Methods to improve fraud detection on conference calling systems based on observation of participants' call time durations
First Claim
1. A method for detecting fraudulent use in a conference calling system, the method including:
- receiving at least one time duration threshold for a conference call of the conference calling system, the at least one time duration threshold including a first call duration threshold, a second call duration threshold, and a third call duration threshold,the first call duration threshold including a maximum allowed call duration for the at least one attendee of the conference call,the second call duration threshold including a maximum allowed total call duration for all of the attendees of the conference call combined, andthe third call duration threshold including a maximum allowed call duration for the conference call;
monitoring the conference call to determine at least one of a first call duration, a second call duration, and a third call duration,the first call duration including a call duration of at least one attendee of the conference call,the second call duration including a total call duration of all of the attendees of the conference call combined, andthe third call duration including a call duration for the conference call;
comparing the time duration threshold to at least one of the first call duration, the second call duration, and the third call duration with a processor; and
performing actions with the processor if at least one of the first call duration, the second call duration, and the third call duration exceeds the time duration threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
-
Citations
22 Claims
-
1. A method for detecting fraudulent use in a conference calling system, the method including:
-
receiving at least one time duration threshold for a conference call of the conference calling system, the at least one time duration threshold including a first call duration threshold, a second call duration threshold, and a third call duration threshold, the first call duration threshold including a maximum allowed call duration for the at least one attendee of the conference call, the second call duration threshold including a maximum allowed total call duration for all of the attendees of the conference call combined, and the third call duration threshold including a maximum allowed call duration for the conference call; monitoring the conference call to determine at least one of a first call duration, a second call duration, and a third call duration, the first call duration including a call duration of at least one attendee of the conference call, the second call duration including a total call duration of all of the attendees of the conference call combined, and the third call duration including a call duration for the conference call; comparing the time duration threshold to at least one of the first call duration, the second call duration, and the third call duration with a processor; and performing actions with the processor if at least one of the first call duration, the second call duration, and the third call duration exceeds the time duration threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for detecting fraudulent use in a conference calling system, the method including:
-
receiving at least one time duration threshold for a conference call of the conference calling system with a user interface, the at least one time duration threshold including a first call duration threshold, a second call duration threshold, and a third call duration threshold, the first call duration threshold including a maximum allowed call duration for the at least one attendee of the conference call, the second call duration threshold including a maximum allowed total call duration for all of the attendees of the conference call combined, and the third call duration threshold including a maximum allowed call duration for the conference call; monitoring the conference call with a timer to determine at least one of a first call duration, a second call duration, and a third call duration, the first call duration including a call duration of at least one attendee of the conference call, the second call duration including a total call duration of all of the attendees of the conference call combined, and the third call duration including a call duration for the conference call; comparing the time duration threshold to at least one of the first call duration, the second call duration, and the third call duration with a processor; and performing at least one of validation actions and alert actions with the processor if at least one of the first call duration, the second call duration, and the third call duration exceeds the time duration threshold, the alert actions including sending an alert to at least one of the administrator of the conference calling system, a moderator of the conference call, participants of the conference call, and at least one security personnel, the alert indicating that the time duration threshold has been exceeded, the validation actions including at least one of; permitting an administrator of the conference calling system to enter the conference call, terminating the conference call, and voiding at least one passcode to the conference call. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system for detecting fraudulent use in a conference calling system, the system including:
-
a user interface for receiving at least one time duration threshold for a conference call of the conference calling system, the at least one time duration threshold including a first call duration threshold, a second call duration threshold, and a third call duration threshold, the first call duration threshold including a maximum allowed call duration for the at least one attendee of the conference call, the second call duration threshold including a maximum allowed total call duration for all of the attendees of the conference call combined, and the third call duration threshold including a maximum allowed call duration for the conference call; a database for storing the at least one time duration threshold; a timer for monitoring the conference call to determine at least one of a first call duration, a second call duration, and a third call duration, the first call duration including a call duration of at least one attendee of the conference call, the second call duration including a total call duration of all of the attendees of the conference call combined, and the third call duration including a call duration for the conference call; and a processor operatively connected to the database and the timer, the processor compares the time duration threshold to at least one of the first call duration, the second call duration, and the third call duration, and the processor performs actions if at least one of the first call duration, the second call duration, and the third call duration exceeds the time duration threshold. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A computer program product for detecting fraudulent use in a conference calling system, the computer program product including:
-
a computer readable storage medium; first program instructions to receive at least one time duration threshold for a conference call of the conference calling system, the at least one time duration threshold including a first call duration threshold, a second call duration threshold, and a third call duration threshold, the first call duration threshold including a maximum allowed call duration for the at least one attendee of the conference call, the second call duration threshold including a maximum allowed total call duration for all of the attendees of the conference call combined, and the third call duration threshold including a maximum allowed call duration for the conference call; second program instructions to monitor the conference call to determine at least one of a first call duration, a second call duration, and a third call duration, the first call duration including a call duration of at least one attendee of the conference call, the second call duration including a total call duration of all of the attendees of the conference call combined, and the third call duration including a call duration for the conference call; third program instructions to compare the time duration threshold to at least one of the first call duration, the second call duration, and the third call duration; and fourth program instructions to perform actions with the processor if at least one of the first call duration, the second call duration, and the third call duration exceeds the time duration threshold, wherein the first program instructions, the second program instructions, the third program instructions, and the fourth program instructions are stored on the computer readable storage medium.
-
Specification