Use cases of services

Applications and Real-World Examples

  1. Home
  2. Use Cases

Fraud management TELCO

Identity Guard

Decoding of network signal data, process them and provides transformed data to defined systems in near real-time frame. Multiple integration types including messaging brokers (Kafka/RabbitMQ), SFTP, REST. High scalability (both horizontal and vertical).

Telco Fraud Challenges

Fraud costs the telco industry an estimated €10 billion per year according to a 2019 report by Europol’s European Cybercrime Centre.

Identity Guard

Product overview: Monitoring, Reporting, Notification and alert, Fraud detection, Anoymization.
Fraud detection module: Seamless integration, Supports three mayor telecommunication fraud types, Possibility to add new fraud rules, Support of fraud detection exclusion list.

Fraud management TELCO

Fraud Detection Module

According to a Europol’s Europian cybercrime centre, fraud costs the telco industry around €10 billion per year and the amount rises constantly.

In 2020 SMS phishing attacks skyrocketed by more than 328%. Fraudsters use different methods which target both MNOs as well as customers and vary from infrastructure attacks to social engineering attacks.

Wangiri attacks

Zero-duration calls, mostly to mobile devices, that leave a missed-call number, which is either a premium rate number or one that produces advertising messages
In more recent cases, bots or scripts initiate fraud by filling out a company’s online form with information that leads the companies to call back premium numbers

FRAUD MANAGEMENT TELCO

Fraud detection rules

  • Wangiri - zero-duration calls, mostly to mobile devices, that leave a missed-call number, which is either a premium rate number or one that produces advertising messages
  • Wangiri 2.0 - bots or scripts initiate fraud by filling out a company's online form with information that leads the companies to call back premium numbers.
  • SMS Spam & Phishing - sending mass SMS in order to obtain personal information from the person who receives the messages
  • Interconnect Bypass - using SIM cards from a local carrier and rerouting international calls using a SIM box or GSM gateway
  • List of risk countries / operators with defined threshold limit

Fraud detection module

According to a Europol’s Europian cybercrime centre, fraud costs the telco industry around €10 billion per year and the amount rises constantly. In 2020 SMS phishing attacks skyrocketed by more than 328%. Fraudsters use different methods which target both MNOs as well as customers and vary from infrastructure attacks to social engineering attacks. Wangiri attacks Zero-duration calls, mostly to mobile devices, that leave a missed-call number, which is either a premium rate number or one that produces advertising messages In more recent cases, bots or scripts initiate fraud by filling out a company’s online form with information that leads the companies to call back premium numbers. Interconnect bypass Using SIM cards from a local carrier and rerouting international calls using a SIM box or GSM gateway SMS Spam & Phishing Sending mass SMS in order to obtain personal information from the person who receives the messages

Fraud detection module

According to a Europol’s Europian cybercrime centre, fraud costs the telco industry around €10 billion per year and the amount rises constantly. In 2020 SMS phishing attacks skyrocketed by more than 328%. Fraudsters use different methods which target both MNOs as well as customers and vary from infrastructure attacks to social engineering attacks. Wangiri attacks Zero-duration calls, mostly to mobile devices, that leave a missed-call number, which is either a premium rate number or one that produces advertising messages In more recent cases, bots or scripts initiate fraud by filling out a company’s online form with information that leads the companies to call back premium numbers. Interconnect bypass Using SIM cards from a local carrier and rerouting international calls using a SIM box or GSM gateway SMS Spam & Phishing Sending mass SMS in order to obtain personal information from the person who receives the messages

Movement Analytics

The movement analytics portal visualizes anonymized users paired with user attributes​. The Source of the geospatial information can be massive data produced by mobile network or different process-related data which can be obtained from other sources. Source data is anonymized near the source to satisfy GDPR requirements. ​
Our solution can use attributes and enrich location information with data from other systems like CRM or any ICT solution that provides adequate API​. The final visualization is multidimensional and can be tailored to the customer’s needs​. Obtained results of the analysis are delivered as customized graphs and reports. ​

Use Case

By connecting the current position of the bank card and mobile device location, our system can add a valuable additional parameter to the bank’s fraud management systems​. GDPR Compliant. Anoymized data. Connecting card and mobile device location​. Configurable.

Example

The mobile device location is somewhere in the city of Zagreb, while the EFTPOS transaction is being made in the greater Dubrovnik area. The transaction is recognized as possibly unauthorized and the PIN code is required even if the transaction is under 250 HRK or a contactless transaction​ ​

Movement analytics

  • Heat maps - See it at a glance - heat map view provides an intuitive view of required data​
  • Multidimensional attributes​ - Know it all - multidimensional attributes are covering all the information required​
  • Anonymization​ - Control reverse anonymization of PII data securely​
  • Reporting​ - An extensive and customizable reporting engine will keep you up-to-date at all times​

Movement analytics

The movement analytics portal visualizes anonymised users on a heatmap paired with user attributes. The source of the geospatial information can be massive data produced by mobile networks or different process-related data which can be obtained from other sources. Source data is anonymised near the source to satisfy GDPR requirements. Our solution can use attributes and enrich location information with data from other systems like CRM or any ICT solution that provides adequate API. The final visualisation is multidimensional and can be tailored to the customer’s needs. Obtained results of the analysis are delivered as customised graphs and reports. Example usage is tourist movement reported by tourist nationality in a particular area.

0 M+

Heat maps

0 %

Anonymization

0 +

Multidimensional attributes

0 +

Reportions

Get Started

Are you interested in this and do you see a possible application?

Get in touch with us and find out more.