WO2000067168A2 - Calcul des utilisations frauduleuses d'un compte - Google Patents
Calcul des utilisations frauduleuses d'un compte Download PDFInfo
- Publication number
- WO2000067168A2 WO2000067168A2 PCT/GB2000/001669 GB0001669W WO0067168A2 WO 2000067168 A2 WO2000067168 A2 WO 2000067168A2 GB 0001669 W GB0001669 W GB 0001669W WO 0067168 A2 WO0067168 A2 WO 0067168A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- account
- alarms
- fraud
- alarm
- score
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 27
- 238000001514 detection method Methods 0.000 claims abstract description 19
- 230000003542 behavioural effect Effects 0.000 claims abstract description 14
- 230000001419 dependent effect Effects 0.000 claims abstract description 7
- 238000013528 artificial neural network Methods 0.000 description 29
- 238000004364 calculation method Methods 0.000 description 10
- 230000007246 mechanism Effects 0.000 description 9
- 230000000694 effects Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000001747 exhibiting effect Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000003607 modifier Substances 0.000 description 1
- 230000000051 modifying effect Effects 0.000 description 1
- 230000001537 neural effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q99/00—Subject matter not provided for in other groups of this subclass
Definitions
- the present invention relates to a method and apparatus for account fraud scoring and a system incorporating the same.
- fraud detection tools have been developed to assist in the identification of such fraudulent use.
- Such a fraud detection tool may, however, produce thousands of alarms in one day.
- these alarms have been ordered either chronologically according to when they have occurred, or in terms of their importance, or a combination of both.
- Alarm importance provided a rudimentary order based on the significance of the alarm raised, although it has many failings: such a system takes no account of how alarms interact.
- the invention seeks to provide an improved method and apparatus for classifying and prioritising identified instances of potential account fraud.
- a method of prioritising alarms in an account fraud detection system comprising the steps of: assigning a numeric weight to each of a plurality of behavioural characteristics of an alarm raised against an account; computing a fraud score for said alarm responsive to said numeric weights.
- the score gives a meaningful representation of the seriousness of a potential fraud associated with the raised alarm.
- said step of computing comprises the step of: forming a product of a plurality of said numeric weights.
- a method of prioritising alarms in an account fraud detection system comprising the steps of: assigning a numeric weight to each of a plurality of behavioural characteristics of each of one or more of alarms raised against an account; computing a fraud score for each of said one or more alarms responsive to said numeric weights; computing an account fraud score responsive to said one or more fraud scores.
- said step of computing a fraud score comprises the step of: forming a product of a plurality of said numeric weights.
- said step of computing an account fraud score comprises the step of: selecting a largest of said one or more fraud scores.
- said step of computing an account fraud score comprises the step of: imposing a numeric bound on the value of said account fraud score.
- said step of computing an account fraud score for each of said one or more alarms comprises the step of: adding a term dependent on the number of alarms raised.
- said step of computing an account fraud score comprises the steps of: selecting a largest of said fraud scores; adding a term dependent on the number of alarms raised.
- this prioritises accounts according to the seriousness of potential fraud associated with them.
- a method of prioritising alarms in an account fraud detection system comprising the steps of: performing the method of claim 3 on a plurality of accounts whereby to compute an account fraud score for each of said accounts; providing a sorted list of accounts responsive to saJd account fraud scores.
- the method may also comprise the step of: displaying said sorted list of accounts.
- this allows an operator to rapidly identify high risk account usage and hence concentrate resources on those high risk, potentially high cost frauds.
- the step of displaying said sorted list of accounts comprises the step of: displaying with each account an indication of its associated account fraud score.
- said characteristics include one or more characteristics drawn from the set consisting of: alarm capability, alarm sub-capability, velocity, bucket size, and account age.
- the invention also provides for a system for the purposes of fraud detection which comprises one or more instances of apparatus embodying the present invention, together with other additional apparatus.
- an apparatus arranged for prioritising alarms in an account fraud detection system comprising: first apparatus arranged to assign a numeric weight to each of a plurality of behavioural characteristics of an alarm raised against an account; second apparatus arranged to compute a fraud score for said alarm responsive to said numeric weights.
