System and method for real-time fraud detection within a telecommunication network
First Claim
1. A system for detecting fraudulent access to a telecommunications network comprising a plurality of switches, the system comprising:
- a signal protocol receiver in data communication with one or more of the plurality of switches and operable to collect signaling protocol data at the one or more of the plurality of switches;
a decoder in data communication with the signal protocol receiver and operable to decode the signaling protocol data and produce call information records based on the signaling protocol data during the duration of the call; and
a processor in data communication with the decoder and operable to analyze the call information records during the duration of the call in order to detect fraudulent use of the telecommunications network.
3 Assignments
0 Petitions
Accused Products
Abstract
Real time detection of the fraudulent use of a telecommunications network is accomplished by analyzing data for each call that is occurring within the network. A signal protocol receiver is used to collect signaling protocol for each call that is occurring within the network. The signaling protocol data is collected, decoded and formatted into call information records (CIRs). The CIRs contain various operator specified parameters for each call that is occurring within the network. The CIRs are compared to operator defined thresholds. If any of the CIRs exceeds the thresholds, an alert is generated. The alerts are stored in a database where the operator can analyze them and take the appropriate corresponding action to resolve the alert. The alerts and the CIRs are archived in a database so that trends of fraudulent use can be detected and prevented. This method of fraud detection provides for the effective analysis of every call that is occurring within the network. Accordingly, no call goes unanalyzed and ideally no fraud goes undetected. Additionally, the method does not impose an additional load on the network switching equipment and therefore results in a better quality of transmissions.
38 Citations
19 Claims
-
1. A system for detecting fraudulent access to a telecommunications network comprising a plurality of switches, the system comprising:
-
a signal protocol receiver in data communication with one or more of the plurality of switches and operable to collect signaling protocol data at the one or more of the plurality of switches; a decoder in data communication with the signal protocol receiver and operable to decode the signaling protocol data and produce call information records based on the signaling protocol data during the duration of the call; and a processor in data communication with the decoder and operable to analyze the call information records during the duration of the call in order to detect fraudulent use of the telecommunications network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. Apparatus to detect a fraudulent telephone call in a telecommunications system, the apparatus comprising:
-
means for collecting signaling protocol data for a telephone call that is independent from a switch of the telecommunications system; means for correlating the signaling protocol data into a call information record during the duration of the telephone call; and means for determining that the telephone call is fraudulent during the duration of the call by analyzing the call information record. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification