Fraud monitoring system
First Claim
1. A method of automatically detecting fraudulent calls in a telecommunications network, the method comprising the steps of:
- determining the origination of the calls;
determining whether the call is likely to be a fraudulent call using a predetermined pattern of previous or expected calls specific to the origination.
0 Assignments
0 Petitions
Accused Products
Abstract
In order to detect fraudulent or potentially fraudulent usage of a telecommunications network, each call connected by way of one of the digital main switching units of the network (3a to 3c) has an associated billing record transferred to a fraud management system (4). The fraud management system compares the origin and destination of the call with a known usage pattern for the originator and, if other indications are that the call is of a fraudulent nature, and the call deviates from the known usage pattern an alarm can be forwarded to an operator. The user profile used to determine normal calling behaviour is updated over a period of time in respect of calls determined as not fraudulent. An initial user profile may be generated from historic billing records.
-
Citations
50 Claims
-
1. A method of automatically detecting fraudulent calls in a telecommunications network, the method comprising the steps of:
-
determining the origination of the calls;
determining whether the call is likely to be a fraudulent call using a predetermined pattern of previous or expected calls specific to the origination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. Apparatus for automatically detecting fraudulent calls in a telecommunications network, the apparatus comprising:
-
determining means for determining the origination of the call;
storage means for storing data for a pattern of previous or expected calls specific to origination; and
fraud detecting means for determining whether the call is likely to be a fraudulent call using the determined origination of the call and the stored pattern of calls specific to the origination. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method of controlling calls over a telecommunications network, the method comprising the steps of:
-
determining the origination of a call, and determining whether the call is to be allowed or disallowed using a predetermined pattern of calls specific to the origination. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. Apparatus for controlling calls over a telecommunications network, the apparatus comprising:
-
determining means for determining the origination of a call;
storage means for storing data for a pattern of calls specific to origination;
allowance determining means for determining whether the call is to be allowed or disallowed using the determined origination of the call and the stored pattern of calls specific to the origination; and
control means for controlling the call in accordance with the determination. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. A method of controlling access to a telecommunications network, the method comprising the steps of:
-
determining the origination of calls over the telecommunications network over a current period of time;
comparing a pattern of calls from an origination for the current period of time with an allowed pattern of calls; and
controlling access to the telecommunications network for originations based on the result of the comparison.
-
-
50. Apparatus for controlling access to a telecommunications network, the apparatus comprising:
-
first storage means for storing patterns of allowed calls for originations;
determining means for determining the origination of calls over the telecommunications network over a current period of time;
second storage means for storing patterns of calls from originations over the current period of time;
comparing means for comparing the stored patterns of calls from originations over the current period of time with the stored patterns of allowed calls; and
control means for controlling access to the telecommunications network for the originations based on the result of the comparison.
-
Specification