Adaptive fraud monitoring and control
First Claim
Patent Images
1. The method of monitoring access to a system, comprising:
- establishing a rate of interruption for demanding authentication from a potential accessor;
denying access in the event of failure to authenticate in response to each demand; and
automatically varying the rate of interruption to a another rate in response to predetermined conditions;
one of the predetermined conditions including prior failed authentications.
1 Assignment
0 Petitions
Accused Products
Abstract
Access to a resource such as a telecommunications system is monitored and prevented adaptively on a real-time basis by establishing with the customer, a steady state low level of surveillance and arbitrary intermittent interruption during which the telecommunications company demands authentication, by personal identification number (PIN), of a given fraction of access demands (for example, telephone calls), and, in response to signals indicating that arrival of an alert condition, and preferably at least one prior invalid call, raising the level of authentication demands.
173 Citations
22 Claims
-
1. The method of monitoring access to a system, comprising:
-
establishing a rate of interruption for demanding authentication from a potential accessor; denying access in the event of failure to authenticate in response to each demand; and automatically varying the rate of interruption to a another rate in response to predetermined conditions; one of the predetermined conditions including prior failed authentications. - View Dependent Claims (2, 3, 6, 7, 8, 9, 19, 20)
-
-
4. The method of monitoring access to a system, comprising:
-
establishing a rate of interruption for demanding authentication from a potential accessor; denying access in the event of failure to authenticate in response to each demand; and automatically varying the rate of interruption to a another rate in response to predetermined conditions; the step of establishing a rate of interruption including determining whether calls are suspicious and determining the rate of interruptions on the basis of only the rate of failed suspicious calls. - View Dependent Claims (5)
-
-
10. An apparatus for monitoring access to a system, comprising:
-
means for establishing a rate of interruption for demanding authentication from a potential accessor; means for denying access in the event of failure to authenticate in response to each demand; and means for varying the rate of interruption to another in response to predetermined conditions selected by the customer, one of the predetermined conditions including prior failed authentications. - View Dependent Claims (11, 12, 15, 16, 17, 18, 21, 22)
-
-
13. An apparatus for monitoring access to a system, comprising:
-
means for establishing a rate of interruption for demanding authentication from a potential accessor; means for denying access in the event of failure to authenticate in response to each demand; and means for varying the rate of interruption to another in response to predetermined conditions selected by the customer, the means for establishing a rate of interruption including means for determining whether calls are suspicious and means for determining the rate of interruptions on the basis of only the rate of failed suspicious calls. - View Dependent Claims (14)
-
Specification