摘要:
When a failure notification is received that was transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with a communication network, device information, network data, and a user profile associated with the wireless communication device is retrieved and processed to generate a network access score for the wireless communication device. If the network access score exceeds a priority threshold, a priority notification is transferred instructing the service node to bypass the authentication for the wireless communication device. If the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, an access notification is transferred instructing the service node to bypass the authentication for the wireless communication device, and subsequent usage of the wireless communication device is monitored for fraudulent activity. If the network access score does not exceed the legitimate user threshold, a suspect notification is transferred instructing the service node to maintain the authentication for the wireless communication device.
摘要:
A method and system for dynamic selection of user plane or control plane signaling for mobile station location determination. A positioning system receives a request for the location of a mobile station and then makes a determination, based on one or more factors, of whether to employ user plane signaling or control plane signaling to obtain mobile station location data. The factors may include mobile station capability, mobile station call state, mobile station support for user plane signaling, mobile station support for simultaneous voice and data communication, time, precision of requested location, subscriber preference, failure of control plane or user plane signaling, and preference specified by the request, among others. Given the determination, the positioning system then employs the selected signaling mechanism.
摘要:
Embodiments of the present invention provide systems, methods, and computer-readable media for generating a voice characteristic profile based on detected sound components. In embodiments, a call is initiated between a first caller and a second caller. Information communicated during the call is monitored to determine that sound components have been spoken by the first caller. The sound components are determined to be associated with a language dialect. Further, the sound components are stored in association with the first caller. In particular, the sound components are stored in association with the first caller in a voice characteristic profile of the first caller.
摘要:
Computer-readable media and methods are provided for identifying a mobile device as a legitimate subscriber to a communications network or as a clone device. A clone device is not legitimately subscribed to the network but poses as a legitimate device to gain usage of the legitimate mobile device's subscribed services. An application on the legitimate mobile device tracks call detail data for calls of the mobile device. The mobile device has a unique identifier. A network server compares the tracked call detail data against a master list of call detail data for the unique identifier. A mismatch between the mobile device's call detail data and the master list indicates a potential clone. A mobile device using the unique identifier but not providing substantially matching call detail data is identified as a clone. Countermeasures are provided to defeat the clone's usage of the network.
摘要:
Embodiments of the present invention provide systems, methods, and computer-readable media for generating a voice characteristic profile based on detected sound components. In embodiments, a call is initiated between a first caller and a second caller. Information communicated during the call is monitored to determine that sound components have been spoken by the first caller. The sound components are determined to be associated with a language dialect. Further, the sound components are stored in association with the first caller. In particular, the sound components are stored in association with the first caller in a voice characteristic profile of the first caller.
摘要:
A method, system, and medium are provided for identifying participants of video conference sessions. One embodiment of the method includes receiving enhanced video content that identifies one or more participants at a particular location of a video conference session. Each participant may be associated with a mobile device. Video conference participants are identified based on wireless communications from the mobile device, which has an electronic module, that is associated with the corresponding participant. The enhanced video content is displayed on a display screen. Such enhanced video content includes video content captured by a video camera that is aggregated with participant data that provides an indication of at least one participant.
摘要:
Systems, methods, and computer media are provided for preserving network address translation (NAT) state for a wireless device across wireless sessions. In response to a state preservation request received during a first wireless session, a device account is created for the wireless device, the account storing NAT state that defines approved content providers from whom inbound data traffic is permitted for the wireless device. Upon determining that the first wireless session has ended and that the wireless device has established a second wireless session, the stored NAT state for the wireless device is activated such that the NAT state of the first wireless session is preserved for the second wireless session. New unsolicited data traffic from approved content providers received during the second wireless session is subsequently permitted and forwarded to the wireless device.
摘要:
Computer-readable media and methods are provided for utilizing analytics collected by a mobile device to inform a user and to implement rules that instruct the mobile device on handling of calls. Analytics that include data about calls made and received by the mobile device are collected by the mobile device. An application on the mobile device uses the analytics to rank callers and provides the rankings to the user. A rule is received by the mobile device that indicates how to handle inbound and outbound calls based at least on the rankings. The analytics and rules are also useable for promotional purposes and can be shared with other services.
摘要:
Systems, methods, and computer-readable media for facilitating enforcement of PRL restrictions are provided. The method includes receiving a registration request from a user device. The registration request includes a device identifier that identifies the user device and a network identifier that identifies a network selected for use. The device identifier is used to reference a list of networks permitted for use or prohibited for use by the user device. Thereafter, it is determined that the network selected for use by the user device is unauthorized based on a comparison of the network identifier that identifies the network selected for use to the list of networks permitted or prohibited for use by the user device. Based on the determination that the network selected for use by the user device is unauthorized, the user device is prevented from utilizing the selected network for voice or data services.
摘要:
A roaming management computer system comprises a communication interface and a processing system. The communication interface is configured to receive loading thresholds and usage information for each of a plurality of different wireless networks. The processing system is configured to process the loading thresholds and the usage information to determine load balancing requirements for the wireless networks, and process the load balancing requirements to generate preferred roaming lists for wireless communication devices roaming in the wireless networks. The communication interface is further configured to transfer the preferred roaming lists for delivery to the wireless communication devices.