System and method for real-time fraud detection within a telecommunications system
First Claim
1. A method for detecting a fraudulent telephone call, the method comprising:
- (a) collecting signaling protocol data for a telephone call, from a switch, using a signal protocol receiver that is independent from the switch;
(b) decoding the signaling protocol data;
(c) correlating the signaling protocol data into a call information record during the duration of the telephone call; and
(d) determining that the telephone call is fraudulent by analyzing the call information record during the duration of the call.
3 Assignments
0 Petitions
Accused Products
Abstract
Real time detection of the fraudulent use of a telecommunications network is accomplished by analyzing data for each call that is occurring within the network. A signal protocol receiver is used to collect signaling protocol for each call that is occurring within the network. The Signaling protocol data is collected, decoded and formatted into call information records (CIRs). The CIRs contain various operator specified parameters for each call that is occurring within the network. The CIRs are compared to operator defined thresholds. If any of the CIRs exceeds the thresholds, an alert is generated. The alerts are stored in a database where the operator can analyze them and take the appropriate corresponding action to resolve the alert. The alerts and the CIRs are archived in a database so that trends of fraudulent use can be detected and prevented. This method of fraud detection provides for the effective analyzation of every call that is occurring within the network. Accordingly, no call go unanalyzed and ideally no fraud goes undetected. Additionally, the method does not impose an additional load on the network switching equipment and therefore results in a better quality of transmissions.
50 Citations
23 Claims
-
1. A method for detecting a fraudulent telephone call, the method comprising:
-
(a) collecting signaling protocol data for a telephone call, from a switch, using a signal protocol receiver that is independent from the switch;
(b) decoding the signaling protocol data;
(c) correlating the signaling protocol data into a call information record during the duration of the telephone call; and
(d) determining that the telephone call is fraudulent by analyzing the call information record during the duration of the call. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for detecting a fraudulent communication within a telecommunications network that includes at least one switch, the method comprising:
-
(a) collecting signaling protocol data using a signal protocol receiver that is independent from the switch, wherein the signaling protocol data relates to a communication that is occurring over the telecommunications network;
(b) decoding the signaling protocol data;
(c) correlating the signaling protocol data into a call information record during the duration of the communication; and
(d) determining that the communication is fraudulently occurring over the telecommunications network by analyzing the call information record during the duration of the communication. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for detecting a fraudulent communication within a telecommunications network that includes at least one switch, the method comprising:
-
(a) providing a signal protocol receiver that is independent from the switch;
(b) collecting signaling protocol data that relates to a communication that is occurring over the telecommunications network using the signal protocol receiver;
(c) decoding the signaling protocol data;
(d) correlating the signaling protocol data into a call information record during the duration of the communication;
(e) comparing the call information record to a pre-established threshold during the duration of the communication;
(g) generating an alert if the call information record exceeds the threshold; and
(h) storing the alert in a database.
-
Specification