METHODS TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTION OF CONFERENCE MODERATOR PASSWORD UTILIZATION FROM A NON-AUTHORIZED DEVICE
First Claim
1. A method for detecting fraudulent use in a conference calling system, said method including:
- creating an authorized device registry in an electronic database, the authorized device registry including identification of at least one authorized device permitted to access the conference calling system;
receiving a request to access the conference calling system from a device;
determining whether the device is included in the authorized device registry with a processor; and
performing actions with the processor if the device is not included in the authorized device registry.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. An authorized device registry is created in an electronic database, wherein the authorized device registry identifies one or more authorized devices permitted to access the conference calling system. A request to access the conference calling system is received from a device; and, a processor determines whether the device is included in the authorized device registry. If the device is included in the authorized device registry, the device is granted access to the conference calling system. If the device is not included in the authorized device registry, however, are performed by the processor.
43 Citations
25 Claims
-
1. A method for detecting fraudulent use in a conference calling system, said method including:
-
creating an authorized device registry in an electronic database, the authorized device registry including identification of at least one authorized device permitted to access the conference calling system; receiving a request to access the conference calling system from a device; determining whether the device is included in the authorized device registry with a processor; and performing actions with the processor if the device is not included in the authorized device registry. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for detecting fraudulent use in a conference calling system, said system including:
-
an electronic database including an authorized device registry, the authorized device registry including identification of at least one authorized device permitted to access said conference calling system; a receiver for receiving a request to access said conference calling system from a device; a processor operatively connected to said electronic database and said receiver, said processor determines whether the device is included in the authorized device registry, and said processor performs actions if the device is not included in the authorized device registry. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer program product for detecting fraudulent use in a conference calling system, said computer program product including:
-
a computer readable storage medium; first program instructions to create an authorized device registry in an electronic database, the authorized device registry including identification of at least one authorized device permitted to access the conference calling system; second program instructions to receive a request to access the conference calling system from a device; third program instructions to determine whether the device is included in the authorized device registry with a processor; and fourth program instructions to performing actions with the processor if the device is not included in the authorized device registry, wherein said first program instructions, said second program instructions, said third program instructions, and said fourth program instructions are stored on said computer readable storage medium. - View Dependent Claims (25)
-
Specification