Call-processing system and method
First Claim
1. A system for detecting fraudulent or attempted fraudulent use of a telephone network, the system comprising:
- means for creating a usage record for a call, said usage record including call information pertaining to said call, wherein said usage record is created for a terminating number associated with said call;
means for updating said usage record if a new call is directed to said terminating number; and
means for comparing said call information in said usage record to one or more thresholds to determine whether said call information indicates a possible fraudulent usage.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method for processing telephone calls and providing enhanced services is presented. The call processing system includes a network control processor for controlling the processing and routing of the calls and for providing enhanced features, and a matrix switch for routing calls from an originating location to a terminating location. Operator consoles can be included to provide operator assistance to the caller. The network control processor comprises a central message processor that receives call data, determines the type of call, determines the processing required, and determines whether operator assistance is required. A call route distributor allocates an operator console to the call if required. A billing server is used to track billing information for the call while it is in progress. A database server is provided for database look-ups and storage. The call processing system also includes a validation system, a billing system, a distribution system, and a fraud detection and prevention system. The validation system is used to validate call information to determine whether the call can be placed. The billing system determines rates for calls and calculates the cost of completed calls. The distribution system distributes changes that are made to a master database to the appropriate slave database. The fraud detection and prevention system monitors originating and in-process calls to detect and possibly prevent possible fraudulent uses of phone services and systems. A client interface is provided to facilitate communications among applications and DEF records are used to define specific call processing actions.
155 Citations
43 Claims
-
1. A system for detecting fraudulent or attempted fraudulent use of a telephone network, the system comprising:
-
means for creating a usage record for a call, said usage record including call information pertaining to said call, wherein said usage record is created for a terminating number associated with said call; means for updating said usage record if a new call is directed to said terminating number; and means for comparing said call information in said usage record to one or more thresholds to determine whether said call information indicates a possible fraudulent usage. - View Dependent Claims (2, 3)
-
-
4. A method of detecting fraudulent or attempted fraudulent use of a telephone network, the method comprising the steps of:
-
(1) creating a usage record for a call, said usage record including call information pertaining to said call, wherein said usage record is created for a terminating number associated with said call; (2) updating said usage record if a new call is directed to said terminating number; and (3) comparing said call information in said usage record to one or more thresholds to determine whether said call information indicates a possible fraudulent usage. - View Dependent Claims (5, 6)
-
-
7. A fraud system that detects fraudulent or attempted fraudulent use of a telephone network, the system comprising:
-
means for receiving call information pertaining to a call that has been completed to a destination external to the fraud system; means for creating a usage record for a completed call to reflect said call information, wherein said usage record is created for an identifying number associated with said completed call; and means for comparing said call information in said usage record to one or more thresholds stored in a threshold file to determine whether said call information indicates a possible fraudulent usage; wherein said call information is compared to said one or more thresholds as soon as said new call is completed to permit a real-time response to said possible fraudulent usage to be initiated prior to termination of said new call. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A method using a fraud system to detect fraudulent or attempted fraudulent use of a telephone network, the method comprising the steps of:
-
receiving call information pertaining to a call that has been completed to a destination external to the fraud system; creating a usage record for a completed call to reflect said call information, wherein said usage record is created for an identifying number associated with said completed call; and comparing said call information in said usage record to one or more thresholds stored in a threshold file to determine whether said call information indicates a possible fraudulent usage; wherein said call information is compared to said one or more thresholds as soon as said new call is completed to permit a real-time response to said possible fraudulent usage to be initiated prior to termination of said new call. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A fraud system that detects fraudulent or attempted fraudulent use of a telephone network, the system comprising:
-
means for receiving call information pertaining to failed call, said failed call intended for a destination external to the fraud system; means for creating a usage record for said failed call to reflect said call information, wherein said usage record is created for an identifying number associated with said failed call; and means for comparing said call information in said usage record to one or more thresholds stored in a threshold file to determine whether said call information indicates a possible fraudulent usage. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
-
35. A method using a fraud system to detect fraudulent or attempted fraudulent use of a telephone network, the method comprising the steps of:
-
receiving call information pertaining to a failed call, said failed call intended for a destination external to the fraud system; creating a usage record for said failed call to reflect said call information, wherein said usage record is created for an identifying number associated with said failed call; and comparing said call information in said usage record to one or more thresholds stored in a threshold file to determine whether said call information indicates a possible fraudulent usage. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43)
-
Specification