- an apparatus arranged for prioritising alarms in an account fraud detection system comprising the steps of: first apparatus arranged to assign a numeric weight to each of a plurality of behavioural characteristics of each of one or more of alarms raised against an account; second apparatus arranged to compute a fraud score for each of said one or more alarms responsive to said numeric weights; third apparatus arranged to compute an account fraud score responsive to said one or more fraud scores.
- a machine readable medium arranged for prioritising alarms in an account fraud detection system and arranged to perform the steps of: assigning a numeric weight to each of a plurality of behavioural characteristics of each of one or more of alarms raised against an account; computing an fraud score for each of said one or more alarms responsive to said numeric weights; computing an account fraud score responsive to said one or more fraud scores.
- Figure 1 shows a schematic diagram of an account fraud scoring apparatus in accordance with the present invention.
- Figure 2 shows a schematic diagram of an account fraud prioritising apparatus in accordance with the present invention.
- Figures 3(a)-(d) show successive columns of a table showing an examples of account fraud score calculations in accordance with the present invention.
- FIG. 1 there is shown a schematic diagram of a system arranged to perform account fraud scoring.
- the system shown relates to telecommunications system account fraud scoring and comprises a source 100 of Call Detail Records (CDRs) arranged to provide CDR's to a plurality of fraud detectors 1 10, 120.
- CDRs Call Detail Records
- a first detector 1 10 is a neural network whilst ' a second detector 120 is arranged to apply thresholds (and/or rules) to the received CRS's.
- the neural network fraud detector 1 10 is arranged to receive a succession of CDR's and to provide in response a series of outputs indicating either a Neural Network Fraudulent Alarm (NN(F)), a Neural
- N(E) Network Expected Alarm
- the third category may be implemented by the neural network not generating an output.
- Each NN(E) alarm provided by the neural network 1 10 is then mapped 1 1 1 to an associated Alarm Capability Factor (ACF) which is a numeric value indicative of the importance or risk associated with the alarm.
- ACF Alarm Capability Factor
- Each NN(F) provided by the neural network 1 10 is mapped 1 12 to a confidence level indicative of the confidence with which the neural network predicts that the account behaviour which raised the alarm is fraudulent. This confidence level may then be normalised with respect to the Alarm Capability Factors arising from NN(E)'s and Threshold alarms (described below) to provide an Alarm Capability Factor for each NN(F).
- the threshold detector 120 is arranged to receive a succession of CDR's from the CDR source 100 and to provide in response a series of outputs indicative of whether the series of CDR's to date has exceeded any of one or more threshold values associated with different characteristics of the CDR series, any one of which might be indicative of fraudulent account usage.
- Fraud score 140 is then calculated 130 from the Alarm Capability Factors (ACF), Velocity Factors (VF), and Bucket Factor (BF) which are described in detail below.
- the score is calculated as a product:
- Fraud Score Alarm Capability Factor x Velocity Factor x Bucket Factor
- a further factor, a sub-capability factor is added to the equation to cater for variations of risk within a given broad category of alarms associated with the alarm capability factor.
- Fraud Score Alarm Capability Factor x Velocity Factor x Bucket Factor x Alarm Sub-Capability Factor (2)
- Fraud scores are computed for each alarm type raised against a given account and the highest of these scores is taken as the base account fraud score.
- An additional term is then added which takes into account the fact that multiple alarms on the score account may be more indicative of a potential fraud risk than a single alarm.
- a fixed, multiple alarm factor is determined and then a multiple of this factor is added to the base account fraud score to give a find account fraud score.
- the multiple used is simply the number of alarms on the account.
- the account fraud scoring system 1 of Figure 1 typically forms part of a fraud detection system.
- the CDR data 100 provided to the scoring mechanism 210 described above is obtained from the telecommunications network 200.
- the resulting account fraud scores calculated per account may then be sorted (220) so as to identify those accounts most suspected of being used fraudulently. This information may then be presented to an operator via, for example a Graphical User Interface (GUI) 230, either simply by listing the accounts in order of fraud likelihood, or by also showing some indication of the associated account fraud score (for example by displaying the actual account fraud score), or by any other appropriate means.
