A large U.S. telecommunication (telco) company provides various cellular services for its end users on HPE NonStop databases in two main call datacenters.
Fraudulent calls have been increasing across the country. The telco needs a system for detecting fraudulent calls. The system is required to monitor call events and watch for unusual activity such as cell phone cloning (duplicating another cell phone’s connection signature).
In Step 1, the master fraud database, an intensive transaction-processing application, is created. Complex fraud queries are run in real-time against the call events in this database and those results are returned to the master fraud application.
In Step 2, to offload query processing from the system that was recording call events, the company uses an asymmetric capacity expansion configuration. The master NonStop node records all of the call events, runs the fraud application, and replicates suspicious cell phone numbers to the processing nodes in the call center. These nodes compare fraud detection queries to the call events, in order to detect unusual call activity.
If suspected fraudulent activity is detected, the master fraud system is notified so that it can take appropriate action. The subordinate query nodes support a customer call center that can handle customer calls concerning actions because of suspected fraudulent activity.
Contact us or your HPE Shadowbase representative, and learn how Shadowbase software will benefit you.
Related Use Case: Scale Look-to-Book Ratio for Online Travel Agent System
Related White Papers:
Related Solution Brief: HPE Shadowbase Business Continuity Solution Brief