Domestic to international collect call blocking

ABSTRACT

A method and device for preventing fraud in collect calls from a domestic origin point to an international terminating point through a long-distance telecommunications system is described. In the system and method, a Screening for International Calls database is added to the call processing platform. This Screening of International Calls database contains records keyed by country codes, and each record has a blocked collect call field listing destination numbers that are blocked from receiving collect calls. When a domestic-to-international collect call is made, the record corresponding to the country code of the international terminating point of the collect call is retrieved from the Screening for International Calls database. This record is checked to determine if the destination number of the collect call matches any destination numbers listed in the blocked collect call field of the country code database record. If there is a match, the call is blocked.

RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 11/520,999 filed on Sep. 14, 2006 (Attorney Docket No.COS99005C1), which is a continuation of U.S. patent application Ser. No.09/859,337 filed on May 17, 2001 (Attorney Docket No. COS99005), thecontents of which are hereby incorporated by reference.

BACKGROUND

1. Technological Field

The present application relates generally to fraud control intelecommunications systems and, in particular, to preventing fraud incollect calls from a domestic origin point to a internationalterminating point in a long distance telecommunications network.

2. Description of the Related Art

The telecommunications industry has experienced significant changes inthe way that customers are billed for their telephone calls. From theonce simple method of billing the originating caller, many methods havebeen developed, allowing greater flexibility for the telecommunicationscustomer. A predominant method for making telephone calls away from homeor the office is by utilizing a collect calling scheme to charge thecall. In this scheme, the party at the terminating end of the connectionpays the charges associated with the call. This method has grown toinclude international destinations, which is the subject of the presentinvention.

Collect call customers may use any telephone facility, including publicfacilities, to make a call that will be charged to the account of thereceiving party. When calling domestically, the process of makingcollect calls typically includes dialing an access number, such as “0”or “1-800-COLLECT”, waiting for an automatic audio prompt or anoperator, and then entering the calling party's name and the calledparty's number. After that, the connection is made with the terminatingparty and authorization from the called party is sought. Ifauthorization is given, the call is released and the parties continuetheir conversation. These collect calls are one type of a category ofphone calls called “special service” calls. These special service calls,which include “700”, “800/888”, and “900” number calls, allowcontemporary telecommunications networks to provide many services beyonddirect long distance dialing. It is the long distance carriers thatprovide this special service call processing, which allows for toll-freecalls, calling card calls, special rate calls, etc.

An example of a domestic collect call will now be described, withreference to FIGS. 1A, 1B, and 2. In FIGS. 1A and 1B, a caller attelephone 111 wishes to make a collect call to telephone 199. The callermay enter an access code or “0” and the terminating number to initiatethe collect call. The call is then routed through Local Exchange Carrier(LEC) 120. A local exchange carrier refers to local telephone companies,such as the Regional Bell Operating Companies (RBOCs), which providelocal transmission services for their customers. For purposes of thepresent description, we are assuming that the call is either to along-distance termination point or that the caller at telephone 111dialed in an access code that is routed to a long distance carrier.Either way, the call will be routed to a long distancetelecommunications company. Specifically, the routers in the LEC willforward the call to the network of the appropriate long distance carrier(or Inter-Exchange Carrier IXC) 130.

After switching through LEC switches 122 and 124, the collect call isrouted from POP (Point-of-Presence) switch 125 into the IXC 130, andthen through IXC switches 137 and 132, to a bridge switch 135. Thepurpose of the bridge switch 135 is to receive calls from the IXCnetwork and bridge them to Automatic Call Distributor (ACD) 140 and,ultimately, into the Intelligent Services Network platform (ISN) 150.Because special service calls require special call processing, they aretypically routed to a call processing platform, such as the ISN platform150. There are a number of ISNs within the IXC, but, for the purpose ofunderstanding the present invention, one ISN will suffice.

An exemplary and simplified diagram of the ISN platform 150 will now bedescribed with reference to FIG. 2. The ACD 140 is under the directcontrol of the Application Processor APP 156, which is a general purposecomputer that functions as the central point for call routing control inthe ISN 150. When the collect call arrives at the ACD 140, the ACD 140makes a request to the APP 156 for directions as to how the call shouldbe handled. Such a request would usually be accompanied by informationconcerning the call; e.g. the destination number, or Automatic NumberIdentifier (ANI), of the call, as well as the access code, if one wasused. The APP 156 would recognize that the call is a collect call and,consequently, the APP 156 would instruct the ACD 140 to deliver the callto the appropriate queue. In this case, the APP 156 may send it toeither to a live operator at the Manual Telecommunications OperatorConsole (MTOC) 154, or to the Automatic Response Unit (ARU) 152. The ARU152 comprises two components, one to process the call, the other toprompt the caller with a voice response system. It is the ARU 152 thatwill ask the caller for the required final destination number (if itwasn't entered initially), the calling party's name, and any additionalinformation. When a live operator is used, the operator enters the sameinformation at the MTOC 154. Whether the call is routed to the ARU 152or the MTOC 154, the same information will be entered. In other words,regardless of whether it is entered by the operator at the MTOC 154 orby the caller at her telephone 111 to the ARU 152, items such as thecalling party's name will have to be entered.

