Detecting fraudulent traffic in a telecommunications system
First Claim
1. A monitoring network node for detecting fraudulent traffic in a telecommunications system, the monitoring network node comprising:
- one or more processors configured to;
monitor traffic to or from a user in the telecommunications system; and
apply to the monitored traffic a fraud profile associated with the user to determine whether the monitored traffic comprises fraudulent traffic, wherein the fraud profile comprises rules for monitoring the user for fraudulent traffic and/or detecting fraudulent traffic to or from the user;
a transmitter configured to transmit data notifying whether the monitored traffic comprises traffic determined to be fraudulent traffic, the data comprising an indication of a probability that the monitored traffic comprises fraudulent traffic; and
a receiver configured to receive data identifying an updated fraud profile for the user, wherein the updated fraud profile comprises updated rules for monitoring the user based on the indication of the probability that the monitored traffic comprises fraudulent traffic for fraudulent traffic and/or detecting fraudulent traffic to or from the user;
wherein the one or more processors are configured to apply the identified updated fraud profile to detect further fraudulent traffic in monitored traffic transmitted to or from the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for detecting fraudulent traffic associated with a user of a telecommunications system. A system comprises a monitoring network node comprising a traffic monitor configured to monitor traffic transmitted to or from a user in the telecommunications system, a fraud detector configured to apply to the monitored traffic a fraud profile associated with the user to determine whether the monitored traffic comprises fraudulent traffic, a transmitter configured to transmit data to a receiver of a profiling network node notifying whether the monitored traffic comprises fraudulent traffic. The profiling network node further comprises a fraud profiler configured to determine an updated fraud profile associated with the user based at least on the received data and a transmitter configured to transmit data identifying the updated fraud profile to one or both of a receiver of a subscription profile repository and a receiver of the monitoring network node.
11 Citations
20 Claims
-
1. A monitoring network node for detecting fraudulent traffic in a telecommunications system, the monitoring network node comprising:
-
one or more processors configured to; monitor traffic to or from a user in the telecommunications system; and apply to the monitored traffic a fraud profile associated with the user to determine whether the monitored traffic comprises fraudulent traffic, wherein the fraud profile comprises rules for monitoring the user for fraudulent traffic and/or detecting fraudulent traffic to or from the user; a transmitter configured to transmit data notifying whether the monitored traffic comprises traffic determined to be fraudulent traffic, the data comprising an indication of a probability that the monitored traffic comprises fraudulent traffic; and a receiver configured to receive data identifying an updated fraud profile for the user, wherein the updated fraud profile comprises updated rules for monitoring the user based on the indication of the probability that the monitored traffic comprises fraudulent traffic for fraudulent traffic and/or detecting fraudulent traffic to or from the user; wherein the one or more processors are configured to apply the identified updated fraud profile to detect further fraudulent traffic in monitored traffic transmitted to or from the user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for detecting fraudulent traffic in a telecommunications system, the method comprising:
-
monitoring, by one or more processors, traffic to or from a user in the telecommunications system; determining, by the one or more processors, whether the monitored traffic comprises fraudulent traffic by applying a fraud profile associated with the user to the monitored traffic, wherein the fraud profile comprises rules for monitoring the user for fraudulent traffic and/or detecting fraudulent traffic to or from the user; transmitting, by a transmitter, data notifying whether the monitored traffic comprises traffic determined to be fraudulent traffic, the data comprising an indication of a probability that the monitored traffic comprises fraudulent traffic; receiving, by a receiver, data identifying an updated fraud profile associated with the user, wherein the updated fraud profile comprises updated rules for monitoring the user based on the indication of the probability that the monitored traffic comprises fraudulent traffic for fraudulent traffic and/or detecting fraudulent traffic to or from the user; and applying, by the one or more processors, the identified updated fraud profile to detect further fraudulent traffic transmitted to or from the user. - View Dependent Claims (8)
-
-
9. A profiling network node for determining a fraud profile associated with a user of a telecommunications system, the profiling network node comprising:
-
