Abstract:
Methods, systems, and computer program products for providing media content delivery audit and verification services are disclosed. In one example, a monitoring system analyzes messages associated with communications in a wireless communications network. The monitoring system identifies, from the messages, messages that are associated with the request for or delivery of media content to a wireless communications device via the network. Copies of the messages relating to media content delivery are generated, correlated, and analyzed in order to provide a network operator with information that may be used to verify media content delivery transactions and associated revenues.
Abstract:
Methods, systems, and computer program products for detecting and mitigating a denial of service attack in a telecommunications signaling network are provided. According to one method, traffic rate information is monitored on at least two of a plurality of signaling links. If the traffic rate on one of the signaling links exceeds the rate on at least another of the signaling links by a predetermined threshold, a denial of service attack is indicated. In response to indicating a denial of service attack, a user may take mitigating action, such as updating a firewall function to block packets associated with the offending source.
Abstract:
The WEB Site Valuation System identifies each user's personal attribution of value to a selected WEB site. The attribution is constrained by assigning each user a predetermined number of assignable credits/tokens from which the user can draw to “deposit” or “withdraw” previously deposited credits in the “account” of a WEB site. The tally of credits for each WEB site is then a direct indication of the value provided to users. This ultimately creates a token economy for and within the WEB, based upon user opinion of the value of WEB sites. The dynamic mapping and correlation of these value indications with the users' characteristics provides analytical data that can be used to determine the relevance of the WEB site to various socio-demographic populations, as well as the response of the users to changes in the WEB site, market forces, and/or the entire community of WEB sites.
Abstract:
Methods, systems, and computer program products for surveillance of messaging service messages in a communications network are disclosed. According to one aspect, a system is provided for intercepting a messaging service message in a communications network. The system can include a communication module for receiving and sending messaging service messages from a communications network. Further, the system can include a subscriber surveillance database for maintaining a listing of subscribers that have been placed under surveillance. The system can also include a surveillance function for receiving a messaging service message, extracting a subscriber identifier from the messaging service message, performing a lookup in the surveillance database using the subscriber identifier, and performing a surveillance action in response to locating a matching entry in the database.
Abstract:
The present invention provides for a system and method for easily, quickly and reliably attaching a sound suppressor or other auxiliary device to the muzzle end of a firearm barrel, and for easily and quickly removing such device therefrom. Moreover, the invention will allow any suppressor—threaded or unthreaded—to quickly, easily and reliably attach to a firearm utilizing a dual part system. The dual part system comprises a barrel adapter having the ability to attach directly to a non-threaded suppressor or a quick disconnect suppressor, or connect to a threaded suppressor utilizing a supplemental coupling adapter which connects to existing threaded suppressors.
Abstract:
The WEB Site Valuation System identifies each user's personal attribution of value to a selected WEB site. The attribution is constrained by assigning each user a predetermined number of assignable credits/tokens from which the user can draw to “deposit” or “withdraw” previously deposited credits in the “account” of a WEB site. The tally of credits for each WEB site is then a direct indication of the value provided to users. This ultimately creates a token economy for and within the WEB, based upon user opinion of the value of WEB sites. The dynamic mapping and correlation of these value indications with the users' characteristics provides analytical data that can be used to determine the relevance of the WEB site to various socio-demographic populations, as well as the response of the users to changes in the WEB site, market forces, and/or the entire community of WEB sites.
Abstract:
Methods, systems, and computer program products for collecting messages associated with providing prepaid communications services in a communications network are disclosed. According to one aspect, a method includes receiving at least a portion of messages copied from a communications network. The at least a portion of messages associated with prepaid calls to a common destination may be identified. At least one measure indicative of an absolute or relative number of prepaid calls being made to the common destination may be generated based on the identified at least a portion of messages.
Abstract:
Methods and systems for detecting intrusion events, such as war dialing events are disclosed. According to one method, signaling messages associated with calls being made or attempted in a telecommunications network are analyzed. Based on the signaling messages, it is determined whether a war dialing event has occurred or is in progress. In response to determining that a war dialing event has occurred or is in progress, a war dialing event mitigating action is performed.
Abstract:
The present invention provides for a system and method for easily, quickly and reliably attaching a sound suppressor or other auxiliary device to the muzzle end of a firearm barrel, and for easily and quickly removing such device therefrom. Moreover, the invention will allow any suppressor—threaded or unthreaded—to quickly, easily and reliably attach to a firearm utilizing a dual part system. The dual part system comprises a barrel adapter having the ability to attach directly to a non-threaded suppressor or a quick disconnect suppressor, or connect to a threaded suppressor utilizing a supplemental coupling adapter which connects to existing threaded suppressors.
Abstract:
A system comprises a database operable to mobile terminated call blocking rules, and a mobile terminated call blocking module operable to receive data associated with a mobile terminated call attempt, determine whether the mobile terminated call attempt should be blocked by accessing the database, and block the mobile terminated call attempt in response to determining that the mobile terminated call attempt should be blocked.