Unlock instant, AI-driven research and patent intelligence for your innovation.

Managing spoofed calls to mobile devices

A technology of mobile devices and confidence levels, applied in the direction of interconnection devices, security devices, automatic switching offices, etc., can solve problems such as deceiving users

Pending Publication Date: 2021-11-30
MICRON TECH INC
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this connectivity may permit third parties with no legitimate reason to call the user (e.g., unwanted sales or promotional calls) and / or third parties with nefarious intent to deceive the user (e.g., by cheating or misleading the user into consider an emergency requiring their immediate attention)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Managing spoofed calls to mobile devices
  • Managing spoofed calls to mobile devices
  • Managing spoofed calls to mobile devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] Mobile devices (eg, cellular telephones) provide a convenient way to connect users in various business and / or personal settings. However, the convenience of a mobile device can be reduced by unwanted calls from third parties, such as to sell or promote their products, by presenting false profiles, or by disguising themselves as legitimate entities (e.g., mortgage banks, credit card companies) or government agencies or authorities (e.g., federal student loan agencies, the Internal Revenue Service (IRS), the U.S. Department of Homeland Security) to defraud users. Such acts of hiding a caller's true identity by disguising a phone call (or other form of communication, such as email or text message) as being from a trusted source may be referred to as spoofing.

[0011] In some cases, a spoofed call may be configured to reveal a legitimate or genuine identification (eg, mortgage bank, IRS) as the source of the call on the user's mobile device to induce the user to answer the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and apparatuses for managing spoofed calls to a mobile device are described, in which the mobile device receives a call transmitted over a cellular or mobile network. The call may include a set of information associated with the network, such as a geological location of a device that generated the call, a hardware device identifier corresponding to the device, an internet protocol (IP) address associated with the device, or a combination thereof. The mobile device may determine whether the call is spoofed or genuine based on the set of information. Subsequently, the mobile device may assist a user of the mobile device to manage the call, such as blocking the call from reaching the user, informing the user that the call is spoofed, facilitating the user to report the call as spoofed to an authority and / or a service provider of the network.

Description

technical field [0001] The present disclosure relates generally to mobile devices and, more particularly, to managing spoofed calls to mobile devices. Background technique [0002] Mobile devices (eg, cellular telephones) are widely deployed to connect users around the world. However, this connectivity may permit third parties with no legitimate reason to call the user (e.g., unwanted sales or promotional calls) and / or third parties with nefarious intent to deceive the user (e.g., by cheating or misleading the user into deemed an emergency requiring its immediate attention). In some cases, such third parties may impersonate or otherwise fabricate various information (e.g., nicknames, phone numbers for the user's contact list) to present on the user's mobile device in order for the user to answer their calls. It would be beneficial to the user if the mobile device could identify such calls to protect the user and / or help the user manage such calls. Contents of the inventi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/128H04M1/27457H04M1/2746
CPCH04M1/27457H04M1/2746H04L65/1079H04L65/1069H04M3/42059H04M3/436H04M3/42348H04M2242/15H04M2203/6027H04L65/1104H04M7/0078
Inventor E·德拉加尔扎维拉里尔M·E·瓦勒B·查布拉C·A·德莱尼
Owner MICRON TECH INC