Abstract:
One example method of operation may include receiving a call message associated with a call, determining a service provider network identifier based on a telephone number of a call origination device, identifying, from the call message, an identity header with a link to a public certificate repository storing a public certificate assigned to a service provider network hosting the call origination device, retrieving a service provider code assigned to the service provider network from the public certificate, and determining whether the service provider code matches the service provider network identifier as identified from a verification table.
Abstract:
One example method of operation may include identifying a call from a calling device destined for a mobile device, responsive to identifying a calling device number assigned to the calling device, accessing a call content application programming interface (API), operated by a content delivery device, configured to deliver to the mobile device a first caller identification name (CNAM) or a second CNAM, assigned to the calling device number, determining a context assigned to a mobile device number assigned to the mobile device, selecting one of the first CNAM and the second CNAM based on the context, and assigning the selected CNAM to the call.
Abstract:
One example method of operation may include identifying a call from a calling device destined for a mobile device, identifying a calling device number associated with the calling device and a mobile device number associated with the mobile device, determining whether a stored calling relationship exists between the calling device number and the mobile device number, and appending one of a plurality of caller identification names (CNAM) to the call based on the determination as to whether there is a stored calling relationship.
Abstract:
One example method of operation may include collecting call metric data over a predefined period of time for identified calls, querying the call metric data to identify whether one or more call filtering criteria parameters require changes, determining one or more call filtering criteria parameters require changes based on a deviation from one or more expected call metric data values included in the call metric data, modifying one or more of the call filtering criteria parameters, and updating an active call scam model stored on a call processing server based on the one or more call filtering parameters.
Abstract:
One example method of operation may include determining a call received from a calling party and intended for a subscriber device has an elevated likelihood of being a scam call, determining a percentage of calls over a current period of time being filtered as scam calls by a carrier server, when the percentage of calls being filtered as scam calls during the current period of time is above a call threshold percentage, retrieving call history information associated with a subscriber profile of the subscriber device, identifying one or more call patterns from the call history information of the subscriber profile corresponding to the received call, and determining whether to permit the received call based on the identified one or more call patterns.
Abstract:
One example method of operation may include initiating a call via a calling device to a mobile device via a mobile device telephone number, responsive to initiating the call, retrieving call content data associated with a calling device profile, forwarding the call content data, via a content provider device, to the mobile device prior to establishing the call, hashing the mobile device telephone number to create a hashed value, storing the hashed value in the content provider device, authorizing the mobile device to receive the call content data, receiving a token representing the hashed value from the mobile device via the content delivery device, and connecting the call to the mobile device responsive to the token being authenticated.
Abstract:
The present disclosure describes a system, method, and computer readable medium for providing information to a receiving party in a communications network. The method includes receiving a message from a sending party and performing a lookup of information relating to the sending party in a database via an Internet Protocol connection. The lookup is based on an identifier of at least one of the sending party and the receiving party. Subsequently, the information is provided to the receiving party based on the availability of the information in the database.
Abstract:
One example method of operation may include receiving one or more data messages, identifying calls and corresponding call data from the one or more messages, identifying call parameters from the call data, applying a call activity filter criteria to the call parameters to identify a suspect sub-set of the call parameters which indicate an elevated likelihood of call scam, forwarding the call parameters and the suspect sub-set of call parameters to one or more call data tables, and assigning one or more scam designation threshold scores to the suspect sub-set of the call parameters in the one or more call data tables.
Abstract:
One example method of operation may include identifying call data associated with a received call, identifying call parameters from the call data, and the call parameters include one or more call routing parameters associated with call routing of the call and one or more call session parameters associated with a call session of the call, assigning weights to one or more of the call routing parameters and the call session parameters, determining a scam score for the call based on a sum of the weights applied to the call routing parameters and the call session parameters, and blocking the call when the scam score is greater than or equal to a predetermined threshold scam score.
Abstract:
The present invention is directed to methods for a called party to report unwanted telephone calls to jurisdictional authorities. These calls may be unwanted, unlawful, or other calls. In the methods of the present invention, the called party dials a code comprised of a series of digits, which triggers the switching node associated with the called party to generate a series of messages, at least one of which encompasses the originating telephone number of the unwanted call. At least one of the messages is directed to the proper reporting authority such that the called party reports the unwanted event. Called parties can take further actions, such as including additional messaging or blocking subsequent calls from the calling party number. The reporting authority can take further action as well, such as matching the called party number with subscriber or geographic information.