This disclosure is related to the determination and management of reputations for telecommunications identifiers and/or entities.
The amount of fraudulent telecommunications is increasing as the number of mobile devices and/or internet users increases. Fraudulent telecommunications are often considered to be a nuisance and/or a waste of telecommunication infrastructure/resources. In an attempt to mitigate telecommunications fraud, deny lists are often used to block entities known to be “bad actors” from accessing telecommunication resources. Unscrupulous entities, however, have been able to circumvent such deny lists by using shell entities, which they open and use to commit fraudulent acts until the shell entities have been added to a deny list, after which the unscrupulous entities open new shell entities, thereby repeating the same process. Such unscrupulous entities, however, often use the same network identifiers, e.g., phone numbers, from which they originate fraudulent telecommunication traffic and/or use telecommunications identifiers that were previously associated with legitimate (trustworthy) entities but which have been dropped from use, e.g., the legitimate entity no longer exists but the telecommunications identifier remains available for use.
Campaign messaging has become an efficient and valuable mechanism for entities to reach large numbers of members, subscribers, and/or customers. Presently, many campaign messaging systems are unable to provide trust mechanisms. As a result, unscrupulous entities often exploit campaign messaging systems to SPAM large numbers of recipients, thus eroding trust in the campaign messaging system and/or legitimate entities whose identities may be spoofed by bad actors launching fraudulent messaging campaigns.
Embodiments of the current disclosure provide for an apparatus for assigning reputation scores to telecommunications identifiers. The apparatus includes a first data interpretation circuit, a second data interpretation circuit, a data analysis circuit, a scoring circuit, and a score provisioning circuit. The first data interpretation circuit is structured to interpret first data from a first database, wherein the first data corresponds to at least one telecommunications identifier. The second data interpretation circuit is structured to interpret second data from a second database distinct from the first database, wherein the second data corresponds to the at least one telecommunications identifier. The data analysis circuit is structured to determine, based at least in part on the first data and the second data, one or more attributes for the at least one telecommunications identifier. The scoring circuit is structured to generate, based at least in part on the one or more attributes, a reputation score for the at least one telecommunications identifier. The score provisioning circuit is structured to transmit the reputation score.
Embodiments of the current disclosure provide for a method for assigning scores to telecommunications identifiers. The method includes interpreting, via at least one processor, first data from a first database, the first data corresponding to at least one telecommunications identifier; and interpreting, via the at least one processor, second data from a second database, the second data corresponding to the at least one telecommunications identifier. The method further includes determining, via the at least one processor and based at least in part on the first data and the second data, one or more attributes for the at least one telecommunications identifier; and generating, via the at least one processor and based at least in part on the one or more attributes, a reputation score for the at least one telecommunications identifier. The method further includes transmitting, via the at least one processor, the reputation score.
Embodiments of the current disclosure provide for a method that includes interpreting call routing data with a telecommunications identifier; and generating, via at least one processor, a reputation score request command value structured to retrieve a reputation score for a telecommunications identifier. The method further includes transmitting the reputation score request command value to a server; and receiving a reputation score responsive to transmitting the reputation score request command value to the server, the reputation score corresponding to the telecommunications identifier. The method further includes executing an action with respect to the call routing data based at least in part on the reputation score.
Embodiments of the current disclosure provide for a method that includes generating, via a campaign requesting circuit, a messaging campaign request that includes a request to execute a messaging campaign; and transmitting, via a campaign request provisioning circuit, the messaging campaign request to an approving authority. The method further includes interpreting, via an approval processing circuit, a campaign approval message from the approving authority; and transmitting, via a campaign circuit and based at least in part on the campaign approval message, a plurality of electronic communications in accordance with the messaging campaign.
Embodiments of the current disclosure provide for an apparatus that includes a campaign requesting circuit, a campaign request provisioning circuit, an approval processing circuit, and a campaign circuit. The campaign requesting circuit is structured to generate a messaging campaign request that includes a request to execute a messaging campaign. The campaign request provisioning circuit is structured to transmit the messaging campaign request to an approving authority. The approval processing circuit is structured to interpret a campaign message from the approving authority. The campaign circuit is structured to transmit a plurality of electronic communications in accordance with the messaging campaign.
Embodiments of the current disclosure provide for a method for executing a messaging campaign. The method includes generating a plurality of telecommunication messages; and transmitting each of the plurality of telecommunication messages to one of a plurality of telecommunications identifiers each associated with an intended distinct recipient. Each of the plurality of telecommunication messages is associated with a same telecommunication identifier (also referred to herein as a telecommunications identifier), e.g., a local number, toll-free number (TFN), and/or short code.
Embodiments of the current disclosure provide for a method for executing a messaging campaign. The method includes generating a plurality of telecommunication messages; and transmitting each of the plurality of telecommunication messages to one of a plurality of telecommunications identifiers each associated with an intended distinct recipient. Each of the plurality of telecommunication messages is associated with a same ten-digit code.
Certain further aspects of example systems, apparatuses, and methods are described following, any one or more of which may be present in certain embodiments of the current disclosure.
Embodiments of the current disclosure may provide for reputational scores (also referred to herein as a reputation score or simply reputation), and/or methods of determining reputation scores, for telecommunications identifiers, e.g., local phone numbers, VOIP numbers, TFNs, usernames, and/or any other type of communications identifier that indicates if the telecommunications identifier is associated with fraud or is trustworthy. Provisioning of a reputational score, as disclosed herein, for a telecommunications identifier may allow entities involved in routing telecommunications data, e.g., traffic, to better detect fraudulent activities and/or to better distinguish between authorized telecommunications data and fraudulent telecommunications data. For example, certain embodiments of the current disclosure may improve the ability of telecommunication carriers and/or network operators to take action against fraudulent telecommunications data while minimizing negative impacts to authorized telecommunications traffic.
Embodiments of the current disclosure may also improve trust between entities involved in generating telecommunications traffic and entities involved in transporting and/or delivering the telecommunications traffic to an end point. For example, embodiments of the current disclosure may provide for trusted messaging campaigns over short codes, ten-(10)-digit numbers, and/or any other type of telecommunication numbers. As will be understood, a benefit of providing trusted messaging campaigns via a ten-(10)-digit code is that a receiving party of such a campaign message may easily call the number from which the campaign message was sent. Embodiments of the current disclosure may require that a campaign be approved to use a certain telecommunications number before sending messages from the number.
Embodiments of the current disclosure also provide for group reputation scores, which may be an aggregate value corresponding to the reputation of two or more telecommunications identifiers.
Embodiments of the current disclosure may also provide for messaging platform providers and/or RespOrgs to better regulate telecommunications traffic originating from messaging platforms and/or telecommunication identifiers (e.g., TFNs, Internet Protocol (IP) addresses, media access control (MAC) addresses, usernames, etc.) and transmitted to network operators, e.g., mobile network operators such as cellular communications networks.
As disclosed in greater detail herein, embodiments of the current disclosure provide for trusted Application-to-Person (A2P) messaging based on reputation scores. The reputation scores may be structured to quantify a TFN's risk based on its historical ownership, application, and/or fraud history. The reputation scores may be derived from and/or based on combining first party operational data from registries, e.g., TFN and/or Toll-Free Texting and Smart Services (TSS), with industry insights.
As used herein, a campaign, also referred to herein as a messaging campaign, may include sending one or more telecommunications messages to one or more telecommunication numbers, e.g., sending a marketing text via short message/messaging service (SMS), email, etc. and/or a voice message to thousands of consumers.
Embodiments of the current disclosure may use raw operational data from telecommunication registries to generate reputational attributes which, in turn, may be used to generate reputation scores for telecommunications identifiers that allow entities involved in generating, transporting (routing and/or switching), and/or receiving telecommunication data associated with the telecommunications identifiers to make better/improved decisions and/or to take actions based on the reputation scores, e.g., dropping telecommunications traffic associated with untrustworthy telecommunications identifiers while permitting telecommunications traffic associated with trustworthy telecommunications identifiers. As will be appreciated, in embodiments, a TFN reputation score, as disclosed herein, may act/serve as a lead indicator of fraud and/or campaign performance. Accordingly, some embodiments of the current disclosure provide for trusted information to drive global connections, e.g., worldwide communications, which, in turn, may provide for organizations to innovate and grow with confidence. The reputation scores, as disclosed herein, may also improve trust relationships between consumers and brands as consumers (and/or communities) can have improved confidence that received campaign messages are, in fact, from who they purport to be from and/or that the entity behind the messaging campaign is a trustable entity. Thus, some embodiments of the current disclosure provide for improved security and/or reliability, and/or may empower customers to make better informed decisions.
As used herein, a TFN Registry, also referred to herein as a “TFNR”, may include databases related to the North American Numbering and Identify Administration. The TFN registry may include more than 43.5 M toll-free numbers supporting over 1,400 service providers. Embodiments of the TFN Registry may contain records corresponding to 1.8B identities.
Embodiments of the current disclosure may provide for an improved business messaging ecosystem by adding a neutral and transparent rating/scoring entity that builds upon trusted A2P delivery solutions without unnecessary friction and costs. As such, embodiments of the current disclosure may provide for businesses to grow at an aggressive pace. Embodiments of the current disclosure may also improve the ability of mobile network operators (MNOs) to sift through and better handle gray traffic, which may be on the order of billions of messages per month. For example, embodiments may convert onto A2P channels, e.g., sms messages may be moved to a dedicated MNO network channel and/or a dedicated network connection. Embodiments of the current disclosure may also provide for competition in the messaging transit space. Embodiments of the current disclosure may also elevate valid users with trusted, neutral transparency.
For the purposes of promoting an understanding of the principles of the disclosure, reference will now be made to the embodiments illustrated in the drawings and described in the following written specification. It is understood that no limitation to the scope of the disclosure is thereby intended. It is further understood that the present disclosure includes any alterations and modifications to the illustrated embodiments and includes further applications of the principles disclosed herein as would normally occur to one skilled in the art to which this disclosure pertains.
Accordingly, referencing
As will be explained in greater detail herein, the entity 120 may desire to send trusted campaign messages 200 (
The campaign message request 300 is then transmitted to an approving authority which, in embodiments, may be the registrar 110 and/or the campaign platform 116. The approving authority may then transmit an approval message 400 (
As will be understood, embodiments of the registrar 110 may be in an optimal position within a telecommunications network to act as the approval authority due to the registrar's role as a neutral steward of the TFN 512 and/or TSS 514 (
As illustrated in
As shown in
As shown in
Referring to
In embodiments, the one or more databases 512, 514, 516 may include a Network Device Registry that pairs IP addresses to corresponding attributes, e.g., an owner (and/or purported owner) of an IP address, a licensee (and/or purported licensee) of an IP address, an Internet Service Provider (ISP) associated with the IP address, a location (e.g., street address, mailing address, city, state, country, etc.) associated with the IP address, an entity (e.g., an individual, corporation, non-profit, government, etc.) associated with the IP address, and/or any other type of data/attribute appropriate for determining a reputation and/or a trust score for an IP address, as disclosed herein.
In embodiments, the one or more databases 512, 514, 516 may include a Fraud Registry that stores data associating a telecommunications identifier and/or an entity (an individual, corporation, non-profit, government, etc.) with instances of known and/or suspected fraudulent and/or criminal activities, e.g., wire fraud, identify theft, monetary theft, human trafficking, illegal drug manufacturing, illegal drug transportation/distribution, vehicle theft, and/or any other type of illegal, fraudulent, and/or otherwise malicious activities. In embodiments, the Fraud Registry may be included in and/or combined with a fraud network, as disclosed herein.
In embodiments, the one or more databases 512, 514, 516 may include a Business Registry, e.g., a state government business registry.
As will be understood, in embodiments, one or more aspects of the IoT Device Registry, the Network Device Registry, the Fraud Registry, the Business Registry, and/or any other type of registry described herein, may be incorporated into and/or otherwise combined with any of the databases and/or registries disclosed herein.
In embodiments, the registrar 110, when acting as the approval authority, may interpret the campaign message request 300 (
In embodiments, a first record 518 from the TFN Registry 512 may include information related to which RespOrg owns which telecommunications identifiers and/or which entities are leasing and/or using the telecommunications identifiers. In embodiments, a second record 520 from the TSS Registry 514 may include information which telecommunications identifiers are authorized to transmit text messages, e.g., SMS, e-mails, and/or other types of text-based telecommunications.
Accordingly, shown in
Referring now to
Accordingly, illustrated in
While the apparatus 1300 and method 1400 are described herein with respect to determining a reputation score for telecommunications identifiers, it is to be understood that embodiments of the apparatus 1300 and/or method 1400 may determine a reputation score for an entity, e.g., 120 (
Some attributes, e.g., churn, growth rates, etc., may be calculated using formulae and/or further adapted to one or more: underlying data sources, length of available data, analyses of validity of and contribution to the final score of a TFN, or the like. In other words, certain embodiments of the current disclosure may tailor one or more attributes based on the type and/or amount of data available. Such adjusting and/or tailoring may be in real-time (or near-real time), and may be performed on a periodic basis, e.g., annually, monthly, weekly, daily, etc. Thus, some embodiments provide for attributes that improve in accuracy over time as more data becomes available, and/or reduce in accuracy in the event data becomes unavailable. Embodiments of the current disclosure may provide an accuracy indicator that accompanies an attribute, where the accuracy indicator may be based at least in part on the amount, length, and/or type of data available to generate a particular attribute.
