Call security system
First Claim
1. A method of determining if a use of a particular unit is fraudulent comprising the steps of, monitoring the use of said particular unit, for a plurality of times that said unit is used, to collect statistics concerning the use of said particular unit over a time period having a specific length to establish a normal usage pattern for said particular unit, said pattern being established over a plurality of uses of said unit, determining if more than a predetermined deviation exits between the use of said unit during a second period of time and said normal usage pattern, taking a first type of action if said deviation is below a first value, taking a second type of action if said deviation is above said first value.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for reducing the vulnerability of the telecommunications system to unauthorized use that can reduce the instances of unauthorized access. The telecommunications system collects statistics of each user'"'"'s pattern of telecommunications usage. Typically, these statistics will be in the form of, say, the average number of calls per day or the average number of calls per day on given days of the week. These statistics are taken for a reference period, such as the preceding thirty days, and the corresponding quantity for the current day is also computed. If the current statistics are not excessive as compared with the reference statistics, then access to a communications resource is granted. But if a predetermined deviation is found then a supplemental restriction is placed upon the call.
-
Citations
10 Claims
-
1. A method of determining if a use of a particular unit is fraudulent comprising the steps of,
monitoring the use of said particular unit, for a plurality of times that said unit is used, to collect statistics concerning the use of said particular unit over a time period having a specific length to establish a normal usage pattern for said particular unit, said pattern being established over a plurality of uses of said unit, determining if more than a predetermined deviation exits between the use of said unit during a second period of time and said normal usage pattern, taking a first type of action if said deviation is below a first value, taking a second type of action if said deviation is above said first value.
-
2. A method for preventing unauthorized use of a particular unit comprising the steps of,
monitoring the use of said particular unit to collect statistics to establish a normal pattern of use of said particular unit, said pattern of use and said monitoring covering a first period of time having a specific length and covering a plurality of times said unit is used, determining if there is more than a predetermined deviation between the use of said particular unit and said normal pattern of use during a second period of time having a length equal to said specific length, taking a first type of action if said deviation is below a first value, taking a second type of action if said deviation is above said first value.
-
3. A computerized system for preventing fraudulent use of a particular item, first means which monitors use of said particular item to collect statistics over a first period of time having a specific length to establish a normal pattern of use of said particular item, said specific length covering a plurality of uses of said item,
second means which determines if there is more than a particular amount of deviation between use of said particular item during a second period having a length equal to said specific length and said normal pattern of use, whereby a first type of action is taken if said deviation is below a first value, and a second type of action if said deviation is above said first value.
-
10. A method of providing security for a particular item including,
monitoring use of said particular item to collect statistics over a first period of time having a particular length to establish a normal pattern of use of said particular item, said pattern covering a plurality of uses of said item, determining if there is more than a predetermined deviation between the use of said particular item during a second period of time having a length equal to said particular length and said normal pattern of use, taking a first type of action if said deviation is below a first value, taking a second type of action if said deviation is above said first value.
Specification