Network assurance analytic system
First Claim
1. A computer-implemented method comprising:
- electronically monitoring traffic of a telecommunications network for at least one pattern that is indicative of a telecommunications anomaly;
based on a set of a set of telecommunications profiles stored in a database, generating a model score representing a value of the telecommunications anomaly; and
generating a solution for the telecommunications network to reduce the model score associated with the telecommunications anomaly.
1 Assignment
0 Petitions
Accused Products
Abstract
A network assurance analytics (NAA) system and method is disclosed. The NAA can be part of a risk analytic for telecom (RAFT) program. The NAA system is configured to monitor telecommunications networks, detect errors or fraud in those telecommunications networks, and provide solutions to resolve the errors or reduce the fraud. Traffic of a telecommunications network is electronically monitored for at least one pattern that is indicative of a telecommunications anomaly. Based on a set of a set of telecommunications profiles stored in a database, a model score representing a value of the telecommunications anomaly is generated. A solution for the telecommunications network to reduce the model score associated with the telecommunications anomaly is then generated for execution on the telecommunications network.
28 Citations
32 Claims
-
1. A computer-implemented method comprising:
-
electronically monitoring traffic of a telecommunications network for at least one pattern that is indicative of a telecommunications anomaly;
based on a set of a set of telecommunications profiles stored in a database, generating a model score representing a value of the telecommunications anomaly; and
generating a solution for the telecommunications network to reduce the model score associated with the telecommunications anomaly. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method comprising:
-
detecting from telecommunications traffic at least one pattern that is indicative of a telecommunications anomaly;
generating a model score representing a value of the telecommunications anomaly; and
generating one or more reason codes based on the telecommunications profiles, each reason code representing a relationship between the value of the telecommunications anomaly and the at least one pattern. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A network assurance analytic system comprising:
-
a monitor that captures call records from traffic of a telecommunications network;
a profile retriever that parses a call record to determine a calling line identity (CLI), a point code (PC) and a route (RT) associated with the call record;
a database that stores a CLI profile, a PC profile, and an RT profile of the traffic; and
a processor that compares the CLI, PC and RT with the respective CLI profile, PC profile and RT profile to determine whether a telecommunications anomaly exists in the traffic. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A method of detecting revenue leakage in a telecommunications system, the method comprising:
-
detecting characteristics of non-reconciled SS7/C7 service detail records for calling line identities across point codes and routes of the telecommunications system; and
reporting the detected characteristics in a hierarchal summarization. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method of detecting revenue leakage in a telecommunications system, the method comprising:
-
detecting characteristics of non-reconciled SS7/C7 service detail records for calling line identities across point codes and routes of the telecommunications system; and
generating an absolute value, frequency and proportion for at least one of the detected characteristics. - View Dependent Claims (31, 32)
-
Specification