Patent classifications
H04W12/48
ASSESSING RISK OF FRAUD ASSOCIATED WITH USER UNIQUE IDENTIFIER USING TELECOMMUNICATIONS DATA
A system and methods for assessing risk of fraud associated with a unique identifier associated with a telecommunication device of a user. The disclosed system utilizes one or more datasets of traffic representing network sessions over a telecommunications network. The system uses machine learning techniques to analyze network session data and/or static or dynamic attributes characterizing the network session data, and generates a risk scoring model that assesses the likelihood that the user is associated with fraudulent activities. The system receives a unique identifier and queries the one or more datasets for data characterizing traffic over the telecommunications network associated with the unique identifier. The system analyzes the traffic data associated with the unique identifier based on the risk scoring model and generates a score, grade, reason code, or other characterization indicating the likelihood of fraud associated with the unique identifier.
ASSESSING RISK OF FRAUD ASSOCIATED WITH USER UNIQUE IDENTIFIER USING TELECOMMUNICATIONS DATA
A system and methods for assessing risk of fraud associated with a unique identifier associated with a telecommunication device of a user. The disclosed system utilizes one or more datasets of traffic representing network sessions over a telecommunications network. The system uses machine learning techniques to analyze network session data and/or static or dynamic attributes characterizing the network session data, and generates a risk scoring model that assesses the likelihood that the user is associated with fraudulent activities. The system receives a unique identifier and queries the one or more datasets for data characterizing traffic over the telecommunications network associated with the unique identifier. The system analyzes the traffic data associated with the unique identifier based on the risk scoring model and generates a score, grade, reason code, or other characterization indicating the likelihood of fraud associated with the unique identifier.
Method for changing an operating mode of a mobile device
A method for changing an operating mode of a mobile device is provided. According to the method, a request from the user of the mobile device to change from a first operating mode to a second operating mode is received. In response to the received request a credential is requested from the user. Next, the credential (RCK) is received from the user and validated. If the received credential (RCK) is valid, the second operating mode is set and an indication of the mobile device indicating that the second operating mode has been set is set. If the second operating mode has been set, a reset of the indication is prohibited.
Linking a physical item to a virtual item
Disclosed are systems and methods for mapping a virtual shopper to a physical shopper. The systems and methods may include receiving, at a backend system, unidentified customer data including information about an unidentified customer. Customer identity data including identifying information about the customer may be received from the customer. An authentication token may be generated that links the unidentified customer data to the customer identity data.
Privacy-enhanced method for linking an eSIM profile
A temporary EID (TEID) is generated based on an indicator of a hash algorithm, a nonce, and a hash generated using the hash algorithm. The hash is generated based on the indicator, nonce, and EID of a mobile device. The TEID is sent to the mobile network operator to identify the mobile device in lieu of using the device's EID. The TEID is stored in a data store and an eSIM profile for the mobile device is associated the TEID. The mobile device sends to an eSIM server the device's EID over a secure communications channel. The eSIM server generates a hash using the indicator and nonce contained in the stored TEID and the EID of the mobile device. The eSIM server verifies that the generated hash matches the hash contained in the TEID stored in the data store. If the hash matches, the eSIM server sends, to the mobile device, subscription credentials for accessing the mobile network in accordance with the data plan.
Privacy-enhanced method for linking an eSIM profile
A temporary EID (TEID) is generated based on an indicator of a hash algorithm, a nonce, and a hash generated using the hash algorithm. The hash is generated based on the indicator, nonce, and EID of a mobile device. The TEID is sent to the mobile network operator to identify the mobile device in lieu of using the device's EID. The TEID is stored in a data store and an eSIM profile for the mobile device is associated the TEID. The mobile device sends to an eSIM server the device's EID over a secure communications channel. The eSIM server generates a hash using the indicator and nonce contained in the stored TEID and the EID of the mobile device. The eSIM server verifies that the generated hash matches the hash contained in the TEID stored in the data store. If the hash matches, the eSIM server sends, to the mobile device, subscription credentials for accessing the mobile network in accordance with the data plan.
Processing configuration data for a subscriber identification module
A method comprises storing first configuration data and operating software for a processing apparatus; executing the operating software using one or more processing devices of the processing apparatus in a configuration defined by the first configuration data so as to provide first processing apparatus functionality; and performing a transition process, the transition process comprising: accessing a subscriber identification module indicative of the transition process; and in response to accessing the subscriber identification module, replacing at least the first configuration data by second configuration data different to the first configuration data, so that the executing step, in a second configuration defined by the second configuration data provides second processing apparatus functionality, different to first processing apparatus functionality defined by the first configuration data.
Access and mobility function (AMF) data storage in cellular network registration
A system and method may improve latency for user equipment (UE) registration in cellular networks. UE registration may retrieve the UE's configuration and subscription data locally rather than from a network or cloud-based unified data management (UDM) entity that manages a unified data repository (UDR). For example, the UE may send a unique identification (e.g., a UE ID) for the UE to a registering entity of a cellular network system. The UE ID may then be used to identify a UE Group Identification for the UE at the UDM. The UE Group Identification may be a pointer to the locally-stored configuration and subscription data for the UE. The entity requesting registration may then use the pointer to retrieve the configuration and subscription data locally rather than a remote entity such as the UDM.
Systems and methods for permitting access to a party using a decentralized identity
Methods and systems are provided for controlling access to communications with a party using a decentralized identity. A device may receive biometric information of a user, and retrieve, using the biometric information of the user, a first communication address associated with the user. The device may transmit, via the first communication address, a request to communicate with the user; and may receive, from a second device associated with the user, an identification of a second communication address controlled by the user. The device may utilize the second communication address to transmit at least one item of information to the second device associated with the user.
WIRELESS DEVICE ACCESS AND SUBSIDY CONTROL
The disclosed technology provides systems and methods for dynamically locking and unlocking wireless communication devices by enforcing updateable subscriber identity module (SIM) and public land mobile network (PLMN) policy information. A device receives policy information from a policy server, compares the policy information against information in the SIM and dynamically updates a lock state of the device based on the policy information, potentially overriding a factory lock state of the device. The policy information can include a whitelist indicating the SIMs that the device can accept. The device can also obtain and apply branding information when the SIM information matches the received policy information, and block access to certain device functionality when the SIM information does not match the policy information.