H04M3/42034

Method for authentication, user terminal and authentication server for executing the same

A method for authentication, a user terminal and an authentication server for executing the same are disclosed. An authentication server according to an embodiment disclosed includes a number receiver that receives a number of a user terminal from a callee who has received a call originated from the user terminal, a device authenticator that determines whether to generate an authentication key based on the number of the user terminal received from the callee and a caller number received from the user terminal, and generates the authentication key when it is determined to generate the authentication key, and an authentication key transmitter that transmits the authentication key to the user terminal.

RESPONSE MECHANISM FOR DETECTION OF A FAKED BASE STATION

A device for communicating with a plurality of user equipment in a cellular network comprises a non-transitory memory having instructions and one or more processors in communication with the memory. The one or more processors execute the instructions to receive information regarding a faked base station including an operating frequency, location area code and cell identification of the faked base station, prepare a first message to alert of the faked base station, select the plurality of user equipment that may receive a signal from the faked base station, transmit the first message to alert of the faked base station to the plurality of user equipment and transmit a second message to bar the plurality of user equipment from connecting to the faked base station.

Response mechanism for detection of a faked base station

A device for communicating with a plurality of user equipment in a cellular network comprises a non-transitory memory having instructions and one or more processors in communication with the memory. The one or more processors execute the instructions to receive information regarding a faked base station including an operating frequency, location area code and cell identification of the faked base station, prepare a first message to alert of the faked base station, select the plurality of user equipment that may receive a signal from the faked base station, transmit the first message to alert of the faked base station to the plurality of user equipment and transmit a second message to bar the plurality of user equipment from connecting to the faked base station.

Outgoing Call Management in a Communication Environment with Unified Communication Interfaces
20170244832 · 2017-08-24 ·

A computer-implemented method for managing a billing policy for mobile phone associated with a first phone number corresponding to a first account and a second phone number corresponding to a second account is described herein. The billing policy defines actions performed by the mobile phone to be charged to the first account, and defines actions performed by the mobile phone to be charged to the second account. Charges are allocated to one of the first account and second account based on the billing policy. A user can configured to phone to operate in a private mode, in response to which actions are charged to a default account of the two accounts, and information about the action is not provided to an external entity.

SYSTEMS AND METHODS FOR PROCESSING CALLS
20250047785 · 2025-02-06 ·

Methods and systems are described for processing calls. An example method may comprise receiving a message for establishing a call. Identification information in the message may be compared to screening data. If a match is found, the message may be forwarded to a screening server. The screening server may establish a call based on the session and provide information indicative of a level of trust associated with the call.

Identifying network entities in a peer-to-peer network
09712667 · 2017-07-18 · ·

A method and a system for identifying a network entity within a first communication network, using an entity identification data of the network entity in a second communication network. More particularly but not exclusively, identifying a network entity within a peer-to-peer communication network, using an entity identification data of the network entity in an underlying conventional communication network.

Voicemail management with multi-number phones

A computer-implemented method for managing voicemails includes receiving, at an intermediate server communicatively coupled to a mobile phone associated with a first phone number corresponding to a first contact group and a second phone number corresponding to a second contact group, a request to receive an incoming call associated with a caller phone number. The intermediate server identifies a contact group associated with the request. The identified contact group comprises the first contact group in response to the received request corresponding to the first phone number, and the identified contact group comprises the second contact group in response to the received request corresponding to the second phone number. The intermediate server selects a voicemail setting based on the identified contact group. In response to determining to route the incoming call to voicemail, the voicemail is configured based at least in part on the selected voicemail setting.

Communication device
20170187850 · 2017-06-29 ·

The communication device comprising a voice communication implementer, a ringing mode implementer, a silent mode implementer, an answering machine implementer, and an audio data output implementer.

System and method for interactive voice response unit table-based programming
09691394 · 2017-06-27 · ·

An embodiment provides a modular framework for managing multiple router applications in an interactive voice response (IVR) system. In an embodiment, a single table-driven framework approach is taken in which multiple IVR router applications, including menu/response type call routing applications and/or frequently asked question (FAQ)/response applications, may be managed in a more streamlined fashion. In an embodiment, a menu is presented to the caller. The menu is part of the router application which references information stored in a database, e.g., voice files and grammars, defined in a format, e.g., in table format. An embodiment analyzes the caller's responses against the menu's information to determine the appropriate actions to take and the appropriate data to retrieve. An embodiment also provides a centralized authentication process that may be used for all self-service router applications that require or somehow make use of authentication.

Billing policy management for multi-number phones

A computer-implemented method for managing a billing policy for mobile phone associated with a first phone number corresponding to a first account and a second phone number corresponding to a second account is described herein. The billing policy defines actions performed by the mobile phone to be charged to the first account, and defines actions performed by the mobile phone to be charged to the second account. Charges are allocated to one of the first account and second account based on the billing policy. A user can configured to phone to operate in a private mode, in response to which actions are charged to a default account of the two accounts, and information about the action is not provided to an external entity.