Some embodiments may include algorithms to summarize certain attributes that may be a product of multiple datapoints, e.g., derived, and/or otherwise based at least in part, from different/distinct products and/or APIs or data streams. As a non-limiting example, such a (sometimes) complex attribute includes assessed demand (e.g., value) of a telecommunications identifier, e.g., a TFN. In such embodiments, the registrar may aggregate demand for the telecommunications identifier from multiple APIs and/or interfaces, and then identify rogue and/or patterned interactions with the databases 514, 512, and/or 516 from machines and/or robots. The registrar may then scale any identified interactions and/or filter them (which may be a complete filtering) to generate a holistic demand attribute for that telecommunications identifier.
In some embodiments, select attributes may be generated using micro-level AI that may perform look-alike, number, and/or word pattern analyses of a telecommunications identifier, itself. As a non-limiting example, to assess value of a telecommunications identifier, one or more of the apparatuses disclosed herein may train algorithms and/or models, e.g., micro-level AIs, to identify high value telecommunications identifiers suitable for brand recall, and/or those with specific patterns of digits and/or words that are compliant with any controlling guidelines, e.g., numbering guidelines.
While the below attributes are described with respect to TFNs, it is to be understood that the disclosed concepts may also apply to telecommunications identifiers, generally, e.g., local numbers, email addresses, short codes, 10-digit codes, social media usernames/accounts, etc. Non-limiting examples of attribute groups include: number history 1510; RespOrg ownership/profile 1512; fraud history 1514; brand ownership 1516, and/or applications 1518. The number history 1510 grouping may include attributes corresponding to a TFN's characteristics in a TFN registry, e.g., 512 (
In embodiments, data sources 1612 may include: TFNR number history, and/or TFNI Dip counts 1620; TFNI and DNO touchpoints (e.g., whether a RespOrg or Brand/Enterprise provided additional information regarding their TFN), and/or segmentation 1622; TFNR number history, TSS number history, and/or TFNI & DNO touchpoint 1624; data from a fraud network, and/or RespOrg feedback 1626; and/or other data sources related to telecommunications. As will be understood, segmentation 1622 may include different classifications for an entity type associated with a telecommunications identifier, e.g., different RespOrgs may be separated into different categories based on one or more properties, e.g., area of focus, products and services offered, etc. In embodiments, data sources 1616 may include: TFNR number history, Responsible Organization Change (RoC) Transfers, TSS number History, and/or segmentation data 1628. A RoC may include transfers of a TFN from one RespOrg to another RespOrg. Such transfers are generally approved by the enterprise owning and/or leasing the TFN being transferred. In embodiments, the TFNR number history may include a log of TFNR actions performed by RespOrgs for their TFNs, e.g., reserve, spare, etc. In embodiments, RespOrgs may be able to view each other's number histories. In embodiments, the registrar 110 (
In embodiments, data from data sources 1612 and/or customer feedback 1618 may flow to an attribute generation process 1630 which, in turn, may generate one or more of the following sub-component scores: an identifier history 1632, a brand score 1634, an application score 1636, and/or a fraud score 1638. The customer feedback 1618 may be from users in one or more portions of the telecommunications ecosystem, e.g., the system 100 (
As will be appreciated, in embodiments, once attributes are calculated, validity and eligibility of each attribute for inclusion (in a reputation score) may be tested using statistical analyses, e.g., 1644 (
In some embodiments, the generated attributes are grouped and/or combined using weighting methods, as disclosed herein, which may be educated/trained/tuned/adjusted by statistical analyses of individual attributes, e.g., the registrar's knowledge of the industry, knowledge from and/or stored (as data) in one or more of the databases 512, 514, 516 (
In embodiments, additional feedback loops may be formed between the registrar and one or more external ecosystem participants and/or sources. As will be appreciated, additional techniques, as disclosed herein, and/or advanced AI algorithms, e.g., certain AI algorithms more comprehensive in size, accuracy, and/or requiring more computing resources than the micro-level AI algorithms disclosed herein, may be used to convert feedback signals into existing and/or new attributes that may educate and/or aligning reputation scoring of telecommunications identifiers, as disclosed herein, with real-world performance of the telecommunications identifiers.
In embodiments, the algorithms component/procedure 1644 may be implemented by the scoring circuit 1316 (
In embodiments, the weighting algorithms may assign weights to both attributes and their groups and use various weighting techniques, as disclosed herein, to calculate/generate a telecommunications identifier's reputation score. Weighting of an individual attribute within its corresponding group may be based at least in part on, e.g., educated via, an origin and/or a source of underlying data, a measure of quality the attribute represents, etc. These weights may be adjusted from time-to-time to account for and/or incorporate data corresponding to developments in industry. As will be appreciated, such adjusting of weights may serve to keep (or assist in keeping) the reputation scores generated, in accordance with this disclosure, by the scoring circuit 1316 in sync with market conditions. As a non-limiting example, if new application uses of reputation scores are introduced in the market, the registrar would be able to introduce a new RespOrg segment focused on facilitating use of telecommunications identifiers in such applications, re-weight an application group and/or the attributes within, and/or other similar processes.
One or more machine learning techniques, as disclosed herein, may also be used (which may be in parallel to a weighting approach, as also disclosed herein) to identify telecommunications identifiers that have similar characteristics in terms of quality metrics as represented by their attributes. Such learning outputs may be further tested for biases and outliers, subject to statistical analyses to verify their validity and applicability to scoring before being used to calculate a telecommunications identifier's reputation score. In embodiment, pre-final reputation scores (reputation scores that may be combined and/or certified before becoming a finalized reputation score) generated from both weighting and machine learning methods may be compared and, when found different, subjected to further automated analyses to determine which of the pre-final reputation scores is the most accurate (or believed/determined by the automated process to be the most accurate) score and, in some cases, identify/determine that the telecommunications identifier cannot be assigned a reputation score and/or a profile. In embodiments, the inconclusive telecommunications identifiers are analyzed manually to identify improvements to the methods discussed herein.
In some embodiments, once a plurality of telecommunications identifiers have been scored, they may be separated by their use in voice and/or text ecosystem applications. Statistical analyses may also be used to examine/identify distributions of reputation scores, compare the distributions with historical spreads, identify and/or eliminate biases and/or deviations within the distributions to maintain consistency and accuracy of the reputation scores.
