Patent classifications
H04M15/8221
Toll-free numbers metadata tagging, analysis and reporting
A method for predicting fraudulent call activity is provided. The method includes receiving one or more datasets indicating call activity corresponding to a phone number, and analyzing the one or more datasets to identify unusual call activity. The method further includes generating a fraud prediction, based at least in part on the identified unusual call activity, that the phone number will be used for fraud.
SYNCHRONOUS INTERFACING WITH UNAFFILIATED NETWORKED SYSTEMS TO ALTER FUNCTIONALITY OF SETS OF ELECTRONIC ASSETS
Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.
Permission-based controlling network architectures and systems, having cellular network components and elements modified to host permission controlling schemas designed to facilitates electronic peer-to-peer communication sessions methods for use thereof
In some embodiments, a method includes: generating, by a session controlling Internet platform, a personalized Universal Resource Locator link (PURL), including: where the PURL is: communicatively coupled to the permission controlling schema and configured to be utilized to establish a peer-to-peer communication session between a sender computing device and a recipient computing device; where the PURL includes: a domain name associated with the session controlling Internet platform hosting a permission controlling schema, and at least one first identity linked to the recipient computing device; transmitting, by the session controlling Internet platform, the PURL to the recipient computing device; receiving, by the session controlling Internet platform, after the transmitting the PURL to the recipient computing device, a mobile originating communication, having data including: a multi-part multi-functional address signaling sequence, including: a MICRO band part, corresponding to a MICRO band parameter and a MACRO band part.
System and method for providing a network service in a distributed fashion to a mobile device
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.
Message processing for subscriber sessions which stretch over different network domains
A technique for hiding topological information in a message that leaves a trusted network-domain is presented. The message pertains to a subscriber session and comprises a Fully Qualified Domain Name (FQDN) of a message originator. The originator is located in a first network domain, and the message is directed towards a destination in a second network domain. A method aspect comprises the steps of receiving the message, determining the FQDN comprised in the message and determining an identifier associated with the message. The identifier comprises at least one of a subscriber identifier, a session identifier and a destination identifier. Further, the method comprises applying a cryptographic operation on the FQDN and the identifier, or on information derived therefrom, to generate a cryptographic value. The message is then processed by substituting at least a portion of the FQDN with the cryptographic value prior to forwarding the message towards the second network domain.
Content-based routing and rating of messages in a telecommunications network
Systems and methods for automated routing and rating of communication data.
Systems and methods for controlling secure persistent electronic communication account servicing with an intelligent assistant
The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is provided that includes receiving, at an enrollment web portal, enrollment data including: enrollment credentials identifying a user for authentication, a phone number of a mobile device associated with the user, and consent by the user to persistently interact with an account servicing system via SMS texting. The method includes: processing the received enrollment data, authenticating the user responsive to processing the received enrollment data, storing the phone number of the mobile device associated with the user in a phone number data storage, and generating, responsive to the authenticating, a revocable token for persistent access to a natural dialogue module via a SMS texting gateway for the mobile device identified by the phone number.
Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept API calls directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.
SYSTEMS AND METHODS FOR CONTROLLING SECURE PERSISTENT ELECTRONIC COMMUNICATION ACCOUNT SERVICING WITH AN INTELLIGENT ASSISTANT
The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is provided that includes receiving, at an enrollment web portal, enrollment data including: enrollment credentials identifying a user for authentication, a phone number of a mobile device associated with the user, and consent by the user to persistently interact with an account servicing system via SMS texting. The method includes: processing the received enrollment data, authenticating the user responsive to processing the received enrollment data, storing the phone number of the mobile device associated with the user in a phone number data storage, and generating, responsive to the authenticating, a revocable token for persistent access to a natural dialogue module via a SMS texting gateway for the mobile device identified by the phone number.
System and method for providing a network service in a distributed fashion to a mobile device
A mobile virtual network operator is provided. The operator includes a server that is communicatively coupled to a mobile device. The mobile device includes application software provided by the virtual network operator for allowing phone call and data connectivity.