Automated and selective intervention in transaction-based networks
DCFirst Claim
1. A method for reducing fraudulent activity in a telecommunication network, comprising the step of:
- automatically and selectively invoking at least one authentication measure during a call processing state for a particular call as a function of scoring calls for the likelihood of fraud, wherein the at least one authentication measure is selectively invoked based on a fraud score, the fraud score being derived as a function of a legitimate subscriber signature and a fraud signature, such that fraudulent activity in the network is reduced on a targeted basis thereby reducing disruptions to legitimate activity in the network.
5 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Fraud losses in a communication network are substantially reduced by automatically and selectively invoking one or more authentication measures based on a fraud score that indicates the likelihood of fraud for that particular call or previously scored calls. By selectively invoking authentication on only those calls that are suspected or confirmed to be fraudulent, fraud prevention can be achieved in a way that both reduces fraud losses and minimizes disruptions to legitimate subscribers. Using telecommunication fraud as an example, a subscriber is registered in a system by collecting data on that subscriber based on the particular authentication method being used, such as shared knowledge (e.g., passwords), biometric validation (e.g., voice verification), and the like. Once registered, the authentication function for the subscriber'"'"'s account is activated and subsequent calls are then scored for the likelihood of fraud during the call setup request phase. Fraud scoring estimates the probability of fraud for each call based on the learned behavior of an individual subscriber and the learned behavior of fraud perpetrators. If fraud is not suspected based on the fraud score, then normal call processing can resume without the need for authentication. If fraud is suspected based on the fraud score, then the system automatically invokes authentication. If authentication indicates suspicion of fraud, e.g., voice prints do not match, then the call may be either be blocked or referred for other appropriate prevention measures, e.g., intercepted by an operator. If fraud is not indicated by authentication, then normal call processing may resume.
283 Citations
21 Claims
-
1. A method for reducing fraudulent activity in a telecommunication network, comprising the step of:
automatically and selectively invoking at least one authentication measure during a call processing state for a particular call as a function of scoring calls for the likelihood of fraud, wherein the at least one authentication measure is selectively invoked based on a fraud score, the fraud score being derived as a function of a legitimate subscriber signature and a fraud signature, such that fraudulent activity in the network is reduced on a targeted basis thereby reducing disruptions to legitimate activity in the network. - View Dependent Claims (2, 3, 4, 5)
-
6. A method for controlling a network where transactions occur, comprising the step of:
automatically and selectively invoking at least one process during a particular transaction based on automated analysis of usage in the network wherein the at least one process is selectively invoked to reduce fraudulent activity in the network on a targeted basis thereby reducing disruptions to legitimate activity in the network. - View Dependent Claims (7)
-
8. A method for reducing fraudulent activity in a telecommunication network, comprising the steps of:
-
registering a subscriber by collecting information on that subscriber, wherein the information corresponds to a prescribed authentication measure; activating the prescribed authentication measure for that subscriber'"'"'s account; scoring a call for the likelihood of fraud during a call setup request phase; and if fraud is suspected based on the scoring step, automatically and selectively invoking authentication for the call according to the prescribed authentication measure, whereby fraudulent activity in the network is reduced on a targeted basis thereby reducing disruptions to legitimate activity in the network. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for reducing fraudulent activity in a network, comprising:
-
means for scoring calls in the network and for generating a fraud score indicative of the likelihood of fraud; and means, responsive to the fraud score for automatically and selectively invoking at least one authentication measure during a call processing state for a particular call, such that fraudulent activity in the network is reduced on a targeted basis thereby reducing disruptions to legitimate activity in the network. - View Dependent Claims (19, 20)
-
-
21. A method for reducing fraudulent activity in a telecommunication network, comprising the step of:
responsive to call scoring, automatically and selectively authenticating a call, wherein call scoring provides an indication of the likelihood of fraud as a function of a legitimate subscriber signature and a fraud signature, such that fraudulent activity in the network is reduced on a targeted basis thereby reducing disruptions to legitimate activity in the network.
Specification