Abstract: A method of detecting telephony fraud in the case of a mobile telephony device roaming at a visited network, the visited network being other than a home network of said mobile telephony device, cross-network triggering being available between said visited network and said home network. The method comprises detecting a non-correlation between said cross-network triggering and activity of said mobile telephony device, testing to find out if profile manipulation has taken place of a profile of said mobile telephony device held at said visited network, and upon detecting that profile manipulation has taken place taking remedial action such as blocking current calls and overwriting the manipulated profile.
Abstract: A method of managing voice calls in LTE/4G telephony for a mobile handset roaming outside of its home network in a network where voice calls use 3G technology, using a Global Location Register (GLR) which is designed to manage registrations without informing the home network. The method involves registering the mobile handset in 4G at the roaming network, obtaining and prestoring 3G information for the mobile handset from the home network while the mobile handset is registered in 4G, obtaining a voice call request for the mobile handset; and reregistering the mobile handset in 3G at the roaming network to use circuit switch fallback for the voice call, the reregistering comprising using the prestored 3G information so that the home network does not have to be contacted.
Abstract: Mobile and in particular Internet of things (IoT) devices have access point names (APN) for identifying network servers with which they are supposed to communicate. Disclosed are network devices and methods for APN virtualization to manage the mobile devices. The network device may replace an original APN with an assigned APN by looking up the mobile device in a database, based on a device identification. The modified APN is then used in a standard DNS lookup.
Abstract: System for monitoring of IoT data traffic between an IoT device connected via a cellular network and a server using Internet Protocol (IP), where the IP addresses are dynamically assigned and thus do not identify the devices. The system uses a device on the cellular network that extracts cellular identification of an IoT device involved in a data communication session and IP identification of the data communication session. The device matches the cellular identification with the IP identification. A database has device security profiles for IoT devices which can be retrieved per device via the cellular identification. Then, an enforcement unit identifies the session using the IP address and allows traffic only if the traffic conforms with the device security profile which was retrieved using the cellular identification.
Abstract: Component for insertion into a cellular communication network to reduce redundant signaling on the network or between the network and other networks, comprises: an extractor, to extract signaling passing the insertion point towards a destination, modify the signaling and reinsert the signaling for sending onwards. The extractor comprises a signal part remover to remove a part determined to be present at the destination; and an inserter for inserting a flag into the signaling to indicate the removal. The modified signal is sent on to the destination where a complementary component reads the flag and reinserts the extracted part from a database of its own. Location update activity often involves redundant transfer of user profiles, which the components herein can save.