×

Detecting possible fraudulent communication usage

  • US 5,907,602 A
  • Filed: 02/09/1998
  • Issued: 05/25/1999
  • Est. Priority Date: 03/30/1995
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of detecting possible fraudulent use of a communications network, which network is arranged to provide call event records having fields containing call event data, at least one of the fields being designated a key field and containing a key relating to an entity as herein defined, the method comprising the steps of:

  • reading a first key field of a call event record and obtaining its key;

    addressing a database by the combination of the first key field and the obtained key (referred to as the "first combination") to access a first combination-associated profile set comprising(i) at least one profile identifying(a) a respective call event data processing algorithm defining a process to be performed upon call event data to obtain a process result,(b) at least one first combination-associated first store to be incremented by the process result, and at least one respective threshold for the or each said first combination-associated first store,(c) a respective predetermined outcome to be generated when the contents of a said first combination-associated first store reaches a threshold, at least one said predetermined outcome comprising a fraud risk indicator,(ii) a further profile identifying(d) a first combination-associated second store to be incremented by a fraud risk indicator,(e) at least one respective threshold for said first combination-associated second store, and(f) a further respective predetermined outcome to be generated when the contents of said first combination-associated second store reaches a threshold;

    processing the call event data of the call event record in accordance with said first combination-associated profile set, therebyobtaining one or more respective process results,incrementing the corresponding identified first combination-associated first store or stores by the respective process result, and, if a threshold is reached,generating the corresponding respective predetermined outcome, and, if a fraud risk indicator is generated,incrementing said first combination-associated second store by that fraud risk indicator, and, if a threshold is reached,generating the corresponding further respective predetermined outcome.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×