Method and system for providing fraud detection for remote access services
First Claim
Patent Images
1. A method for providing fraud detection in support of data communication services, the method comprising:
- monitoring a usage pattern associated with an account for remote access to a data network;
comparing the usage pattern with a reference pattern specified for the account; and
selectively generating a fraud alert based on the comparison.
5 Assignments
0 Petitions
Accused Products
Abstract
An approach provides fraud detection in support of data communication services. A usage pattern associated with a particular account for remote access to a data network is monitored. The usage pattern is compared with a reference pattern specified for the account. A fraud alert is selectively generated based on the comparison.
-
Citations
43 Claims
-
1. A method for providing fraud detection in support of data communication services, the method comprising:
-
monitoring a usage pattern associated with an account for remote access to a data network;
comparing the usage pattern with a reference pattern specified for the account; and
selectively generating a fraud alert based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for providing fraud detection in support of data communication services, the system comprising:
-
a monitoring device communicating with a data network, the monitoring device being configured to monitor a usage pattern associated with an account for remote access to the data network; and
a fraud detection system in communication with the monitoring device and being configured to compare the usage pattern with a reference pattern specified for the account, and to selectively generate a fraud alert based on the comparison. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium carrying one or more sequences of one or more instructions for providing fraud detection in support of data communication services, the one or more sequences of one or more instructions including instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of:
-
monitoring a usage pattern associated with an account for remote access to a data network;
comparing the usage pattern with a reference pattern specified for the account; and
selectively generating a fraud alert based on the comparison. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for detecting fraudulent use of data communication services, the method comprising the steps of:
-
detecting an attempt by a party to establish communications with a server through a telephony connection;
determining an attribute associated with the attempted communications; and
determining a fraud-indicating value based on the attribute, the fraud-indicating value relating to likelihood of the attempt as fraudulent. - View Dependent Claims (23)
-
-
24. A method of detecting possible fraudulent use of communications services with respect to a usage account in a communications system, the method comprising the steps of:
-
determining excessiveness of a communication session duration;
determining that communications services have been accessed via the usage account;
determining location of a host from which the communications services have been accessed;
retrieving one datum associated with the location and relating likelihood of fraudulent usage from the location; and
responsive to the datum, determining a fraud-indicating value indicative of the likelihood that the usage account is being used fraudulently. - View Dependent Claims (25, 26)
-
-
27. A method of detecting possible fraudulent use of communications services with respect to a usage account in a communications system, the method comprising the steps of:
-
determining a first pattern of an attribute of usage of the communications services associated with the usage account;
from an instance of usage of the communications services associated with the usage account, determining a second pattern of the attribute;
comparing the second pattern to the first pattern; and
determining a likelihood of fraud responsive at least to the comparing step. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34)
-
-
35. A method of detecting possible fraudulent use of communications services with respect to a usage account in a communications system, the method comprising the steps of:
-
over a period of time, determining a total amount of time that the usage account uses communications services; and
determining whether the total amount of time exceeds a predetermined duration specified for the period of time.
-
-
36. A method of detecting possible fraudulent use of communications services with respect to a usage account in a communications system, the method comprising the steps of:
-
determining that the user account is used to access communications services from a first location during a first time period;
determining that the user account is used to access communications services from a second location during a second time period; and
determining likelihood of fraudulent use responsive to at least one of;
the distance between the first location and the second location and the occurrence time of the first time period relative to the second time period. - View Dependent Claims (37, 38)
-
-
39. A method of detecting possible fraudulent use of communications services, the method comprising the steps of:
-
monitoring access of the communication services for a usage account; and
determining a quantity of distinct locations from which the communications services have been accessed on behalf of the usage account for a predetermined time interval. - View Dependent Claims (40)
-
-
41. A method of detecting possible fraudulent use of communications services, the method comprising the steps of:
-
for a usage account, determining a first pattern of likelihood of communications usage involving each location among a set of locations;
for the usage account, determining a second pattern of communications actually occurring;
comparing the second pattern to the first pattern; and
determining a likelihood of fraud responsive to the comparing the second pattern to the first pattern. - View Dependent Claims (42, 43)
-
Specification