- GUI Graphical User Interface
- the first column simply assigns a number to each of the main alarm types listed in column 2. Rows having no explicitly named alarm type relate to the same alarm type as appears most closely above.
- Column 1 1 shows the effect of applying the sub-capability factor, velocity factor and bucket factor to each basic alarm capability factor.
- Column 12 is blank, indicating that all the accounts listed in columns 15- 32 are considered in this example to be well-established accounts, with a default account age factor of 1.0. In the case of newly opened accounts on higher account age factor, for example 1.2 might be employed.
- Columns 15-32 show nine examples of account fraud score calculations for separate accounts. Each successive pair of columns shows how many of each kind of alarm have been raised against that account, alongside the fraud score associated with that alarm.
- a base account fraud score is shown (being the maximum fraud score computed for any alarm raised against that account) along with the total number of alarms raised against that account.
- the resulting account fraud scores range from 60.25 on account 7 to 90.65 on account 6.
- Too many elements in the scoring equation tends to make it very volatile, with a higher probability of algorithmic inaccuracies, and also increased risk of any such errors causing a ricochet effect through the fraud scoring engine.
- the margin for error in configuring the scoring mechanism, and indeed the parameters for the rules and thresholds themselves, is also reduced as the number of elements increases since they are the building blocks on which scoring is based.
- the Alarm Capability Factor indicates the relative hierarchical position of the risk associated with a given alarm relative to risks associated with other alarms.
- the Sub-Capability Factor gives a further refinement of the indication of the hierarchical position of the risk associated with a given alarm relative to risks associate with other alarms.
- Bucket Factor is a measure of the volume of the potential fraud.
- Velocity Factor is a measure of the rate at which the fraud is being perpetrated.
- Account Age Factor is a measure of how old the account is: new accounts behaviour may be less predictable than older established usage patterns, and more susceptible to fraud.
- the Account Fraud Score created should accurately reflect the level of risk associated with the course of events causing the production of an alarm. This calculation should primarily consider the speed with which money is and may be defrauded, and the volume of revenue defrauded, as these indicate loss to the telecommunications company concerned; questions of cost are always paramount. For example if a criminal has used $5,000 worth of traffic over 4 hours, this is more significant than if the same individual had done so over 8 hours.
- the Sub-Capability Factor is added to increase or decrease the risk associated with specific types of alarm.
- Many alarm types have a finer level of granularity as appropriate to that specific alarm.
- Many alarm types are sub-divided, for example, into different sub-types of alarms for different call destinations as the inherent risk is different for different destinations. For example international calls are more often associated with fraud than calls to mobile telephones.
- Trigger Value divided by Threshold Value accurately and expeditiously alarms any account where there is a large sudden increase in traffic for that customer. This is because, for example, the 1 hour bucket will always have the lowest threshold for a given capability and therefore any increase in traffic will proportionately increase the fraud score more in any 1 hour bucket than in a corresponding longer period.
- a single extra unit of traffic represents a 2% rise to the 1 hour bucket but only a 1% rise for the 4 hour bucket:
- an account age factor may be applied to increase the risk score associated with new accounts. Over time, the account operators' knowledge of each customer will improve as more data (such as payment information, bank details, and view call pattern) is received about normal usage patterns and, as a consequence, it will become less likely that the customer will attempt to perpetrate a fraud.
- an account age factor of 1.2 might be applied, whilst an established account may have a factor of 1.
- performance of certain confirmatory functions by the account owner may be required after certain time periods and if the account owner fails to perform these then the account will be suspended
- a bucket is a time duration over which an alarm has been raised.
- the velocity factor (Trigger value/ Threshold value) and Bucket factor are both superfluous in conjunction with the above alarm types (though they may for simplicity be assigned nominal values of 1 which when applied will have a null modifying effect) and the only true modifier is Account Age
- the score resulting directly from the combinations of factors listed above may exceed reasonable bounds, for example in cases where many factors each have a high value individually indicative of high fraud risk. This may give rise to fraud scores well outside normal range. Whilst such scores may be left unamended, since their high value will clearly stand out relative to other scores, it is also reasonable to take the approach that score values beyond a given threshold all be treated equally since, with such high scores all indicative of high fraud risk, there is little benefit in differentiating between them: at those score levels the difference in score is more likely to be an artefact of the scoring system than the actual differentiation of fraud risk. The same approach may be applied to very low scores. In such cases then, scores may be normalised to lie within fixed bounds: scores lying above or below those bounds being amended to the maximum or minimum bound as appropriate. In practice such a situation should not be common due to the accuracy of the various factor figures given.
