Self-learning real-time prioritization of telecommunication...

Telephonic communications – With usage measurement – Call charge metering or monitoring

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C379S112010, C379S114010, C379S114140, C379S127020, C379S133000, C379S188000, C379S189000, C455S410000

Reexamination Certificate

active

06597775

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to detecting telecommunications fraud using intelligent predictive modeling systems.
2. Description of the Related Art
The rapid growth of the telecommunications industry has been accompanied by a correlative increase in telecommunications fraud. In some situations, however, a telecommunications service may be accessed or obtained in an undesirable fashion, e.g., by fraud, theft, or other nefarious activity, and unauthorized use may ensue. Providers take control actions to stop the provision of service when it is used in an undesirable fashion, e.g., by blocking compromised calling card numbers before service is fraudulently obtained. Unfortunately, by the time fraudulent use is detected and control actions can be taken, there has often already been a significant unauthorized use of the co-opted service, resulting in expense to the service provider. Accordingly, there is a need for a way to identify undesirable and unauthorized use of a service at an early juncture, in order to minimize the amount of loss resulting from that use.
Additionally, long distance carriers regularly lease bandwidth from other carriers. On such occasions, the call data record (CDR) for the call is often stripped of identifying information such as the number from where the call was made (“originating number”). This is done so that the long distance company leasing the bandwidth (the lessor) and completing the call on behalf of another carrier will not attempt to solicit business from the caller at the originating number, who is presumably not one of the lessor's subscribers, but the lessee's subscriber. Unfortunately, this frustrates fraud control efforts, since the information that has been stripped from the CDR would normally be used subsequently to detect fraud. As a result, there is substantial opportunity for fraud in these types of bandwidth exchanges. What is needed is a way to use the information stripped from the CDR to predict fraud, without divulging the stripped information to the provider providing the bandwidth.
BRIEF SUMMARY OF THE INVENTION
The present invention provides a system that includes a predictive model for detecting fraud in Call Data Records (CDRs). Telephone companies (Telcos) provide CDRs to the system, and the CDRs are then evaluated against Telco-specified rules; each participating Telco may define it own set of rules for evaluating calls made through that Telco. If one or more of a Telco's rules are matched, then the system generates an alert. All pending alerts for a caller (individual or company or portion thereof) form a case. The case also contains details—such as a statistical summary of alert—generating calls—about the caller's calling history. The case, current alert information, and a variety of risk factors serve as inputs to the predictive model. The predictive model outputs a score that is predictive of the likelihood that the call being made is fraudulent. This information is then queued for examination by analysts. The queue is designed so that calls that are more likely to involve fraud are examined earlier. After an analyst has made a determination about whether the call involved fraud, or alternatively, if no decision is made on the case within a pre-specified time, the case is saved in a case database. The fraud
o-fraud decision is used to update the risk factors and the predictive model to improve predictions about future alerts.
The features and advantages described in this summary and the following detailed description are not all-inclusive, and particularly, many additional features and advantages will be apparent to one of ordinary skill in the art. Moreover, it should be noted that the language used in this disclosure has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter, resort to the claims being necessary to determine such inventive subject matter.


REFERENCES:
patent: 5438570 (1995-08-01), Karras et al.
patent: 5566234 (1996-10-01), Reed et al.
patent: 5627886 (1997-05-01), Bowman
patent: 5666481 (1997-09-01), Lewis
patent: 5706338 (1998-01-01), Relyea et al.
patent: 5768354 (1998-06-01), Lange et al.
patent: 5802145 (1998-09-01), Farris et al.
patent: 5875236 (1999-02-01), Jankowitz et al.
patent: 5963625 (1999-10-01), Kawecki et al.
patent: 6163604 (2000-12-01), Baulier et al.
patent: 6535728 (2003-03-01), Perfit et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Self-learning real-time prioritization of telecommunication... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Self-learning real-time prioritization of telecommunication..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Self-learning real-time prioritization of telecommunication... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3069027

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.