System and method for the detection and termination of fraudulent services
First Claim
1. A system for the automatic detection of fraudulent activity on a transaction network, for which each transaction over the network has an identifier associated therewith, the system comprising:
- voice comparison means for comparing a first sampled voice of a user of a first transaction with a subsequently sampled voice of a user of a subsequent transaction having an identical identifier to that of the first transaction, and control means for determining, from said comparison, a profile of user usage that is representative of a number of different users of the identifier, for comparing the profile of user usage with a threshold for fraudulent use and for generating a fraud condition signal in the event that the profile of user usage exceeds said threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
A system is disclosed for the automatic detection of fraudulent activity on a transaction network, for which each transaction over the network has an associated identifier. In one embodiment, the system includes voice comparison means for comparing a first sampled voice of a user of a first transaction with a subsequently sampled voice of a user of a subsequent transaction having an identical identifier to that of the first transaction. Control means in the form of a voice-based fraud detection engine is provided for determining, from said comparison, a profile of user usage that is representative of a total number of different users of the associated identifier. In a preferred embodiment, the system also includes voice sampling means for sampling a voice of the user of the first transaction to generate a first voice sample.
-
Citations
41 Claims
-
1. A system for the automatic detection of fraudulent activity on a transaction network, for which each transaction over the network has an identifier associated therewith, the system comprising:
- voice comparison means for comparing a first sampled voice of a user of a first transaction with a subsequently sampled voice of a user of a subsequent transaction having an identical identifier to that of the first transaction, and control means for determining, from said comparison, a profile of user usage that is representative of a number of different users of the identifier, for comparing the profile of user usage with a threshold for fraudulent use and for generating a fraud condition signal in the event that the profile of user usage exceeds said threshold.
- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
27. A system for the automatic detection of fraudulent activity on a transaction network, for which each transaction over the network has an identifier associated therewith, the system comprising a voice comparator for comparing a first sampled voice of a user of a first transaction with a second sampled voice of a user of a subsequent transaction having an identical identifier to that of the first transaction, and a controller for determining, from said comparison, a profile of user usage for the identifier that is representative of how many different users of the identifier there are, for comparing the profile of user usage with a threshold for fraudulent use and for generating a fraud condition signal in the event that the profile of user usage exceeds said threshold.
-
28. A method of automatic detection of fraudulent activity on a transaction network, for which each transaction over the network has an identifier associated therewith, the method comprising:
- comparing a first sampled voice of a user of a first transaction with a subsequent sampled voice of a user of a subsequent transaction having an identical identifier to that of the first transaction, determining, from said comparison, a profile of user usage for said identifier that is representative of a number of different users of the identifier, comparing the profile of user usage with a threshold for fraudulent use, and generating a fraud condition signal in the event that the profile of user usage exceeds said threshold.
- View Dependent Claims (29, 30, 31)
-
32. A fraud detection system for detecting fraudulent activity on a transaction network, for which each transaction over the network has an identifier associated therewith, the system comprising:
-
a voice comparator for comparing a first sampled voice of a user of one of the identifiers with a subsequently sampled voice of a user of the same identifier taken during a subsequent use of said same identifier; a profiler for building a profile of usage by users of said same identifier based on the voice comparisons, such that the profile is representative of a number of different users of the identifier; and
,a fraud detector for comparing the number of different users represented in the profile as using the identifier to a threshold indicative of fraudulent use, wherein in the event that the number of users exceeds the threshold a fraud alert signal is generated.
-
-
33. A method of automatic detection of fraudulent activity on a transaction network, for which each transaction over the network has an identifier associated therewith, the method comprising:
-
sampling a first voice of a user of one of the identifiers; subsequently sampling a second voice of a user of the same identifier; comparing the first sampled voice with the subsequently sampled voice; profiling usage by users of said same identifier based on the voice comparisons, such that the profile is representative of a number of different users of the identifier; comparing the number of different users represented in the profile as using the identifier to a threshold indicative of fraudulent use; and
,generating a fraud alert signal in the event that the number of users exceeds said threshold.
-
-
34. A fraud detection system for detecting fraudulent activity on a transaction network, for which each transaction over the network has an identifier associated therewith, the system comprising:
-
a voice based fraud detection engine for sampling the voice of each user of the identifier during each use of the identifier using a voice analysis technique to identify the number of unique users of the identifier and to indicate the presence of fraudulent use when the number of unique users of the identifier exceeds a threshold; and
,a fraud alert generator to signal presence of fraudulent activity when the voice based fraud detection engine indicates the presence of fraud. - View Dependent Claims (37)
-
-
35. A fraud detection system for detecting fraudulent activity on a transaction network, for which each transaction over the network has an identifier associated therewith, the system comprising:
-
a use characteristics fraud detection engine for analysing characteristics of the use of the network to determine whether fraud is indicated in the use of one of the identifiers; a voice based fraud detection engine for sampling the voice of each user of the identifier during each use of the identifier using a voice analysis technique to identify the number of unique users of the identifier and to indicate the presence of fraudulent use when the number of unique users of the identifier exceeds a threshold; and
,a fraud alert generator to signal presence of fraudulent activity when both of the use characteristics fraud detection engine and the voice based fraud detection engine indicate the presence of fraud. - View Dependent Claims (36)
-
-
38. A method of automatic detection of fraudulent activity on a transaction network, for which each transaction over the network has an identifier associated therewith, the method comprising:
-
sampling the voice of each user during each use of said identifier and using a voice analysis technique to identify the number of unique users of the identifier to indicate the presence of fraudulent use in the event that the number of unique users of the identifier exceeds a threshold indicative of fraudulent use; and
,generating a fraud alert for signalling presence of fraudulent activity when the voice based analysis indicates the presence of fraud. - View Dependent Claims (41)
-
-
39. A method of automatic detection of fraudulent activity on a transaction network, for which each transaction over the network has an identifier associated therewith, the method comprising:
-
analysing characteristics of the use of the network to determine whether fraud is indicated in the use of one of the identifiers; sampling the voice of each user during each use of said identifier and using a voice analysis technique to identify the number of unique users of the identifier to indicate the presence of fraudulent use in the event that the number of unique users of the identifier exceeds a threshold indicative of fraudulent use; and
,generating a fraud alert for signalling presence of fraudulent activity when both of the use characteristics analysis and the voice based analysis indicate the presence of fraud. - View Dependent Claims (40)
-
Specification