- an Account Fraud Score may be normalised within the calculation to ensure that a normalised score between 0 and 100 is produced. All scores under or equal to 0 will be mapped to 0; all scores over or equal to 100 will be mapped to 100.
- a situation may occur where multiple alarms are raised for one account in one poll and it is desirable to cater for this in determining an Account
- Fraud Score The decision on how to treat multiple alarm breaches is based on an assessment of whether there is a greater chance of fraud in an account with multiple threshold breaches or alarms.
- the risk associated with an alarm of type A and an alarm of type B together may be less than, equal to, or greater than the risk associated with one alarm of type C.
- time slot In isolation or if combined with Account Type, time slot will add an extra dimension to the calculation of Account Fraud Score. Different frauds may be perpetrated at different times of day with certain traffic types representing a greater risk at night or the weekend.
- the percentage confidence calculated by the neural network is used as the alarm capability factor and processed as per other alarms.
- the confidence given by the neural network must be integral to the score given for that alarm, since the confidence is a statement as to the probability that an account is exhibiting fraudulent behaviour.
- the confidence should be the basis for any calculation and accordingly is used as the prime factor calculating the Account Fraud Score, the alarm capability factor. Furthermore, the alarm confidence for fraudulent neural network alarms must be unaffected in the calculation from alarm confidence to individual alarm capability factor except for a standardisation factor which converts the percentage into an alarm priority proportionate to the other alarm priorities and proportionate to its value in terms of assessing and quantifying risk. In short, the figure should be adjusted to ensure it is relative to other alarm capability factors. It is again true that it would be a detraction from the value of the neural network confidence calculation process if it were changed more than minimally.
- Alarm Capability Factor AlarmConfidence(NN(F)) / X (4) where AlarmConfidence(NN(F)) is the Neural Network Fraudulent Alarm Confidence and X is a standardisation factor for Neural Network Fraudulent Alarms.
- Neural Network Fraudulent alarms must be assessed with all other alarms generated, or persisting, for an account in order to ensure that the alarm, and the account, posing the most risk is prioritised above the remainder..
- This proposed “clean” processing keeps the ordering by Account Fraud Scoring as pure as possible; the assigned confidence is not adjusted by other factors outside the neural network although it is integrated within the scoring process.
- Capability Factor is a fixed figure for Neural Network Expected Alarms and Threshold alarms while for Neural Network Fraudulent Alarms, the confidence is standardised to associate a relational and reasonable level of significance.
- the method takes different alarms or other types of information, homogenises them through scoring the risk embodied in each element of the mechanism, taking the highest scored alarm for each account on any one time and then adding an extra value to the score dependent upon the number of alarms raised. The resulting value is the account fraud score.
