$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Detecting possible fraudulent communication usage 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04M-015/00
출원번호 US-0930280 (1998-02-09)
우선권정보 EP-0302159 (1995-03-30)
국제출원번호 PCT/GB96/00763 (1996-03-29)
§371/§102 date 19980209 (19980209)
국제공개번호 WO-9631043 (1996-10-03)
발명자 / 주소
  • Peel Stephen John,GBX
  • Woods David John,GBX
  • Scott Michael,GBX
  • Regnault John Christopher,GBX
  • Gibbins Christopher John,GBX
  • Eaden Russel,GBX
출원인 / 주소
  • British Telecommunications public limited company, GBX
대리인 / 주소
    Nixon & Vanderhye P.C.
인용정보 피인용 횟수 : 134  인용 특허 : 5

초록

A method of, and a system for, detecting possible fraudulent use of a telecommunications network. Call event records, both call initiation and call completion records, are examined. A call record has a number of key fields, e.g. called number, calling number, calling card number, and for each field

대표청구항

[ We claim:] [1.] A method of detecting possible fraudulent use of a communications network, which network is arranged to provide call event records having fields containing call event data, at least one of the fields being designated a key field and containing a key relating to an entity as herein

이 특허에 인용된 특허 (5)

  1. Lang Jerry M. (Lindale TX) Scott David W. (Garland TX), Low NOx burner.
  2. Bhattacharyya Ranendra K. (Monmouth Junction ; Middlesex County NJ) Feustel Timothy C. (Cedar Knolls ; Morris County NJ) Kluepfel Henry M. (Mendham ; Morris County NJ), Method and apparatus for data evidence collection.
  3. Franco Victor A. (Old Bridge NJ), Method and apparatus for restricting credit card communication calls.
  4. Relyea Wayne E. ; Ronca Suzanne E., Real-time communications fraud monitoring system.
  5. Moller Jens L. ; Galetti Matthew L. ; Curtis Terrill J. ; Mai Trung, Telephone fraud detection system.

이 특허를 인용한 특허 (134)

  1. Martin,Thomas, 3-Way call detection system.
  2. Martin, Thomas J., 3-Way call detection system and method.
  3. Martin, Thomas J., 3-way call detection system and method.
  4. Gorodetski, Alex; Shapira, Ido; Wein, Ron; Sidi, Oana, Acoustic signature building for a speaker from multiple sessions.
  5. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  6. Marchand, Dean C.; Jackman, Erin C., Alert suppression in a telecommunications fraud control system.
  7. Fukuzawa Yohji,JPX ; Morikawa Toshihiro,JPX ; Mitome Hirofumi,JPX, Apparatus and method for permitting temporary use of a telephone number.
  8. Mihalache, Theodor; Herskovic, Maya; Bar-Menachem, Ika, Assessing mobile user authenticity based on communication activity.
  9. Sidi, Oana; Wein, Ron, Blind diarization of recorded calls with arbitrary number of speakers.
  10. Sidi, Oana; Wein, Ron, Blind diarization of recorded calls with arbitrary number of speakers.
  11. Sidi, Oana; Wein, Ron, Blind diarization of recorded calls with arbitrary number of speakers.
  12. Rae, Robert L.; Spadaro, Thomas R., Call processing with voice over internet protocol transmission.
  13. Takae,Naohito; Tani,Hiroyuki; Omiya,Hiroyuki, Cellular phone managing method, managing apparatus, record medium and cellular phone apparatus.
  14. Caslin,Michael; Van Arkel,John Hans; Springer,Arthur Lance, Communications system with fraud monitoring.
  15. Bolt,George; Manslow,John, Configurable profiling of data.
  16. Higgs, Joseph, Controlled-environment facility resident communication detection.
  17. Higgs, Joseph, Controlled-environment facility resident communication detection.
  18. Childress, Rhonda L.; Hickey, Donna M.; Johnson, Randy S.; Kelley, John F.; Northway, Tedrick N.; Wells, Bradley K., Converging tool terminology.
