Patent classifications
H04M7/0093
METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING EVENTS, AND PARTICIPANTS
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
CONTROL INFORMATION FOR PUBLIC SWITCHED TELEPHONE NETWORK (PSTN) USING BLOCKCHAIN SYSTEM
Signaling system for public switched telephone network (PSTN) using a blockchain system. In one embodiment, a method is provided. The method includes determining that a phone call related operation between a first telecommunications operator and a second telecommunications operator has been requested. A public switched telephone network (PSTN) comprises the first telecommunications operator and the second telecommunications operator. The method also includes updating, by a node of a blockchain system, a distributed ledger to indicate that the phone call related operation between the first telecommunications operator and the second telecommunications operator has been requested. The method further includes analyzing the distributed ledger to determine if the phone call related operation has been approved. The method further includes proceeding with the phone call related operation in response to determining that the phone call related operation has been approved.
SYSTEMS AND METHODS FOR IMPROVING ROUTING OF COMMUNICATIONS TO EMERGENCY SERVICES
Systems and techniques for routing emergency communications to appropriate public safety answering points (PSAPs) based on location information associated with the communications are provided. Currently, only imprecise location information is available for call routing, and retrieving the imprecise location information requires a slow, expensive query to an automatic location identification (ALI) database. The present disclosure obtains location information that can be used for routing without performing the query to the ALI database, and also incorporates the use of precise location information available from mobile device providers (when available). Similar techniques for routing other types communications to other destination devices based on location information are also disclosed.
Method and apparatus for threat identification through analysis of communications signaling events, and participants
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
Systems and methods for improving routing of communications to emergency services
Systems and techniques for routing emergency communications to appropriate public safety answering points (PSAPs) based on location information associated with the communications are provided. Currently, only imprecise location information is available for call routing, and retrieving the imprecise location information requires a slow, expensive query to an automatic location identification (ALI) database. The present disclosure obtains location information that can be used for routing without performing the query to the ALI database, and also incorporates the use of precise location information available from mobile device providers (when available). Similar techniques for routing other types communications to other destination devices based on location information are also disclosed.
Method and apparatus for threat identification through analysis of communications signaling, events, and participants
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS ISGNALING EVENTS, AND PARTICIPANTS
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.
Method and apparatus for inter-carrier communications
Aspects of the subject disclosure may include, for example, receiving, from a private telephone number mapping server, a first database comprising address records associated with subscriber devices of a first carrier, storing, at an inter-carrier server system, an inter-carrier mapping database comprising the address records converted to an inter-carrier format, receiving new address records associated with new subscriber devices registered with the first carrier, updating the inter-carrier mapping database with the address records converted to the inter-carrier format, receiving a first query for an address record associated with a called number of a first device of the first carrier for initiating an internet protocol call between the first device and a second device of the second carrier, querying the inter-carrier mapping database of the inter-carrier server system for the address record, and transmitting the address record to the second carrier for routing the internet protocol call. Other embodiments are disclosed.
Hierarchical decoupling, integrated and open communication open system
A hierarchical decoupling, integrated and open communication open system includes a large communication network, a Yunxi platform, and a customer, which are communicatively connected to one another, wherein the Yunxi platform includes a service application layer, a communication capability layer and a resource pool, which are communicatively connected to one another, the large communication network, the communication capability layer and the customer are communicatively connected to one another, and the service application layer is communicatively connected to the customer. The present invention innovates decentralized communication service provision methods, further integrate communication capabilities, encapsulate communication scenarios into flexible and easy-to-use communication modules, and provide a unified and convenient service interface, thereby lowering a user-side access threshold, and deeply integrating communication capabilities with application scenarios of government and enterprise customers.
METHOD AND APPARATUS FOR THREAT IDENTIFICATION THROUGH ANALYSIS OF COMMUNICATIONS SIGNALING, EVENTS, AND PARTICIPANTS
Aspects of the invention determining a threat score of a call traversing a telecommunications network by leveraging the signaling used to originate, propagate and terminate the call. Outer-edge data utilized to originate the call may be analyzed against historical, or third party real-time data to determine the propensity of calls originating from those facilities to be categorized as a threat. Storing the outer edge data before the call is sent over the communications network permits such data to be preserved and not subjected to manipulations during traversal of the communications network. This allows identification of threat attempts based on the outer edge data from origination facilities, thereby allowing isolation of a compromised network facility that may or may not be known to be compromised by its respective network owner. Other aspects utilize inner edge data from an intermediate node of the communications network which may be analyzed against other inner edge data from other intermediate nodes and/or outer edge data.