Asymmetric Capacity Expansion for Real-Time Cell Phone Fraud Detection

  • Copy link to clipboard
  • Email link
  • Print


A large U.S. telecommunication (telco) company provides various cellular services for its end users on HPE NonStop databases in two main call datacenters.


Fraudulent calls have been increasing across the country. The telco needs a system for detecting fraudulent calls. The system is required to monitor call events and watch for unusual activity such as cell phone cloning (duplicating another cell phone’s connection signature).


In Step 1, the master fraud database, an intensive transaction-processing application, is created. Complex fraud queries are run in real-time against the call events in this database and those results are returned to the master fraud application.

In Step 2, to offload query processing from the system that was recording call events, the company uses an asymmetric capacity expansion configuration. The master NonStop node records all of the call events, runs the fraud application, and replicates suspicious cell phone numbers to the processing nodes in the call center. These nodes compare fraud detection queries to the call events, in order to detect unusual call activity.

If suspected fraudulent activity is detected, the master fraud system is notified so that it can take appropriate action. The subordinate query nodes support a customer call center that can handle customer calls concerning actions because of suspected fraudulent activity.


HPE Shadowbase Products of Interest

Contact us or your HPE Shadowbase representative, and learn how Shadowbase software will benefit you.

Further Reading

Related Use Case: Application Capacity Expansion Scale Look-to-Book Ratio for Online Travel Agent System

Related White Papers:

Related Solution Brief: Business Continuity HPE Shadowbase Business Continuity Solution Brief