Telephonic communications – Call or terminal access alarm or control – Fraud or improper use mitigating or indication
Reexamination Certificate
1997-02-24
2001-12-04
Matar, Ahmad (Department: 2642)
Telephonic communications
Call or terminal access alarm or control
Fraud or improper use mitigating or indication
C379S196000, C379S114140
Reexamination Certificate
active
06327352
ABSTRACT:
TECHNICAL FIELD
This invention relates generally to detecting fraudulent use of a resource such as a telecommunications network and particularly to methods and systems for detecting and analyzing fraudulent use of a telecommunications network in real-time.
BACKGROUND OF THE INVENTION
Modem telecommunications networks consist of a number of interconnected switches which may be provided by a common operating company. Individuals may gain unauthorized access to the network to use the network resources without paying services charges to the operator. Such unauthorized use often results in the wrong party being charged for the use because the fraudulent user is unknown. When the wrong party is charged for the unauthorized use, the telecommunication network's operator will be unable to collect the charges. Such unauthorized use may account for a significant portion of a network operating expenses and impose a financial burden on the operating company.
Fraudulent use of a telecommunications network also consumes valuable network resources which may degrade the quality of service provided to legitimate customers. The misuse of network resources denies legitimate customers access to the network.
An effective way of preventing fraudulent use of a network is to detect the misuse as it occurs. If the misuse is detected as it is occurring, may then be prevented before or as it occurs. The ability to detect fraudulent use in real-time can thus significantly reduce the financial burden imposed on a network operator. Accordingly, a network which accurately detects fraudulent use of a telecommunications network, in real-time, is needed.
Prior systems have attempted real-time fraud detection. One example of such a system is disclosed in U.S. Pat. No. 5,495,521 to Rangachar, Which describes a method and means for preventing fraudulent use of a telephone network. The system described therein utilizes the switching equipment located within a network's central offices to collect data and create a call detail record. The call detail record information is automatically generated by the switching equipment to provide data that is analyzed to detect fraudulent network use.
One problem with this data collection technique is that the switching equipment's primary function is to switch traffic within the system. The creation of call detail records, however, is a secondary function of the switching system. Accordingly, the switching equipment is not a efficient mechanism for generating call detail records. Also, the switching equipment is equipped with hardware and extensive software which facilitate the switching of calls. The software may include upgrades and patches which can interfere with the switching and cause the switch to malfunction. This combination of shortcomings results in a data collection method where a call detail record may not be created for all calls. Accordingly, some fraudulent calls may go undetected.
Another problem with prior data collection methods is that the call records are dependent upon the individual switches. Typically, the call record format is determined by the particular switch handling the call. A network may contain a number of different types of switches. Each switch is programmed to create a call detail record which includes predetermined parameters. Thus, the modification of call detail records generated at the switch level requires the modification of all switches within the telecommunications network that is being monitored for fraud.
REFERENCES:
patent: 4002848 (1977-01-01), Stein
patent: 4159400 (1979-06-01), Hall et al.
patent: 4188508 (1980-02-01), Rogers et al.
patent: 4799255 (1989-01-01), Billinger et al.
patent: 4811378 (1989-03-01), Else et al.
patent: 5345595 (1994-09-01), Johnson et al.
patent: 5351290 (1994-09-01), Naeini et al.
patent: 5438570 (1995-08-01), Karras et al.
patent: 5463681 (1995-10-01), Vaios et al.
patent: 5465387 (1995-11-01), Mukherjee
patent: 5495521 (1996-02-01), Rangachar
patent: 5504810 (1996-04-01), McNair et al.
patent: 5506893 (1996-04-01), Buscher et al.
patent: 5555551 (1996-09-01), Rudokas et al.
patent: 5596632 (1997-01-01), Curtis et al.
patent: 5602906 (1997-02-01), Phelps et al.
patent: 5627886 (1997-05-01), Bowman et al.
patent: 5706338 (1998-01-01), Relyea et al.
patent: 5729597 (1998-03-01), Bhusri
patent: 5768354 (1998-06-01), Lange et al.
patent: 5805686 (1998-09-01), Moller et al.
patent: 5912954 (1999-06-01), Whited et al.
patent: 5937043 (1999-08-01), He
patent: 6085084 (2000-07-01), Christmas
patent: 6185415 (2001-02-01), Boatwright
Betts Judy Lynn
Hatlak Michael Joseph
McGuire Michael Joseph
Ameritech Corporation
Brinks Hofer Gilson & Lione
Matar Ahmad
Tieu Benny Q.
White Jason C.
LandOfFree
System and method for real-time fraud detection within a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for real-time fraud detection within a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for real-time fraud detection within a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2560232