白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Connection management service

專利號
US11178068B1
公開日期
2021-11-16
申請人
Amazon Technologies, inc.(US WA Seattle)
發(fā)明人
Samuel Rislove Etler; Elizabeth Ann Dow Johnson; Dionisios Spiro Vervitsiotis; Kamlesh Nanda; Kenneth I. Rawlings
IPC分類
H04L12/927; H04L12/923; H04L12/64
技術(shù)領(lǐng)域
endpoint,trust,customer,score,may,service,request,account,connection,risk
地域: WA WA Seattle

摘要

A technology is described for determining a trust score or trust metric used to determine whether to allow a connection to a high risk destination. In one example of the technology, a connection request to initiate a connection with a destination over a network may be received at a communication service. The communication service may identify a customer account associated with the connection request and obtain a trust score that indicates whether the connection request associated with the customer account may be allowed. The communication service may determine whether the connection request associated with the customer account is allowed to initiate the connection with the destination based on the trust score, and initiate the connection with the destination over the network when the trust score allows the connection request.

說明書

BACKGROUND

Voice-communication systems allow users who may be remote from one another to communicate over a communications network using an array of different devices. These voice-communication services may allow users to place telephone calls using an application hosted on a client device or a VOIP (voice over IP) phone, and send voice traffic via a private branch exchange (PBX) over the Internet and other networks, including a public switched telephone network (PSTN).

Premium rate telephone numbers are telephone numbers for telephone calls that incur a higher charge as compared to charges for calls to other telephone numbers. A telephone service provider charges the calling party a high rate and shares the revenue with the owner of the premium rate number. Although billing for premium rate telephone calls is different from standard telephone calls, routing of premium rate telephone calls is typically the same as standard telephone calls. Criminals may also use premium rate numbers to defraud unsuspecting users. As one example, a user may be induced to download dialer software that surreptitiously dials a premium rate number in order to accumulate charges on the user's phone bill without the user's knowledge.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1 and 2 are block diagrams illustrating various example components included in a system for processing a connection request to a destination endpoint based on a trust score for a customer account.

FIG. 3 is a flow diagram that illustrates an example method for processing a connection request associated with a customer account to initiate a connection with a destination endpoint over a network.

