Patent classifications
H04L65/1104
NUISANCE CALL COUNTERMEASURE APPARATUS, METHOD AND PROGRAM
A spam call prevention apparatus 11 includes: a response unit 111 configured to convey, to a phone terminal of a sender of a call, a response that, in a case where the call from the sender is evaluated as a spam or a fraud by a receiver of the call, the sender is billed a sum of money corresponding to a probability of being evaluated as the spam or the fraud; a notification unit 112 configured to notify, when the sender has requested, in responding to the response, the call to the receiver, a phone terminal of the receiver of a request for returning an evaluation result of evaluating the call from the sender after the call between the sender and the receiver has ended; and a determination unit 114 configured to determine, when the call from the sender has been evaluated as the spam or the fraud in the evaluation result, the sum of money corresponding to the probability of being evaluated as the spam or the fraud, as a sum of billing.
SESSION RECOVERY FROM DEDICATED BEARER FAILURE
Techniques and systems for recovering a communication session from a dedicated bearer failure are disclosed. For example, a P-CSCF node can determine that a dedicated bearer associated with a communication session has failed, and, in response, send a SIP message to a UE associated with the communication session, the SIP message causing the UE to refrain from sending SIP requests using a SIP INVITE method. The process may further include identifying a first network node associated with an identifier of the UE, the first network node comprising one of a PGW or a SMF, and sending an instruction to the first network node to dissociate the dedicated bearer from the communication session. This causes a new attach procedure to be performed by the UE to recover the session without session failure.
SESSION RECOVERY FROM DEDICATED BEARER FAILURE
Techniques and systems for recovering a communication session from a dedicated bearer failure are disclosed. For example, a P-CSCF node can determine that a dedicated bearer associated with a communication session has failed, and, in response, send a SIP message to a UE associated with the communication session, the SIP message causing the UE to refrain from sending SIP requests using a SIP INVITE method. The process may further include identifying a first network node associated with an identifier of the UE, the first network node comprising one of a PGW or a SMF, and sending an instruction to the first network node to dissociate the dedicated bearer from the communication session. This causes a new attach procedure to be performed by the UE to recover the session without session failure.
Call protect geolocator display for 5G or other next generation network
Call spoofing can be mitigated by providing geolocation information to the called device. For example, when a call rings, a geolocator can be invoked and the incoming call display screen can show a carrier logo and/or a geolocator globe illustrating the location of the call originator. The geolocation session initiation protocol data can be confirmed by a network device and compared against carrier specific data of the calling device to authenticate voice calls for called devices. In one embodiment location data of the calling device can purposely be shared in order to facilitate the mitigation of call spoofing.
Call protect geolocator display for 5G or other next generation network
Call spoofing can be mitigated by providing geolocation information to the called device. For example, when a call rings, a geolocator can be invoked and the incoming call display screen can show a carrier logo and/or a geolocator globe illustrating the location of the call originator. The geolocation session initiation protocol data can be confirmed by a network device and compared against carrier specific data of the calling device to authenticate voice calls for called devices. In one embodiment location data of the calling device can purposely be shared in order to facilitate the mitigation of call spoofing.
Method for setting up a WebRTC session
Some embodiments relate to a method implemented by a first terminal for setting up a session with a second terminal. An identifier of a session server is obtained at least from a subscriber device in the first terminal which comprises a subscriber identifier and an operator identifier. A session request and an identifier of the second terminal are sent to the server. At least one instruction is received from the server and a message comprising a first set, relative to the first terminal, of at least one characteristic parameter of the requested session is generated in accordance with at least one instruction received and sent to the server. A message is received from the server comprising a second set of at least one characteristic parameter of the requested session, the second set relating to the second terminal and having a non-zero overlap with the first set.
SYSTEMS AND METHODS FOR PROCESSING CALLS
Methods and systems are described for processing calls. An example method may comprise receiving a message for establishing a call. Identification information in the message may be compared to screening data. If a match is found, the message may be forwarded to a screening server. The screening server may establish a call based on the session and provide information indicative of a level of trust associated with the call.
DETECTING, VERIFYING, AND PREVENTING UNAUTHORIZED USE OF A VOICE OVER INTERNET PROTOCOL SERVICE
A computer-implemented method, a computer program product, and a computer system for detecting, verifying and preventing unauthorized use of a Voice over Internet Protocol (VoIP) service. A computer rates a VoIP call based on a database including information of the caller number, in response to determining that no record of a caller number exists in a database including the information of unauthorized uses. The computer sets a predetermined time period for the VoIP call based on a rating of the VoIP call, adds the predetermined time period to a session initiation protocol (SIP) invite, and connects the VoIP call to a called party. In response to that the predetermined time period is reached, the computer interrupts the VoIP call and prompts the caller to conduct user verification. In response to that the caller is successfully verified, the computer reconnects the VoIP call to the called party.
DETECTING, VERIFYING, AND PREVENTING UNAUTHORIZED USE OF A VOICE OVER INTERNET PROTOCOL SERVICE
A computer-implemented method, a computer program product, and a computer system for detecting, verifying and preventing unauthorized use of a Voice over Internet Protocol (VoIP) service. A computer rates a VoIP call based on a database including information of the caller number, in response to determining that no record of a caller number exists in a database including the information of unauthorized uses. The computer sets a predetermined time period for the VoIP call based on a rating of the VoIP call, adds the predetermined time period to a session initiation protocol (SIP) invite, and connects the VoIP call to a called party. In response to that the predetermined time period is reached, the computer interrupts the VoIP call and prompts the caller to conduct user verification. In response to that the caller is successfully verified, the computer reconnects the VoIP call to the called party.
Location updates for call routing decisions
A server is configured to provide data communications services to a plurality of endpoint devices. Geolocation information identifying a first geographic location of the particular endpoint device is received at the server and from an application running on an endpoint device. A second geographic location for an IP address is compared to the first geographic location. In response to a mismatch between the compared geographic locations, a location database is modified to include an entry specifying that the particular endpoint device is located at the first geographic location. For an outgoing telephone call from the endpoint device, the modified entry is used to select a telephone carrier. The outgoing telephone call is routed using the selected telephone carrier.