The various elements in the ISN platform 150 are connected by a LocalArea Network (LAN) 158, such as Ethernet or DECNet. Regardless ofwhether the collect call is being processed at the ARU 152 or the MTOC154, certain validation information concerning the final destination,the paying party's telephone 199, needs to be obtained. For instance,whether the destination number is a pay phone needs to be determinedprior to calling the destination number in order that fraud is avoided.Because of this and other reasons, the Bell companies developed the LineInformation Database (LIDB) system in the early 1980's. This is acentral database accessible from all telecommunications switches whichprovides information concerning credit validation; both the LECs and theIXCs have access to the LIDB and use it for call credit verification. Asimplified view of this relationship is shown in FIGS. 1 and 2, wherethe LIDB 170 is directly connected to the ISN 150 and shares informationwith LECs 120 and 160. This is simplified because the real systemconsists of multiple LIDBs, where each LEC maintains a centralized LIDBthat is continually sharing information and updating the other LIDBs.The centralized LIDB for LEC 160 is the primary source for informationon any terminating points serviced by LEC 160. IXCs may keep their ownlocal copy for frequently accessed numbers of other LIDBs and for othersystems to obtain information concerning their card holders. Even withinan individual LEC or IXC, there are multiple intermediaries between thecentralized LIDB and the automated switches or line operators that useLIDB information. For instance, an ISN platform 150 will often maintaina local copy of the LIDB 170 for quicker access. However, the entiresystem is often referred to as a single LIDB, as one skilled in therelevant art would know.

In our example, either the MTOC 154 or the ARU 152 accesses the LIDB 170through the LAN 158, as shown in FIG. 2. The LIDB 170 validates thecredit of the destination number, or called party, before the MTOC 154or ARU 152 contacts the called party for authorization of the collectcall. Once the call is credit validated, either the ARU 152 or MTOC 154connects the terminating leg of the call, as shown in FIG. 1B. Theterminating leg extends through IXC switches 132, 131, and 133, to thePOP switch 166 of LEC 160. Once in LEC 160, the call is switched throughLEC switches 164 and 162 to the called party's telephone 199. If someoneanswers at telephone 199, either the ARU 152 or MTOC 154 attempts to getauthorization from the called party. If authorization is received,either the ARU 152 or MTOC 154 releases the call to the automatedswitches of the IXC network 130. This means the call is torn down fromthe bridge switch 135 and maintained by the IXC switches for theduration of the call. If the called party declines to authorize thecall, the terminating leg of the call will be disconnected.

Fraud analysts or automated programs located at the Fraud Controlconsole 100 can also access the LIDB 170 to read or alter information.Fraud Control 100 monitors the traffic on IXC network 130 and attemptsto isolate suspicious activity. Thresholds are kept in order to issuealerts when traffic shows symptoms of fraudulent activity. If FraudControl 100 finds fraudulent activity at a certain terminatingtelephone, Fraud Control 100 may enter the LIDB 170 and change therecords so that the terminating ANI can no longer receive collect calls.

However, this method of blocking fraudulent collect calls using the LIDB170 is of no help with collect calls that originate domestically andterminate in international locations. Unlike the situation describedabove, there is no LIDB maintained on an international level withcountries such as England or Chile. For example, when a caller attelephone 111 in FIG. 3 attempts to make a collect call to a telephone,in this case, a cellular phone in car 399, in England, the call isprocessed differently. Although the collect call will still go throughthe LEC 120, IXC switches 137 and 132, and bridge switch 135 to ACD 140and the ISN platform 150, the processing in the ISN platform 150 isdifferent. Because there is no international LIDB, either the MTOC 154or ARU 152 will make no attempt at credit validation, except contactingthe other country's telecommunications carrier, in this case, BritishTelecom 315. Regardless of whether an operator at British Telecom 315,an operator at MTOC 154, or an automated program at ARU 152 makes thefinal connection with the called party, it is the foreign telephonecompany, British Telecom 315, which validates the final destination ofthe call, a cellular phone in an automobile 399. But often the foreigntelephone company does not keep adequate records on all the telephonesin its operating area, and the IXC network 130 will end up maintaining along-distance connection for which no one will pay. This is particularlytrue of cellular phones in foreign countries, because cellular phonesmaintain their connection with the telephone network through a radiolink with a base station 312. Cellular phones have no fixed locationfrom which to disconnect telephone lines or block calls and, without ahighly efficient local validation system in effect, can be easily usedfraudulently.

