摘要:
A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as, for example, a rules-based thresholding engine and a profiling engine. The detection layer can include an AI-based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases. The analysis layer preferably generates a probability of fraud for each fraud case. The expert systems layer receives fraud cases and automatically initiates actions for certain fraud cases. The presentation layer also receives fraud cases for presentation to human analysts. The presentation layer permits the human analysts to initiate additional actions.
摘要:
Systems and methods which determines the likelihood that a calling (or in some cases the called) user will pay for a particular auxiliary service are described. A system of an embodiment considers the user's credit risk and his/her propensity to pay, when deciding if the user is eligible for a particular auxiliary service. A methodology used for determining propensity to pay for an auxiliary service according to embodiments is independent from a determination of propensity to pay for a basic calling service. Thus, the criteria used, and the weight given to each criteria, for determining eligibility for auxiliary services can be different from the criteria and criteria weight used for basic communication connections.
摘要:
Method and arrangement in a mediating function (204) for supporting detection of fraud in a network, when a network security function (200) is employed for analyzing activities in the network in view of predefined alert criteria, and a fraud detection function (202) is employed for analyzing e.g. charging information of users. When a first alert is received from a first one of the network security function and the fraud detection function, indicating that the predefined alert criteria of said first function have been satisfied, the alert criteria of the second one of said network security function and fraud detection function are modified based on the received first alert. Thereby, the network security and fraud detection functions can be correlated and made more efficient regarding accuracy and/or speed in detecting fraud.
摘要:
System, apparatus, computer program products and methods for preventing fraud attacks (e.g., on a virtual PBX service provider) are disclosed. In some implementations, a set of fraud evaluation processes are performed, an overall fraud evaluation score is incremented as each of the set of fraud evaluation processes are performed and a step result is obtained. A user request (e.g., account activation) can be denied or accepted based on the overall fraud evaluation score. In some implementations, the set of fraud evaluation processes can include one or more of: an internal fraud evaluation process, a process for checking multiple trial accounts associated with a common account parameter, a process for geolocation verification of multiple account parameters, a process for device type verification for a contact phone number, a process for credit card verification, and a process for placing a contact number verification call.
摘要:
The present invention is directed to a method for managing transactions in a telecommunications network. The method includes creating an XML transaction detail file. At least one transaction detail record is stored in the XML transaction detail file in response to a telecommunications transaction. The at least one transaction detail record includes transaction data corresponding to the telecommunications transaction.
摘要:
A technique is disclosed in the context of a communications system whereby parties accessible through the system may be referenced by multiple alternative symbolic names. User profile information for a given party may be maintained in the system to control features and routing behavior in response to session request involving the party. By virtue of a mapping capability, one or more symbolic names may be associated with the same user profile information. A session request involving any of the alternative names for a party will evoke the same user profile.
摘要:
A method and system for operating a telephone service are disclosed, in which callers with insufficient credit or network airtime are able to contact a call recipient. The network monitors call attempts from callers to identify call attempts from callers with insufficient credit or airtime to make a call. When such a call attempt is detected, a call request is transmitted to the intended recipient of the call, to notify the recipient of the call attempt. The notification may take the form of an in-call notification if the call recipient is on-line, or an SMS or voicemail message if the recipient is off-line. The method and system permit individuals who otherwise would not be able to access the network to indicate to a call recipient that they have attempted to contact the call recipient. The call recipient can then contact the would be caller at his/her discretion.
摘要:
A network assurance analytics (NAA) system and method is disclosed. The NAA can be part of a risk analytic for telecom (RAFT) program. The NAA system is configured to monitor telecommunications networks, detect errors or fraud in those telecommunications networks, and provide solutions to resolve the errors or reduce the fraud. Traffic of a telecommunications network is electronically monitored for at least one pattern that is indicative of a telecommunications anomaly. Based on a set of a set of telecommunications profiles stored in a database, a model score representing a value of the telecommunications anomaly is generated. A solution for the telecommunications network to reduce the model score associated with the telecommunications anomaly is then generated for execution on the telecommunications network.
摘要:
A method of effecting a sale over a computer network in which it is determined whether a user passes fraud control before effecting a sale over a computer network. Information associated with a method of payment, such as credit card information, debit card information, checking account information, a telephone service account, a cable television account, a utility service account, or an Internet service provider account, is requested from the user after the user passes the fraud control. Information associated with the method of payment is received from the user in real time. Method-of-payment information is communicated to a payment authorization database, which can be located locally or remotely. The method-of-payment information includes the received information associated with the method of payment. Payment authorization information associated with the method of payment is received from the payment authorization database. A sale transaction is completed when the payment authorization information is affirmative. Sale charge information associated with the sale effected over the computer network is transmitted to the payment authorization database when the sale transaction is complete. The sale charge information includes information for charging the method of payment an amount representing a charge for the sale.
摘要:
An apparatus is disclosed. The apparatus is for comparing a set of production fraud parameters with one or more sets of test or proposed fraud parameters run against prepaid card production data in a prepaid card analysis. The apparatus may include a system for uploading a set of production fraud parameters and one or more sets of test fraud parameters, a processing engine for receiving the uploaded parameters for running production data against the set of production fraud parameters in tandem with the one or more sets of test fraud parameters to produce a set of suspected fraud cases triggered by each set of fraud parameters, and one or more databases integrated with or in communications with the processing engine for card validation.