H04M2207/12

METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS
20230007120 · 2023-01-05 · ·

Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.

TELECOMMUNICATIONS CALL VALIDATION PLATFORM

A method for generating a list of telecommunication identifiers is provided. The method includes interpreting, via at least one processor, telecommunications data including available telecommunication identifiers, assigned telecommunication identifiers, in-use telecommunication identifiers, and disconnected telecommunication identifiers. The method further includes generating the list based at least in part on the telecommunications data, wherein the list includes telecommunication identifiers that are a subset of the available telecommunication identifiers. The method further includes transmitting the list.

Callback Notification From Devices With Insufficient Credit For Communication
20170331946 · 2017-11-16 · ·

A method and a callback notification system (CNS) are provided for sending a missed call ring alert (MCRA) from a source number to a destination number. The CNS receives communication information from a calling party device (CGPD) or a network thereof, when an unsuccessful communication attempt is made by the CGPD to contact a called party device (CDPD), and places a call to the destination number with an identification of an originator of the call as the source number using the communication information. The CNS identifies a ring of the CDPD when the call successfully reaches the destination number and terminates the call before chargeable completion of the call, thereby sending an MCRA from the source number of the CGPD to the destination number of the CDPD. The CNS sends one or more alternative callback notifications to the destination number, concurrently with the MCRA or if the MCRA is unsuccessful.

Call recording in a telecommunications network

A method of recording media transmitted to or from a first party communicating through one of a plurality of mobile telecommunications networks with a second party is described. Either the first party or the second party initiates a call with the other party. One of a set of call splitters distributed through the plurality of telecommunications networks is then determined to be a local call splitter to one of the parties. A connection is then established between the first party and the local call splitter to split the call into a recording part and a call part. The call part is routed between the first party and the second party via the call splitter to provide transmission of media between the first party and the second party, and the recording part is provided by the local call splitter to a recording service associated with the first party. Suitable apparatus is also described, as are methods for recording the calls of a subscriber to a central recording station using a network trigger set or a SIM application set to divert the call to a recording node.

System and method for provision of an advanced network function to a device

Enhanced capabilities within a telephone network are made accessible to a telecommunications device. The telecommunications device is used to dial a sequence. A network server receives and identifies the sequence invokes an advanced network function. A advanced network function server in communication with the network server provides instructions as to how the network server is to provide the advanced network function. The network server processes the call in accordance with the received instructions to provide the particular advanced network function.

SYSTEMS AND METHODS FOR OBTAINING A SUBSCRIBER IDENTITY FOR AN EMERGENCY CALL

In some implementations, an internet protocol multimedia subsystem (IMS) may receive a device identity of the user device as part of an emergency call. The IMS may transmit the device identity to an emergency call server (ECS). The IMS may receive, from the ECS, a subscriber identity of the user device. The IMS may transmit the subscriber identity to a public safety answering point (PSAP) through a next generation core services (NGCS) network that uses a Stir and Shaken protocol. The emergency call is then established with a true subscriber identity of the user device.

SYSTEMS AND METHODS FOR SWITCHING ZERO CHARGE CALLERS
20220030398 · 2022-01-27 ·

Asynchronous and/or synchronous zero charge telephony protocol systems and methods may include an asynchronous signaling switch and/or a call duration time quota from a synchronous charging onset to place and complete a call. A first device call request is received with a second device mobile address. The asynchronous systems include instructions to automatically modify the mobile address with a routing prefix when the first device has insufficient balance or independent of balance, route to the asynchronous signaling switch based on an associated modified address trunk path, revert the modified call signal at the asynchronous signaling switch to the call signal, and deliver and automatically disconnect the call immediately when the call is completed. The synchronous systems include instructions to automatically set the call duration time quota upon insufficient balance, and deliver and automatically disconnect the call from the second user mobile device when the call is completed and the call duration time quota is exceeded.

Systems and methods for switching zero charge callers
11622248 · 2023-04-04 · ·

Asynchronous and/or synchronous zero charge telephony protocol systems and methods may include an asynchronous signaling switch and/or a call duration time quota from a synchronous charging onset to place and complete a call. A first device call request is received with a second device mobile address. The asynchronous systems include instructions to automatically modify the mobile address with a routing prefix when the first device has insufficient balance or independent of balance, route to the asynchronous signaling switch based on an associated modified address trunk path, revert the modified call signal at the asynchronous signaling switch to the call signal, and deliver and automatically disconnect the call immediately when the call is completed. The synchronous systems include instructions to automatically set the call duration time quota upon insufficient balance, and deliver and automatically disconnect the call from the second user mobile device when the call is completed and the call duration time quota is exceeded.

SYSTEM AND METHOD FOR PROVISION OF AN ADVANCED NETWORK FUNCTION TO A DEVICE

Enhanced capabilities within a telephone network are made accessible to a telecommunications device. The telecommunications device is used to dial a sequence. A network server receives and identifies the sequence invokes an advanced network function. A advanced network function server in communication with the network server provides instructions as to how the network server is to provide the advanced network function. The network server processes the call in accordance with the received instructions to provide the particular advanced network function.

Method and apparatus for threat identification through analysis of communications signaling events, and participants
11445060 · 2022-09-13 · ·

Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.