Therefore, there is a need to block fraudulent collect calls fromdomestic originating points to international terminating points throughlong distance telecommunications systems. Furthermore, the manner ofblocking calls must be maintained within the long distancetelecommunication system.

SUMMARY

One object of this invention is to provide a system and method ofblocking domestic-to-international collect calls to suspect terminatingdestinations in a long distance telecommunications network.

Another object of this invention is to provide a system and a method forproviding a screening database for domestic-to-international collectcalls in a long distance telecommunications network.

To accomplish the above and other objects, a system and method forpreventing fraud on international collect calls from an domestic originpoint to an international terminating point through a long-distancetelecommunications system is disclosed. In the system and method, a“Screening for International Calls” database is added to the ISNplatform. This Screening of International Calls database containsrecords keyed by country codes, and each record has a blocked collectcall field listing destination numbers or portions of destinationnumbers that are blocked from receiving collect calls. When adomestic-to-international collect call is made, the record correspondingto the country code of the international terminating point of thecollect call is retrieved from the Screening for International Callsdatabase. This record is checked to determine if the destination numberof the collect call matches any destination numbers listed in theblocked collect call field of the country code database record. If thereis a match, the call is blocked.

BRIEF DESCRIPTION OF THE FIGURES

The foregoing and other objects, aspects and advantages will be betterunderstood from the following detailed description of a preferredembodiment as illustrated in the following drawings. In the drawings,like reference numbers indicate identical or functionally similarelements.

FIGS. 1A and 1B are schematic diagrams of an exemplary domestic collectcall through a long distance telecommunications system;

FIG. 2 is a schematic diagram of an exemplary and simplified callprocessing platform with associated fraud control system, according tothe prior art;

FIG. 3 is a schematic diagram of an exemplary domestic-to-internationalcollect call through a long distance telecommunications system,according to the prior art; and

FIG. 4 is a schematic diagram of an exemplary and simplified callprocessing platform with associated fraud control system, according tothe preferred embodiment of the present system and method.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

In the following description, the term “network” is a short-handdescription of the conglomeration of databases, trunk and telephonelines, routers, switches, protocols, and computers that are required tomake a telecommunications network.

In short, the preferred embodiment of the present system and methodallows particular international terminating destinations to be blockedfrom receiving collect calls. Each international country has a countrycode (CC) associated with it, and a record is maintained for each CC.Although the preferred embodiment uses CCs, codes indicating smallerunits, such as provinces or cities, could be used. These CC records aremaintained in a Screening for International Calls database (SCREENINGINTERNAT'L) 460, which is added to the ISN platform 150 as shown in FIG.4. SCREENING INTERNAT'L 460 can be located outside the ISN platform 150in other embodiments, but both Fraud Control 100 and the ISN platform150 must have some sort of access to it. In the preferred embodiment, ina manner akin to the LIDB, there is a centralized SCREENING INTERNAT'Ldatabase for the entire IXC network 130, and smaller local copies aremaintained at appropriate spots throughout the telecommunicationssystem. Similarly to the LIDB, the SCREENING INTERNAT'L database will bereferred to as a single unit in this application.

The CC records in the Screening for International Calls database arekeyed by the country code and contain information concerning categoriesof billing products (calling cards, collect calls, third party calls,etc.), type of call, and blocked destination phone numbers (hereinafter“destination numbers”). Specifically, a blocked collect call field isadded to the CC records in the SCREENING INTERNAT'L 460 database; andany destination number listed in that field of the CC record is blockedfrom receiving collect calls. In other words, when adomestic-to-international collect call is made, the CC record of aparticular destination country or country code is looked up in theSCREENING INTERNAT'L 460, and it is determined if the terminatingdestination number of the call is listed in the blocked collect callfield of the CC record. If it is, the collect call is blocked.

In the preferred embodiment, Fraud Control console 100 in FIG. 4 willdetermine which terminating destinations numbers in a particular countrywill be blocked from receiving collect calls. Many methods may be usedto ascertain fraudulent destination numbers to be entered in theSCREENING INTERNAT'L 460 database. For example, past collect calldestination numbers that have ended up not paying will be added to theblocked collect call field of the appropriate CC record. Further if acustomer account associated with an international destination number hasan overdue balance, the destination number will be added to the blockedcollect call field of the appropriate CC record. Either an automatedprogram or a fraud analyst at Fraud Control console 100, which isconnected either directly or indirectly with the ISN platform 150, wouldadd these destination numbers to the CC record in the SCREENINGINTERNAT'L 460 database. In addition, Fraud Control 100 monitors networktraffic in order to determine if particular international destinationnumbers exhibit suspicious behavior. Typically, Fraud Control console100 also receives updates from foreign telephone companies, listingfraudulent destination numbers, or groups of destination numbers.