a receiver configured to receive data notifying whether monitored traffic transmitted to or from a user in the telecommunications system is determined to comprise fraudulent traffic, the data comprising an indication of a probability that the monitored traffic comprises fraudulent traffic; one or more processors configured to determine a fraud profile associated with the user based at least on the received data, wherein the fraud profile is for use detecting further fraudulent traffic and the fraud profile comprises updated rules for monitoring the user based on the indication of the probability that the monitored traffic comprises fraudulent traffic for fraudulent traffic and/or detecting fraudulent traffic to or from the user; and a transmitter configured to in response to the notification that the user has logged onto the telecommunications system, transmit a request for data identifying the fraud profile associated with the user to a subscription profile repository; wherein; the receiver is further configured to receive the data identifying the fraud profile from the subscription profile repository; and the transmitter is further configured to transmit the data identifying the fraud profile to a monitoring network node. - View Dependent Claims (10, 11, 12)
-
-
13. A method for determining a fraud profile for a user of a telecommunications system, the method comprising:
-
receiving, by a receiver, data notifying whether monitored traffic transmitted to or from a user in the telecommunications system is determined to comprise fraudulent traffic, the data comprising an indication of a probability that the monitored traffic comprises fraudulent traffic; determining, by one or more processors, a fraud profile associated with the user based at least on the received data, wherein the fraud profile is for use detecting further fraudulent traffic and the fraud profile comprises updated rules for monitoring the user based on the indication of the probability that the monitored traffic comprises fraudulent traffic for fraudulent traffic and/or detecting fraudulent traffic to or from the user; transmitting, in response to the notification that the user has logged onto the telecommunications system, a request for data identifying the fraud profile associated with the user to a subscription profile repository by a transmitter; receiving, by a receiver, the data identifying the fraud profile from the subscription profile repository; and transmitting the data identifying the fraud profile to a monitoring network node. - View Dependent Claims (14)
-
-
15. A telecommunications system for detecting fraudulent traffic, the system comprising:
-
a monitoring network node comprising one or more processors configured to monitor traffic transmitted to or from a user in the telecommunications system; the one or more processors configured to apply to the monitored traffic a fraud profile associated with the user to determine whether the monitored traffic comprises fraudulent traffic, wherein the fraud profile comprises rules for monitoring the user for fraudulent traffic and/or detecting fraudulent traffic to or from the user; a transmitter configured to transmit data to a receiver of a profiling network node notifying whether the monitored traffic comprises fraudulent traffic, the data comprising an indication of a probability that the monitored traffic comprises fraudulent traffic; wherein the one or more processors are further configured to determine an updated fraud profile associated with the user based at least on the received data, wherein the updated fraud profile comprises updated rules for monitoring the user based on the indication of the probability that the monitored traffic comprises fraudulent traffic for fraudulent traffic and/or detecting fraudulent traffic to or from the user; and a transmitter configured to transmit data identifying the updated fraud profile to one or both of a receiver of a subscription profile repository and a receiver of the monitoring network node. - View Dependent Claims (16, 17, 18)
-
-
19. A method for operating a telecommunications system, the method comprising:
-
monitoring, by one or more processors of a monitoring network node, traffic transmitted to or from a user in the telecommunications system; applying, by the one or more processors of the monitoring network node, a fraud profile associated with the user to the monitored traffic to determine whether the monitored traffic comprises fraudulent traffic, wherein the fraud profile comprises rules for monitoring the user for fraudulent traffic and/or detecting fraudulent traffic to or from the user; transmitting, by a transmitter of the monitoring network node, data to a receiver of a profiling network node notifying whether the monitored traffic comprises fraudulent traffic, the data comprising an indication of a probability that the monitored traffic comprises fraudulent traffic; determining, by the one or more processors of the profiling network node, an updated fraud profile associated with the user based at least on the received data, wherein the updated fraud profile comprises updated rules for monitoring the user based on the indication of the probability that the monitored traffic comprises fraudulent traffic for fraudulent traffic and/or detecting fraudulent traffic to or from the user; transmitting, by a transmitter of the profiling network node, the data identifying the updated fraud profile to one or both of a receiver of a subscription profile repository and a receiver of the monitoring network node. - View Dependent Claims (20)
-
Specification