Class / Patent application number | Description | Number of patent applications / Date published |
379114140 | Fraud detection or control | 12 |
20090010409 | METHOD FOR BILLING IN A TELECOMMUNICATIONS NETWORK - The present invention is directed to a method for placing a call between a client in one network and a client in another network. The IP network includes a SIP server and a network gateway configured to provide access to a public switched network. The method includes receiving a SIP call request message from the first client. The SIP call request message is authenticated to thereby identify an authentic originating client. Subsequently, a database is searched to find client billing tag corresponding to the authentic originating client. The call is completed if the client billing tag is obtained, and not completed if the client billing tag cannot be obtained. Thus, the present invention provides an efficient method for billing phone calls that are placed from SIP enabled devices to a telephone connected to the Public Switched Telephone Network (PSTN). The method of the present invention also substantially eliminates certain types of fraud. | 01-08-2009 |
20090168981 | Apparatus and Methods for Managing Communication between Parties - Increasing use is being made of XML procedure calls to control and integrate telecommunications networks with other IT equipment. XML messages are verbose and include information which is not required merely to monitor activity in the network for purposes such as billing and authentication. The use of XPath or XQuery operations allow the XML messages to be dynamically and quickly analysed and filtered for relevant information. | 07-02-2009 |
20090310763 | VOICE AUTHENTICATION FOR CALL CONTROL - A communication network is disclosed that uses voice authentication to provide call control. The communication network includes a call control function, a voice collection system, a voice authentication system, and a permission system. The voice collection system collects voice samples of a first party during the call to a second party, and transmits the collected voice samples to the voice authentication system. The voice authentication system compares the collected voice samples to stored voice samples to determine the identity of the first party. The permission system determines whether the first party is authorized for the call based on the identity of the first party. The permission system generates results based on the determination and transmits the results to the call control function. The call control function then processes the results, and interrupts the call if the first party is not authorized. | 12-17-2009 |
20100080372 | METHOD AND APPARATUS FOR PROVIDING FRAUD DETECTION USING HOT OR COLD ORIGINATING ATTRIBUTES - An approach provides fraud detection in support of data communication services. A list of single-event attributes (e.g., hot or cold attributes) is generated and includes a network address of an end user host originating a data call or a calling party identification (e.g., Automatic Number Identification (ANI) or an originating Calling Line Identification (CLI)) for network access, wherein entries of the list specify values of the hot attributes. An attribute value associated with the data call is compared with the entries. A fraud alert is generated if the attribute value matches one of the entries. | 04-01-2010 |
20100142690 | DOMESTIC TO INTERNATIONAL COLLECT CALL BLOCKING - A method and device for preventing fraud in collect calls from a domestic origin point to an international terminating point through a long-distance telecommunications system is described. In the system and method, a Screening for International Calls database is added to the call processing platform. This Screening of International Calls database contains records keyed by country codes, and each record has a blocked collect call field listing destination numbers that are blocked from receiving collect calls. When a domestic-to-international collect call is made, the record corresponding to the country code of the international terminating point of the collect call is retrieved from the Screening for International Calls database. This record is checked to determine if the destination number of the collect call matches any destination numbers listed in the blocked collect call field of the country code database record. If there is a match, the call is blocked. | 06-10-2010 |
20110255676 | FRAUD DETECTION BASED ON CALL ATTEMPT VELOCITY ON TERMINATING NUMBER - A method of identifying fraud in a telecommunications system, the method including receiving data related to a current call placed from an originating ANI to a terminating ANI, where the received data includes the terminating ANI and a billing number used to place the call. Billing numbers for prior calls to the terminating ANI, if any, and corresponding indicia of the times of the calls are retrieved. A determination is made of whether the number of billing numbers used for the current and prior calls to the terminating ANI over a prior period of time falling within a time interval satisfies a threshold. If the threshold is satisfied, a fraud alert is generated. | 10-20-2011 |
