System and method for real-time fraud detection within a...

Telephonic communications – Call or terminal access alarm or control – Fraud or improper use mitigating or indication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C379S196000, C379S114140

Reexamination Certificate

active

06327352

ABSTRACT:

TECHNICAL FIELD
This invention relates generally to detecting fraudulent use of a resource such as a telecommunications network and particularly to methods and systems for detecting and analyzing fraudulent use of a telecommunications network in real-time.
BACKGROUND OF THE INVENTION
Modem telecommunications networks consist of a number of interconnected switches which may be provided by a common operating company. Individuals may gain unauthorized access to the network to use the network resources without paying services charges to the operator. Such unauthorized use often results in the wrong party being charged for the use because the fraudulent user is unknown. When the wrong party is charged for the unauthorized use, the telecommunication network's operator will be unable to collect the charges. Such unauthorized use may account for a significant portion of a network operating expenses and impose a financial burden on the operating company.
Fraudulent use of a telecommunications network also consumes valuable network resources which may degrade the quality of service provided to legitimate customers. The misuse of network resources denies legitimate customers access to the network.
An effective way of preventing fraudulent use of a network is to detect the misuse as it occurs. If the misuse is detected as it is occurring, may then be prevented before or as it occurs. The ability to detect fraudulent use in real-time can thus significantly reduce the financial burden imposed on a network operator. Accordingly, a network which accurately detects fraudulent use of a telecommunications network, in real-time, is needed.
Prior systems have attempted real-time fraud detection. One example of such a system is disclosed in U.S. Pat. No. 5,495,521 to Rangachar, Which describes a method and means for preventing fraudulent use of a telephone network. The system described therein utilizes the switching equipment located within a network's central offices to collect data and create a call detail record. The call detail record information is automatically generated by the switching equipment to provide data that is analyzed to detect fraudulent network use.
One problem with this data collection technique is that the switching equipment's primary function is to switch traffic within the system. The creation of call detail records, however, is a secondary function of the switching system. Accordingly, the switching equipment is not a efficient mechanism for generating call detail records. Also, the switching equipment is equipped with hardware and extensive software which facilitate the switching of calls. The software may include upgrades and patches which can interfere with the switching and cause the switch to malfunction. This combination of shortcomings results in a data collection method where a call detail record may not be created for all calls. Accordingly, some fraudulent calls may go undetected.
Another problem with prior data collection methods is that the call records are dependent upon the individual switches. Typically, the call record format is determined by the particular switch handling the call. A network may contain a number of different types of switches. Each switch is programmed to create a call detail record which includes predetermined parameters. Thus, the modification of call detail records generated at the switch level requires the modification of all switches within the telecommunications network that is being monitored for fraud.


REFERENCES:
patent: 4002848 (1977-01-01), Stein
patent: 4159400 (1979-06-01), Hall et al.
patent: 4188508 (1980-02-01), Rogers et al.
patent: 4799255 (1989-01-01), Billinger et al.
patent: 4811378 (1989-03-01), Else et al.
patent: 5345595 (1994-09-01), Johnson et al.
patent: 5351290 (1994-09-01), Naeini et al.
patent: 5438570 (1995-08-01), Karras et al.
patent: 5463681 (1995-10-01), Vaios et al.
patent: 5465387 (1995-11-01), Mukherjee
patent: 5495521 (1996-02-01), Rangachar
patent: 5504810 (1996-04-01), McNair et al.
patent: 5506893 (1996-04-01), Buscher et al.
patent: 5555551 (1996-09-01), Rudokas et al.
patent: 5596632 (1997-01-01), Curtis et al.
patent: 5602906 (1997-02-01), Phelps et al.
patent: 5627886 (1997-05-01), Bowman et al.
patent: 5706338 (1998-01-01), Relyea et al.
patent: 5729597 (1998-03-01), Bhusri
patent: 5768354 (1998-06-01), Lange et al.
patent: 5805686 (1998-09-01), Moller et al.
patent: 5912954 (1999-06-01), Whited et al.
patent: 5937043 (1999-08-01), He
patent: 6085084 (2000-07-01), Christmas
patent: 6185415 (2001-02-01), Boatwright

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for real-time fraud detection within a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for real-time fraud detection within a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for real-time fraud detection within a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2560232

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.