Accordingly, in embodiments, the component/procedure 1644 may consider/receive as input twenty-two (22) or more attributes which may be spread over five (5) or more attribute groups. In embodiments, the record 518 (
As shown in table 1, in embodiments, the aggregate scoring procedure/module, e.g., 1648 (
In embodiments, an aggregate or group score generated by procedure/module 1648 may describe the reputation of telecommunications identifiers and/or, inversely, risk associated with a group of selected/identified telecommunications identifiers, as compared with that of all telecommunications identifiers scored as a group. In embodiments, an aggregate score for a specified/selected/identified group of telecommunications identifiers may be calculated and presented for application use in real-time, or near real-time, by leveraging pre-calculated reputation scores of individual telecommunications identifiers within the specified/selected/identified group.
As described herein, telecommunications reputation scores may be used to enable use cases in voice and/or text messaging systems and/or for display of a telecommunications identifier on variety of output consoles. As such, embodiments of the current disclosure may provide for the presentation of reputation scores with label(s) in a graphical user interface. In such embodiments, numerical telecommunications identifier reputation scores may be labeled for a particular use-case. The labelling may be numerical scaling. In such embodiments, the scaling may be based at least in part on a scale required by a particular application, e.g., binary based for a reputation/risk threshold pre-declared by an application, categorical labelling, color coding, binary as necessary for decision making, etc.
In embodiments, the aggregate scoring procedure 1648 may access shared scoring data for more than one TFN in the TFN 512 and/or TSS 514 registries, e.g., 60K TFNs. Embodiments of the current disclosure may provide for matching of fraudulent knowledge concerning a telecommunication identifier known by the one or more servers 510 (
As will be appreciated, embodiments of the current disclosure provide for process/processing flows that transform first and/or third-party collected data into attribute values, e.g., raw attribute values, that may provide for the basis of a reputation score. For example, certain embodiments of the current disclosure may us a data process/processing flow that combines data from one or more data-streams, e.g., data sources 1612, customer feedback 1618, and/or data sources 1616 (
Illustrated in
In embodiments, the feedback may be provided voluntarily by RespOrgs, MNOs, campaign providers, mobile device users and the like. At 1744, the campaign platform 1714 dips into the registrar 1724 to get updated telecommunications identifier risks, which the messaging firewall 1734 may use to adjust its watchlist.
As will be understood, as shown below in Table 2, A2P messaging platforms, e.g., campaign platforms 116, can complement the brand score 1634 from TCR with the TFN registry 512 (
As will be further understood, embodiments of the current disclosure may provide A2P messaging platforms, e.g., 116 (
Embodiments of the current disclosure may also provide for reputation scoring of telecommunications identifiers at the time of provisioning, which may ensure only trusted telecommunications identifiers are text enabled by leveraging neutral, authoritative data for reputational scoring at the telecommunications identifier level. As such, the authoritative registries of some embodiments of the current disclosure may reduce friction and costs of telecommunications identifier approval processes while improving the quality of the assessment.
As disclosed herein, some embodiments of the current disclosure provide for perpetual reputation scoring that builds over time. The authoritative registries of such embodiments may ensure the status of a telecommunications identifier is updated in real-time. As will be further understood, feedback looks may enhance reputational scoring, central analytics, and/or improve spam containment.
Embodiments of the current disclosure may also provide for data, analytics, and/or transparent communication that exceeds and/or otherwise surpasses the economic value of protocols like “Stir/Shaken”. For example, some embodiments of the current disclosure may provide for MNOs to have access to data that reduces false positives so robotexts may be blocked in a more responsible manner.
Embodiments of the current disclosure may also provide for a universal verified sender applied to RCS.
Embodiments of the current disclosure may provide for integration of processes, such a TCR, which may be integrated into the TSS Registry for text enablement.
Referring now to tables 3-5 and
As can be seen, 19.8 k TFNs were inactive with 39K TFNs being activated (by 100+RespOrgs). Approximately 3983 TFNs were received out of band during NN onboarding, and 3235 TFNs were not verified by the corresponding Text Messaging Provisioning Entity. About 3273 (˜5%) TFNs were owned by non-aggregator RespOrgs, and nearly 6000 of these TFNs were owned by a single RespOrg. Further, 22% of the TFNs were verified by the corresponding Text Message Provisioning Entity, 44K TFNs had message counts of <500, 15.5 k TFNs had message counts >500, and 67 TFNs had message counts >0.5 M.
Referring to
An example embodiment of the present disclosure, utilizing one or more aspects as set forth preceding, includes an apparatus for assigning reputation scores to telecommunications identifiers. The apparatus includes a first data interpretation circuit, a second data interpretation circuit, a data analysis circuit, a scoring circuit, and a score provisioning circuit. The first data interpretation circuit is structured to interpret first data from a first database, wherein the first data corresponds to at least one telecommunications identifier. The second data interpretation circuit is structured to interpret second data from a second database distinct from the first database, wherein the second data corresponds to the at least one telecommunications identifier. The data analysis circuit is structured to determine, based at least in part on the first data and the second data, one or more attributes for the at least one telecommunications identifier. The scoring circuit is structured to generate, based at least in part on the one or more attributes, a reputation score for the at least one telecommunications identifier. The score provisioning circuit is structure to transmit the reputation score. In certain aspects, the apparatus includes the first database. In certain aspects, the first database includes records associating the at least one telecommunications identifier with an entity. In certain aspects, the first database is a Toll-Free Number Registry. In certain aspects, the first database includes records associating the at least one telecommunications identifier with one or more authorized services. In certain aspects, the first database is a Toll-Free Texting and Smart Services Registry. In certain aspects, the apparatus includes the first database and the second database. In certain aspects, the first database includes records associating the at least one telecommunications identifier with an entity; and the second database includes records associating the at least one telecommunications identifier with one or more authorized services. In certain aspects, the first database is a Toll-Free Number Registry; and the second database is a Toll-Free Texting and Smart Services Registry. In certain aspects, the apparatus further includes a fraud network, wherein the data analysis circuit is further structured to determine the one or more attributes based at least in part on fraud data available via the fraud network.
