Using calling party number for caller authentication
First Claim
1. A method, comprising:
- receiving, by an authentication device, a call request and associated calling party information that includes a calling party number, wherein the call request is initiated by a caller;
retrieving, by the authentication device, one or more parameters associated with the calling party number, the one or more parameters comprising a number of accounts linked to the calling party number;
comparing, by the authentication device, the one or more parameters to one or more respective threshold values;
verifying, by the authentication device, that the call request originates from a location or a device associated with the calling party number;
generating, by the authentication device based on at least one of the verifying and the comparing, an authentication result indicating whether the calling party number is authenticated;
sending, by the authentication device, the authentication result to a call processing device that processes the call request from the caller according to the authentication result, wherein the authentication result is sent to the call processing device before the call request is answered by a called party device;
tracking, by the authentication device, the number of accounts linked to the calling party number and fraud information associated with each of the linked accounts;
associating, by the authentication device, the authentication result with the calling party number; and
adjusting, by the authentication device, one or more thresholds corresponding to the one or more retrieved parameters based on an accuracy of the authentication result;
wherein the generating comprises;
retrieving the fraud information associated with each of the linked accounts;
using a result of the verifying and the comparing to compute a risk score indicating how likely the call request is associated with fraud, the risk score computed based at least in part on whether any fraud associated with one of the linked accounts occurred within a threshold number of days; and
comparing the risk score with a risk threshold to determine the authentication result.
6 Assignments
0 Petitions
Accused Products
Abstract
Embodiments include a system, method, and computer program product that authenticates a caller using calling party information. In an embodiment, an authentication device receives the call request and associated calling party information that includes a calling party number. The authentication device retrieves parameters associated with the calling party number, where a retrieved parameter is a number of accounts linked to the calling party number. The authentication device determines whether the number of accounts is between one and a threshold value, inclusive, and verifies that the call request originates from a location or a device associated with the calling party number. Based on the verifying and determining, the authentication device generates an authentication result that indicates whether the calling party number is authenticated. Then, the authentication device sends the authentication result to a call processing device that processes the call request from the caller according to the authentication result.
57 Citations
13 Claims
-
1. A method, comprising:
-
receiving, by an authentication device, a call request and associated calling party information that includes a calling party number, wherein the call request is initiated by a caller; retrieving, by the authentication device, one or more parameters associated with the calling party number, the one or more parameters comprising a number of accounts linked to the calling party number; comparing, by the authentication device, the one or more parameters to one or more respective threshold values; verifying, by the authentication device, that the call request originates from a location or a device associated with the calling party number; generating, by the authentication device based on at least one of the verifying and the comparing, an authentication result indicating whether the calling party number is authenticated; sending, by the authentication device, the authentication result to a call processing device that processes the call request from the caller according to the authentication result, wherein the authentication result is sent to the call processing device before the call request is answered by a called party device; tracking, by the authentication device, the number of accounts linked to the calling party number and fraud information associated with each of the linked accounts; associating, by the authentication device, the authentication result with the calling party number; and adjusting, by the authentication device, one or more thresholds corresponding to the one or more retrieved parameters based on an accuracy of the authentication result; wherein the generating comprises; retrieving the fraud information associated with each of the linked accounts; using a result of the verifying and the comparing to compute a risk score indicating how likely the call request is associated with fraud, the risk score computed based at least in part on whether any fraud associated with one of the linked accounts occurred within a threshold number of days; and comparing the risk score with a risk threshold to determine the authentication result. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a memory for storing a plurality of thresholds corresponding to a plurality of parameters; a processor coupled to the memory; a communications interface that when executing in the processor receives a call request and associated calling party information that includes a calling party number, wherein the call request is initiated by a caller; a calling number verificator that when executing in the processor; verifies that the call request originates from a location or a device associated with the calling party number; a calling number authenticator that when executing in the processor; retrieves the plurality of parameters associated with the calling party number, the one or more parameters comprising a number of accounts linked to the calling party number, compares the plurality of parameters to a plurality of respective threshold values, generates, based on the verifying and the comparing, an authentication result indicating whether the calling party number is authenticated, sends the authentication result to a call processing device that processes the call request from the caller according to the authentication result, wherein the authentication result is sent to the call processing device before the call request is answered by a called party device; tracks the number of accounts linked to the calling party number and fraud information associated with each of the linked accounts; associates the authentication result with the calling party number; and adjusts one or more thresholds corresponding to the plurality of retrieved parameters based on an accuracy of the authentication result; wherein in generating the authentication result, the calling number authenticator; retrieves the fraud information associated with each of the linked accounts; computes a risk score using a result of the verifying and the comparing, the risk score indicating how likely the call request is associated with fraud, the risk score computed based at least in part on whether any fraud associated with one of the linked accounts occurred within a threshold number of days; and compares the risk score with a risk threshold to determine the authentication result. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A non-transitory computer-readable device having instructions stored thereon that, when executed by at least one computing device, cause the at least one computing device to perform operations comprising:
-
receiving, by an authentication device, a call request and associated calling party information that includes a calling party number, wherein the call request is initiated by a caller; retrieving, by the authentication device, one or more parameters associated with the calling party number, the one or more parameters comprising a number of accounts linked to the calling party number; comparing, by the authentication device, the one or more parameters to one or more respective threshold values; verifying, by the authentication device, that the call request originates from a location or a device associated with the calling party number; generating, by the authentication device based on at least one of the verifying and the comparing, an authentication result indicating whether the calling party number is authenticated; sending, by the authentication device, the authentication result to a call processing device that processes the call request according to the authentication result, wherein the authentication result is sent to the call processing device before the call request is answered by a called party device, wherein an authenticated calling party number authenticates the caller; tracking, by the authentication device, the number of accounts linked to the calling party number and fraud information associated with each of the linked accounts; associating, by the authentication device, the authentication result with the calling party number; and adjusting, by the authentication device, one or more thresholds corresponding to the one or more retrieved parameters based on an accuracy of the authentication result; wherein the generating comprises; retrieving the fraud information associated with each of the linked accounts; using a result of the verifying and the comparing to compute a risk score indicating how likely the call request is associated with fraud, the risk score computed based at least in part on whether any fraud associated with one of the linked accounts occurred within a threshold number of days; and comparing the risk score with a risk threshold to determine the authentication result.
-
Specification