Call security system which detects fraud by examination of call history
First Claim
1. The method of controlling connection to a communications resource required by a call received during a current period at a communications facility from a remote location by way a trunk line connected to the facility, the call identifying a user from which the call has ostensibly been made, a method comprising the steps of:
- collecting reference statistics of the user'"'"'s communications traffic during a reference period;
collecting current statistics of the user'"'"'s communications traffic during the current period;
receiving the call;
determining whether there is more than a predetermined deviation between the current and reference statistics for the user that the call identifies;
if no more than the predetermined deviation exists between those statistics, connecting the call to the required communications resource without imposing supplemental security restrictions; and
if more than the predetermined deviation exists between those statistics, imposing the supplemental security restrictions.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for reducing the vulnerability of the telecommunications system to unauthorized use that is easy to implement and that can reduce the instances of unauthorized access even during periods when telecommunications personnel are not able to give attention to the traffic on the system. The telecommunications system collects statistics of each user'"'"'s pattern of telecommunications usage. Typically, these statistics will be in the form of, say, the average number of calls per day or the average number of calls per day on given days of the week. It may also include the mean busy hour for the given days of the week. Moreover, daily averages may be taken not only for all calls but also for all calls of a particular type, e.g., of all international calls. These statistics are taken for a reference period, such as the preceding thirty days, and the corresponding quantity for the current day is also computed. If the current statistics are not excessive as compared with the reference statistics, then access to a communications resource—e.g., an outgoing trunk line—is granted to the call without any supplemental access restrictions. But if a predetermined deviation is detected between the current statistics and the reference statistics, then a supplemental restriction is placed upon the call.
44 Citations
7 Claims
-
1. The method of controlling connection to a communications resource required by a call received during a current period at a communications facility from a remote location by way a trunk line connected to the facility, the call identifying a user from which the call has ostensibly been made, a method comprising the steps of:
-
collecting reference statistics of the user'"'"'s communications traffic during a reference period;
collecting current statistics of the user'"'"'s communications traffic during the current period;
receiving the call;
determining whether there is more than a predetermined deviation between the current and reference statistics for the user that the call identifies;
if no more than the predetermined deviation exists between those statistics, connecting the call to the required communications resource without imposing supplemental security restrictions; and
if more than the predetermined deviation exists between those statistics, imposing the supplemental security restrictions.
-
-
2. A communications system including in combination:
-
A) a PBX (private branch exchange) connected to communications resources including trunk lines and internal lines for connecting incoming calls on at least one of the trunk lines to a predetermined internal line and for responding to transfer signals from the internal line to connect the call connected thereto to a communications resource required for the destination that the transfer signal designates; and
B) an access-control module, for;
i) collecting reference statistics of user'"'"'s communications traffic during a reference period;
ii) collecting current statistics user'"'"'s communications traffic during a current period;
iii) determining whether a predetermined deviation between the current and reference statistics for a user that a call identifies;
iv) if no more than the predetermined deviation exists between those statistics, responding to a given received call by sending to the private branch exchange transfer signals that transfer the given received call to the required communications resource without imposing supplemental security restrictions; and
v) if more than the predetermined deviation exists between those statistics, responding to a given received call by imposing the supplemental security restrictions on the given received. - View Dependent Claims (3, 4, 5, 6)
-
-
7. The method of controlling connection to a communications resource in response to a call, said call identifying a user name, said method comprising the steps of:
-
collecting reference statistics of communications traffic associated with said user name during a reference period;
collecting current statistics of communications traffic associated with said user name during a current period;
receiving said call;
determining whether there is more than a predetermined deviation between the current and reference statistics associated with said user name, if there is more than said predetermined deviation between the current and the reference statistics associated with said user name, imposing supplemental security restrictions before connection said call, and if there is not more than said predetermined deviation between the current and the reference statistics associated with said user name, connecting said call to the required communications resource without imposing said supplemental security restrictions.
-
Specification