An example embodiment of the present disclosure, utilizing one or more aspects as set forth preceding, includes a method for assigning scores to telecommunications identifiers. The method includes interpreting, via at least one processor, first data from a first database, the first data corresponding to at least one telecommunications identifier; and interpreting, via the at least one processor, second data from a second database, the second data corresponding to the at least one telecommunications identifier. The method further includes determining, via the at least one processor and based at least in part on the first data and the second data, one or more attributes for the at least one telecommunications identifier; and generating, via the at least one processor and based at least in part on the one or more attributes, a reputation score for the at least one telecommunications identifier. The method further includes transmitting, via the at least one processor, the reputation score. In certain aspects, the method further includes associating the at least one telecommunications identifier with an entity in a database. In certain aspects, the database is a toll-free number registry. In certain aspects, the method further includes operating the Toll-Free Number Registry. In certain aspects, the method further includes associating the at least one telecommunications identifier with one or more authorized service in a database. In certain aspects, the database is a Toll-Free Texting and Smart Services Registry. In certain aspects, the method further includes operating the Toll-Free Texting and Smart Services Registry. In certain aspects, the method further includes associating the at least one telecommunications identifier with an entity in a first database; and associating the at least one telecommunications identifier with one or more authorized service in a second database. In certain aspects, the first database is a Toll-Free Number Registry; and the second database is a Toll-Free Texting and Smart Services Registry. In certain aspects, the method further includes operating the Toll-Free Number Registry; and operating the Toll-Free Texting and Smart Services Registry. In certain aspects, the first database is a Toll-Free Number Registry, and the second database is a Toll-Free Texting and Smart Services Registry; and the method further includes operating the Toll-Free Number Registry, and operating the Toll-Free Texting and Smart Service Registry. In certain aspects, the first database is at least one of an IoT Device Registry, a Network Device Registry, or a Fraud Registry.
An example embodiment of the present disclosure, utilizing one or more aspects as set forth preceding, includes a method that includes interpreting call routing data with a telecommunications identifier; and generating, via at least one processor, a reputation score request command value structured to retrieve a reputation score for a telecommunications identifier. The method further includes transmitting the reputation score request command value to a server; and receiving a reputation score responsive to transmitting the reputation score request command value to the server, the reputation score corresponding to the telecommunications identifier. The method further includes executing an action with respect to the call routing data based at least in part on the reputation score. In certain aspects, the action is routing telecommunications data originating from a source corresponding to the telecommunications identifier. In certain aspects, the telecommunications data forms part of a text message. In certain aspects, the telecommunications data forms part of a call. In certain aspects, the telecommunications data forms part of a graphical message. In certain aspects, the action is dropping telecommunications data originating from a source corresponding to the telecommunications identifier. In certain aspects, the action is reporting the origination of telecommunications data, from a source corresponding to the telecommunications identifier, to a fraud tracking database.
An example embodiment of the present disclosure, utilizing one or more aspects as set forth preceding, includes a method that includes generating, via a campaign requesting circuit, a messaging campaign request that includes a request to execute a messaging campaign; and transmitting, via a campaign request provisioning circuit, the messaging campaign request to an approving authority. The method further includes interpreting, via an approval processing circuit, a campaign approval message from the approving authority; and transmitting, via a campaign circuit and based at least in part on the campaign approval message, a plurality of electronic communications in accordance with the messaging campaign. In certain aspects, the messaging campaign request includes a telecommunications identifier which the plurality of electronic communications will be associated with associated when transmitted. In certain aspects, the telecommunications identifier is a short code. In certain aspects, the telecommunications identifier is a ten-digit code. In certain aspects, the telecommunications identifier is a telecommunications number. In certain aspects, the telecommunications number is a local number. In certain aspects, the telecommunications number is a toll-free number.
An example embodiment of the present disclosure, utilizing one or more aspects as set forth preceding, includes an apparatus that includes a campaign requesting circuit, a campaign request provisioning circuit, an approval processing circuit, and a campaign circuit. The campaign requesting circuit is structured to generate a messaging campaign request that includes a request to execute a messaging campaign. The campaign request provisioning circuit is structured to transmit the messaging campaign request to an approving authority. The approval processing circuit is structured to interpret a campaign message from the approving authority. The campaign circuit is structured to transmit a plurality of electronic communications in accordance with the messaging campaign. In certain aspects, the messaging campaign request includes a telecommunications identifier which the plurality of electronic communications will be associated with associated when transmitted. In certain aspects, the telecommunications identifier is a short code. In certain aspects, the telecommunications identifier is a ten-digit code. In certain aspects, the telecommunications identifier is a telecommunications number. In certain aspects, the telecommunications identifier is a local number. In certain aspects, the telecommunications number is a toll-free number.
An example embodiment of the present disclosure, utilizing one or more aspects as set forth preceding, includes a method for executing a messaging campaign. The method includes generating a plurality of telecommunication messages; and transmitting each of the plurality of telecommunication messages to one of a plurality of telecommunications identifiers each associated with an intended distinct recipient. Each of the plurality of telecommunication messages is associated with a same short code. In certain aspects, the method further includes: interpreting a campaign request from an entity; and determining a reputation score of the entity. Generating the plurality of telecommunication messages is based at least in part on the reputation score. In certain aspects, generating the plurality of telecommunication messages is performed when the reputation score meets or exceeds a threshold. In certain aspects, the threshold corresponds to a level of trust with respect to a propensity to commit fraud. In certain aspects, the reputation score is determined by a registrar and the method further includes: determining feedback data corresponding to the reputation score; and transmitting the feedback data to the registrar. In certain aspects, the feedback data indicates the reputation score needs to be adjusted. In certain aspects, the adjustment is an increase in value. In certain aspects, the adjustment is a decrease in value.
An example embodiment of the present disclosure, utilizing one or more aspects as set forth preceding, includes a method for executing a messaging campaign. The method includes generating a plurality of telecommunication messages; and transmitting each of the plurality of telecommunication messages to one of a plurality of telecommunications identifiers each associated with an intended distinct recipient. Each of the plurality of telecommunication messages is associated with a same ten-digit code. In certain aspects, the method further includes: interpreting a campaign request from an entity; and determining a reputation score of the entity. Generating the plurality of telecommunication messages is based at least in part on the reputation score. In certain aspects, generating the plurality of telecommunication messages is performed when the reputation score meets or exceeds a threshold. In certain aspects, the threshold corresponds to a level of trust with respect to a propensity to commit fraud. In certain aspects, the reputation score is determined by a registrar and the method further includes: determining feedback data corresponding to the reputation score; and transmitting the feedback data to the registrar. In certain aspects, the feedback data indicates the reputation score needs to be adjusted. In certain aspects, the adjustment is an increase in value. In certain aspects, the adjustment is a decrease in value.
