Telecommunications fraud detection scheme
First Claim
1. A method comprising the steps of:
- analyzing echo characteristics of a path of a telephone call to determine whether the telephone call is a multiple-leg call;
collecting data representing attributes of the telephone call when the echo characteristics indicate that the telephone call is a multiple-leg call; and
processing the data to generate an indication of whether the telephone call was established fraudulently.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus are disclosed for providing increased security in a telecommunications network by using quasi-time domain reflectometry techniques to identify those telephone calls which comprise multiple legs. Echo data are collected for the telephone call from a predetermined point in the network to a point where the call originated. The data are processed to generate an indication of whether the telephone call comprises multiple legs, thus identifying those calls most susceptible to unauthorized use. The indication that a telephone call comprises multiple legs is advantageously used together with call attribute information, such as whether the call is placed to an international destination, to determine whether a given multiple-leg call is most likely a valid access to the communication system or most likely fraudulent.
-
Citations
10 Claims
-
1. A method comprising the steps of:
-
analyzing echo characteristics of a path of a telephone call to determine whether the telephone call is a multiple-leg call; collecting data representing attributes of the telephone call when the echo characteristics indicate that the telephone call is a multiple-leg call; and processing the data to generate an indication of whether the telephone call was established fraudulently. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising the steps of:
-
detecting the echo characteristics of the path of a telephone call; collecting data representing attributes of the telephone call; determining whether the collected data and the echo characteristics of the path are consistent with each other; and generating an indication that the telephone call was established fraudulently when the collected data and the characteristics of the path are inconsistent with each other. - View Dependent Claims (9, 10)
-
Specification