Abstract: Systems and methods for automatically authenticating an incoming call are disclosed. In one implementation a method for automatically authenticating an incoming call includes receiving a call from a calling device. The call includes an identifier associated with the calling device. The method further includes receiving, separately from the call, authentication data associated with a device or a user, determining, using the identifier and the authentication data, that the authentication data is associated with the same calling device that initiated the call, verifying the authentication data, and based on a result of the verification, determining that the call is initiated by an authenticated device or user.
Type:
Grant
Filed:
April 3, 2019
Date of Patent:
October 12, 2021
Assignee:
Neustar, Inc.
Inventors:
Guido Jonjie S. Sena, Jr., Manjul Maharishi, Gaurav Sharma
Abstract: A method and system for authenticating answers to Domain Name System (DNS) queries originating from recursive DNS servers are provided. A verification component provides a verification that a DNS query originated from the recursive DNS server. An authoritative DNS server receives the query via a network, such as the Internet, and provides an answer to the query to an authentication component. The authentication component then provides an authentication, such as a digital signature, which confirms that the received answer was provided by the authoritative DNS server, and then communicates the answer and the authentication to the verification component via the network. The verification component then verifies that the authentication corresponds to the received answer and sends the answer to the recursive DNS server. When the verification component receives an answer in the absence of a corresponding authentication, the verification component drops the answer.
Type:
Application
Filed:
November 9, 2020
Publication date:
September 16, 2021
Applicant:
Neustar, Inc.
Inventors:
Rodney Lance JOFFE, Victor Joseph OPPLEMAN, David Link KING, Brett Dean WATSON, Andrew JACKSON, Sean LEACH
Abstract: Computer systems and methods for verifying a route taken by a communication are disclosed. In one implementation, a device for verifying a route taken by a communication may include one or more processors configured to obtain a communication transmitted by a source entity. The communication may include data and digital signatures, and each of the digital signatures may be generated based on at least the data. Further, the digital signatures may include a digital signature associated with the source entity, and a set of digital signatures associated with at least a subset of intermediate entities on a route taken by the communication. The one or more processors may be further configured to verify the digital signatures included in the communication, verify whether the entities associated with the digital signatures form an expected route for the communication, and process the data.
Abstract: Systems and methods for providing called devices with sets of context data associated with communication sessions are disclosed. In one implementation, a method for generating context data associated with a communications session may include receiving, from a calling device at a first subsystem, a request to establish a communications session. The request may include a first identifier associated with the calling device. The method may further include receiving, at a second subsystem, activities data associated with the calling device that transmitted the request to establish the communications session. The activities data may include a second identifier associated with the calling device and may be indicative of device activities of the calling device.
Type:
Grant
Filed:
April 3, 2019
Date of Patent:
July 6, 2021
Assignee:
Neustar, Inc.
Inventors:
Guido Jonjie S. Sena, Jr., Manjul Maharishi, Gaurav Sharma
Abstract: Examples described herein relate to a data aggregation system for enabling query operations on restricted data that originates from multiple independent sources.
Abstract: Systems and methods are described that enable trusted communications between two entities. In one implementation, a controller of a vehicle may include one or more processors configured to receive data and a controller signature from a second controller of the vehicle. The controller signature may be generated based on at least a first portion of the data. The one or more processors may be further configured to transmit the data and the controller signature to a gateway of the vehicle and receive a gateway signature from the gateway. The gateway signature may be generated based on at least a second portion of the data and transmitted to the controller after the gateway verified the controller signature. In addition, the one or more processors may be configured to verify the gateway signature and process the data.
Abstract: A method for disabling a device associated with a virtual identity may include receiving, from the device, a request to use the virtual identity, where the request that may include a passcode guess and a device identifier. The method may also include determining that the passcode guess does not authorize use of the virtual identity and incrementing a number of incorrect passcode guesses received within a time interval. The method may additionally include determining that the number of incorrect passcode guesses received within the time interval is greater than or equal to a threshold. The method may further include storing an indication that subsequent requests associated with the device identifier should not authorize use of the virtual identity.
Abstract: A contact information system provides an independent network authority for providing contact information in connection with incoming calls or messages. The contact information system utilizes a database of communication identifiers to provide contact information for end user devices that receive incoming communications which specify communication identifiers that are stored in the database.
Type:
Grant
Filed:
January 28, 2020
Date of Patent:
April 13, 2021
Assignee:
Neustar, Inc.
Inventors:
Tim Cody, Guido Jonjie S. Sena, Jr., Ken Politz, John Devolites, Michael Cooley
Abstract: Computerized approaches for replicating a portion of a data set to a local repository associated with a subnetwork are disclosed. In one implementation, a method for a device associated with a subnetwork may include obtaining a portion of a data set from a central repository. The data set may be associated with one or more subnetworks, and the portion of the data set may be associated with the subnetwork. The method may further include obtaining a request for data originating from a node in the subnetwork. The requested data may include the portion of the data set, and data generated based on the portion of the data set, and the request may be destined for the central repository. The method may also include determining whether the central repository is unavailable to provide the requested data, and providing the requested data to the node if the central repository is unavailable.
Abstract: A system and method are provided for routing content requests. On a given server network, content requests comprising a character string may be routed up a hierarchical network topology until a linear chain, corresponding to the character string, is identified. Thus, the content request is forwarded up the hierarchy until an intersecting server network is reached. Then the content request is forwarded down the hierarchy until, along a published linear chain corresponding to the character string, until a content source is reached. Content is provided to the requestor along a reverse path of the content request.
Abstract: System and methods for providing calling party information are disclosed. In one implementation, a server for providing calling party information includes one or more processors configured to receive a query for calling party information from a carrier. The query includes an identifier associated with the calling party. The processors are further configured to determine a score based on one or more previously obtained queries, generate the calling party information based on the score, and transmit the calling party information to the carrier. The carrier transmits the calling party information to a device associated with the called party as a Caller ID Name (CNAM).
Type:
Grant
Filed:
June 27, 2018
Date of Patent:
January 5, 2021
Assignee:
Neustar, Inc.
Inventors:
Marybeth C. Degeorgis, Kenneth McWilliams, Aleksandr Fedoseyev, Padmavati Chitrapu
Abstract: A method and system for authenticating answers to Domain Name System (DNS) queries originating from recursive DNS servers provided. A verification component provides a versification that a DNS query originated from the recursive DNS server. An authoritative DNS server receives the query via a network, such as the Internet, provides an answer to the query to an authentication component. The authentication component then provides an authentication such as a digital signature, which confirms that the received answer was provided by the authoritative DNS server, and then communicates the answer and the authentication to the verification component via the network. The verification component then verifies that the authentication corresponds to the receive answer and sends the answer to the recursive DNS server. When the verification component receives an answer in the absence of a corresponding authentication the verification component drops the answer.
Type:
Grant
Filed:
May 29, 2018
Date of Patent:
November 10, 2020
Assignee:
Neustar, Inc.
Inventors:
Rodney Lance Joffe, Victor Joseph Oppleman, David Link King, Brett Dean Watson, Andrew Jackson, Sean Leach
Abstract: A contact information system provides an independent network authority for providing contact information in connection with incoming calls or messages. The contact information system utilizes a database of communication identifiers to provide contact information for end user devices that receive incoming communications which specify communication identifiers that are stored in the database.
Type:
Application
Filed:
January 28, 2020
Publication date:
August 20, 2020
Applicant:
Neustar, Inc.
Inventors:
Tim CODY, Guido Jonjie S. SENA, JR., Ken POLITZ, John DEVOLITES, Michael COOLEY
Abstract: A method and system for distributing contacting information between applications is provided. The system preferably uses an ENUM-type protocol and a middleware tool kit to associate telephone numbers to other identifying information, such as e-mail addresses or URLs for web sites. The system enables the associated contacting information to be shared across multiple applications that may be implemented on a computer or a mobile telephony device. Information is shared only after verification that a requester is authorized to receive the requested contacting information.
Type:
Grant
Filed:
November 2, 2018
Date of Patent:
June 23, 2020
Assignee:
Neustar, Inc.
Inventors:
Jon Peterson, Webb Dryfoos, Peter Charlier Davis
Abstract: The disclosed systems, methods and apparatus enable alert messaging systems to send geographic location information with a geo-targeted message to end user wireless devices. The disclosed technology can be used to generate a plurality of messages where payload of a first message can include a message content, and where a payload of one or more additional messages can includes compressed location information. The user devices receiving the plurality of generated messages can process the compressed location information to determine whether the content of the received message should be displayed.
Type:
Grant
Filed:
March 22, 2019
Date of Patent:
June 23, 2020
Assignee:
Neustar, Inc.
Inventors:
Roland Guegel, Deepak Sonar, Ralph Holmes, Adam Campbell
Abstract: Computer systems and methods for displaying on a device associated with a calling party visual content customized by a called party are disclosed. In one implementation, a device associated with a calling party includes one or more processors may be configured to obtain a request to establish a communication session with a device associated with a called party. The one or more processors may be further configured to, in response to obtaining the request to establish the communication session, attempt to initiate the communication session and transmit an identifier associated with the called party to a server and obtain display data from the server. The display data may be generated based on configuration data associated with the called party. The one or more processors may be further configured to cause display of visual content generated based on the display data.
Abstract: A contact information system provides an independent network authority for providing contact information in connection with incoming calls or messages. The contact information system utilizes a database of communication identifiers to provide contact information for end user devices that receive incoming communications which specify communication identifiers that are stored in the database.
Type:
Grant
Filed:
April 10, 2018
Date of Patent:
January 28, 2020
Assignee:
Neustar, Inc.
Inventors:
Tim Cody, Guido Jonjie S. Sena, Jr., Ken Politz, John Devolites, Michael Cooley
Abstract: Systems and methods are described that enable trusted communications between two entities. In one implementation, a server for communicating with a device may include one or more processors configured to receive data and a device signature from the device. The device signature may be generated based on at least a first portion of the data. One or more processors may be further configured to transmit the data and the device signature to a second server and receive a second server signature from the second server. The second server signature may be generated based on at least a second portion of the data and transmitted to the server after the second server verified the device signature. Further, one or more processors may be configured to verify the second server signature and process the data.
Abstract: A server system for a domain name system (DNS) which operates to concurrently provide both public-facing and restricted channels for receiving and handling Internet Protocol (IP) address requests from a population of computers. The server system implements an alternative DNS request handling process to provide a trusted computer entity with exclusive access to the restricted channels.
Abstract: Examples described herein relate to a data aggregation system for enabling query operations on restricted data that originates from multiple independent sources.