Detecting fraud rings in mobile communications networks

    公开(公告)号:US11477651B2

    公开(公告)日:2022-10-18

    申请号:US16870871

    申请日:2020-05-08

    Abstract: An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.

    MACHINE LEARNING TELECOMMUNICATION NETWORK SERVICE FRAUD DETECTION

    公开(公告)号:US20210383393A1

    公开(公告)日:2021-12-09

    申请号:US16894675

    申请日:2020-06-05

    Abstract: A processing system may obtain a customer identifier at a first retail location of a telecommunication network service provider, determine a recency factor of the identifier, obtain an identification of items of interest to the customer, and determine whether the customer has visited a second retail location of the provider within a time period prior to the customer being at the first retail location. The processing system may then apply, to a fraud detection machine learning model, a plurality of factors comprising: a quantity of items of interest, a value of the items, a factor associated with whether the customer has visited the second retail location within the time period, and the recency factor, where the fraud detection machine learning model outputs a fraud indicator value, determine that the fraud indicator value meets a warning threshold and present a warning to a device at the first retail location.

    CALL GRAPHS FOR TELECOMMUNICATION NETWORK ACTIVITY DETECTION

    公开(公告)号:US20230216968A1

    公开(公告)日:2023-07-06

    申请号:US17566886

    申请日:2021-12-31

    CPC classification number: H04M15/58 G06N5/022 H04M15/47

    Abstract: A processing system may maintain a communication graph that includes nodes representing a plurality of phone numbers including a first phone number and edges between the nodes representing a plurality of communications between the plurality of phone numbers and may generate at least one vector via a graph embedding process applied to the communication graph, the at least one vector representing features of at least a portion of the communication graph. The processing system may then apply the at least one vector to a prediction model that is implemented by the processing system and that is configured to predict whether the first phone number is associated with a type of network activity associated with a telecommunication network and may implement a remedial action in response to an output of the prediction model indicating that the first phone number is associated with the type of network activity.

    DETECTING FRAUD RINGS IN MOBILE COMMUNICATIONS NETWORKS

    公开(公告)号:US20230136950A1

    公开(公告)日:2023-05-04

    申请号:US18047272

    申请日:2022-10-17

    Abstract: An example method performed by a processing system obtaining a first port-in number for a first mobile device from a first mobile communications service provider, wherein the first port-in number is known to be involved in fraudulent activity, constructing a social graph of communications between the first port-in number and a plurality of other numbers associated with a plurality of other communications devices, identifying, by the processing system, a maximal subgraph of the social graph, wherein the maximal subgraph connects the first port-in number and a subset of the plurality of other numbers that includes those of the plurality of other numbers for which a usage metric is below a predefined threshold for a defined period of time prior to the first port-in number being ported into the first mobile communications service provider, and identifying, by the processing system, a potential fraud ring, based on the maximal subgraph.

    DETECTING THREAT PATHWAYS USING SEQUENCE GRAPHS

    公开(公告)号:US20220394049A1

    公开(公告)日:2022-12-08

    申请号:US17338646

    申请日:2021-06-03

    Abstract: A method for detecting threat pathways using sequence graphs includes constructing a sequence graph from a set of data containing information about activities in a telecommunications service provider network, where the sequence graph represents a subset of the activities that occurs as a sequence, providing an embedding of the sequence graph as input to a machine learning model, wherein the machine learning model has been trained to detect when an input embedding of a sequence graph is likely to indicate a threat activity, determining, based on an output of the machine learning model, whether the subset of the activities is indicative of the threat activity, and initiating a remedial action to mitigate the threat activity.

    DATA STREAM BASED EVENT SEQUENCE ANOMALY DETECTION FOR MOBILITY CUSTOMER FRAUD ANALYSIS

    公开(公告)号:US20220366430A1

    公开(公告)日:2022-11-17

    申请号:US17321279

    申请日:2021-05-14

    Abstract: Data stream based event sequence anomaly detection for mobility customer fraud analysis is presented herein. A system obtains a sequence of events comprising respective modalities of communication that correspond to a subscriber identity associated with a communication service—the sequence of events having occurred within a defined period. Based on defined classifiers representing respective fraudulent sequences of events, the system determines, via a group of machine learning models corresponding to respective machine learning processes, whether the sequence of events satisfies a defined condition with respect to likelihood of representing a fraudulent sequence of events of the respective fraudulent sequences of events. In response to the sequence of events being determined to satisfy the defined condition, the system sends, via a user interface of the system, a notification indicating that the sequence of events has been determined to represent the fraudulent sequence of events.

    DISAMBIGUATION OF FEATURE GRAPH DATABASES
    10.
    发明公开

    公开(公告)号:US20240111750A1

    公开(公告)日:2024-04-04

    申请号:US17959528

    申请日:2022-10-04

    CPC classification number: G06F16/23

    Abstract: A processing system may obtain a request to add at least a first feature to a feature graph database, where the request comprises a first feature ontology of the first feature, and where the first feature ontology comprises: a label of the first feature and a relationship of the first feature to a concept or to another feature. The processing system may then identify whether the first feature is a duplicate of a second feature in the feature graph database based at least upon the first feature ontology and a second feature ontology of the second feature and generate an indication of whether the first feature is a duplicate in response to the identifying.

Patent Agency Ranking