Patent classifications
H04W12/12
Detecting fraud using machine-learning and recorded voice clips
A system and method are disclosed for training a machine-learning model to detect characteristics of fraudulent calls. The machine-learning model is trained using audio clips, voice recognition, call handler feedback and general public knowledge of commercial risks to detect and divert fraudulent calls, thereby alleviating the burdens otherwise placed on call center service representatives.
Information processing method and apparatus
An information processing method includes: obtaining, by a data analytics network element, terminal behavioral information of a plurality of terminals; determining, by the data analytics network element, network-side expected terminal behavioral information based on the terminal behavioral information; and sending, by the data analytics network element, the network-side expected terminal behavioral information to a user data management network element.
METHOD AND APPARATUS FOR PROVIDING NOTIFICATION OF DETECTED ERROR CONDITIONS IN A NETWORK
Methods for managing a communication session in a communication network are disclosed. For example, a method includes detecting, by a first endpoint comprising at least one processor, an error condition associated with the communication session, sending, by the first endpoint, a notification of the error condition to a second endpoint that is using a transport layer session and receiving, by the first endpoint, a communication from the second endpoint, proposing a response to the error condition. Another method includes receiving, by a first endpoint comprising at least one processor, a notification of an error condition associated with the communication session, selecting, by the first endpoint, a response to the error condition, and sending, by the first endpoint, a communication to a second endpoint that is using a transport layer session, proposing a response to the error condition.
METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY
A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast message over a broadcast channel. A method for decrypting a broadcast message that is encrypted is also disclosed.
METHOD FOR PROCESSING AN AUTHORIZATION TO IMPLEMENT A SERVICE, DEVICES AND CORRESPONDING COMPUTER PROGRAM
A method for processing, by a processing entity, of an authorization to implement a service and/or access an item. The method includes: reception, from a requesting device, of a request for implementing a service and/or accessing an item; searching for an indicator of dependency from at least one piece of data of said request for implementation; when an indicator of dependency is present, obtaining an authorization from a verification device to implement said service and/or access said item.
TOKEN AND CRYPTOGRAM USING TRANSACTION SPECIFIC INFORMATION
Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.
SYSTEMS AND METHODS FOR DETECTING AND INTERFERING WITH COMPROMISED DEVICES AND UNAUTHORIZED DEVICE RELOCATION IN A COMMUNICATION NETWORK
Systems and methods for detecting and interfering with compromised devices and unauthorized device relocation in a communication network are disclosed. The described embodiments may be deployed in a content delivery network where receivers have been compromised in a manner that renders the conditional access system (CAS) inoperative at controlling the receivers' ability to receive content. In some embodiments, alternate commands not protected by the CAS system may be used to detect hacked devices and interdict same. In some embodiments, service devices in the content delivery network may allow for detection of unauthorized device relocation.
SECURING IDENTITIES OF CHIPSETS OF MOBILE DEVICES
A method of verifying IMEIs and chipset S/Ns of devices within a wireless communication network. The method comprises receiving a request from a device to access the wireless communication network and receiving an international mobile equipment identity (IMEI) and serial number (S/N) from the device, wherein the IMEI and S/N are included on a chipset of the device, and wherein the S/N is the S/N for the chipset. The method further comprises comparing the IMEI and S/N with a database to confirm the authenticity of the IMEI and S/N. Based upon the authenticity of the IMEI and S/N, the request is either granted or not granted for the device to access the wireless communication network.
SECURING IDENTITIES OF CHIPSETS OF MOBILE DEVICES
A method of verifying IMEIs and chipset S/Ns of devices within a wireless communication network. The method comprises receiving a request from a device to access the wireless communication network and receiving an international mobile equipment identity (IMEI) and serial number (S/N) from the device, wherein the IMEI and S/N are included on a chipset of the device, and wherein the S/N is the S/N for the chipset. The method further comprises comparing the IMEI and S/N with a database to confirm the authenticity of the IMEI and S/N. Based upon the authenticity of the IMEI and S/N, the request is either granted or not granted for the device to access the wireless communication network.
IDENTIFICATION OF SOURCES OF MEDIA TRAFFIC THROUGH A NETWORK
A method for identifying one or more unauthorised routes used for the termination of application-to-person (A2P) short message service (SMS) messages to a mobile telecommunications network, and a system for use in performing the method. An application service is stimulated to generate an A2P SMS message, and to send it to a collection point. The message is processed to obtain an identifier identifying a source of the message, and it is determined whether the identifier corresponds to an authorised source of A2P traffic to the network.