H04M2215/0148

System, method and computer program product for assessing risk of identity theft
11610278 · 2023-03-21 · ·

In one embodiment, this invention analyzes demographic data that is associated with a specific street address when presented as an address change on an existing account or an address included on a new account application when that address is different from the reference address (e.g., a credit bureau type header data). The old or reference address and the new address, the new account application address or fulfillment address demographic attributes are gathered, analyzed, compared for divergence and scaled to reflect the relative fraud risk.

METHOD FOR DETECTING FRAUDULENT OR ABUSIVE USE OF A TELEPHONE SERVICE PROVIDED BY A TELEPHONE OPERATOR
20230120157 · 2023-04-20 ·

Method for detecting fraudulent or abusive use of telephone services comprising the following steps: collecting data on telephone communication exchanges carried out over a given study period from/to telephone numbers and involving roaming and/or interconnection; creating individual files for compiling exchange data for each studied number; revaluing communications based on pre-established revaluation rules to obtain a wholesale cost amount for each studied number; a step E4 of identifying suspicious numbers for which the amount of wholesale costs exceeds a predetermined threshold value over the study period; a step E7 of detecting fraudulent use by analysing exchange data compiled in the files associated with the identified numbers and/or the multiparametric indicators obtained from said data.

Methods for detecting fraudulent or abusive use of telephone services.

System, Method and Computer Program Product for Assessing Risk of Identity Theft
20230177635 · 2023-06-08 · ·

In one embodiment, this invention analyzes demographic data that is associated with a specific street address when presented as an address change on an existing account or an address included on a new account application when that address is different from the reference address (e.g., a credit bureau type header data). The old or reference address and the new address, the new account application address or fulfillment address demographic attributes are gathered, analyzed, compared for divergence and scaled to reflect the relative fraud risk.

Fraud detection on a communication network
09729727 · 2017-08-08 · ·

A method and corresponding apparatus for automatically detecting and preventing fraudulent calls on a communication network. At least one example embodiment may include collecting CDRs on the communication network for a given time period, aggregating the plurality of call features for each of the collected call detail records by destination number, and utilizing machine learning to generate a decision model for determining if a destination number and/or a call to that destination number may be fraudulent. According to another aspect of the example embodiment, the decision model may be implemented on the communication network to detect and prevent fraudulent calls.

Throttling based on phone call durations

According to examples, an apparatus may include a processor and a computer readable medium on which is stored machine readable instructions that may cause the processor to determine a call duration threshold assigned to an entity, in which a phone number may be associated with the entity. The processor may also track durations of one or more calls placed to the phone number, determine whether the tracked durations of the one or more calls placed to the phone number meet or exceed the call duration threshold, and based on a determination that the tracked durations meet or exceed the call duration threshold, throttle placement of an additional call to the phone number.

Method and system for identification of a remote host in an out-of-band verification network
11196873 · 2021-12-07 · ·

A system detects abnormalities in a call signal indicative of call fraud. The system includes a first device situated in an originating call network and configured to send call signals to a second device situated in a terminating call network. The first device is coupled to a first registry to which it sends the call data from the sent signals for storage as originating call records. The second device is coupled to a second registry to which it sends the call data from the received signals for storage as terminating call records. The first and second registries exchange verification requests and responses to detect whether discrepancies exist between the stored originating call records in the first registry and stored terminating call records in the second registry. The registries generate alerts based on detected discrepancies, which may be used by the devices to block the call fraud.

MACHINE AND PROCESS FOR MANAGING A SERVICE ACCOUNT

A machine and process for managing restrictions of a wireless device associated with an inmate service account. The machine and process include a kiosk operable to exchange data with the wireless device, including limited-use restrictions related to: an inmate associated with the inmate service account, a correctional facility, and/or a parole requirement. The kiosk may also unlock the wireless device when the inmate is released from the correctional facility by removing the limited-use restrictions from the wireless device.

Method and system for transmission of a session initiation protocol (SIP) identity header in an out-of-band verification network
11297189 · 2022-04-05 · ·

A computer-implemented network verification system includes a second device situated in a terminating call network and configured to receive a call signal from a first device situated in an originating network. The first device is coupled to a first registry that stores originating call records. The first registry is configured to obtain, from the first device, and store call data and a SIP identity header associated with the call signal. The system also includes a second registry coupled to the second device and configured to receive, from the first registry over an out-of-band verification network, a first verification request that contains the originating call record, including the SIP identity header associated with the call signal. The second registry is further configured to send the SIP identity header contained in the first verification request to the second device.

Method and Apparatus for Detecting SMS Parameter Manipulation
20220070301 · 2022-03-03 ·

System and method for detecting SMS parameters manipulation. A first SMS registry is coupled to a first Short Message Service Center (SMSC) and optionally to other SMS registries. The first SMSC is within a terminating telephone network. The first SMS registry receives first and second information about an SMS message that was sent from another telephone network or from an External Short Messaging Entity (ESME) and is destined to the first SMSC. The first and second information represent status of the SMS message respectively before and after the SMS message enters the terminating telephone network. The first SMS registry or a firewall automatically compares at least corresponding portions of the first and second information. As a result of the comparison, in response to detecting a difference between the at least portions of the first and second information, the first SMS registry automatically sends a signal indicating SMS parameter manipulation.

Method and System for Transmission of a Session Initiation Protocol (SIP) Identity Header in an Out-of-band Verification Network
20220070300 · 2022-03-03 ·

A computer-implemented network verification system includes a second device situated in a terminating call network and configured to receive a call signal from a first device situated in an originating network. The first device is coupled to a first registry that stores originating call records. The first registry is configured to obtain, from the first device, and store call data and a SIP identity header associated with the call signal. The system also includes a second registry coupled to the second device and configured to receive, from the first registry over an out-of-band verification network, a first verification request that contains the originating call record, including the SIP identity header associated with the call signal. The second registry is further configured to send the SIP identity header contained in the first verification request to the second device.