Methods to improve fraud detection on conference calling systems based on observation of participants' call time durations
First Claim
1. A method for detecting fraudulent use in a conference calling system, the method including:
- receiving at least one time duration threshold for a conference call of the conference calling system;
monitoring the conference call to determine at least one of a first call duration, a second call duration, and a third call duration,the first call duration including a call duration of at least one attendee of the conference call,the second call duration including a total call duration of all of the attendees of the conference call combined, andthe third call duration including a call duration for the conference call;
comparing the time duration threshold to at least one of the first call duration, the second call duration, and the third call duration with a processor;
performing actions with the processor if at least one of the first call duration, the second call duration, and the third call duration exceeds the time duration threshold; and
permitting the conference call to continue if the time duration threshold exceeds the first call duration, the second call duration, and the third call duration, when said comparing of the time duration threshold includes comparing the time duration threshold to the first call duration, the second call duration, and the third call duration.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds.
35 Citations
22 Claims
-
1. A method for detecting fraudulent use in a conference calling system, the method including:
-
receiving at least one time duration threshold for a conference call of the conference calling system; monitoring the conference call to determine at least one of a first call duration, a second call duration, and a third call duration, the first call duration including a call duration of at least one attendee of the conference call, the second call duration including a total call duration of all of the attendees of the conference call combined, and the third call duration including a call duration for the conference call; comparing the time duration threshold to at least one of the first call duration, the second call duration, and the third call duration with a processor; performing actions with the processor if at least one of the first call duration, the second call duration, and the third call duration exceeds the time duration threshold; and permitting the conference call to continue if the time duration threshold exceeds the first call duration, the second call duration, and the third call duration, when said comparing of the time duration threshold includes comparing the time duration threshold to the first call duration, the second call duration, and the third call duration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for detecting fraudulent use in a conference calling system, the method including:
-
receiving at least one time duration threshold for a conference call of the conference calling system with a user interface; monitoring the conference call with a timer to determine at least one of a first call duration, a second call duration, and a third call duration, the first call duration including a call duration of at least one attendee of the conference call, the second call duration including a total call duration of all of the attendees of the conference call combined, and the third call duration including a call duration for the conference call; comparing the time duration threshold to at least one of the first call duration, the second call duration, and the third call duration with a processor; performing at least one of validation actions and alert actions with the processor if at least one of the first call duration, the second call duration, and the third call duration exceeds the time duration threshold, the validation actions and alert actions including at least one of; permitting an administrator of the conference calling system to enter the conference call, terminating the conference call, voiding at least one passcode to the conference call, and sending an alert to at least one of the administrator of the conference calling system, a moderator of the conference call, participants of the conference call, and at least one security personnel, the alert indicating that the time duration threshold has been exceeded; and permitting the conference call to continue if the time duration threshold exceeds the first call duration, the second call duration, and the third call duration, when said comparing of the time duration threshold includes comparing the time duration threshold to the first call duration, the second call duration, and the third call duration. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system for detecting fraudulent use in a conference calling system, the system including:
-
a user interface for receiving at least one time duration threshold for a conference call of the conference calling system; a database for storing the at least one time duration threshold; a timer for monitoring the conference call to determine a first call duration, a second call duration, and a third call duration, the first call duration including a call duration of at least one attendee of the conference call, the second call duration including a total call duration of all of the attendees of the conference call combined, and the third call duration including a call duration for the conference call; a processor operatively connected to the database and the timer, the processor compares the time duration threshold to at least one of the first call duration, the second call duration, and the third call duration, and the processor performs actions if at least one of the first call duration, the second call duration, and the third call duration exceeds the time duration threshold; and an alert module in the processor, the alert module sends an alert to an administrator of the conference calling system, a moderator of the conference call, participants of the conference call, and at least one security personnel, the alert indicating that the time duration threshold has been exceeded. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A computer program product for detecting fraudulent use in a conference calling system, the computer program product including:
-
a computer readable storage medium; first program instructions to receive at least one time duration threshold for a conference call of the conference calling system; second program instructions to monitor the conference call to determine at least one of a first call duration, a second call duration, and a third call duration, the first call duration including a call duration of at least one attendee of the conference call, the second call duration including a total call duration of all of the attendees of the conference call combined, and the third call duration including a call duration for the conference call; third program instructions to compare the time duration threshold to at least one of the first call duration, the second call duration, and the third call duration; fourth program instructions to perform actions with the processor if at least one of the first call duration, the second call duration, and the third call duration exceeds the time duration threshold, and fifth program instructions to permit the conference call to continue if the time duration threshold exceeds the first call duration, the second call duration, and the third call duration, when said comparing of the time duration threshold includes comparing the time duration threshold to the first call duration, the second call duration, and the third call duration, wherein the first program instructions, the second program instructions, the third program instructions, the fourth program instructions, and the fifth program instructions are stored on the computer readable storage medium.
-
Specification