  19. Childress, Rhonda L.; Hickey, Donna M.; Johnson, Randy S.; Kelley, John F.; Northway, Tedrick N.; Wells, Bradley K., Converging tool terminology.
  20. Childress, Rhonda L.; Hickey, Donna M.; Johnson, Randy S.; Kelley, John F.; Northway, Tedrick N.; Wells, Bradley K., Converging tool terminology.
  21. Sloan, David, Correctional supervision program and card.
  22. Arthur L. Springer ; Dean Marchand, Country to country call intercept process.
  23. Arthur L. Springer ; Dean Marchand, Country to domestic call intercept process (CIP).
  24. Luk, Ho Ming; Coates, Pamela E.; Deo, Arati S.; Downs, Sean M.; Friesen, Benjamin A.; Nies, Craig A.; Pathria, Anu K., Detection of insurance premium fraud or abuse using a predictive software system.
  25. Suresh, Nallan C; de Traversay, Jean; Gollamudi, Hyma; Pathria, Anu K; Tyler, Michael K, Detection of upcoding and code gaming fraud and abuse in prospective payment healthcare systems.
  26. Ziv, Omer; Achituv, Ran; Shapira, Ido; Dreyfuss, Jeremie, Diarization using acoustic labeling.
  27. Ziv, Omer; Achituv, Ran; Shapira, Ido; Dreyfuss, Jeremie, Diarization using linguistic labeling.
  28. Arthur L. Springer ; Dean Marchand, Domestic to country call intercept process (CIP).
  29. Marchand, Dean C.; Springer, Arthur Lance, Domestic to international collect call blocking.
  30. Schmid, Greg; Pickens, Keith S.; Heilmann, Craig; Smith, Kirk, Encapsulation, compression and encryption of PCM data.
  31. Schmid,Greg; Smith,Kirk; Pickens,Keith S.; Heilmann,Craig, Encapsulation, compression, and encryption of PCM data.
  32. Zeppenfeld, Torsten; Gutierrez, Richard; Guerra, Lisa; Efron, Andrew S.; Rajakumar, Anthony, Enhanced diarization systems, media and methods of use.
  33. Edwards, Alexander F M, Fraud monitoring system.
  34. Busuioc Marius Nicolae,GBX, Fraud prevention in a telecommunications network.
  35. Justice, Scott C.; Hopper, Eric L.; Obrist, Ken C., Fraud prevention system and method.
  36. Syvanne,Tuomo, Handling information about packet data connections in a security gateway element.
  37. Rae, Robert L.; Rosenfield, Stuart, Inmate management and call processing systems and methods.
  38. Rae, Robert L.; Rosenfield, Stuart, Inmate management and call processing systems and methods.
  39. Ernest Karras, Means for and methods of detecting fraud, lack of credit, and the like from the SS # 7 system network.
  40. Rudokas Ronald Steven ; Storch John Adam ; Daniels David Leighton, Method and apparatus for fraud control in cellular telephone systems.
  41. Croak, Marian; Eslambolchi, Hossein, Method and apparatus for monitoring shifts in call patterns.
  42. Fiszman, Sergio; Beaulleu, Laurence; Ensing, Paul; Fournier, Pierre; Goldrich, Elizabeth; Howe-Patterson, Kevin; Leeder, Michael; Price, David; Ryerson, Chris; Taylor, Richard, Method and apparatus for open management of multi-media services.
  43. Karch,Robert, Method and apparatus for optimizing a data access customer service system.
  44. Lambert, Diane; Pinheiro, Jose C.; Sun, Don X., Method and apparatus for updating records in a database system based on an improved model of time-dependent behavior.
  45. Zehnbacht, Alexander; Finkelstein, Steve S., Method and device for preventing misuse of personal information.
  46. Madoch, Pitsa; Ericson, Richard Peter; Laitman, Robert John, Method and network for providing access to an information network.
  47. Hartig, David; Rajakumar, Anthony; Guerra, Lisa Marie; Gutierrez, Richard, Method and system for generating a fraud risk score using telephony channel based audio and non-audio data.
  48. Elliott, Isaac; Steele, Rick; Verlare, Jim, Method and system for multi-media collaboration between remote parties.
  49. Marchand, Dean C.; Springer, Arthur Lance, Method and system for using bad billed number records to prevent fraud in a telecommunication system.
  50. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method for accessing service resource items that are for use in a telecommunications system.
  51. Lambert, Diane; Pinheiro, Jose′ C; Sun, Don X, Method for constructing an updateable database of subject behavior patterns.
  52. Duncan Alex,IEX ; Farrell Stephan,IEX ; Scott Cedric,IEX, Method for granting accesses to information in a distributed computer system.
  53. Lingafelt, Charles Steven; Murray, James William; Swantek, James Thomas, Method to improve fraud detection on conference calling systems by detecting re-use of conference moderator passwords.
  54. Gandhi, Rajesh K.; Carson, Jr., Keith Alan; Tiruveedi, Venkata R.; Ninan, Anoop George; Shmuylovich, Samuil; Farizon, Boris, Methods and apparatus for detection and recovery of database out of synchronization conditions.
  55. Lingafelt, Charles S.; Murray, James W.; Swantek, James T., Methods to improve fraud detection on conference calling systems based on observation of participants' call time durations.
  56. Lingafelt, Charles Steven; Murray, James William; Swantek, James Thomas, Methods to improve fraud detection on conference calling systems based on observation of participants' call time durations.
  57. Lingafelt, Charles Steven; Murray, James William; Swantek, James Thomas, Methods to improve security of conference calls by observation of attendees' order and time of joining the call.
  58. Russell,Travis Earl, Methods, systems, and computer program products for automatically populating signaling-based access control database.
  59. Groenendaal, Johan van de; Chakraborty, Amitava, Mobility management in wireless networks.
  60. Allen D. Kaplan ; William F. McCarthy, Multi-protocol communications routing optimization.
  61. Allen D. Kaplan ; William F. McCarthy, Multi-protocol telecommunications routing optimization.
  62. Kaplan, Allen D.; McCarthy, William F., Multi-protocol telecommunications routing optimization.
  63. Kaplan, Allen D.; McCarthy, William F., Multi-protocol telecommunications routing optimization.
  64. Kaplan,Allen D.; McCarthy,William F., Multi-protocol telecommunications routing optimization.
  65. Nomura, Yuji; Kurose, Yoshitoshi; Kano, Shinya, Network-device control system and apparatus.
  66. Noda Saneyuki,JPX, Portable radio signal transceiver and method of preventing disallowed use thereof.
  67. Spadaro,Thomas R.; Knodle,Martin L.; Miller,Fredrick W.; Salibrici,William J.; Abdelwahab,Amr E., Public telephone control with voice over internet protocol transmission.
  68. Hurme, Jaana; Haapala, Soili; Lindgren, Tomi; Martin, Markus; Numminen, Raili, Restriction of communication duration in a telecommunications network.
  69. Soukup, Martin; Gaito, Stephen; Fiszman, Sergio, Self-healing containers.
  70. Lawyer,Justin; Barclay,Alex; Englund,Dirk; Holmes,Robert; Pathria,Dimpy; Roach,Tim; Zoldi,Scott, Self-learning real-time prioritization of fraud control actions.
  71. Lawyer,Justin; Barclay,Alex; Englund,Dirk; Holmes,Robert; Pathria,Dimpy; Roach,Tim; Zoldi,Scott, Self-learning real-time prioritization of telecommunication fraud control actions.
