Patent classifications
H04L65/1079
CALL IDENTITY AUTHENTICATION METHOD, TERMINAL AND COMPUTER-READABLE STORAGE MEDIUM
A call identity authentication method, a terminal device and a computer-readable storage medium are disclosed. The method may include: in response to receiving a call setup request from a calling terminal device, acquiring biometric authentication information sent from the calling terminal device through a fifth generation (5G) message (S100); obtaining an authentication result according to the biometric authentication information (S200); and displaying authentication notification information according to the authentication result (S300).
SYSTEMS AND METHODS FOR AUTHENTICATION AND FRAUD DETECTION
Systems and methods are provided to stop both external and internal fraud, ensure correct actions are being followed, and information is available to fraud teams for investigation. The system includes components that can address: 1) behavioral analytics (ANI reputation, IVR behavior, account activity)—this gives a risk assessment event before a call gets to an agent; 2) fraud detection—the ability to identify, in real time, if a caller is part of a fraudster cohort' and alert the agent and escalate to the fraud team; 3) identity authentication—the ability to identify through natural language if the caller is who they say they are; and 4) two factor authentication—the ability to send a text message to the caller and automatically process the response and create a case in the event of suspected fraud.
MANAGING SPOOFED CALLS TO MOBILE DEVICES
Methods and apparatuses for managing spoofed calls to a mobile device are described, in which the mobile device receives a call transmitted over a cellular or mobile network. The call may include a set of information associated with the network, such as a geological location of a device that generated the call, a hardware device identifier corresponding to the device, an internet protocol (IP) address associated with the device, or a combination thereof. The mobile device may determine whether the call is spoofed or genuine based on the set of information. Subsequently, the mobile device may assist a user of the mobile device to manage the call, such as blocking the call from reaching the user, informing the user that the call is spoofed, facilitating the user to report the call as spoofed to an authority and/or a service provider of the network.
METHOD FOR PREVENTING SIP DEVICE FROM BEING ATTACKED, CALLING DEVICE, AND CALLED DEVICE
The present disclosure discloses a method for preventing a SIP device from being attacked, a calling device, and a called device, belonging to the field of network security. The present disclosure provides a method including: generating, by a calling device and a called device, the same public password, and transmitting, by the calling device, a connection request to the called device; performing, by the called device, header field verification on the connection request to verify whether a specified header field is carried in the connection request; performing, by the called device, device verification on the connection request; and performing, by the called device, identity verification on the connection request, and establishing, by the called device, a connection to the calling device. In this case, spoofing data is filtered out and the SIP device is not easily attacked, so that a user is free of disturbance.
CALL AUTHORIZATION AND VERIFICATION VIA A SERVICE PROVIDER CODE
One example method of operation may include receiving a call message associated with a call, determining a service provider network identifier based on a telephone number of a call origination device, identifying, from the call message, an identity header with a link to a public certificate repository storing a public certificate assigned to a service provider network hosting the call origination device, retrieving a service provider code assigned to the service provider network from the public certificate, and determining whether the service provider code matches the service provider network identifier as identified from a verification table.
System and method for preventing robocall voicemail deposit
Systems and methods for preventing a robocall from leaving a voicemail are described. When an incoming call without a history information header (HIH) destined for a subscriber is detected, the incoming call is prevented from leaving a voicemail if the subscriber does not answer the incoming call. If the incoming call has the HIH, additional determination process based on a visited network address of the subscriber is performed to determine whether the incoming call is to be prevented from leaving a voicemail.
SYSTEMS AND METHODS FOR ENHANCED MESSAGING FOR NETWORK- AND USER EQUIPMENT-IMPLEMENTED CALL REQUEST HANDLING
A system described herein may provide a technique for handling call requests, prior to the performance of a call setup procedure, based on attributes of a calling User Equipment (“UE”) and/or a called UE. A Messaging Application Server may receive a call request, from the calling UE and to the called UE, identify a category or event type associated with the call request, and notify the called UE of the call request, including the category or event type. Different categories or event types may be associated with different sets of eligible actions to perform. The called UE may indicate a particular action, associated with the identified category or event type, and the MAS may handle the call request according to the particular action (e.g., reject the call request or proceed with a call setup procedure).
SYSTEMS AND METHODS FOR QUANTUM SESSION AUTHENTICATION
Systems, apparatuses, methods, and computer program products are disclosed for session authentication and random number generation. An example method includes receiving, by decoding circuitry and over a quantum line, a set of qubits generated based on a first set of quantum bases. The example method further includes decoding, by the decoding circuitry and based on a second set of quantum bases, the set of qubits to generate a decoded set of bits. In this example method, the first set of quantum bases is determined without reliance on the second set of quantum bases and the second set of quantum bases is determined without reliance on the first set of quantum bases. The example method further includes generating, by random number generation circuitry, a number comprising the decoded set of bits.
Web service-based monitoring and detection of fraudulent or unauthorized use of calling service
Novel tools and techniques are provided for implementing web-based monitoring and detection of fraudulent or unauthorized use of voice calling service. In various embodiments, a computing system might receive, from a user device associated with an originating party, a request to initiate a call session with a destination party, the request comprising user information associated with the originating party and a destination number associated with the destination party; might query a database with session data (including user information) to access permission data and configuration data; and might configure fraud logic using received configuration data from the database. The computing system might analyze the session data and permission data using the configured fraud logic to determine whether the originating party is permitted to establish the requested call session with the destination party; if so, might initiate one or more first actions; and, if not, might initiate one or more second actions.
Call authorization and verification via a service provider code
One example method of operation may include receiving a call message associated with a call, determining a service provider network identifier based on a telephone number of a call origination device, identifying, from the call message, an identity header with a link to a public certificate repository storing a public certificate assigned to a service provider network hosting the call origination device, retrieving a service provider code assigned to the service provider network from the public certificate, and determining whether the service provider code matches the service provider network identifier as identified from a verification table.