Patent classifications
H04M3/42297
Techniques for managing an aging telephone number before returning to active service
Techniques are described for managing out of service telephone numbers (TNs) before returning them to active service. A telephone number profile score may be calculated for an out of service TN entering an aging protocol, the aging protocol comprising a pre-determined number of days the TN must remain out of service. The out of service TN may then be assigned a profile based on its telephone number profile score, the profile indicative of how quickly the TN will achieve one or more quality thresholds. The number of days from entry into the aging protocol it will take the TN to achieve the one or more quality thresholds based on its assigned profile may be determined. The quality threshold status of the TN may then be updated each time it crosses one of the quality thresholds. Once it completes the aging process, the TN may be placed into an inventory of TNs eligible for active service. Thereafter, the quality threshold status of the TN may continue to be updated each time it crosses one of the quality thresholds.
RELAY SERVER, RELAY METHOD AND RELAY PROGRAM
A relay server 31 includes: a detection unit 31A that detects a failure of a subscriber server 21; and a relay unit 31B that relays call connection requests 51, 52, and 53 to another network in which corresponding subscribers may possibly be accommodated according to connection attempt network information indicating networks to attempt a call connection, when a failure of the subscriber server 21 is detected by the detection unit 31A.
NUMBER MANAGEMENT SYSTEM, NUMBER MANAGEMENT METHOD, NUMBER MANAGEMENT DEVICE AND NUMBER MANAGEMENT PROGRAM
A number management unit (11) of a number management system (1) generates a transaction using number portability information including a hashed telephone number and connection destination information, newly generates and approves a block using multiple transactions, and stores the block in a number database (13) as a blockchain. A number resolution unit (12) hashes a telephone number that is a query target using a hash function, searches transactions in a blockchain using the hashed telephone number as a key, and sends connection destination information corresponding to the telephone number that is the query target as a response.
MAINTAINING ACCESS TO SERVICES VIA SIM CARD
Implementations of the subject technology provide for storing a temporary certificate on a mobile device for accessing services in association with a primary number. A device determines that a first subscriber identity module (SIM) card, previously used by the device, is not available for use by the device. The device determines that a second SIM card is available for use by the first device within a predetermined time period after the first SIM card is determined to be not available for use by the device. The device confirms that a communication identifier of the first SIM card is strongly tied to a user account associated with the device. The device stores a temporary certificate that attests to continued ownership of the communication identifier by the device and allows the device to access at least one service in association with the communication identifier.
Method and system for identification of a remote host in an out-of-band verification network
A system detects abnormalities in a call signal indicative of call fraud. The system includes a first device situated in an originating call network and configured to send call signals to a second device situated in a terminating call network. The first device is coupled to a first registry to which it sends the call data from the sent signals for storage as originating call records. The second device is coupled to a second registry to which it sends the call data from the received signals for storage as terminating call records. The first and second registries exchange verification requests and responses to detect whether discrepancies exist between the stored originating call records in the first registry and stored terminating call records in the second registry. The registries generate alerts based on detected discrepancies, which may be used by the devices to block the call fraud.
Method and a SIP proxy for managing calls in a voice over SIP network
A method is provided of managing calls in a voice over IP network, and is performed by a SIP proxy. The method includes receiving a registration request issued by a voice over IP terminal to register with the SIP proxy, obtaining from a database the address of at least one voice over IP platform associated with the voice over IP terminal, registering the SIP proxy with a said voice over IP platform, and sending a request to a number portability server suitable for managing incoming calls to said voice over IP terminal, the request requesting the server to associate the telephone number of the voice over IP terminal with a routing prefix associated with the voice over IP platform.
METHOD AND SYSTEM FOR DETERMINING A MOBILE NETWORK OPERATOR IDENTIFIER
The invention concerns a method and system for determining a mobile network operator identifier in relation to a mobile device subscriber number and a telecommunications network event, the telecommunications network event comprising a call set-up initiated by a first mobile device having an associated first mobile device subscriber number to connect to a second mobile device having a second mobile device subscriber number, the call set-up comprising sending a request to a portability server, the portability server sending a response formatted according to a predetermined format depending on a type of cellular technology. The determination comprises analyzing the response and extracting an identifier of the mobile network operator associated to the second mobile device subscriber number, and storing, in a dedicated storing structure, an association between the mobile network operator identifier and the second mobile device subscriber number of the second mobile device.
Maintaining access to services via SIM card
Implementations of the subject technology provide for storing a temporary certificate on a mobile device for accessing services in association with a primary number. A device determines that a first subscriber identity module (SIM) card, previously used by the device, is not available for use by the device. The device determines that a second SIM card is available for use by the first device within a predetermined time period after the first SIM card is determined to be not available for use by the device. The device confirms that a communication identifier of the first SIM card is strongly tied to a user account associated with the device. The device stores a temporary certificate that attests to continued ownership of the communication identifier by the device and allows the device to access at least one service in association with the communication identifier.
Communication failover and load balancing method
A system comprising a communication activity detecting device, a network selector, and a network control memory structure that operate to detect anomalous communication activity and, in response, send a routing control to a location routing number control memory structure to alter a location routing number, which results in communication activity switching from a first network to a second network. A method including receiving a network switch control to switch communication activity from a first network to a second network, selecting the second network from one or more networks to route the communication activity, and sending a routing control to a location routing number control memory structure. The routing control may include instructions to alter a first location routing number to a second location routing number associated with the second network.
RISK ASSESSMENT AND RESOLUTION FOR END DEVICE PORTING AND ACTIVATION
A method, a device, and a non-transitory storage medium are described in which an onboarding risk assessment and remedial service is provided. The service may identify users that are having difficulty in completing an onboarding procedure and may be wasting end device and/or network device resources due to unsuccessful attempts to complete the onboarding procedure. The service may calculate an onboarding risk value to identify certain users that are having the difficulty. The service may calculate the onboarding risk value based on calculated criteria values pertaining to an incomplete onboarding procedure. The service may identify potential root causes of errors that may occur during the incomplete onboarding procedure. The service may perform remedial procedures to correct the errors and facilitate the successful completion of the onboarding procedure.