20130315386 | SYSTEM AND METHOD FOR PROFITABLE OPERATION OF AN UNLIMITED COMMUNICATIONS PLAN - A system and method for profitably operating communications services may include providing a service plan inclusive of at least a portion of the communications services being unlimited for a user. A computing system may collect usage data of the user during a time period associated with the unlimited portion of the service plan. The computing system may determine whether the usage data is indicative of the user using the communications services in violation of service terms and conditions associated with the unlimited portion of the service plan. The computing system may perform an action in response to determining that the user is in violation of the terms and conditions. | 11-28-2013 |
20140044248 | NETWORK ASSURANCE ANALYTIC SYSTEM - A network assurance analytics (NAA) system and method is disclosed. The NAA can be part of a risk analytic for telecom (RAFT) program. The NAA system is configured to monitor telecommunications networks, detect errors or fraud in those telecommunications networks, and provide solutions to resolve the errors or reduce the fraud. Traffic of a telecommunications network is electronically monitored for at least one pattern that is indicative of a telecommunications anomaly. Based on a set of a set of telecommunications profiles stored in a database, a model score representing a value of the telecommunications anomaly is generated. A solution for the telecommunications network to reduce the model score associated with the telecommunications anomaly is then generated for execution on the telecommunications network. | 02-13-2014 |
20140376705 | SYSTEM AND METHOD FOR NON-DISRUPTIVE MITIGATION OF VOIP FRAUD - A system and method are disclosed herein for providing mitigation of VoIP PBX fraud while having minimal impact on authorized VoIP PBX users. The method includes a system for detecting potential fraud based on multiple and configurable fraud indicators as well as historical data, which can be customized for individual users or groups, which in turn can trigger the other parts of the system to mitigate fraud. The system can terminate in-process calls that are potentially fraudulent and reset the network access credentials for the user accounts or device(s) that have been potentially compromised. The system can use historical data to block further calls from the compromised user accounts or devices to specific locations where the presumed fraudulent calls were directed. In a further aspect, the system and method can automatically reset the network access credentials for authorized users with minimal down time. | 12-25-2014 |
20160127562 | MANAGEMENT OF TOLL-FREE NUMBER MISUSE AND FRAUD DETECTION - Methods and systems for providing a rating system that allow for customers to create a database of toll-free numbers that are abused by malicious consumers which may be cloud-based and allow for service providers to dip prior to completing or accepting calls. | 05-05-2016 |
20160134757 | METHOD AND SYSTEM FOR PREVENTING ILLICIT USE OF A TELEPHONY PLATFORM - A system and method for preventing illicit use of a telephony platform that includes enrolling a plurality of accounts on a telecommunications platform, wherein an account includes account configuration; at a fraud detection system of the telecommunications platform, receiving account usage data, wherein the usage data includes at least communication configuration data and billing configuration data of account configuration and further includes communication history of the plurality of accounts; calculating fraud scores of a set of fraud rules from the usage data, wherein at least a sub-set of the fraud rules include conditions of usage data patterns between at least two accounts; detecting when the fraud scores of an account satisfy a fraud threshold; and initiating an action response when a fraud score satisfies the fraud threshold. | 05-12-2016 |
20160150092 | ANALYZING VOICE CHARACTERISTICS TO DETECT FRAUDULENT CALL ACTIVITY AND TAKE CORRECTIVE ACTION WITHOUT USING RECORDING, TRANSCRIPTION OR CALLER ID - A system and method for monitoring telephone calls to detect fraudulent activity and take corrective action is described. The system receives a first group of telephone calls having associated voice characteristics and analyzes the first group of telephone calls to identify and store a first set of distributions of voice characteristics that are indicative of normal activity, fraudulent activity, or indeterminate activity. The system receives a second group of telephone calls to be analyzed. The system analyzes the second group of telephone calls to identify a second set of distributions of voice characteristics associated with the second group of telephone calls. The system then compares the second set of distributions of voice characteristics to the stored first set of distributions of voice characteristics to assess a probability that one or more telephone calls in the second group of telephone calls represents normal, fraudulent, or indeterminate activity. If the assessed probability of fraudulent activity exceeds a threshold, the system takes appropriate corrective action, such a flagging the fraudulent call or withholding a financial incentive associated with the fraudulent call. | 05-26-2016 |