Patent classifications
H04W12/062
Call content management for mobile devices
One example method of operation may include identifying a plurality of mobile device telephone numbers associated with a plurality of mobile devices, forwarding the plurality of mobile device telephone numbers to a content delivery device, hashing the plurality of mobile device telephone numbers, storing the hashed plurality of mobile device telephone numbers in the content delivery device, identifying a scheduled call campaign to the plurality of mobile devices, forwarding call content associated with schedule call campaign to the plurality of mobile devices prior to calling the plurality of mobile devices, and responsive to receiving confirmation that the content was successfully forwarded to the plurality of mobile devices, initiating a calling device to begin calling the plurality of mobile devices.
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
Systems and methods for facilitating network voice authentication
Systems and methods are provided for facilitating voice authentication of a user in connection with a network transaction. One exemplary method includes receiving an authentication request for a transaction, initiated at a voice interactive device, from a merchant plug-in (MPI) associated with a merchant involved in the transaction, where the authentication request includes a pre-authentication indicator based on voice authentication of a user by the voice interactive device or by a voice authentication service. The method also includes generating a risk score for the transaction based at least in part on the pre-authentication indicator, transmitting the risk score with the authentication request for the transaction to an access controller server (ACS) associated with an issuer of an account to which the transaction is directed, and returning a result response to the MPI where the result response indicates permission to proceed in the transaction based on authentication of the user.
USING A PSEUDONYM FOR ACCESS AUTHENTICATION OVER NON-3GPP ACCESS
Apparatuses, methods, and systems are disclosed for using a pseudonym for access authentication over non-3GPP access. One apparatus includes a processor and a transceiver that communicates with a mobile communication network using a 3GPP access network and a non-3GPP access network. The processor sends a registration message to a first network function in the mobile communication network via the 3GPP access network, the first authentication message comprising a first indicator and a SUCI for the apparatus, wherein the first indicator comprises an indication that the apparatus has the capability for access authentication for non-3GPP access in an EPS. The processor receives a first identity pseudonym for the apparatus in response to the registration message comprising the first indicator and performs access authentication via a non-3GPP access network using the first identify pseudonym.
USING A PSEUDONYM FOR ACCESS AUTHENTICATION OVER NON-3GPP ACCESS
Apparatuses, methods, and systems are disclosed for using a pseudonym for access authentication over non-3GPP access. One apparatus includes a processor and a transceiver that communicates with a mobile communication network using a 3GPP access network and a non-3GPP access network. The processor sends a registration message to a first network function in the mobile communication network via the 3GPP access network, the first authentication message comprising a first indicator and a SUCI for the apparatus, wherein the first indicator comprises an indication that the apparatus has the capability for access authentication for non-3GPP access in an EPS. The processor receives a first identity pseudonym for the apparatus in response to the registration message comprising the first indicator and performs access authentication via a non-3GPP access network using the first identify pseudonym.
Communication Method, Apparatus, and System
A communication method and apparatus are provided, to implement automatic onboarding when no network-side information is configured on a terminal device. The method includes: The terminal device obtains auxiliary authentication information that includes identification information of one or more networks; determines access information of a first network based on first temporary authentication information and identification information of the first network, where the first network is any one of the one or more networks; triggers mutual temporary authentication with the first network based on the access information of the first network; and receives configuration information of the first network from the first network when the mutual temporary authentication succeeds. The terminal device may trigger the mutual temporary authentication with the first network based on the access information of the first network.
CONNECTION OF NETWORK MEMBERS
A system includes a database to provide access to stored user profile information about a first user using a respective first mobile communications device and a second user profile, using a respective second mobile communications device. A computing device is to receive a unique member identifier from all communications devices from all users who are members of the network to associate with profiles and authenticate when users sign into a user account; send to the second mobile communications device, an invitation to accept or reject an invitation to connect to the first user including receiving personal attribute information from, or sharing personal attribute information with, the first user; receive, from the second user, an acceptance of the invitation to connect to the first user; and connect the first user and the second user through the computing device for personal communication between first user and the second user.