Risk management technique for network access
First Claim
1. A method for managing the risk of access by a subscriber to a network for a particular one of a plurality of separate and distinct services subscribed to by said subscriber, comprising the steps of:
- maintaining a record for each said subscriber that includes usage and payment ability information for each of said separate and distinct services subscribed to by said each subscriber and an individual risk characteristic representing the risk associated with access by that subscriber for said each separate and distinct service and a composite risk characteristic, representing the composite risk associated with access to all of said each services by said each subscriber;
retrieving, upon receipt of a request by said each subscriber for access said each service, the record corresponding to said each subscriber; and
determining, from said each subscriber'"'"'s individual service risk characteristic for said each service to be accessed by said each subscriber and said each subscriber'"'"'s risk composite characteristic, whether said each subscriber should gain access to said each service.
1 Assignment
0 Petitions
Accused Products
Abstract
The risk of fraud associated with access by a subscriber to a network (42) is managed by a system that includes a data base (46) that stores a record for each subscriber indicative of that subscriber'"'"'s usage history and payment ability for each service to which that subscriber has access. Additionally, the subscriber'"'"'s record also stores an individual service risk characteristic indicative of the risk of providing access by the subscriber to a particular service, as well as a composite risk characteristic indicative of an overall risk of access. In response to a request for access to a particular service by a subscriber, the data base (46) responds in accordance with the subscriber'"'"'s individual service risk characteristic for the service sought as well as the composite risk characteristic. In this way, account is taken of the subscriber'"'"'s usage and payment ability with respect to all services available to the subscriber, rather than the single service sought by the subscriber.
126 Citations
18 Claims
-
1. A method for managing the risk of access by a subscriber to a network for a particular one of a plurality of separate and distinct services subscribed to by said subscriber, comprising the steps of:
-
maintaining a record for each said subscriber that includes usage and payment ability information for each of said separate and distinct services subscribed to by said each subscriber and an individual risk characteristic representing the risk associated with access by that subscriber for said each separate and distinct service and a composite risk characteristic, representing the composite risk associated with access to all of said each services by said each subscriber; retrieving, upon receipt of a request by said each subscriber for access said each service, the record corresponding to said each subscriber; and determining, from said each subscriber'"'"'s individual service risk characteristic for said each service to be accessed by said each subscriber and said each subscriber'"'"'s risk composite characteristic, whether said each subscriber should gain access to said each service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for managing the risk of access by a subscriber to a network for a particular one of a plurality of separate and distinct services subscribed to by said subscriber, comprising:
-
a signal transfer point for accepting inquiries and for providing responses regarding subscriber requests for access to one of said plurality of separate and distinct services; a data base for maintaining at least one record for each subscriber that includes usage and payment ability information for each of said separate and distinct services subscribed to by said each subscriber and an individual risk characteristic representing the risk associated with access by said each subscriber for said each service and a composite risk characteristic, representing the composite risk associated with access by said each subscriber for all of said separate and distinct services;
said data base responsive to an access inquiry received from the signal transfer point and providing a response thereto in accordance with said each subscriber'"'"'s individual risk characteristic for said each service to be accessed and said each subscriber'"'"'s composite risk characteristic andmeans for establishing said records maintained by said data base. - View Dependent Claims (17, 18)
-
Specification