Detection and blocking of cloned mobile devices
First Claim
1. A method for blocking a cloned mobile device, the method comprising:
- receiving, by a processor of a network, a first registration from a first mobile device at a first location, wherein the first registration includes a device identifier and a phone number;
confirming, by the processor, that a second registration from a second mobile device at a second location includes the device identifier and the phone number;
calculating, by the processor, a first fraud score for the first mobile device and a second fraud score for the second mobile device;
determining, by the processor, the second mobile device is the cloned mobile device, when the second fraud score exceeds the first fraud score; and
blocking the cloned mobile device from registering on the network, wherein the blocking comprisesremoving an entry associated with the device identifier and the phone number from a visiting location register associated with the second location; and
preventing re-registration of the device identifier and the phone number at the visiting location register associated with the second location.
2 Assignments
0 Petitions
Accused Products
Abstract
A method is disclosed for blocking a cloned mobile device by a processor of a network. The processor receives a first registration from a first mobile device at a first location. The first registration includes a device identifier and a phone number. The processor then confirms that a second registration from a second mobile device at a second location includes the device identifier and the phone number and calculates a first fraud score for the first mobile device and a second fraud score for the second mobile device. The processor then determines that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score, and blocks the cloned mobile device from registering on the network.
-
Citations
20 Claims
-
1. A method for blocking a cloned mobile device, the method comprising:
-
receiving, by a processor of a network, a first registration from a first mobile device at a first location, wherein the first registration includes a device identifier and a phone number; confirming, by the processor, that a second registration from a second mobile device at a second location includes the device identifier and the phone number; calculating, by the processor, a first fraud score for the first mobile device and a second fraud score for the second mobile device; determining, by the processor, the second mobile device is the cloned mobile device, when the second fraud score exceeds the first fraud score; and blocking the cloned mobile device from registering on the network, wherein the blocking comprises removing an entry associated with the device identifier and the phone number from a visiting location register associated with the second location; and preventing re-registration of the device identifier and the phone number at the visiting location register associated with the second location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium storing a plurality of instructions which, when executed by a processor of a network, cause the processor to perform operations for blocking a cloned mobile device, the operations comprising:
-
receiving a first registration from a first mobile device at a first location, wherein the first registration includes a device identifier and a phone number; confirming that a second registration from a second mobile device at a second location includes the device identifier and the phone number; calculating a first fraud score for the first mobile device and a second fraud score for the second mobile device; determining that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score; and blocking the cloned mobile device from registering on the network, wherein the blocking comprises removing an entry associated with the device identifier and the phone number from a visiting location register associated with the second location; and preventing re-registration of the device identifier and the phone number at the visiting location register associated with the second location.
-
-
16. An apparatus for blocking a cloned mobile device, the apparatus comprising:
-
a processor of a network; and a computer-readable medium storing instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising; receiving a first registration from a first mobile device at a first location, wherein the first registration includes a device identifier and a phone number; confirming that a second registration from a second mobile device at a second location includes the device identifier and the phone number; calculating a first fraud score for the first mobile device and a second fraud score for the second mobile device; determining that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score; and blocking the cloned mobile device from registering on the network, wherein the blocking comprises removing an entry associated with the device identifier and the phone number from a visiting location register associated with the second location; and preventing re-registration of the device identifier and the phone number at the visiting location register associated with the second location. - View Dependent Claims (17, 18, 19, 20)
-
Specification