An example embodiment of the present disclosure, utilizing one or more aspects as set forth preceding, includes a system including a first database, a second database, and a registrar. The first database stores first data corresponding to at least one telecommunications identifier. The second database stores second data corresponding to the at least one telecommunications identifier. The registrar server is structured to: access and interpret the first data and the second data to determine one or more attributes for the at least one telecommunications identifier; determine a reputation score for the at least one telecommunications identifier; and transmit the reputation score. In certain aspects, the registrar server determines the reputation score based at least in part on weighting the one or more attributes. In certain aspects, the system further includes a third database, and weighing the one or more attributes is based at least in part on third data stored within the third database. In certain aspects, the third data corresponds to at least one management behavior of an entity associated with the at least one telecommunications identifier. In certain aspects, the third data corresponds to at least one transactional behavior of an entity associated with the at least one telecommunications identifier. In certain aspects, the third data corresponds to at least one fraudulent behavior of an entity associated with the at least one telecommunications identifier. In certain aspects, the at least one fraudulent behavior includes number masking. In certain aspects, the at least one fraudulent behavior further includes spoofing. In certain aspects, the at least one fraudulent behavior further includes a negative experience by a user, associated with a mobile device, with the entity.
An example embodiment of the present disclosure, utilizing one or more aspects as set forth preceding, includes a non-transitory computer-readable medium storing instructions. The stored instructions adapt at least one processor to: interpret first data from a first database, the first data corresponding to at least one telecommunications identifier; interpret second data from a second database, the second data corresponding to the at least one telecommunications identifier; determine, based at least in part on the first data and the second data, one or more attributes for the at least one telecommunications identifier; generate, based at least in part on the one or more attributes, a reputation score for the at least one telecommunications identifier; and transmit the reputation score. In certain aspects, the stored instructions further adapt the at least one processor to: associate the at least one telecommunications identifier with an entity based at least in part on the first data. In certain aspects, the first database stores at least one record pairing the at least one telecommunications identifier to the entity. In certain aspects, the at least one telecommunications identifier is a local number. In certain aspects, the at least one telecommunications identifier is an IP address. In certain aspects, the at least one telecommunications identifier is a street address. In certain aspects, the first database is a toll-free number registry. In certain aspects, the stored instructions further adapt the at least one processor to: associate the at least one telecommunications identifier with one or more authorized service. In certain aspects, the first database is a Toll-Free Texting and Smart Services Registry.
As will be appreciated, embodiments of the current disclosure build upon base TFN and TSS historic data by adding TFN reputation attributes, TFN transactional feedback, and/or TFN industry insights, which may then be processed via TFN algorithms to generate a TFN reputational score, which in turn may be aggregated to provide for an anonymized way to evaluate the trustworthiness of a TFN.
An example reputation scoring use case includes assigning trust scores for messaging campaigns, e.g., SMS and/or e-mail messaging campaigns. A campaign messaging platform may register its campaign with a registrar who then provides reputation scores to various entities, e.g., MNOs who operate networks that will be used by the campaign messaging platform to distribute campaign messages. Knowledge of a reputation score for a messaging campaign may improve the ability of the MNOs to distinguish between authorized network traffic and fraudulent network traffic which, in turn, may improve the ability of a messaging campaign platform to reach intended recipients and/or customers. Additionally, the registrar may be able to assist the campaign platform in detecting messaging campaign requests associated with fraudulent entities, e.g., the detection of a fraudulent telecommunications identifier within the message portion of a campaign message.
Another example reputation score use case is providing fresh TFNs within a score range that is suitable for a particular application, e.g., a TFN with a very high reputation score could be used for a Government hotline for Covid. As another example, a RespOrg may acquire a TFN with a mid-level TFN score, that may have recently been returned to a registry, for the purpose of examining residual traffic.
Another example reputation score use case us the prioritization or blocking of telecommunications identifier, with respect to accessing and/or using telecommunication resources. For example, telecommunication numbers with a comparatively high reputation e.g., they are trustworthy, may be treated with preferences by telecommunication network resources, e.g., carriers, over less trustworthy telecommunications identifiers. Additionally, telecommunications identifiers with a comparatively low reputation score may be denied access to telecommunication resources, e.g., a number known to have repeatedly been used to commit fraud may have a reputation score below a pre-defined threshold that results in the telecommunications identifier being unable to originate telecommunications.
Another example reputation score use case is the screening of calls for answering and/or callbacks. For example, in embodiments, the reputation score of a telecommunication number originating a telecommunication may be displayed on a user device, e.g., a smart phone, so that the user of the device can make an informative decision as to whether they should answer the inbound telecommunication and/or call the telecommunications identifier back.
Another example reputation score use case is approving and/or enabling text messages to be generated, routed, and/or received. For example, a campaign platform may use reputation scores, as disclosed herein, to filter telecommunications traffic that is passed to an MNO network so as to reduce the amount of spam (originating from the campaign platform) that hits/enters the MNO network. For example, only telecommunications traffic associated with a reputation score above a threshold level may be allowed to pass from the campaign platform to the MNO network.
In embodiments, a reputational score may be based on one or more of: the stability of a company, e.g., how long has it been around, the stability of a number being registered to a company, how often has the company trying to execute a campaign changed numbers, and/or other attributes which may indicate whether a company is stable or likely to be fraudulent in nature. Reputational scores may be dynamic, e.g., adjusted over time. For example, a company may initially have a bad-moderate reputational score that improves over time as the company demonstrates stability and/or a track-record of non-fraudulent activities. In embodiments, attributes used to determine a reputational score may be retrieved from a telecommunications number registration database. In embodiments, attributes may be retrieved from fraud databases and/or other data sources that track fraudulent and/or potentially fraudulent activities associated with telecommunications numbers and/or companies. In embodiments, attributes for determining a score may include a geographic region, e.g., country, zip code, address, state/province, etc., associated with the telecommunications number and/or the company. In embodiments, attributes for determining a score may include network traffic patterns associated with the telecommunications number and/or the company requesting to launch a campaign.
Another example use case of the APIs, disclosed herein, includes real-time dashboard that provide for monitoring of TF and 10DLC messaging campaigns, sole proprietary uses, spam/fraud filtering statistics, etc.
The methods and systems described herein may be deployed in part or in whole through a machine having a computer, computing device, processor, circuit, and/or server that executes computer readable instructions, program codes, instructions, and/or includes hardware configured to functionally execute one or more operations of the methods and systems herein. The terms computer, computing device, processor, circuit, and/or server, (“computing device”) as utilized herein, should be understood broadly.
An example computing device includes a computer of any type, capable to access instructions stored in communication thereto such as upon a non-transient computer readable medium, whereupon the computer performs operations of the computing device upon executing the instructions. In certain embodiments, such instructions themselves comprise a computing device. Additionally or alternatively, a computing device may be a separate hardware device, one or more computing resources distributed across hardware devices, and/or may include such aspects as logical circuits, embedded circuits, sensors, actuators, input and/or output devices, network and/or communication resources, memory resources of any type, processing resources of any type, and/or hardware devices configured to be responsive to determined conditions to functionally execute one or more operations of systems and methods herein.
