Fraud analysis in a contact database
First Claim
1. A method of identifying fraudulent data in a contact database, the method comprising:
- receiving a plurality of contact records, each of the plurality of contact records including a set of contact field values corresponding to a set of contact fields;
determining, by a computing device, whether a similar content pattern exists in the plurality of contact records using at least one of the set of contact field values, wherein determining whether the similar content pattern exists in the plurality of contact records comprises;
receiving a threshold value for the similar content pattern;
calculating a dupes-score for at least one of the set of contact fields, the dupes-score indicating an amount of content duplication in the at least one of the set of contact fields; and
determining that the similar content pattern exists when the dupes-score exceeds the threshold value for the similar content pattern; and
flagging, by the computing device, the plurality of contact records when the similar content pattern is determined to exist in the plurality of contact records to verify whether the flagged contact records contain fraudulent data.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method of identifying fraudulent data in a contact database is disclosed herein. In some embodiments, a set of contact records is received where each of the contact records includes a set of contact field values corresponding to a set of contact fields. Some embodiments determine whether a similar content pattern exists in the contact records using at least one of the set of contact field values. In some embodiments, a determination is made as to whether an unusual content pattern exists in the contact records using at least one of the set of contact field values. The set of contact records is flagged when at least one of the similar content pattern or the unusual content pattern is determined to exist in the contact records.
125 Citations
17 Claims
-
1. A method of identifying fraudulent data in a contact database, the method comprising:
-
receiving a plurality of contact records, each of the plurality of contact records including a set of contact field values corresponding to a set of contact fields; determining, by a computing device, whether a similar content pattern exists in the plurality of contact records using at least one of the set of contact field values, wherein determining whether the similar content pattern exists in the plurality of contact records comprises;
receiving a threshold value for the similar content pattern;calculating a dupes-score for at least one of the set of contact fields, the dupes-score indicating an amount of content duplication in the at least one of the set of contact fields; and determining that the similar content pattern exists when the dupes-score exceeds the threshold value for the similar content pattern; and flagging, by the computing device, the plurality of contact records when the similar content pattern is determined to exist in the plurality of contact records to verify whether the flagged contact records contain fraudulent data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium containing program code executable by a processor in a computer to identify fraudulent data for a database system having a corpus of contact information stored therein, the program code including instructions to:
-
receive a plurality of contact records, each of the plurality of contact records including a set of contact field values corresponding to a set of contact fields; determine whether a similar content pattern exists in the plurality of contact records using at least one of the set of contact field values, wherein the instruction to determine whether the similar content pattern exists in the plurality of contact records further includes a set of instructions to;
receive a threshold value for the similar content pattern;calculate a dupes-score for at least one of the set of contact fields, the dupes-score indicating an amount of content duplication in the at least one of the set of contact fields; and determine that the similar content pattern exists when the dupes-score exceeds the threshold value for the similar content pattern; and identify the plurality of contact records when the similar content pattern is determined to exist in the plurality of contact records to verify whether the identified contact records contain fraudulent data. - View Dependent Claims (10, 11, 12)
-
-
13. A system for identifying fraudulent data in a contact database having a corpus of contact information stored therein, the system comprising:
-
a processor; a network interface; and a memory encoded with program code to be executed by the processor, comprising; program code to receive a plurality of contact records, each of the plurality of contact records including a set of contact field values corresponding to a set of contact fields; program code to determine whether a similar content pattern exists in the plurality of contact records using at least one of the set of contact field values, wherein the program code to determine whether the similar content pattern exists in the plurality of contact records further includes program code to;
receive a threshold value for the similar content pattern,calculate a dupes-score for at least one of the set of contact fields, the dupes-score indicating an amount of content duplication in the at least one of the set of contact fields, and determine that the similar content pattern exists when the dupes-score exceeds the threshold value for the similar content pattern; and program code to identify the plurality of contact records when at least one of the similar content pattern or the unusual content pattern is determined to exist in the plurality of contact records to verify whether the identified contact records contain fraudulent data. - View Dependent Claims (14, 15, 16, 17)
-
Specification