Landscapes
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Alarm Systems (AREA)
Abstract
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00925506A EP1224585A2 (fr) | 1999-04-30 | 2000-04-28 | Calcul des utilisations frauduleuses d'un compte |
AU44227/00A AU4422700A (en) | 1999-04-30 | 2000-04-28 | Account fraud scoring |
CA002371730A CA2371730A1 (fr) | 1999-04-30 | 2000-04-28 | Calcul des utilisations frauduleuses d'un compte |
IL14637300A IL146373A0 (en) | 1999-04-30 | 2000-04-28 | Account fraud scoring |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9910111.5 | 1999-04-30 | ||
GBGB9910111.5A GB9910111D0 (en) | 1999-04-30 | 1999-04-30 | Account fraud scoring |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2000067168A2 true WO2000067168A2 (fr) | 2000-11-09 |
WO2000067168A3 WO2000067168A3 (fr) | 2002-04-25 |
Family
ID=10852648
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2000/001669 WO2000067168A2 (fr) | 1999-04-30 | 2000-04-28 | Calcul des utilisations frauduleuses d'un compte |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1224585A2 (fr) |
AU (1) | AU4422700A (fr) |
CA (1) | CA2371730A1 (fr) |
GB (1) | GB9910111D0 (fr) |
IL (1) | IL146373A0 (fr) |
WO (1) | WO2000067168A2 (fr) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7606721B1 (en) | 2003-01-31 | 2009-10-20 | CDR Associates, LLC | Patient credit balance account analysis, overpayment reporting and recovery tools |
US7774842B2 (en) * | 2003-05-15 | 2010-08-10 | Verizon Business Global Llc | Method and system for prioritizing cases for fraud detection |
US7783019B2 (en) | 2003-05-15 | 2010-08-24 | Verizon Business Global Llc | Method and apparatus for providing fraud detection using geographically differentiated connection duration thresholds |
WO2010118057A1 (fr) * | 2009-04-06 | 2010-10-14 | Finsphere Corporation | Système et procédé de protection d'identité à l'aide d'une reconnaissance de motifs d'emplacements obtenus à partir d'un réseau de signalisation de dispositif mobile |
US7817791B2 (en) | 2003-05-15 | 2010-10-19 | Verizon Business Global Llc | Method and apparatus for providing fraud detection using hot or cold originating attributes |
US7971237B2 (en) | 2003-05-15 | 2011-06-28 | Verizon Business Global Llc | Method and system for providing fraud detection for remote access services |
US8116731B2 (en) | 2007-11-01 | 2012-02-14 | Finsphere, Inc. | System and method for mobile identity protection of a user of multiple computer applications, networks or devices |
US8374634B2 (en) | 2007-03-16 | 2013-02-12 | Finsphere Corporation | System and method for automated analysis comparing a wireless device location with another geographic location |
US9420448B2 (en) | 2007-03-16 | 2016-08-16 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US9432845B2 (en) | 2007-03-16 | 2016-08-30 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US9922323B2 (en) | 2007-03-16 | 2018-03-20 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US11405781B2 (en) | 2007-03-16 | 2022-08-02 | Visa International Service Association | System and method for mobile identity protection for online user authentication |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5819226A (en) * | 1992-09-08 | 1998-10-06 | Hnc Software Inc. | Fraud detection using predictive modeling |
GB2303275B (en) * | 1995-07-13 | 1997-06-25 | Northern Telecom Ltd | Detecting mobile telephone misuse |
DE69730130T2 (de) * | 1996-03-29 | 2005-08-18 | Azure Solutions Ltd. | Betrugsüberwachung in einem fernmeldenetz |
GB2321364A (en) * | 1997-01-21 | 1998-07-22 | Northern Telecom Ltd | Retraining neural network |
-
1999
- 1999-04-30 GB GBGB9910111.5A patent/GB9910111D0/en not_active Ceased
-
2000
- 2000-04-28 EP EP00925506A patent/EP1224585A2/fr not_active Withdrawn
- 2000-04-28 WO PCT/GB2000/001669 patent/WO2000067168A2/fr active Application Filing
- 2000-04-28 CA CA002371730A patent/CA2371730A1/fr not_active Abandoned
- 2000-04-28 AU AU44227/00A patent/AU4422700A/en not_active Abandoned
- 2000-04-28 IL IL14637300A patent/IL146373A0/xx unknown
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7606721B1 (en) | 2003-01-31 | 2009-10-20 | CDR Associates, LLC | Patient credit balance account analysis, overpayment reporting and recovery tools |
US7835921B1 (en) | 2003-01-31 | 2010-11-16 | ASC Commercial Solutions, Inc. | Patient credit balance account analysis, overpayment reporting and recovery tools |
US7774842B2 (en) * | 2003-05-15 | 2010-08-10 | Verizon Business Global Llc | Method and system for prioritizing cases for fraud detection |
US7783019B2 (en) | 2003-05-15 | 2010-08-24 | Verizon Business Global Llc | Method and apparatus for providing fraud detection using geographically differentiated connection duration thresholds |
