Abstract:
Methods, systems, and computer program products for providing media content delivery audit and verification services are disclosed. In one example, a monitoring system analyzes messages associated with communications in a wireless communications network. The monitoring system identifies, from the messages, messages that are associated with the request for or delivery of media content to a wireless communications device via the network. Copies of the messages relating to media content delivery are generated, correlated, and analyzed in order to provide a network operator with information that may be used to verify media content delivery transactions and associated revenues.
Abstract:
Methods, systems, and computer program products for detecting and mitigating a denial of service attack in a telecommunications signaling network are provided. According to one method, traffic rate information is monitored on at least two of a plurality of signaling links. If the traffic rate on one of the signaling links exceeds the rate on at least another of the signaling links by a predetermined threshold, a denial of service attack is indicated. In response to indicating a denial of service attack, a user may take mitigating action, such as updating a firewall function to block packets associated with the offending source.
Abstract:
The WEB Site Valuation System identifies each user's personal attribution of value to a selected WEB site. The attribution is constrained by assigning each user a predetermined number of assignable credits/tokens from which the user can draw to “deposit” or “withdraw” previously deposited credits in the “account” of a WEB site. The tally of credits for each WEB site is then a direct indication of the value provided to users. This ultimately creates a token economy for and within the WEB, based upon user opinion of the value of WEB sites. The dynamic mapping and correlation of these value indications with the users' characteristics provides analytical data that can be used to determine the relevance of the WEB site to various socio-demographic populations, as well as the response of the users to changes in the WEB site, market forces, and/or the entire community of WEB sites.
Abstract:
Methods, systems, and computer program products for surveillance of messaging service messages in a communications network are disclosed. According to one aspect, a system is provided for intercepting a messaging service message in a communications network. The system can include a communication module for receiving and sending messaging service messages from a communications network. Further, the system can include a subscriber surveillance database for maintaining a listing of subscribers that have been placed under surveillance. The system can also include a surveillance function for receiving a messaging service message, extracting a subscriber identifier from the messaging service message, performing a lookup in the surveillance database using the subscriber identifier, and performing a surveillance action in response to locating a matching entry in the database.
Abstract:
The present invention provides for a system and method for easily, quickly and reliably attaching a sound suppressor or other auxiliary device to the muzzle end of a firearm barrel, and for easily and quickly removing such device therefrom. Moreover, the invention will allow any suppressor—threaded or unthreaded—to quickly, easily and reliably attach to a firearm utilizing a dual part system. The dual part system comprises a barrel adapter having the ability to attach directly to a non-threaded suppressor or a quick disconnect suppressor, or connect to a threaded suppressor utilizing a supplemental coupling adapter which connects to existing threaded suppressors.
Abstract:
A system comprises a database operable to mobile terminated call blocking rules, and a mobile terminated call blocking module operable to receive data associated with a mobile terminated call attempt, determine whether the mobile terminated call attempt should be blocked by accessing the database, and block the mobile terminated call attempt in response to determining that the mobile terminated call attempt should be blocked.
Abstract:
Methods, systems, and computer program products for detecting fraudulent message service message traffic are disclosed. According to one method, message service messages are monitored. It is determined that the message service message traffic indicates that the message service message traffic is fraudulent based on detection of at least one of: 1) message service message traffic received at a first network from a second network, where the traffic includes at least one message with an SCCP calling party address internal to the first network, 2) a volume of message service message traffic received at the first network from the second network that exceeds the volume of message service message traffic sent by the first network to the second network by a threshold amount, and 3) message service message traffic that is sent to a dark number. In response to detecting fraudulent message service message traffic, a mitigating action is performed.
Abstract:
Methods, systems, and computer program products for analyzing signaling messages associated with delivery of streaming media content to subscribers via a broadcast and multicast service (BCMCS) are disclosed. According to one method, at least one signaling message transmitted between network elements associated with delivery of streaming media content to a subscriber via a BCMCS is monitored. The at least one signaling message is analyzed. Information resulting from the analysis is provided to at least one BCMCS data processing application.
Abstract:
Methods, systems, and computer program products for automatically populating a signaling-based access control database based on output from a fraud detection application are disclosed. According to one method, a fraud detection application detects fraud based on call information received from monitoring points in a network. The fraud detection application produces output for identifying a calling party making a fraudulent call. The output is used to automatically populate a signaling-based access control database. A signaling-based access control application screens call signaling messages and performs a screening action, such as rerouting a call, using the information received from the fraud detection application.
Abstract:
The present invention provides for a system and method for easily, quickly and reliably attaching a sound suppressor or other auxiliary device to the muzzle end of a firearm barrel, and for easily and quickly removing such device therefrom. Moreover, the invention will allow any suppressor—threaded or unthreaded—to quickly, easily and reliably attach to a firearm utilizing a dual part system. The dual part system comprises a barrel adapter having the ability to attach directly to a non-threaded suppressor or a quick disconnect suppressor, or connect to a threaded suppressor utilizing a supplemental coupling adapter which connects to existing threaded suppressors.