  72. Cottrille Scott C. ; Bakshi Ashesh P., Server-side chat monitor.
  73. Bhusri, Gurcharan S., Service and information management system for a telecommunications network.
  74. Bhusri,Gurcharan S., Service and information management system for a telecommunications network.
  75. Gurcharan S. Bhusri, Service and information management system for a telecommunications network.
  76. Hsu,Willie; Shuai,Tsui Yu; Katakwar,Anand; Yuan,Liang Chih, Service logic execution environment (SLEE) that is running on a device, supporting a plurality of services and that is compliant with a telecommunications computing standard for SLEES.
  77. Ziv, Omer; Wein, Ron; Shapira, Ido; Achituv, Ran, Speaker separation in diarization.
  78. Poder, James, Stateful home phone service.
  79. Elliott, Isaac K.; Krishnawswamy, Sridhar, System and method for a directory service supporting a hybrid communication system architecture.
  80. Brysch, Michael; Heilmann, Craig; Pickens, Keith S.; Applonie, Robert R., System and method for bringing an in-line device on-line and assuming control of calls.
  81. Gavan, John; Paul, Kevin; Richards, Jim; Dallas, Charles A.; Van Arkel, Hans; Herrington, Cheryl; Mahone, Saralyn; Curtis, Terril J.; Wagner, James J., System and method for detecting and managing fraud.
  82. Gavan, John; Paul, Kevin; Richards, Jim; Dallas, Charles A; Arkel, Hans Van; Herrington, Cheryl; Mahone, Saralyn; Curtis, Terrill J; Wagner, James J, System and method for detecting and managing fraud.
  83. Gavan,John; Paul,Kevin; Richards,Jim; Dallas,Charles A; Van Arkel,Hans; Herrington,Cheryl; Mahone,Saralyn; Curtis,Terrell J; Wagner,James J, System and method for detecting and managing fraud.
  84. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  85. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  86. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  87. Chmaytelli, Mazen; Khazaka, Samir K., System and method for minimizing fraudulent usage of a mobile telephone.
  88. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  89. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  90. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  91. Marchand, Dean C.; Jackman, Erin C.; Zimmerman, Ron, System and method for preventing fraudulent calls using a common billing number.
  92. Martinez, Veronica; Hite, Marc; Keiser, Luke, System and method for proactively establishing a third-party payment account for services rendered to a resident of a controlled-environment facility.
  93. Elliott, Isaac K.; Reynolds, Tim E.; Krishnaswamy, Sridhar, System and method for providing requested quality of service in a hybrid network.
  94. Isaac K. Elliott ; Tim E. Reynolds ; Sridhar Krishnaswamy, System and method for providing requested quality of service in a hybrid network.
  95. Clendinning, Kerry; McCartney, Michael; Mengerink, Matthew; Robinette, IV, Fred Garfield; Wilson, David J., System and method for retrieving and normalizing product information.
  96. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  97. Olligschlaeger, Andreas M., System and method for three-way call detection.
  98. Olligschlaeger, Andreas M., System and method for three-way call detection.
  99. Olligschlaeger, Andreas M., System and method for three-way call detection.
  100. Olligschlaeger, Andreas M., System and method for three-way call detection.
  101. Stevens, Gilman R.; Mani, Babu V., System, intelligent network service engine and method for detecting a fraudulent call using real time fraud management tools.
  102. Eastep, Guido M.; Litzenberger, Paul; Orebaugh, Shannon R., System, method and article of manufacture for a call back architecture in a hybrid network with support for internet telephony.
  103. Elliott,Isaac K., System, method and article of manufacture for selecting a gateway of a hybrid communication system architecture.
  104. Curtis Terrill J. ; Dallas Charles A. ; Gavan John ; Herrington Cheryl ; Mahone Saralyn ; Paul Kevin ; Richards Jim ; Van Arkel Hans ; Wagner James J., System, method and computer program product for a dynamic rules-based threshold engine.
