset. The method further comprises comparing the IMEI and S/N with a database to confirm the authenticity of the IMEI and S/N. Based upon the authenticity of the IMEI and S/N, the request is either granted or not granted for the device to access the wireless communication network.
Using calling party number for caller authentication
Embodiments include a system, method, and computer program product that authenticates a caller using calling party information. In an embodiment, an authentication device receives the call request and associated calling party information that includes a calling party number. The authentication device retrieves parameters associated with the calling party number, where a retrieved parameter is a number of accounts linked to the calling party number. The authentication device determines whether the number of accounts is between one and a threshold value, inclusive, and verifies that the call request originates from a location or a device associated with the calling party number. Based on the verifying and determining, the authentication device generates an authentication result that indicates whether the calling party number is authenticated. Then, the authentication device sends the authentication result to a call processing device that processes the call request from the caller according to the authentication result.
Throttling based on phone call durations
According to examples, an apparatus may include a processor and a computer readable medium on which is stored machine readable instructions that may cause the processor to determine a call duration threshold assigned to an entity, in which a phone number may be associated with the entity. The processor may also track durations of one or more calls placed to the phone number, determine whether the tracked durations of the one or more calls placed to the phone number meet or exceed the call duration threshold, and based on a determination that the tracked durations meet or exceed the call duration threshold, throttle placement of an additional call to the phone number.
Monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks
Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.