-
公开(公告)号:US11710081B2
公开(公告)日:2023-07-25
申请号:US16894675
申请日:2020-06-05
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Edmond J. Abrahamian , Ana Armenta , James Pratt
IPC: G06N20/20 , G06Q20/40 , G06N20/00 , G06F18/214 , G06F18/243 , G06Q40/03
CPC classification number: G06N20/20 , G06F18/214 , G06F18/24323 , G06N20/00 , G06Q20/4016 , G06Q40/03
Abstract: A processing system may obtain a customer identifier at a first retail location of a telecommunication network service provider, determine a recency factor of the identifier, obtain an identification of items of interest to the customer, and determine whether the customer has visited a second retail location of the provider within a time period prior to the customer being at the first retail location. The processing system may then apply, to a fraud detection machine learning model, a plurality of factors comprising: a quantity of items of interest, a value of the items, a factor associated with whether the customer has visited the second retail location within the time period, and the recency factor, where the fraud detection machine learning model outputs a fraud indicator value, determine that the fraud indicator value meets a warning threshold and present a warning to a device at the first retail location.
-
公开(公告)号:US11477651B2
公开(公告)日:2022-10-18
申请号:US16870871
申请日:2020-05-08
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Edmond J. Abrahamian , Lauren Savage , Surya Murali , Ana Armenta
Abstract: An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.
-
公开(公告)号:US20220327326A1
公开(公告)日:2022-10-13
申请号:US17226908
申请日:2021-04-09
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Lauren Savage , Mark Austin , Prince Paulraj , Ana Armenta , James Pratt
Abstract: An example method includes receiving data to be provided to an application using a scoring model for calculating a score, determining that the data is incompatible with a current feature set of the scoring model applied by the application, receiving a next best model of features in response to the determining that the data is incompatible with the current feature set, executing the application to calculate the score with the data and the features of the next best model, and generating an output in accordance with the score.
-
公开(公告)号:US20210383393A1
公开(公告)日:2021-12-09
申请号:US16894675
申请日:2020-06-05
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Edmond J. Abrahamian , Ana Armenta , James Pratt
Abstract: A processing system may obtain a customer identifier at a first retail location of a telecommunication network service provider, determine a recency factor of the identifier, obtain an identification of items of interest to the customer, and determine whether the customer has visited a second retail location of the provider within a time period prior to the customer being at the first retail location. The processing system may then apply, to a fraud detection machine learning model, a plurality of factors comprising: a quantity of items of interest, a value of the items, a factor associated with whether the customer has visited the second retail location within the time period, and the recency factor, where the fraud detection machine learning model outputs a fraud indicator value, determine that the fraud indicator value meets a warning threshold and present a warning to a device at the first retail location.
-
5.
公开(公告)号:US12244619B2
公开(公告)日:2025-03-04
申请号:US17480170
申请日:2021-09-21
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Maisam Shahid Wasti , Sai Sharath Japa , Ana Armenta , Prince Paulraj
Abstract: Aspects of the subject disclosure may include, for example, monitoring a first activity undertaken by a communication device during a first communication session, generating, based on the monitoring, first data that indicates an amount of time that is spent on the first activity, comparing, based on the generating, the first data to a threshold, and identifying, based on at least the comparing, an action to take when the amount of time that is spent on the first activity exceeds the threshold. Other embodiments are disclosed.
-
公开(公告)号:US20230216968A1
公开(公告)日:2023-07-06
申请号:US17566886
申请日:2021-12-31
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Elijah Hall , Prince Paulraj , Ana Armenta , Surya Murali
Abstract: A processing system may maintain a communication graph that includes nodes representing a plurality of phone numbers including a first phone number and edges between the nodes representing a plurality of communications between the plurality of phone numbers and may generate at least one vector via a graph embedding process applied to the communication graph, the at least one vector representing features of at least a portion of the communication graph. The processing system may then apply the at least one vector to a prediction model that is implemented by the processing system and that is configured to predict whether the first phone number is associated with a type of network activity associated with a telecommunication network and may implement a remedial action in response to an output of the prediction model indicating that the first phone number is associated with the type of network activity.
-
公开(公告)号:US20230136950A1
公开(公告)日:2023-05-04
申请号:US18047272
申请日:2022-10-17
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Edmond J. Abrahamian , Lauren Savage , Surya Murali , Ana Armenta
Abstract: An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.
-
公开(公告)号:US20220394049A1
公开(公告)日:2022-12-08
申请号:US17338646
申请日:2021-06-03
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Edmond Abrahamian , Maisam Shahid Wasti , Andrew Campbell , Ana Armenta , Prince Paulraj
IPC: H04L29/06 , G06N20/00 , G06F40/134
Abstract: A method for detecting threat pathways using sequence graphs includes constructing a sequence graph from a set of data containing information about activities in a telecommunications service provider network, where the sequence graph represents a subset of the activities that occurs as a sequence, providing an embedding of the sequence graph as input to a machine learning model, wherein the machine learning model has been trained to detect when an input embedding of a sequence graph is likely to indicate a threat activity, determining, based on an output of the machine learning model, whether the subset of the activities is indicative of the threat activity, and initiating a remedial action to mitigate the threat activity.
-
公开(公告)号:US20220366430A1
公开(公告)日:2022-11-17
申请号:US17321279
申请日:2021-05-14
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Ryan Steckel , Ana Armenta , Prince Paulraj , Chih Chien Huang
Abstract: Data stream based event sequence anomaly detection for mobility customer fraud analysis is presented herein. A system obtains a sequence of events comprising respective modalities of communication that correspond to a subscriber identity associated with a communication service—the sequence of events having occurred within a defined period. Based on defined classifiers representing respective fraudulent sequences of events, the system determines, via a group of machine learning models corresponding to respective machine learning processes, whether the sequence of events satisfies a defined condition with respect to likelihood of representing a fraudulent sequence of events of the respective fraudulent sequences of events. In response to the sequence of events being determined to satisfy the defined condition, the system sends, via a user interface of the system, a notification indicating that the sequence of events has been determined to represent the fraudulent sequence of events.
-
公开(公告)号:US20240111750A1
公开(公告)日:2024-04-04
申请号:US17959528
申请日:2022-10-04
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Edmond J. Abrahamian , Ana Armenta , Andrew Campbell , Jean Luo , Elijah Hall , Prince Paulraj
IPC: G06F16/23
CPC classification number: G06F16/23
Abstract: A processing system may obtain a request to add at least a first feature to a feature graph database, where the request comprises a first feature ontology of the first feature, and where the first feature ontology comprises: a label of the first feature and a relationship of the first feature to a concept or to another feature. The processing system may then identify whether the first feature is a duplicate of a second feature in the feature graph database based at least upon the first feature ontology and a second feature ontology of the second feature and generate an indication of whether the first feature is a duplicate in response to the identifying.
-
-
-
-
-
-
-
-
-