FRAUD ANALYSIS IN A CONTACT DATABASE
First Claim
1. A method of identifying fraudulent data in a contact database, the method comprising:
- receiving a plurality of contact records, each of the plurality of contact records including a set of contact field values corresponding to a set of contact fields;
determining, by a computing device, whether a similar content pattern exists in the plurality of contact records using at least one of the set of contact field values;
determining, by the computing device, whether an unusual content pattern exists in the plurality of contact records using at least one of the set of contact field values; and
flagging, by the computing device, the plurality of contact records when at least one of the similar content pattern or the unusual content pattern is determined to exist in the plurality of contact records.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method of identifying fraudulent data in a contact database is disclosed herein. In some embodiments, a set of contact records is received where each of the contact records includes a set of contact field values corresponding to a set of contact fields. Some embodiments determine whether a similar content pattern exists in the contact records using at least one of the set of contact field values. In some embodiments, a determination is made as to whether an unusual content pattern exists in the contact records using at least one of the set of contact field values. The set of contact records is flagged when at least one of the similar content pattern or the unusual content pattern is determined to exist in the contact records.
43 Citations
20 Claims
-
1. A method of identifying fraudulent data in a contact database, the method comprising:
-
receiving a plurality of contact records, each of the plurality of contact records including a set of contact field values corresponding to a set of contact fields; determining, by a computing device, whether a similar content pattern exists in the plurality of contact records using at least one of the set of contact field values; determining, by the computing device, whether an unusual content pattern exists in the plurality of contact records using at least one of the set of contact field values; and flagging, by the computing device, the plurality of contact records when at least one of the similar content pattern or the unusual content pattern is determined to exist in the plurality of contact records. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium containing program code executable by a processor in a computer to identify fraudulent data for a database system having a corpus of contact information stored therein, the program code including instructions to:
-
receive a plurality of contact records, each of the plurality of contact records including a set of contact field values corresponding to a set of contact fields; determine whether a similar content pattern exists in the plurality of contact records using at least one of the set of contact field values; determine whether an unusual content pattern exists in the plurality of contact records using at least one of the set of contact field values; and identify the plurality of contact records when at least one of the similar content pattern or the unusual content pattern is determined to exist in the plurality of contact records. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A system for identifying fraudulent data in a contact database having a corpus of contact information stored therein, the system comprising:
-
a processor; a network interface; and a memory encoded with program code to be executed by the processor, comprising; program code to receive a plurality of contact records, each of the plurality of contact records including a set of contact field values corresponding to a set of contact fields; program code to determine whether a similar content pattern exists in the plurality of contact records using at least one of the set of contact field values; program code to determine whether an unusual content pattern exists in the plurality of contact records using at least one of the set of contact field values; and program code to identify the plurality of contact records when at least one of the similar content pattern or the unusual content pattern is determined to exist in the plurality of contact records. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification