Patent classifications
H04M2215/0164
System and method for identifying unwanted communications using communication fingerprinting
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
System and method for identifying and handling unwanted callers using a call answering system
A method and system for identifying an unwanted caller using a call answering system. The method comprises receiving, by a call records server, information about callers from a plurality of telephony devices and one or more phone number data sources, classifying, by the call records server, one or more of the callers as either wanted or unwanted callers based on the received information, and storing, by the call records server, the received information and the classification of the one or more of the callers into a directory. The method further comprises identifying, by a call answering server, that a call from a given caller from a phone number to a receiving telephony device is from an unwanted caller by searching the directory, and handling, by the call answering server, the call from the given caller according to one or more preferences of the user, the one or more preferences including rejecting the call from the receiving telephony device, playing a recorded message, and disposing of the call.
Adapting Network Policies Based on Device Service Processor Configuration
Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
Enhanced Roaming Services and Converged Carrier Networks with Device Assisted Services and a Proxy
A method performed by a wireless device communicatively coupled to a network system by a wireless access network, the network system including a network element corresponding to a network element destination. The method includes receiving, from the network system, a device policy including a service usage activity classification and information identifying the network element destination, detecting, using the device policy, wireless device traffic associated with service activities, identifying, using the device policy, one or more of the service activities as being included in the service usage activity classification, the service usage activity classification includes side information associated with the one or more identified service activities and collected on the one or more identified service activities, and directing or routing, using the device policy, the side information over the wireless access network based on the information identifying the network element destination.
SYSTEM AND METHOD FOR IDENTIFYING UNWANTED COMMUNICATIONS USING COMMUNICATION FINGERPRINTING
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
Fraud detection on a communication network
A method and corresponding apparatus for automatically detecting and preventing fraudulent calls on a communication network. At least one example embodiment may include collecting CDRs on the communication network for a given time period, aggregating the plurality of call features for each of the collected call detail records by destination number, and utilizing machine learning to generate a decision model for determining if a destination number and/or a call to that destination number may be fraudulent. According to another aspect of the example embodiment, the decision model may be implemented on the communication network to detect and prevent fraudulent calls.
Hierarchical service policies for creating service usage data records for a wireless end-user device
A non-transitory computer-readable storage medium storing one or more machine-executable instructions that, when executed by one or more processors, cause the one or more processors to: determine whether a traffic flow of a wireless end-user device is associated with a first service activity, the traffic flow comprising one or more attempted or successful communications over a wireless access network; if it is determined that the traffic flow is associated with the first service activity, create a first data record, the first data record identifying the first service activity; if it is determined that the traffic flow is not associated with the first service activity, determine whether the traffic flow is associated with a second service activity; and if it is determined that the traffic flow is associated with the second service activity, create a second data record, the second data record identifying the second service activity.
DEVICE ASSISTED CDR CREATION, AGGREGATION, MEDIATION AND BILLING
Device assisted CDR creation, aggregation, mediation and billing is provided. In some embodiments, device assisted CDR creation, aggregation, mediation and billing for a wireless network includes collecting device generated service usage information for one or more devices in wireless communication on the wireless network; and providing the device generated service usage information in a syntax (e.g., a device assisted charging data record (CDR)) and a communication protocol (e.g., 3GPP, 3GPP2, or other communication protocols) that can be used by other network devices to augment or replace network generated service usage information for the one or more devices in wireless communication on the wireless network.
Offline charging of communications services
The disclosed embodiments include a method for offline charging performed by an anchoring node of a telecommunications network. The anchoring node can send a request to an online charging system (OCS), where the request is for online metering of a call by a subscriber of the telecommunications network. The anchoring node may obtain an indication of an exception to the online metering of the call. In response, the anchoring node can perform a default call handling (DCH) procedure to allow the call on the telecommunications network despite an inability to perform the online metering. The anchoring node also generates a modified charging detail record (CDR) that includes an indication of the exception. The anchoring node can then send a message, which includes at least an indication of the modified CDR, to enable a mediation server to perform offline charging for the call.
SYSTEMS AND METHODS FOR SWITCHING ZERO CHARGE CALLERS
Asynchronous and/or synchronous zero charge telephony protocol systems and methods may include an asynchronous signaling switch and/or a call duration time quota from a synchronous charging onset to place and complete a call. A call request is received with a second device mobile address. The asynchronous systems include instructions to automatically modify the mobile address with a routing prefix when the first device has insufficient balance or independent of balance, route to the asynchronous signaling switch based on an associated modified address trunk path, revert to the call signal at the asynchronous signaling switch, and deliver and automatically disconnect the call immediately when the call is completed. The synchronous systems include instructions to automatically set the call duration time quota upon insufficient balance, and deliver and automatically disconnect the call from the second user mobile device when the call is completed and the call duration time quota is exceeded.