Method to improve fraud detection on conference calling systems by detecting re-use of conference moderator passwords
First Claim
1. A method for detecting fraudulent use of a passcode in a conference calling system, said method including:
- obtaining first information from a person assigned the passcode;
setting a threshold number of passcodes permitted in a conference call;
determining a total number of passcodes entered into the conference call;
comparing the total number of passcodes to the threshold number of passcodes with a processor; and
performing actions with the processor when the total number of passcodes exceeds the threshold number of passcodes, said performing of the actions including obtaining second information from at least one person who has entered the passcode into the conference call, and determining whether the second information matches the first information.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention provides a method for detecting fraudulent use of a moderator passcode in a conference calling system. The method sets a threshold number of moderator passcodes permitted in a conference call. The total number of moderator passcodes entered into the conference call is determined and compared to the threshold number with a processor. The conference call is allowed to continue if the threshold number exceeds the total number of moderator passcodes entered into the conference call. If, however, the total number of moderator passcodes exceeds the threshold number of moderator passcodes, the processor performs validation actions and/or alert actions.
40 Citations
23 Claims
-
1. A method for detecting fraudulent use of a passcode in a conference calling system, said method including:
-
obtaining first information from a person assigned the passcode; setting a threshold number of passcodes permitted in a conference call; determining a total number of passcodes entered into the conference call; comparing the total number of passcodes to the threshold number of passcodes with a processor; and performing actions with the processor when the total number of passcodes exceeds the threshold number of passcodes, said performing of the actions including obtaining second information from at least one person who has entered the passcode into the conference call, and determining whether the second information matches the first information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for detecting fraudulent use of a passcode in a conference calling system, said system including:
-
a user interface, said user interface receives a threshold number of passcodes permitted in a conference call, first information from a person assigned the passcode, and second information from at least one person who has entered the passcode into the conference call; a counter, said counter determines a total number of passcodes entered into the conference call; and a processor operatively connected to said counter and said user interface, said processor compares the total number of passcodes from said counter to the threshold number of passcodes from said user interface, said processor performs actions when the total number of passcodes exceeds the threshold number of passcodes, and said processor determines whether the second information matches the first information. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for detecting fraudulent use of a moderator passcode in a conference calling system, said method including:
-
setting a threshold number of moderator passcodes permitted in a conference call with a user interface; determining a total number of moderator passcodes entered into the conference call with a counter module; comparing the total number of moderator passcodes to the threshold number of moderator passcodes with a processor; and performing at least one of validation actions and alert actions with the processor when the total number of moderator passcodes exceeds the threshold number of moderator passcodes, said performing of said validation actions includes obtaining first information from a person assigned the moderator passcode with the user interface, obtaining second information from at least one person who has entered the moderator passcode into the conference call with the user interface, and determining whether the second information matches the first information with the processor. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A computer program product for detecting fraudulent use of a moderator passcode in a conference calling system, said computer program product including:
-
a non-transitory computer readable storage medium; first program instructions to set a threshold number of moderator passcodes permitted in a conference call; second program instructions to determine a total number of moderator passcodes entered into the conference call; third program instructions to compare the total number of moderator passcodes to the threshold number of moderator passcodes with a processor; and fourth program instructions to perform actions with the processor when the total number of moderator passcodes exceeds the threshold number of moderator passcodes, wherein said first program instructions, said second program instructions, said third program instructions, and said fourth program instructions are stored on said computer readable storage medium.
-
Specification