摘要:
When a failure notification is received that was transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with a communication network, device information, network data, and a user profile associated with the wireless communication device is retrieved and processed to generate a network access score for the wireless communication device. If the network access score exceeds a priority threshold, a priority notification is transferred instructing the service node to bypass the authentication for the wireless communication device. If the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, an access notification is transferred instructing the service node to bypass the authentication for the wireless communication device, and subsequent usage of the wireless communication device is monitored for fraudulent activity. If the network access score does not exceed the legitimate user threshold, a suspect notification is transferred instructing the service node to maintain the authentication for the wireless communication device.
摘要:
Systems, methods, and computer-readable media for restricting mobile device services between an occurrence of an account change and an acquisition of a security code. The method includes recognizing that a low level of security is in effect in association with a user device, or a set of credentials associated therewith. In accordance with the low level of security, an indication is provided to restrict one or more services initially provided for the user device, or the set of credentials associated therewith. In addition, an indication is provided to initiate an authentication event. Performance of such an authentication event results in the user device, or the set of credentials associated therewith, obtaining a security code that results in application of an increased level of security in effect in association with the user device, or the set of credentials associated therewith.
摘要:
A method, system, and medium are provided for facilitating message recalls. One embodiment includes receiving an indication that a message has been communicated in association with a user device. A confirmation message is communicated to the user device. The confirmation message includes a recall option that, if selected, initiates a recall of the voice message. An indication of a user selection of the recall option is received and, thereafter, a recall of the message is initiated.
摘要:
Systems, methods, and computer-readable media, for facilitating incoming spoof call determinations are provided. In some embodiments, the method includes receiving call-setup data including a point code associated with origination of a call intended for a receiving device. The point code can be utilized to determine that the call intended for the receiving device is a spoof call. Such a spoof call can be initiated by a spoof-calling party associated with a number and is intended to provide an indication to the receiving device that the call is associated with another number.
摘要:
What is disclosed is a method of operating a communication system to reconfigure a wireless communication device. The method includes, in the wireless communication device, optically receiving image data. The method also includes processing the image data to display a configuration interface, and receiving an instruction into the configuration interface to reconfigure the wireless communication device.
摘要:
Systems, methods, and computer-readable media for facilitating enforcement of PRL restrictions are provided. The method includes receiving a registration request from a user device. The registration request includes a device identifier that identifies the user device and a network identifier that identifies a network selected for use. The device identifier is used to reference a list of networks permitted for use or prohibited for use by the user device. Thereafter, it is determined that the network selected for use by the user device is unauthorized based on a comparison of the network identifier that identifies the network selected for use to the list of networks permitted or prohibited for use by the user device. Based on the determination that the network selected for use by the user device is unauthorized, the user device is prevented from utilizing the selected network for voice or data services.
摘要:
Computer-readable media and methods are provided for identifying a mobile device as a legitimate subscriber to a communications network or as a clone device. A clone device is not legitimately subscribed to the network but poses as a legitimate device to gain usage of the legitimate mobile device's subscribed services. An application on the legitimate mobile device tracks call detail data for calls of the mobile device. The mobile device has a unique identifier. A network server compares the tracked call detail data against a master list of call detail data for the unique identifier. A mismatch between the mobile device's call detail data and the master list indicates a potential clone. A mobile device using the unique identifier but not providing substantially matching call detail data is identified as a clone. Countermeasures are provided to defeat the clone's usage of the network.
摘要:
A method, system, and medium are provided for applying call events in association with user devices based on priority levels is provided. One embodiment of the method includes referencing an active event level associated with a user device. The active event level indicates an extent of call events, such as dropped calls and/or blocked calls, in association with the user device. When it is determined that the active event level is unacceptable, a priority level associated with the user device is adjusted based on the active event level to reconcile the unacceptable active event level.
摘要:
Systems, methods, and computer-readable media for providing alternate caller names in accordance with caller-name preferences are provided. In one embodiment, a device identifier associated with a phone call initiated by a calling device is received. A caller-name preference(s) associated with the calling device is referenced. The caller-name preference(s) can indicate usage of a first caller name and/or a second caller name. The caller-name preference(s) can be used to select one of the first caller name or the second caller name to provide to in association with the phone call initiated by the calling device.
摘要:
A wireless communication system broadcasts using Frequency Modulation (FM) in a Very High Frequency (VHF) band. In the system, base stations exchange wireless communications with user devices including user media requests and the requested media. A control system processes the user media requests to identify media streams for individual base stations. The individual base stations wirelessly broadcast the media streams identified by the control system using FM in the VHF band. The base stations wirelessly notify the user devices of the media stream FM broadcasts.