Methods and systems to detect abuse of network services
First Claim
Patent Images
1. A method comprising:
- obtaining network service activity information associated with a plurality of network service accounts;
comparing via a fraud detection system the network service activity information with a term of a service agreement of a service provider; and
identifying abusive activity based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus, and systems to detect abuse of network services are disclosed. An example method involves obtaining network service activity information associated with a plurality of network service accounts, comparing via a fraud detection system the network service activity information with a term of a service agreement of a service provider, and identifying abusive activity based on the comparison.
-
Citations
37 Claims
-
1. A method comprising:
-
obtaining network service activity information associated with a plurality of network service accounts;
comparing via a fraud detection system the network service activity information with a term of a service agreement of a service provider; and
identifying abusive activity based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
obtaining network service activity information associated with a plurality of network service accounts; and
comparing via a fraud detection system the network service activity information with a term of a service agreement associated with a third-party service provider providing services over a communication channel of a primary service provider. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus comprising:
-
a data interface to obtain subscriber accounts data from a plurality of network nodes within a communication system;
a data analyzer communicatively coupled to the data interface to analyze the service accounts data to identify abusive activity; and
an abuse response handler to guide a user communication based on the abusive activity. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A machine accessible medium having instructions stored thereon that, when executed, cause a machine to:
-
obtain subscriber accounts data from a plurality of network nodes within a communication system;
analyze subscriber accounts data to identify patterns indicative of abusive activity; and
store information in a customer relationship management system to facilitate interaction with a subscriber based on the analysis. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification