Managing spoofed calls to mobile devices
A technology of mobile devices and confidence levels, applied in the direction of interconnection devices, security devices, automatic switching offices, etc., can solve problems such as deceiving users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0010] Mobile devices (eg, cellular telephones) provide a convenient way to connect users in various business and / or personal settings. However, the convenience of a mobile device can be reduced by unwanted calls from third parties, such as to sell or promote their products, by presenting false profiles, or by disguising themselves as legitimate entities (e.g., mortgage banks, credit card companies) or government agencies or authorities (e.g., federal student loan agencies, the Internal Revenue Service (IRS), the U.S. Department of Homeland Security) to defraud users. Such acts of hiding a caller's true identity by disguising a phone call (or other form of communication, such as email or text message) as being from a trusted source may be referred to as spoofing.
[0011] In some cases, a spoofed call may be configured to reveal a legitimate or genuine identification (eg, mortgage bank, IRS) as the source of the call on the user's mobile device to induce the user to answer the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