The Fraud Control console 100 has the ability to block larger andsmaller terminating destination numbers by altering the digits that areplaced in the blocked collect call field of a CC record. For example,although a single cellular phone with telephone number 555-5433 could beblocked from receiving collect calls by placing 555-5433 in the blockedcollect call field, it is also possible to block the whole series ofnumbers that begin with 555-5 by entering 555-5*** in the blockedcollect call field. The “*” is a “wildcard” character which canrepresent any number. This is helpful in the case when an entire seriesof numbers is being used by suspected cellular phones. It is alsohelpful when fraud control 100 uses fraud-to-revenue ratio analysis ondestination exchanges, such as “555”. Once this fraud-to-revenue ratioreaches a certain threshold, Fraud Control 100, either manned by a fraudanalyst or under the control of an automated program, will decidewhether to place a block on that terminating destination exchange. If itis decided to do so, the terminating destination exchange will be placedin the blocked collect call field of the INTERNAT'L SCREENING database460 CC record of the originating country.

As an example of a domestic-to-international collect call using thepreferred embodiment, consider the exemplary call made earlier withreference to FIG. 3. A caller, located at telephone 111 attempts to makea collect call from telephone 111 to a cellular phone located inautomobile 399 in England. In this example, the telephone number of thecellular phone is one of a series of telephone numbers that has beenrecognized as fraudulent by Fraud Control 100, and entered into theblocked collect call field of the CC record of the United Kingdom. Thecollect call is routed through LEC switch 122 and POP switch 125 to IXCnetwork 130, where it is connected through IXC switches 137 and 132 tobridge switch 135. From the bridge switch 135, the collect call isrouted into the ACD 140 of the ISN platform 150, as shown in FIG. 4,according to a preferred embodiment of the present invention.

Once in the ISN platform 150 in FIG. 4, the domestic-to-internationalcollect call is either routed to the MTOC 154 or ARU 152. As part of thevalidation process, the CC record of the United Kingdom is accessed byeither the ARU 152 or the MTOC 154. The destination number of thecollect call is compared with the number or numbers in the blockedcollect call field of the CC record. Once it is determined that thedestination cellular phone number is one of the series of numbers thatis blocked from receiving collect calls, there are several courses ofactions that may be taken. The collect call could be routed to a liveoperator to explain the situation to the caller at telephone 111. Anautomated message could explain the situation to the caller at telephone111. Either way, the option of an alternative billing method could bepresented to the caller. The collect call could also be abruptlyterminated. Although abrupt termination may seem unfriendly, if thenumber of caller hangups during the explanation script reaches a certainpercentage, it indicates that only hackers are attempting to reach thattelephone number and the resources of the ISN platform 150 should not bewasted explaining their fraudulent activity to them.

By use of the SCREENING INTERNAT'L database 460, many fraudulentdomestic-to-international collect calls can be stopped before they arebegun, thus saving money for the IXC. Having no set digit size for theblocked collect call field in the CC records allows for very fine orvery coarse granularity in the blocking of these types of calls. Inanother embodiment, there is an additional step of determining whetherthere are any destination numbers listed in the blocked collect callfield before comparing the terminating destination number with the oneslisted in the blocked collect call field. In this way, if there are nonumbers listed in the blocked collect call field, resources and time arenot wasted in making comparisons.

As one skilled in the relevant art would recognize, many elements of atelecommunications network have been left out in order not to obscurethe invention in details unnecessary to the understanding of the presentinvention. In addition, although the above-described embodiment is thepreferred embodiment, many modifications would be obvious to one skilledin the art.

While the present invention has been described with respect to a certainpreferred embodiment, it should be understood that the invention is notlimited to this particular embodiment, but, on the contrary, theinvention is intended to cover all modifications, equivalents, andalternatives falling within the spirit and scope of the invention asdefined by the appended claims.

1. A method for preventing telephony fraud, the method comprising:maintaining a centralized database resident within a domestic region,the database being configured to store a block call list that includes aterminating number corresponding to an international region, wherein thedatabase is accessible by all telephony switches within a firsttelephony network; and receiving a database query initiated by one ofthe telephony switches in response to a collect call placed to adestination number terminated via a second telephony network within theinternational region, wherein the collect call is blocked if thedatabase query results in a response indicating the destination numberis within the block call list.