US8638916B2 (en) | 2003-05-15 | 2014-01-28 | Verizon Business Global Llc | Method and apparatus for providing fraud detection using connection frequency and cumulative duration thresholds |
US7817791B2 (en) | 2003-05-15 | 2010-10-19 | Verizon Business Global Llc | Method and apparatus for providing fraud detection using hot or cold originating attributes |
US7971237B2 (en) | 2003-05-15 | 2011-06-28 | Verizon Business Global Llc | Method and system for providing fraud detection for remote access services |
US8015414B2 (en) | 2003-05-15 | 2011-09-06 | Verizon Business Global Llc | Method and apparatus for providing fraud detection using connection frequency thresholds |
US8374634B2 (en) | 2007-03-16 | 2013-02-12 | Finsphere Corporation | System and method for automated analysis comparing a wireless device location with another geographic location |
US9603023B2 (en) | 2007-03-16 | 2017-03-21 | Visa International Service Association | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US11405781B2 (en) | 2007-03-16 | 2022-08-02 | Visa International Service Association | System and method for mobile identity protection for online user authentication |
US10776791B2 (en) | 2007-03-16 | 2020-09-15 | Visa International Service Association | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US8831564B2 (en) | 2007-03-16 | 2014-09-09 | Finsphere Corporation | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US9420448B2 (en) | 2007-03-16 | 2016-08-16 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US9432845B2 (en) | 2007-03-16 | 2016-08-30 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US8280348B2 (en) | 2007-03-16 | 2012-10-02 | Finsphere Corporation | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US9848298B2 (en) | 2007-03-16 | 2017-12-19 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US9922323B2 (en) | 2007-03-16 | 2018-03-20 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US10354253B2 (en) | 2007-03-16 | 2019-07-16 | Visa International Service Association | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US10669130B2 (en) | 2007-03-16 | 2020-06-02 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US10776784B2 (en) | 2007-03-16 | 2020-09-15 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US8116731B2 (en) | 2007-11-01 | 2012-02-14 | Finsphere, Inc. | System and method for mobile identity protection of a user of multiple computer applications, networks or devices |
WO2010118057A1 (fr) * | 2009-04-06 | 2010-10-14 | Finsphere Corporation | Système et procédé de protection d'identité à l'aide d'une reconnaissance de motifs d'emplacements obtenus à partir d'un réseau de signalisation de dispositif mobile |
Also Published As
Publication number | Publication date |
---|---|
IL146373A0 (en) | 2002-07-25 |
GB9910111D0 (en) | 1999-06-30 |
EP1224585A2 (fr) | 2002-07-24 |
AU4422700A (en) | 2000-11-17 |
CA2371730A1 (fr) | 2000-11-09 |
WO2000067168A3 (fr) | 2002-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7457401B2 (en) | Self-learning real-time prioritization of fraud control actions | |
US6535728B1 (en) | Event manager for use in fraud detection | |
US6597775B2 (en) | Self-learning real-time prioritization of telecommunication fraud control actions | |
US7117191B2 (en) | System, method and computer program product for processing event records | |
US7971237B2 (en) | Method and system for providing fraud detection for remote access services | |
US7783019B2 (en) | Method and apparatus for providing fraud detection using geographically differentiated connection duration thresholds | |
US8340259B2 (en) | Method and apparatus for providing fraud detection using hot or cold originating attributes | |
EP0890256B1 (fr) | Prevention des fraudes dans un reseau de telecommunications | |
JP2002510942A (ja) | 処理ベースのネットワークにおける不正手段の自動的な取り扱い | |
EP1224585A2 (fr) | Calcul des utilisations frauduleuses d'un compte | |
EP0890255B1 (fr) | Surveillance des fraudes dans un reseau de telecommunications | |
KR102200253B1 (ko) | 문자 메시지 부정 사용 탐지 방법 및 시스템 | |
US20050222806A1 (en) | Detection of outliers in communication networks | |
CN108810290A (zh) | 一种诈骗电话的识别的方法及系统 | |
US6590967B1 (en) | Variable length called number screening | |
US6466778B1 (en) | Monitoring a communication network | |
Kang et al. | Toll Fraud Detection of Voip Services via an Ensemble of Novelty Detection Algorithms. | |
EP1427244A2 (fr) | Gestionnaire d'évênements utilisé pour détecter une fraude | |
MXPA98007770A (en) | Monitoring fraud in a telecommunication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2371730 Country of ref document: CA Ref country code: CA Ref document number: 2371730 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000925506 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 2000925506 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |