摘要:
A system and method for processing telephone calls and providing enhanced services is presented. The call processing system includes a network control processor for controlling the processing and routing of the calls and for providing enhanced features, and a matrix switch for routing calls from an originating location to a terminating location. Operator consoles can be included to provide operator assistance to the caller. The network control processor comprises a central message processor that receives call data, determines the type of call, determines the processing required, and determines whether operator assistance is required. A call route distributor allocates an operator console to the call if required. A billing server is used to track billing information for the call while it is in progress. A database server is provided for database look-ups and storage. The call processing system also includes a validation system, a billing system, a distribution system, and a fraud detection and prevention system. The validation system is used to validate call information to determine whether the call can be placed. The billing system determines rates for calls and calculates the cost of completed calls. The distribution system distributes changes that are made to a master database to the appropriate slave database. The fraud detection and prevention system monitors originating and in-process calls to detect and possibly prevent possible fraudulent uses of phone services and systems. A client interface is provided to facilitate communications among applications and DEF records are used to define specific call processing actions.
摘要:
A method of effecting a sale over a computer network in which it is determined whether a user passes fraud control before effecting a sale over a computer network. Information associated with a method of payment, such as credit card information, debit card information, checking account information, a telephone service account, a cable television account, a utility service account, or an Internet service provider account, is requested from the user after the user passes the fraud control. Information associated with the method of payment is received from the user in real time. Method-of-payment information is communicated to a payment authorization database, which can be located locally or remotely. The method-of-payment information includes the received information associated with the method of payment. Payment authorization information associated with the method of payment is received from the payment authorization database. A sale transaction is completed when the payment authorization information is affirmative. Sale charge information associated with the sale effected over the computer network is transmitted to the payment authorization database when the sale transaction is complete. The sale charge information includes information for charging the method of payment an amount representing a charge for the sale.
摘要:
A telephony system that enables a user to personally his/her telephone number or numbers that can reach a particular handset and then change those numbers at will, or block certain parties from reach the handset. The handset also features a swipe slot so that a credit card can be inserted therein. A method of using a unique one time use credit card that is useless of a thief provides security to prevent fraudulent charges by non-authorized users.
摘要:
Centralized billing is provided by processing requests for pre-paid and post-paid services at a service control point that is configured to prepare one or more associated event records. Event records associated with provided services can be stored at the service control point or in a remote database, or the service control point can direct the event records to a central billing system that is configured to bill subscribers directly or to transmit event records to one or more payment systems via a financial gateway. Service control point service logic is configured to permit negative account balances for post-paid subscribers, while account balances remain positive for pre-paid subscribers. Credit limits can be associated with post-paid subscribers, and service authorization can be based on such credit limits.
摘要:
The present invention addresses the need to facilitate prepaid communication services in a manner that reduces the user inconvenience and lost operator revenue presently associated with account replenishment. The network equipment (110-122) collects service usage information associated with a prepaid account and uses this information to predict when the prepaid account will be depleted. If the remaining time before account depletion is below an established minimum, a communication unit (101) associated with the account is notified. The communication unit is then able to respond by requesting replenishment of the account.
摘要:
A method, system, and program providing identification usage fraud protection are provided. A context for a use of an identification via a communication line is detected at a fraud protection service. The context for use of the identification is analyzed in view of multiple previous uses of the identification. A level of suspicion of fraudulent use of the identification is specified according to the analysis of the context. Depending on the level of suspicion, further use of the identification may require additional authentication or may be barred. The identification may include a user name, an account number, a password, or other identifier that may be utilized to represent an individual in accessing products and services.
摘要:
The application describes a method for detecting a behavior of interest in a surrounding including at least one telecommunication network, by using approach of Immune Engineering. The method comprises steps of analyzing the behavior of interest by building a characterizing data string called DNA which comprises two or more data sub-strings characterizing fragments of the behavior of interest and called genes. Further, there are selected two or more data fragments called detectors and being substantially close to the genes, and the detectors are applied to identify similar to them data fragments if appearing in information concerning real time activity in the surrounding. Based on the identification results, the method detects whether the behavior of interest is present in the newly incoming information.
摘要:
A portable communication unit that operates based upon predetermined discrete blocks of airtime. The unit may be operated as a conventional portable communication unit when airtime is available, and operation of the unit for conventional communication is disabled when all the airtime has been used. By entering a specific code, which may be supplied by a dealer, the user may activate an additional block of airtime. Two classes of airtime may be provided; home time airtime which is used when the unit is within the area of a local or primary communication service provider, and roam time airtime which is used when the unit is outside of the area of a local or primary communication service provider. The unit may be programmed, preferably only by the dealer, with toll restrictor codes that limit the available range of numbers with which the unit may initiate a communication session.
摘要:
A method and device for suppressing threshold alerts in a telecommunication fraud control system is disclosed. Threshold alerts are generated when the count of a certain category of call exceeds a certain threshold. These counts are maintained in relation to particular accounts. A fraud analyst determines whether or not a particular account will have alert suppression enabled, based on the type of account and its history. Once alert suppression is enabled, the count is multiplied by a coefficient before determining whether to issue a threshold alert. If the multiplied count still exceeds the threshold, an alert is generated. If not, no alert is generated.
摘要:
Control is exercised over a tap connection made for law enforcement agency monitoring of mobile station communications in response to an inter-exchange hand-off. Where such a tap connection does not yet exist at hand-off, pre-hand-off actions taken at the target exchange trigger an analysis of whether a party to that communication is marked for monitoring followed by an establishment of the tap connection at hand-off if the party is so marked. If the tap connection is already in place, pre-hand-off actions taken at the target exchange trigger an analysis of whether law enforcement agency monitoring of that communication is lawfully authorized with respect to the target exchange followed by instructing the anchor exchange to terminate the tap connection at hand-off if monitoring is not lawfully authorized.