TRUST LABELING OF CALL GRAPHS FOR TELECOMMUNICATION NETWORK ACTIVITY DETECTION

    公开(公告)号:US20240064063A1

    公开(公告)日:2024-02-22

    申请号:US17892569

    申请日:2022-08-22

    CPC classification number: H04L41/12 G06K9/6269 G06K9/6215

    Abstract: A processing system may obtain a feature vector for a relationship between first and second user identities within a telecommunication network, the feature vector including: a first number of communications from the first user identity to the second user identity for a first communication channel, a first volume associated with the first number of communications, a second number of communications from the second user identity to the first user identity for the first communication channel, and a second volume associated with the second number of communications. The processing system may then calculate a scaled distance between the feature vector and a centroid comprising a mean vector of a set of relationships between user identities within the telecommunication network, where the scaled distance is associated to a trust value, and perform at least one remedial action in the telecommunication network based on the trust value.

    ANOMALY DETECTION RELATING TO COMMUNICATIONS USING INFORMATION EMBEDDING

    公开(公告)号:US20230164150A1

    公开(公告)日:2023-05-25

    申请号:US17456520

    申请日:2021-11-24

    CPC classification number: H04L63/1416

    Abstract: Anomalies associated with events relating to users or user accounts can be detected. An anomaly detection management component (ADMC) determines embedded arrays comprising data bit groups representative of groups of properties and groups of relationships between properties associated with users, based on analysis of data related to events associated with users. ADMC trains a neural network (NN) based on applying embedded arrays to NN, in accordance with an artificial intelligence (AI) analysis process. ADMC determines an embedded array comprising data bits representative of properties and relationships between properties associated with a user based on analysis of data associated with the user. Trained NN can determine a pattern relating to the properties and relationships associated with the user based on AI-based analysis of the embedded array. Trained NN can detect an anomaly in the pattern based on AI-based analysis of the pattern, wherein the anomaly relates to an event.

    DETECTING FRAUD RINGS IN MOBILE COMMUNICATIONS NETWORKS

    公开(公告)号:US20210352482A1

    公开(公告)日:2021-11-11

    申请号:US16870871

    申请日:2020-05-08

    Abstract: An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.

    Trust labeling of call graphs for telecommunication network activity detection

    公开(公告)号:US12301425B2

    公开(公告)日:2025-05-13

    申请号:US17892569

    申请日:2022-08-22

    Abstract: A processing system may obtain a feature vector for a relationship between first and second user identities within a telecommunication network, the feature vector including: a first number of communications from the first user identity to the second user identity for a first communication channel, a first volume associated with the first number of communications, a second number of communications from the second user identity to the first user identity for the first communication channel, and a second volume associated with the second number of communications. The processing system may then calculate a scaled distance between the feature vector and a centroid comprising a mean vector of a set of relationships between user identities within the telecommunication network, where the scaled distance is associated to a trust value, and perform at least one remedial action in the telecommunication network based on the trust value.

    RELATIONSHIP GRAPHS FOR TELECOMMUNICATION NETWORK FRAUD DETECTION

    公开(公告)号:US20250133167A1

    公开(公告)日:2025-04-24

    申请号:US19007305

    申请日:2024-12-31

    Abstract: A processing system may maintain a relationship graph that includes nodes and edges representing phone numbers and device identifiers having associations with the phone numbers. The processing system may obtain an identification of a first phone number or a first device identifier for a fraud evaluation and extract features from the relationship graph associated with at least one of the first phone number or the first device identifier. The plurality of features may include one or more device identifiers associated with the first phone number, or one or more phone numbers associated with the first device identifier. The processing system may then apply the features to a prediction model that is implemented by the processing system and that is configured to output a fraud risk value of the first phone number or the first device identifier and implement at least one remedial action in response to the fraud risk value.

    IDENTIFIER VELOCITY ANOMALY DETECTION
    17.
    发明公开

    公开(公告)号:US20240070230A1

    公开(公告)日:2024-02-29

    申请号:US17895933

    申请日:2022-08-25

    CPC classification number: G06K9/6248 G06K9/6215 G06K9/6239

    Abstract: A processing system including at least one processor may obtain a personal identifier comprising a plurality of characters and generate a first embedding of the personal identifier in accordance with an embedding model. The processing system may then identify one or more embeddings of other personal identifiers that are within a threshold distance of the first embedding and generate an alert in response to the identifying of the one or more embeddings of the other personal identifiers that are within the threshold distance.

    MITIGATING TEMPORAL GENERALIZATION FOR A MACHINE LEARNING MODEL

    公开(公告)号:US20230401512A1

    公开(公告)日:2023-12-14

    申请号:US17839260

    申请日:2022-06-13

    CPC classification number: G06Q10/0637 G06N20/00 G06N5/025

    Abstract: Mitigation of temporal generalization losses a target machine learning model is disclosed. Mitigation can be based on identifying, removing, modifying, transforming, etc., features, explanatory variables, models, etc., that can have an unstable relationship with a target outcome over time. Implementation of a more stable representation can be initiated. Temporal stability measures (TSMs) for one or more model feature(s) can be determined based on one or more variable performance metrics (VPMs). A group of one or more VPMs can be selected based on features of a model in either a development or production environment. Model feature modification can be recommended based on a TSM, which can prune a feature, transform a feature, add a feature, etc. Temporal stability information can be presented, e.g., via a dashboard-type user interface. Models can be updated based on mutations of a model comprising a feature modification(s), including competitive champion/challenger model updating.

    TELECOMMUNICATION NETWORK MACHINE LEARNING DATA SOURCE FAULT DETECTION AND MITIGATION

    公开(公告)号:US20220329328A1

    公开(公告)日:2022-10-13

    申请号:US17225784

    申请日:2021-04-08

    Abstract: A processing system may determine a plurality of input features of a first machine learning model that is deployed in a telecommunication network for a prediction task associated with an operation of the telecommunication network and apply a time series forecast model to a historical data set of a first data source associated with at least one of the plurality of input features to generate a forecast upper bound of a first characteristic of the first data source for a first time period and a forecast lower bound of the first characteristic of the first data source for the first time period. The processing system may then detect that the first characteristic exceeds one of the forecast upper bound or the forecast lower bound during the first time period and generate an alert that an output of the first machine learning model may be faulty, in response to the detecting.

Patent Agency Ranking