H04M3/2281

PRIVILEGED ELECTRONIC COMMUNICATIONS WITH INMATES
20230051388 · 2023-02-16 · ·

Systems and methods for providing secure communication between an inmate and an outside user are disclosed. In various aspects, account information of both the user and the inmate is stored. A message transmission is received from a first device that includes a header portion and an encrypted payload portion. The system verifies that confidential communication between the inmate and the outside user is permitted based on the header portion and the stored account information. Once verified, the message is transmitted to a second device without decrypting the payload portion of the message.

COMPUTER-IMPLEMENTED DETECTION OF ANOMALOUS TELEPHONE CALLS

Computer-implemented detection of anomalous telephone calls, for example detection of interconnect bypass fraud, is disclosed. A telephone call associated with user devices is analyzed remote from the user devices. A first set of multiple features, for example Mel Frequency Cepstral Coefficients, is derived from a call audio stream. The first set is converted to an embedding vector, for example via a model based on a Universal Background Model comprising a Gaussian Mixture Model, which model is preferably configured based on a training plurality of first sets of multiple features derived form a corresponding training plurality of audio streams. Occurrence, or probability of occurrence, of an anomalous telephone call is determined based on the embedding vector, for example via a back-end classifier, such as a Gaussian Backend Model, which classifier is preferably configured based on labels associated with the training plurality of audio streams.

METHODS AND SYSTEMS FOR DETECTING CALL SPOOFING IN A TELECOMMUNICATION NETWORK
20230044205 · 2023-02-09 ·

Embodiments herein disclose methods and systems for detecting call spoofing in a telecommunication network. The system includes a memory , at least one processor , a call spoofing controller connected to the memory and the processor configured to: create a mirror of signaling protocols for an incoming call from first a user device . The call spoofing controller is further configured to determine if a caller phone number belongs to a network operator using a source Internet Protocol (IP) address in an incoming INVITE/Iniytial Address Message (IAM). The call spoofing controller is further configured to determine the incoming call as a spoofed call, if the source IP address does not match a Session Border Controller/Service Switching Point (SBC/SSP) of the network operator.

FRAUD DAMAGE PREVENTION SYSTEM, FRAUD DAMAGE PREVENTION METHOD, CALL PROCESSING SERVER, ENUM / DNS SERVER, AND PROGRAM
20230008581 · 2023-01-12 ·

A fraud damage prevention system (1000) includes a call processing server (20) and an ENUM/DNS server (10). The call processing server (20) includes: a fraud determination requesting unit that transmits a fraud number determination request, to which a call originating number of a call originating device (4) is affixed, to the ENUM/DNS server (10), and that receives the determination result as to whether or not the call originating number is a fraud number; and a fraud prevention processing unit that performs a predetermined fraud damage prevention process. The ENUM/DNS server (10) includes: a storage unit that stores fraud number information (100); and a fraud determination unit that references the fraud number information (100) using the call originating number, determines that the call originating number is a fraud number in the case where a number that is the same as the call originating number is registered, and transmits the determination result to the call processing server (20).

Detecting fraud using machine-learning and recorded voice clips

A system and method are disclosed for training a machine-learning model to detect characteristics of fraudulent calls. The machine-learning model is trained using audio clips, voice recognition, call handler feedback and general public knowledge of commercial risks to detect and divert fraudulent calls, thereby alleviating the burdens otherwise placed on call center service representatives.

Call screening service for detecting fraudulent inbound/outbound communications with subscriber devices

An example method of operation may include one or more of identifying an outbound call placed by a mobile device subscribed to a protected carrier network, determining the outbound call is destined for a destination telephone number that was stored in a call history of the mobile device, determining the destination telephone number is a scam call suspect telephone number based on one or more identified call filter parameters associated with the destination telephone number, and forwarding a scam call notification to the mobile device while the outbound call is dialing the destination telephone number.

AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION
20180007194 · 2018-01-04 · ·

An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.

Machine learning dataset generation using a natural language processing technique

A server can receive a plurality of records at a databases such that each record is associated with a phone call and includes at least one request generated based on a transcript of the phone call. The server can generate a training dataset based on the plurality of records. The server can further train a binary classification model using the training dataset. Next, the server can receive a live transcript of a phone call in progress. The server can generate at least one live request based on the live transcript using a natural language processing module of the server. The server can provide the at least one live request to the binary classification model as input to generate a prediction. Lastly, the server can transmit the prediction to an entity receiving the phone call in progress. The prediction can cause a transfer of the call to a chatbot.

INTERCEPTION FOR ENCRYPTED, TRANSCODED MEDIA
20180013880 · 2018-01-11 ·

Certain embodiments of the invention generally relate to lawful interception of communications for IP Multimedia System-based (IMS-based) voice over IP (VoIP). For example, some embodiments relate to interception of communications including interception for encrypted, transcoded media. A method may include identifying a network node that provides call content interception. The method may also include determining a codec type used at a location of the call content interception at the network node. The method may further include sending a matched codec of the codec type used at the location of the call content interception at the network node to a delivery function in the communications network.

Method and device for managing incoming calls in a communication terminal

A method for managing an incoming call in a communication terminal is described, the incoming call having an associated call identifier. The method can comprise checking the routing of an outgoing call to the call identifier associated with the incoming call, and classifying the incoming call on the basis of the result of the checking of the routing, the incoming call being classified as a malicious incoming call if the checking of the routing reveals that the outgoing call is not able to be routed. The method can be used, for example, to detect malicious calls or spam.