METHODS TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTION OF NON-TYPICAL USEAGE OF MODERATOR PASSCODE
First Claim
1. A method for detecting fraudulent use in a conference calling system, said method including:
- receiving at least one access parameter;
receiving a request to access the conference calling system, the request including at least one of a user passcode and at least one request parameter;
determining whether the request parameter matches the access parameter with a processor; and
performing actions with the processor when the request parameter does not match the access parameter.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more access parameters are received, wherein the access parameters include an authorized day of week parameter, an authorized time of day parameter, and/or an authorized location parameter. One or more requests to access the conference calling system are received, wherein each request includes a user passcode and one or more request parameters. A processor determines whether the request parameters match the access parameters. Access to the conference calling system is granted when the request parameters match the access parameters; however, the processor performs actions when a request parameter does not match an access parameter.
-
Citations
25 Claims
-
1. A method for detecting fraudulent use in a conference calling system, said method including:
-
receiving at least one access parameter; receiving a request to access the conference calling system, the request including at least one of a user passcode and at least one request parameter; determining whether the request parameter matches the access parameter with a processor; and performing actions with the processor when the request parameter does not match the access parameter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for detecting fraudulent use in a conference calling system, said method including:
-
receiving at least one unauthorized access parameter; receiving a request to access the conference calling system, the request including at least one of a user passcode and at least one request parameter; determining whether the request parameter matches the unauthorized access parameter with a processor; and performing at least one of validation actions and alert actions with the processor when the request parameter matches the unauthorized access parameter. - View Dependent Claims (14, 15, 16)
-
-
17. A system for detecting fraudulent use in a conference calling system, said system including:
-
an electronic storage device including at least one access parameter; a receiver for receiving a request to access said conference calling system, the request including at least one of a user passcode and at least one request parameter; and a processor operatively connected to said electronic storage device and said receiver, said processor determines whether the request parameter matches the access parameter, and said processor performs actions when the request parameter does not match the access parameter. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer program product for detecting fraudulent use in a conference calling system, said computer program product including:
-
a computer readable storage medium; first program instructions to receive at least one access parameter; second program instructions to receive a request to access the conference calling system, the request including at least one of a user passcode and at least one request parameter; third program instructions to determine whether the request parameter matches the access parameter with a processor; and fourth program instructions to perform actions with the processor when the request parameter does not match the access parameter, wherein said first program instructions, said second program instructions, said third program instructions, and said fourth program instructions are stored on said computer readable storage medium.
-
Specification