Network and/or communication resources include, without limitation, local area network, wide area network, wireless, internet, or any other known communication resources and protocols. Example and non-limiting hardware and/or computing devices include, without limitation, a general-purpose computer, a server, an embedded computer, a mobile device, a virtual machine, and/or an emulated computing device. A computing device may be a distributed resource included as an aspect of several devices, included as an interoperable set of resources to perform described functions of the computing device, such that the distributed resources function together to perform the operations of the computing device. In certain embodiments, each computing device may be on separate hardware, and/or one or more hardware devices may include aspects of more than one computing device, for example as separately executable instructions stored on the device, and/or as logically partitioned aspects of a set of executable instructions, with some aspects comprising a part of one of a first computing device, and some aspects comprising a part of another of the computing devices.
A computing device may be part of a server, client, network infrastructure, mobile computing platform, stationary computing platform, or other computing platform. A processor may be any kind of computational or processing device capable of executing program instructions, codes, binary instructions and the like. The processor may be or include a signal processor, digital processor, embedded processor, microprocessor or any variant such as a co-processor (math co-processor, graphic co-processor, communication co-processor and the like) and the like that may directly or indirectly facilitate execution of program code or program instructions stored thereon. In addition, the processor may enable execution of multiple programs, threads, and codes. The threads may be executed simultaneously to enhance the performance of the processor and to facilitate simultaneous operations of the application. By way of implementation, methods, program codes, program instructions and the like described herein may be implemented in one or more threads. The thread may spawn other threads that may have assigned priorities associated with them; the processor may execute these threads based on priority or any other order based on instructions provided in the program code. The processor may include memory that stores methods, codes, instructions and programs as described herein and elsewhere. The processor may access a storage medium through an interface that may store methods, codes, and instructions as described herein and elsewhere. The storage medium associated with the processor for storing methods, programs, codes, program instructions or other type of instructions capable of being executed by the computing or processing device may include but may not be limited to one or more of a CD-ROM, DVD, memory, hard disk, flash drive, RAM, ROM, cache and the like.
A processor may include one or more cores that may enhance speed and performance of a multiprocessor. In embodiments, the process may be a dual core processor, quad core processors, other chip-level multiprocessor and the like that combine two or more independent cores (called a die).
The methods and systems described herein may be deployed in part or in whole through a machine that executes computer readable instructions on a server, client, firewall, gateway, hub, router, or other such computer and/or networking hardware. The computer readable instructions may be associated with a server that may include a file server, print server, domain server, internet server, intranet server and other variants such as secondary server, host server, distributed server and the like. The server may include one or more of memories, processors, computer readable transitory and/or non-transitory media, storage media, ports (physical and virtual), communication devices, and interfaces capable of accessing other servers, clients, machines, and devices through a wired or a wireless medium, and the like. The methods, programs, or codes as described herein and elsewhere may be executed by the server. In addition, other devices required for execution of methods as described in this application may be considered as a part of the infrastructure associated with the server.
The server may provide an interface to other devices including, without limitation, clients, other servers, printers, database servers, print servers, file servers, communication servers, distributed servers, and the like. Additionally, this coupling and/or connection may facilitate remote execution of instructions across the network. The networking of some or all of these devices may facilitate parallel processing of program code, instructions, and/or programs at one or more locations without deviating from the scope of the disclosure. In addition, all the devices attached to the server through an interface may include at least one storage medium capable of storing methods, program code, instructions, and/or programs. A central repository may provide program instructions to be executed on different devices. In this implementation, the remote repository may act as a storage medium for methods, program code, instructions, and/or programs.
The methods, program code, instructions, and/or programs may be associated with a client that may include a file client, print client, domain client, internet client, intranet client and other variants such as secondary client, host client, distributed client and the like. The client may include one or more of memories, processors, computer readable transitory and/or non-transitory media, storage media, ports (physical and virtual), communication devices, and interfaces capable of accessing other clients, servers, machines, and devices through a wired or a wireless medium, and the like. The methods, program code, instructions, and/or programs as described herein and elsewhere may be executed by the client. In addition, other devices required for execution of methods as described in this application may be considered as a part of the infrastructure associated with the client.
The client may provide an interface to other devices including, without limitation, servers, other clients, printers, database servers, print servers, file servers, communication servers, distributed servers, and the like. Additionally, this coupling and/or connection may facilitate remote execution of methods, program code, instructions, and/or programs across the network. The networking of some or all of these devices may facilitate parallel processing of methods, program code, instructions, and/or programs at one or more locations without deviating from the scope of the disclosure. In addition, all the devices attached to the client through an interface may include at least one storage medium capable of storing methods, program code, instructions, and/or programs. A central repository may provide program instructions to be executed on different devices. In this implementation, the remote repository may act as a storage medium for methods, program code, instructions, and/or programs.
The methods and systems described herein may be deployed in part or in whole through network infrastructures. The network infrastructure may include elements such as computing devices, servers, routers, hubs, firewalls, clients, personal computers, communication devices, routing devices and other active and passive devices, modules, and/or components as known in the art. The computing and/or non-computing device(s) associated with the network infrastructure may include, apart from other components, a storage medium such as flash memory, buffer, stack, RAM, ROM and the like. The methods, program code, instructions, and/or programs described herein and elsewhere may be executed by one or more of the network infrastructural elements.
The methods, program code, instructions, and/or programs described herein and elsewhere may be implemented on a cellular network having multiple cells. The cellular network may either be frequency division multiple access (FDMA) network or code division multiple access (CDMA) network. The cellular network may include mobile devices, cell sites, base stations, repeaters, antennas, towers, and the like.
The methods, program code, instructions, and/or programs described herein and elsewhere may be implemented on or through mobile devices. The mobile devices may include navigation devices, cell phones, mobile phones, mobile personal digital assistants, laptops, palmtops, netbooks, pagers, electronic books readers, music players and the like. These devices may include, apart from other components, a storage medium such as a flash memory, buffer, RAM, ROM and one or more computing devices. The computing devices associated with mobile devices may be enabled to execute methods, program code, instructions, and/or programs stored thereon. Alternatively, the mobile devices may be configured to execute instructions in collaboration with other devices. The mobile devices may communicate with base stations interfaced with servers and configured to execute methods, program code, instructions, and/or programs. The mobile devices may communicate on a peer-to-peer network, mesh network, or other communications network. The methods, program code, instructions, and/or programs may be stored on the storage medium associated with the server and executed by a computing device embedded within the server. The base station may include a computing device and a storage medium. The storage device may store methods, program code, instructions, and/or programs executed by the computing devices associated with the base station.
The methods, program code, instructions, and/or programs may be stored and/or accessed on machine readable transitory and/or non-transitory media that may include: computer components, devices, and recording media that retain digital data used for computing for some interval of time; semiconductor storage known as random access memory (RAM); mass storage typically for more permanent storage, such as optical discs, forms of magnetic storage like hard disks, tapes, drums, cards and other types; processor registers, cache memory, volatile memory, non-volatile memory; optical storage such as CD, DVD; removable media such as flash memory (e.g. USB sticks or keys), floppy disks, magnetic tape, paper tape, punch cards, standalone RAM disks, Zip drives, removable mass storage, off-line, and the like; other computer memory such as dynamic memory, static memory, read/write storage, mutable storage, read only, random access, sequential access, location addressable, file addressable, content addressable, network attached storage, storage area network, bar codes, magnetic ink, and the like.
Certain operations described herein include interpreting, receiving, and/or determining one or more values, parameters, inputs, data, or other information (“receiving data”). Operations to receive data include, without limitation: receiving data via a user input; receiving data over a network of any type; reading a data value from a memory location in communication with the receiving device; utilizing a default value as a received data value; estimating, calculating, or deriving a data value based on other information available to the receiving device; and/or updating any of these in response to a later received data value. In certain embodiments, a data value may be received by a first operation, and later updated by a second operation, as part of the receiving a data value. For example, when communications are down, intermittent, or interrupted, a first receiving operation may be performed, and when communications are restored an updated receiving operation may be performed.
Certain logical groupings of operations herein, for example methods or procedures of the current disclosure, are provided to illustrate aspects of the present disclosure. Operations described herein are schematically described and/or depicted, and operations may be combined, divided, re-ordered, added, or removed in a manner consistent with the disclosure herein. It is understood that the context of an operational description may require an ordering for one or more operations, and/or an order for one or more operations may be explicitly disclosed, but the order of operations should be understood broadly, where any equivalent grouping of operations to provide an equivalent outcome of operations is specifically contemplated herein. For example, if a value is used in one operational step, the determining of the value may be required before that operational step in certain contexts (e.g., where the time delay of data for an operation to achieve a certain effect is important), but may not be required before that operation step in other contexts (e.g. where usage of the value from a previous execution cycle of the operations would be sufficient for those purposes). Accordingly, in certain embodiments an order of operations and grouping of operations as described is explicitly contemplated herein, and in certain embodiments re-ordering, subdivision, and/or different grouping of operations is explicitly contemplated herein.
The methods and systems described herein may transform physical and/or or intangible items from one state to another. The methods and systems described herein may also transform data representing physical and/or intangible items from one state to another.
The methods and/or processes described above, and steps thereof, may be realized in hardware, program code, instructions, and/or programs or any combination of hardware and methods, program code, instructions, and/or programs suitable for a particular application. The hardware may include a dedicated computing device or specific computing device, a particular aspect or component of a specific computing device, and/or an arrangement of hardware components and/or logical circuits to perform one or more of the operations of a method and/or system. The processes may be realized in one or more microprocessors, microcontrollers, embedded microcontrollers, programmable digital signal processors or other programmable device, along with internal and/or external memory. The processes may also, or instead, be embodied in an application specific integrated circuit, a programmable gate array, programmable array logic, or any other device or combination of devices that may be configured to process electronic signals. It will further be appreciated that one or more of the processes may be realized as a computer executable code capable of being executed on a machine-readable medium.
The computer executable code may be created using a structured programming language such as C, an object oriented programming language such as C++, or any other high-level or low-level programming language (including assembly languages, hardware description languages, and database programming languages and technologies) that may be stored, compiled or interpreted to run on one of the above devices, as well as heterogeneous combinations of processors, processor architectures, or combinations of different hardware and computer readable instructions, or any other machine capable of executing program instructions.
Thus, in one aspect, each method described above, and combinations thereof, may be embodied in computer executable code that, when executing on one or more computing devices, performs the steps thereof. In another aspect, the methods may be embodied in systems that perform the steps thereof, and may be distributed across devices in a number of ways, or all of the functionality may be integrated into a dedicated, standalone device or other hardware. In another aspect, the means for performing the steps associated with the processes described above may include any of the hardware and/or computer readable instructions described above. All such permutations and combinations are intended to fall within the scope of the present disclosure.
Accordingly, as is to be appreciated, embodiments of the current disclosure may enhance telecommunication messaging systems by leveraging neutral and/or authoritative data from registry operations to ensure that only numbers with a high level of trust, e.g., a high reputation score, have text enabled. Such embodiments may quickly reduce friction and/or costs of telecommunications by augmenting current processes, with trust levels building over time. For example, some embodiments of the current disclosure may ensure reputations are current and flag any changes to their status (in one or more registries), thereby mitigating the likelihood of reputational scored becoming stale over time. In embodiments, real-time feedback loops between the various members of a telecommunications system, e.g., 100 (
As will be further appreciated, the reputation scoring of telecommunications identifiers and/or entities, as disclosed herein, may provide for a path, e.g., a solution to mitigating spam and/or other types of fraud, in which only verified, trusted, and/or wanted business messaging application telecommunications traffic is delivered to end users without penalizing good (trustworthy) traffic due to the actions of bad (untrustworthy) traffic. Further, embodiments of the current disclosure may provide for proper P2P exemption support that truly supports one-to-one end user traffic profiles which, in turn, may promote industry growth. Further still, unlike many Stir/Shaken-based protocols, the tools, e.g., GUIs, disclosed herein, may provide for the mitigation of robotexts. Yet further still, the APIs, disclosed herein, may provide dashboards for MNOs to monitor their networks and/or telecommunications traffic in real-time.
While the disclosure has been disclosed in connection with certain embodiments shown and described in detail, various modifications and improvements thereon will become readily apparent to those skilled in the art. Accordingly, the spirit and scope of the present disclosure is not to be limited by the foregoing examples but is to be understood in the broadest sense allowable by law.
This application claims the benefit of and priority to: U.S. Provisional Patent Application Ser. No. 63/346,444, filed May 27, 2022, and entitled “REPUTATION MANAGEMENT PLATFORM AND METHODS THEREOF” (SMS8-0011-P01); and U.S. Provisional Patent Application Ser. No. 63/453,586, filed Mar. 21, 2023, and entitled “REPUTATION MANAGEMENT PLATFORM AND METHODS THEREOF” (SMS8-0011-P02). All of the foregoing patents and patent applications are incorporated herein by reference in their entirety for all purposes.
Number | Date | Country | |
---|---|---|---|
63346444 | May 2022 | US | |
63453586 | Mar 2023 | US |