SYSTEMS AND METHODS FOR PROVIDING CALLING PARTY INFORMATION

    公开(公告)号:US20240430356A1

    公开(公告)日:2024-12-26

    申请号:US18753691

    申请日:2024-06-25

    Applicant: Neustar, Inc.

    Abstract: System and methods for providing calling party information are disclosed. In one implementation, a server for providing calling party information includes one or more processors configured to receive a query for calling party information from a carrier. The query includes an identifier associated with the calling party. The processors are further configured to determine a score based on one or more previously obtained queries, generate the calling party information based on the score, and transmit the calling party information to the carrier. The carrier transmits the calling party information to a device associated with the called party as a Caller ID Name (CNAM).

    DATABASE LOCKING USING LOGICAL LOCK MECHANISM

    公开(公告)号:US20240303220A1

    公开(公告)日:2024-09-12

    申请号:US18613552

    申请日:2024-03-22

    Applicant: NEUSTAR, INC.

    Inventor: Edward F. BARKER

    CPC classification number: G06F16/13 G06F16/2343

    Abstract: Systems and methods for locking databases during database operation, such a logical mechanisms for locking a local number portability (LNP) database associated with the Number Portability Administration Center (NPAC), are described. For example, the systems and methods may utilize various logical constructs, such as parameters that identify items or records within a database (e.g., object type and value information). and lock records that include such paramters.

    End-to-end management of authenticated communications

    公开(公告)号:US12052386B2

    公开(公告)日:2024-07-30

    申请号:US18161539

    申请日:2023-01-30

    Applicant: NEUSTAR, INC.

    CPC classification number: H04M3/42042 H04M3/382

    Abstract: Disclosed herein are systems and methods for providing mobile call authentication. For instance, a token indicative of a call request can be received from a calling party. The token can include a called party number and a time of the request. A subscriber database can be accessed to determine identifying information associated with the calling party based at least in part on the token. The token can be authenticated based at least in part on the identifying information and using one or more predefined authentication protocols. The token can be stored in a call session registry storing data indicative of a plurality of active telephone call events. A verification request for the call request can be received from the called party. The call request can be verified based at least in part on the token. The called party can be notified that the call request has been verified.

    SYSTEMS AND METHODS FOR PROVIDING CONTEXT DATA ASSOCIATED WITH A COMMUNICATIONS SESSION TO THE CALLED DEVICE

    公开(公告)号:US20240236231A1

    公开(公告)日:2024-07-11

    申请号:US18539905

    申请日:2023-12-14

    Applicant: Neustar, Inc.

    CPC classification number: H04M3/42068 H04L67/535 H04M3/5191

    Abstract: Systems and methods for providing called devices with sets of context data associated with communication sessions are disclosed. In one implementation, a method for generating context data associated with a communications session may include receiving, from a calling device at a first subsystem, a request to establish a communications session. The request may include a first identifier associated with the calling device. The method may further include receiving, at a second subsystem, activities data associated with the calling device that transmitted the request to establish the communications session. The activities data may include a second identifier associated with the calling device and may be indicative of device activities of the calling device. In addition, the method includes determining, using the first identifier and the second identifier, that the received activities data is associated with the calling device that transmitted the request to establish the communications session, generating context data associated with the communications session based on the received activities data, generating visual content based on the generated context data, and establishing the communications session in response to receiving, from a user of the called device, an input command to accept the request.

    Systems And Methods For Enabling Trusted Communications Between Controllers

    公开(公告)号:US20230388131A1

    公开(公告)日:2023-11-30

    申请号:US18325385

    申请日:2023-05-30

    Applicant: Neustar, Inc.

    Inventor: Brian R. KNOPF

    Abstract: Systems and methods are described that enable trusted communications between two entities. In one implementation, a controller of a vehicle may include one or more processors configured to receive data and a controller signature from a second controller of the vehicle. The controller signature may be generated based on at least a first portion of the data. The one or more processors may be further configured to transmit the data and the controller signature to a gateway of the vehicle and receive a gateway signature from the gateway. The gateway signature may be generated based on at least a second portion of the data and transmitted to the controller after the gateway verified the controller signature. In addition, the one or more processors may be configured to verify the gateway signature and process the data.

    SYSTEMS AND METHODS FOR VERIFYING A ROUTE TAKEN BY A COMMUNICATION

    公开(公告)号:US20220231859A1

    公开(公告)日:2022-07-21

    申请号:US17460837

    申请日:2021-08-30

    Applicant: Neustar, Inc.

    Abstract: Computer systems and methods for verifying a route taken by a communication are disclosed. In one implementation, a device for verifying a route taken by a communication may include one or more processors configured to obtain a communication transmitted by a source entity. The communication may include data and digital signatures, and each of the digital signatures may be generated based on at least the data. Further, the digital signatures may include a digital signature associated with the source entity, and a set of digital signatures associated with at least a subset of intermediate entities on a route taken by the communication. The one or more processors may be further configured to verify the digital signatures included in the communication, verify whether the entities associated with the digital signatures form an expected route for the communication, and process the data.

    END-TO-END MANAGEMENT OF AUTHENTICATED COMMUNICATIONS

    公开(公告)号:US20220182487A1

    公开(公告)日:2022-06-09

    申请号:US17247387

    申请日:2020-12-09

    Applicant: Neustar, Inc.

    Abstract: Disclosed herein are systems and methods for providing mobile call authentication. For instance, a token indicative of a call request can be received from a calling party. The token can include a called party number and a time of the request. A subscriber database can be accessed to determine identifying information associated with the calling party based at least in part on the token. The token can be authenticated based at least in part on the identifying information and using one or more predefined authentication protocols. The token can be stored in a call session registry storing data indicative of a plurality of active telephone call events. A verification request for the call request can be received from the called party. The call request can be verified based at least in part on the token. The called party can be notified that the call request has been verified.

    SYSTEM AND METHOD FOR FACILITATING ROUTING

    公开(公告)号:US20210400120A1

    公开(公告)日:2021-12-23

    申请号:US17248423

    申请日:2021-01-25

    Applicant: Neustar, Inc.

    Inventor: Armand PRIEDITIS

    Abstract: A system and method are provided for routing content requests. On a given server network, content requests comprising a character string may be routed up a hierarchical network topology until a linear chain, corresponding to the character string, is identified. Thus, the content request is forwarded up the hierarchy until an intersecting server network is reached. Then the content request is forwarded down the hierarchy until, along a published linear chain corresponding to the character string, until a content source is reached. Content is provided to the requestor along a reverse path of the content request.

Patent Agency Ranking