-
公开(公告)号:US20240064063A1
公开(公告)日:2024-02-22
申请号:US17892569
申请日:2022-08-22
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Elijah Hall , Ana Armenta , Prince Paulraj
CPC classification number: H04L41/12 , G06K9/6269 , G06K9/6215
Abstract: A processing system may obtain a feature vector for a relationship between first and second user identities within a telecommunication network, the feature vector including: a first number of communications from the first user identity to the second user identity for a first communication channel, a first volume associated with the first number of communications, a second number of communications from the second user identity to the first user identity for the first communication channel, and a second volume associated with the second number of communications. The processing system may then calculate a scaled distance between the feature vector and a centroid comprising a mean vector of a set of relationships between user identities within the telecommunication network, where the scaled distance is associated to a trust value, and perform at least one remedial action in the telecommunication network based on the trust value.
-
公开(公告)号:US20230164150A1
公开(公告)日:2023-05-25
申请号:US17456520
申请日:2021-11-24
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Edmond J. Abrahamian , Andrew Campbell , Ana Armenta , Prince Paulraj
IPC: H04L29/06
CPC classification number: H04L63/1416
Abstract: Anomalies associated with events relating to users or user accounts can be detected. An anomaly detection management component (ADMC) determines embedded arrays comprising data bit groups representative of groups of properties and groups of relationships between properties associated with users, based on analysis of data related to events associated with users. ADMC trains a neural network (NN) based on applying embedded arrays to NN, in accordance with an artificial intelligence (AI) analysis process. ADMC determines an embedded array comprising data bits representative of properties and relationships between properties associated with a user based on analysis of data associated with the user. Trained NN can determine a pattern relating to the properties and relationships associated with the user based on AI-based analysis of the embedded array. Trained NN can detect an anomaly in the pattern based on AI-based analysis of the pattern, wherein the anomaly relates to an event.
-
13.
公开(公告)号:US20230092557A1
公开(公告)日:2023-03-23
申请号:US17480170
申请日:2021-09-21
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Maisam Shahid Wasti , Sai Sharath Japa , Ana Armenta , Prince Paulraj
Abstract: Aspects of the subject disclosure may include, for example, monitoring a first activity undertaken by a communication device during a first communication session, generating, based on the monitoring, first data that indicates an amount of time that is spent on the first activity, comparing, based on the generating, the first data to a threshold, and identifying, based on at least the comparing, an action to take when the amount of time that is spent on the first activity exceeds the threshold. Other embodiments are disclosed.
-
公开(公告)号:US20210352482A1
公开(公告)日:2021-11-11
申请号:US16870871
申请日:2020-05-08
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Edmond J. Abrahamian , Lauren Savage , Surya Murali , Ana Armenta
Abstract: An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.
-
公开(公告)号:US12301425B2
公开(公告)日:2025-05-13
申请号:US17892569
申请日:2022-08-22
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Elijah Hall , Ana Armenta , Prince Paulraj
IPC: H04L41/12 , G06F18/22 , G06F18/2411
Abstract: A processing system may obtain a feature vector for a relationship between first and second user identities within a telecommunication network, the feature vector including: a first number of communications from the first user identity to the second user identity for a first communication channel, a first volume associated with the first number of communications, a second number of communications from the second user identity to the first user identity for the first communication channel, and a second volume associated with the second number of communications. The processing system may then calculate a scaled distance between the feature vector and a centroid comprising a mean vector of a set of relationships between user identities within the telecommunication network, where the scaled distance is associated to a trust value, and perform at least one remedial action in the telecommunication network based on the trust value.
-
公开(公告)号:US20250133167A1
公开(公告)日:2025-04-24
申请号:US19007305
申请日:2024-12-31
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Surya Murali , Edmond J. Abrahamian , Ana Armenta , Prince Paulraj , Elijah Hall
Abstract: A processing system may maintain a relationship graph that includes nodes and edges representing phone numbers and device identifiers having associations with the phone numbers. The processing system may obtain an identification of a first phone number or a first device identifier for a fraud evaluation and extract features from the relationship graph associated with at least one of the first phone number or the first device identifier. The plurality of features may include one or more device identifiers associated with the first phone number, or one or more phone numbers associated with the first device identifier. The processing system may then apply the features to a prediction model that is implemented by the processing system and that is configured to output a fraud risk value of the first phone number or the first device identifier and implement at least one remedial action in response to the fraud risk value.
-
公开(公告)号:US20240070230A1
公开(公告)日:2024-02-29
申请号:US17895933
申请日:2022-08-25
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Tri Bui , Andrew Campbell , Ana Armenta
IPC: G06K9/62
CPC classification number: G06K9/6248 , G06K9/6215 , G06K9/6239
Abstract: A processing system including at least one processor may obtain a personal identifier comprising a plurality of characters and generate a first embedding of the personal identifier in accordance with an embedding model. The processing system may then identify one or more embeddings of other personal identifiers that are within a threshold distance of the first embedding and generate an alert in response to the identifying of the one or more embeddings of the other personal identifiers that are within the threshold distance.
-
公开(公告)号:US11902308B2
公开(公告)日:2024-02-13
申请号:US17338646
申请日:2021-06-03
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Edmond Abrahamian , Maisam Shahid Wasti , Andrew Campbell , Ana Armenta , Prince Paulraj
IPC: H04L29/06 , G06N20/00 , G06F40/134 , H04L9/40
CPC classification number: H04L63/1425 , G06F40/134 , G06N20/00 , H04L63/08 , H04L63/10 , H04L63/1491 , H04L2463/082
Abstract: A method for detecting threat pathways using sequence graphs includes constructing a sequence graph from a set of data containing information about activities in a telecommunications service provider network, where the sequence graph represents a subset of the activities that occurs as a sequence, providing an embedding of the sequence graph as input to a machine learning model, wherein the machine learning model has been trained to detect when an input embedding of a sequence graph is likely to indicate a threat activity, determining, based on an output of the machine learning model, whether the subset of the activities is indicative of the threat activity, and initiating a remedial action to mitigate the threat activity.
-
公开(公告)号:US20230401512A1
公开(公告)日:2023-12-14
申请号:US17839260
申请日:2022-06-13
Applicant: AT&T INTELLECTUAL PROPERTY I, L.P.
Inventor: Brandon Bolong Lee , Andrew Campbell , Ana Armenta , Prince Paulraj
CPC classification number: G06Q10/0637 , G06N20/00 , G06N5/025
Abstract: Mitigation of temporal generalization losses a target machine learning model is disclosed. Mitigation can be based on identifying, removing, modifying, transforming, etc., features, explanatory variables, models, etc., that can have an unstable relationship with a target outcome over time. Implementation of a more stable representation can be initiated. Temporal stability measures (TSMs) for one or more model feature(s) can be determined based on one or more variable performance metrics (VPMs). A group of one or more VPMs can be selected based on features of a model in either a development or production environment. Model feature modification can be recommended based on a TSM, which can prune a feature, transform a feature, add a feature, etc. Temporal stability information can be presented, e.g., via a dashboard-type user interface. Models can be updated based on mutations of a model comprising a feature modification(s), including competitive champion/challenger model updating.
-
公开(公告)号:US20220329328A1
公开(公告)日:2022-10-13
申请号:US17225784
申请日:2021-04-08
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Prince Paulraj , Ana Armenta , Lauren Savage
Abstract: A processing system may determine a plurality of input features of a first machine learning model that is deployed in a telecommunication network for a prediction task associated with an operation of the telecommunication network and apply a time series forecast model to a historical data set of a first data source associated with at least one of the plurality of input features to generate a forecast upper bound of a first characteristic of the first data source for a first time period and a forecast lower bound of the first characteristic of the first data source for the first time period. The processing system may then detect that the first characteristic exceeds one of the forecast upper bound or the forecast lower bound during the first time period and generate an alert that an output of the first machine learning model may be faulty, in response to the detecting.
-
-
-
-
-
-
-
-
-