Apple Inc.
Detection of spoofed call information

Last updated:

Abstract:

A mobile device receives an invitation to commence a media session. The invitation may be from a legitimate caller or from a spoofing caller. The mobile device checks parameters using templates to evaluate a consistency of the invitation with respect to a database in the mobile device. The templates include session protocol, network topology, routing, and social templates. Specific template data includes standardized protocol parameters, values from a database of the mobile device and phonebook entries of the mobile device. Examples of the parameters include capabilities, preconditions, vendor equipment identifiers, a hop counter value and originating network information. The originating network information may be obtained from the database by first querying an on-line database to determine a network identifier associated with caller identification information in the invitation. Then, the obtained carrier identifier is used as an index into a database to obtain template data characteristic of the identified originating network.

Status:
Grant
Type:

Utility

Filling date:

5 Apr 2017

Issue date:

17 Aug 2021