權(quán)利要求

1
What is claimed is:1. A system comprising:at least one processor; anda memory device including instructions that, when executed by the at least one processor, cause the system to:receive, at a communication service hosted in a service provider environment, a connection request to initiate a connection between an origin endpoint at a first location and a destination endpoint at a second location over a public switched telephone network (PSTN), the first location being remote from the second location;identify a customer account associated with the connection request;obtain, based on the connection request, a trust score that indicates whether the connection request associated with the customer account is allowed, wherein the trust score is determined based in part on a risk score associated with the destination endpoint and a pattern of previous voice connections of the customer account with one or more first destination endpoints categorized as a high risk destination endpoint and one or more second destination endpoints categorized as a high cost destination endpoint;determine that the connection request associated with the customer account is allowed to initiate the connection with the destination endpoint based in part on the trust score; andinitiate the connection with the destination endpoint over the PSTN.2. The system in claim 1, wherein the connection with the destination endpoint is initiated based in part on a lack of deviation of the connection request with respect to the pattern of previous voice connections.3. The system in claim 1, wherein the connection request is received from a communications application hosted on a client device that transmits and receives communication data for the connection with the destination endpoint.4. The system in claim 1, wherein the instructions, when executed by the at least one processor, further cause the system to:determine that a number of calls to the destination endpoint during a predetermined amount of time is equal to or greater than a predetermined number; anddetermine the risk score based in part on the number of calls during the predetermined time period being equal to or greater than the predetermined number.5. The system in claim 1, wherein the instructions, when executed by the at least one processor, further cause the system to:determine, at a first time, that the risk score meets or exceeds a threshold value;classify, based in part on the risk score meeting or exceeding the threshold value, the destination endpoint as the high risk destination endpoint; anddetermine, at a second time that is subsequent to the first time and based in part on the risk score being classified as the high risk destination endpoint, the trust score.6. The system in claim 1, wherein the instructions, when executed by the at least one processor, further cause the system to:determine that a first calling rate associated with the destination endpoint is a threshold amount greater than second calling rates associated with one or more different destination endpoints;classify, based in part on the first calling rate being the threshold amount greater than the second calling rates, the destination endpoint as the high cost destination endpoint; anddetermine the risk score based in part on the destination endpoint being classified as the high cost destination endpoint.7. The system in claim 1, wherein the instructions, when executed by the at least one processor, further cause the system to:determine one or more factors associated with the destination endpoint, the one or more factors including first calls to the destination endpoint outside of a predetermined range of hours, the destination endpoint being an unrecognized destination endpoint, and a duration of second calls to the destination endpoint being equal to or greater than a predetermined amount of time; anddetermine the risk score based in part on the one or more factors.8. A computer implemented method comprising:receiving a connection request to initiate a connection between an origin endpoint and a destination endpoint that is remote from the origin endpoint over a network;identifying a customer account associated with the connection request;obtaining, based on the connection request, a trust score that indicates whether the connection request associated with the customer account is allowed, wherein the trust score is determined based in part on a risk score associated with connecting to the destination endpoint over the network and a pattern of previous voice connections of the customer account with one or more first destination endpoints categorized as a high risk destination endpoint and one or more second destination endpoints categorized as a high cost destination endpoint;determining whether the connection request associated with the customer account is allowed to initiate the connection with the destination endpoint based in part on the trust score; andinitiating the connection with the destination endpoint over the network based in part on a determination that the connection request is allowed to initiate the connection with the destination endpoint based in part on the trust score.9. The method in claim 8, further comprising:determining that the risk score of the destination endpoint meets or exceeds a threshold value; andidentifying a condition linked to the customer account that the trust score be evaluated prior to allowing the connection with the destination endpoint.10. The method in claim 8, wherein obtaining the trust score further comprises sending a trust score request to a scoring agent that generates the trust score using: (i) destination risk information for the destination endpoint, and (ii) customer status information and call history information linked to the customer account.11. The method in claim 8, wherein obtaining the trust score further comprises:obtaining destination risk information, customer status information, and call history information linked to the customer account; andapplying a rule set to the destination risk information, the customer status information, and the call history information to determine the trust score.12. The method in claim 8, wherein obtaining the trust score further comprises:analyzing a customer call history linked to the customer account for the pattern of previous voice connections that meet or exceed a risk threshold; andgenerating the trust score based in part on matching the connection request to the pattern of previous voice connections.13. The method in claim 8, wherein obtaining the trust score further comprises:training a machine learning model to generate trust scores that are classifications using training data that includes customer account features for a plurality of customer accounts and destination features for a plurality of destination endpoints;inputting one or more customer account features for the customer account and one or more destination features for the destination endpoint to the machine learning model; anddetermining, as an output from the machine learning model, a trust score classification for the customer account.14. The method in claim 8, further comprising:receiving a second connection request to initiate a second connection between the origin endpoint and the destination endpoint over the network;determining that the second connection request to initiate the second connection with the destination endpoint is not allowed based in part on the trust score; andproviding an indication that the second connection request is denied.15. The method in claim 8, further comprising:receiving instructions to override a denial of the connection request; andinitiating the connection with the destination endpoint.16. The method in claim 8, further comprising:receiving an authorization code with instructions to override a denial of the connection request;validating the authorization code; andinitiating the connection with the destination endpoint based in part on the authorization code being validated.17. The method in claim 8, wherein the connection request is a call forwarding request that redirects a call from a first destination endpoint to a second destination endpoint.18. The method in claim 8, wherein the connection request is sent by a communications application hosted on a client device, and the communications application includes functionality for calling destinations.19. A non-transitory machine readable storage medium including instructions embodied thereon, wherein the instructions, when executed by at least one processor:receive a connection request to initiate a connection between an origin endpoint and a destination endpoint that is remote from the origin endpoint over a network;identify a customer account associated with the connection request;determine that a first calling rate associated with the destination endpoint is a threshold amount greater than one or more second calling rates associated with one or more different destination endpoints;classify, based in part on the first calling rate being the threshold amount greater than the one or more second calling rates, the destination endpoint as a high cost destination endpoint;determine a risk score associated with the destination endpoint based in part on the destination endpoint being classified as the high cost destination endpoint;obtain, based in part on the connection request and the risk score, a trust score for the customer account that indicates whether the connection with the destination endpoint is allowed for the customer account, wherein the trust score is determined based in part on matching the connection request to a pattern of customer connections to other destination endpoints;determine that the connection request associated with the customer account is allowed to initiate the connection with the destination endpoint based in part on the trust score; andinitiate the connection with the destination endpoint over the network.20. The non-transitory machine readable storage medium in claim 19, wherein the connection request is received at a communication service hosted in a service provider environment, and the communication service is scaled based in part on demand by launching and terminating computing instances used to host the communication service.
微信群二維碼
意見反饋