  105. Gavan, John; Paul, Kevin; Richards, Jim; Dallas, Charles A.; Van Arkel, Hans; Herrington, Cheryl; Mahone, Saralyn M.; Curtis, Terrill J.; Wagner, James J., System, method and computer program product for processing event records.
  106. Gavan,John; Paul,Kevin; Richards,Jim; Dallas,Charles A.; Arkel,Hans Van; Herrington,Cheryl; Mahone,Saralyn M.; Curtis,Terrill J.; Wagner,James J., System, method and computer program product for processing event records.
  107. Sidler, James S.; Viola, John J.; Polozola, Michelle L., Systems and methods for acquiring, accessing, and analyzing investigative information.
  108. Hogg, Jr., John S., Systems and methods for detecting a call anomaly using biometric identification.
  109. Hogg, Jr., John S., Systems and methods for detecting a call anomaly using biometric identification.
  110. Begeja, Lee; Stern, Benjamin J., Systems, methods and programs for detecting unauthorized use of text based communications services.
  111. Begeja, Lee; Stern, Benjamin J., Systems, methods and programs for detecting unauthorized use of text based communications services.
  112. Begeja, Lee; Stern, Benjamin J., Systems, methods and programs for detecting unauthorized use of text based communications services.
  113. Guerra, Lisa; Gutierrez, Richard; Hartig, David; Rajakumar, Anthony; Vyas, Vipul, Systems, methods, and media for determining fraud patterns and creating fraud behavioral models.
  114. Guerra, Lisa; Gutierrez, Richard; Hartig, David; Rajakumar, Anthony; Vyas, Vipul, Systems, methods, and media for determining fraud patterns and creating fraud behavioral models.
  115. Rajakumar, Anthony; Guerra, Lisa; Zeppenfeld, Torsten; Vyas, Vipul, Systems, methods, and media for disambiguating call data to determine fraud.
  116. Begeja, Lee; Stern, Benjamin J., Systems, methods, and programs for detecting unauthorized use of text based communications.
  117. Begeja, Lee; Stern, Benjamin J., Systems, methods, and programs for detecting unauthorized use of text based communications services.
  118. Stevens, Gilman R.; Mani, Babu V., Telecommunications system, service control point and method for pre-screening telephone calls to help prevent telephone toll fraud.
  119. Buntin, David L.; Pickens, Keith S.; Collier, Mark D.; Smith, Kirk E., Telephony security system.
  120. Buntin,David L.; Pickens,Keith S., Telephony security system.
  121. Heilmann Craig ; Beebe Todd, Telephony security system.
  122. Heilmann Craig ; Beebe Todd, Telephony security system.
  123. Heilmann, Craig; Beebe, Todd, Telephony security system.
  124. Heilmann, Craig; Collier, Mark D.; Conyers, Doug; Pickens, Keith S.; Buntin, David; Schmid, Greg; Faustino, Stephen; Beebe, Todd; Brysch, Michael; Applonie, Robert R., Telephony security system.
  125. Heilmann,Craig; Collier,Mark D.; Conyers,Doug; Pickens,Keith S.; Buntin,David; Schmid,Greg; Faustino,Stephen; Beebe,Todd; Brysch,Michael; Applonie,Robert R., Telephony security system.
  126. Arthur L. Springer ; Dean Marchand, Termination number screening.
  127. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  128. Martin, Thomas J., Three-way call detection using steganography.
  129. Martin,Thomas J., Three-way call detection using steganography.
  130. Beebe Todd ; Collier Mark D. ; Conyers Doug ; Hamlett Chris ; Faustino Stephen, Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities.
  131. Zang, Hui; Dawson, Travis E., Using communications records to detect unauthorized use of telecommunication services.
  132. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  133. Wein, Ron, Voice activity detection using a soft decision mechanism.
  134. Gorodetski, Alex; Sidi, Oana; Wein, Ron; Shapira, Ido, Word-level blind diarization of recorded calls with arbitrary number of speakers.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로