System and method to determine network usage
First Claim
Patent Images
1. A method comprising:
- determining, at a network tracking system, a first usage value for a user account during a time interval by applying a first correction factor to a first data value determined from a first cell count of cell counter data retrieved from a network device of a network;
determining first usage data based on the cell counter data, wherein the first usage data identifies a first location associated with the first usage value, a first session associated with the first usage value, a first authenticated user associated with the first usage value, or a combination thereof;
determining, at the network tracking system, a second usage value for the user account during the time interval based on session information from a plurality of network devices of the network;
determining second usage data based on the session information, wherein the second usage data identifies a second location associated with the second usage value, a second session associated with the second usage value, a second authenticated user associated with the second usage value, or a combination thereof; and
in response to one or more inconsistencies between the first usage data and the second usage data, detecting an indication of a fraudulent activity.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes determining, at a network tracking system, a first usage value for a user account during a time interval by applying a first correction factor to a first data value determined from a first cell count of cell counter data retrieved from a network device of a network. The method also includes determining, at the network tracking system, a second usage value for the user account during the time interval based on session information from a plurality of network devices of the network. The method further includes generating a cumulative usage value based on the first usage value and the second usage value.
62 Citations
19 Claims
-
1. A method comprising:
-
determining, at a network tracking system, a first usage value for a user account during a time interval by applying a first correction factor to a first data value determined from a first cell count of cell counter data retrieved from a network device of a network; determining first usage data based on the cell counter data, wherein the first usage data identifies a first location associated with the first usage value, a first session associated with the first usage value, a first authenticated user associated with the first usage value, or a combination thereof; determining, at the network tracking system, a second usage value for the user account during the time interval based on session information from a plurality of network devices of the network; determining second usage data based on the session information, wherein the second usage data identifies a second location associated with the second usage value, a second session associated with the second usage value, a second authenticated user associated with the second usage value, or a combination thereof; and in response to one or more inconsistencies between the first usage data and the second usage data, detecting an indication of a fraudulent activity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor; and a memory comprising instructions that, when executed by the processor, cause the processor to perform operations comprising; determining a first usage value for a user account during a time interval by applying a first correction factor to a first data value determined from a first cell count of cell counter data retrieved from a network device of a network; determining first usage data based on the cell counter data, wherein the first usage data identifies a first location associated with the first usage value, a first session associated with the first usage value, a first authenticated user associated with the first usage value, or a combination thereof; determining a second usage value for the user account during the time interval based on session information from a plurality of network devices of the network; determining second usage data based on the session information, wherein the second usage data identifies a second location associated with the second usage value, a second session associated with the second usage value, a second authenticated user associated with the second usage value, or a combination thereof; and in response to one or more inconsistencies between the first usage data and the second usage data, detecting an indication of a fraudulent activity. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable storage device comprising instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
determining a first usage value for a user account during a time interval by applying a first correction factor to a first data value determined from a first cell count of cell counter data retrieved from a network device of a network; determining first usage data based on the cell counter data, wherein the first usage data identifies a first location associated with the first usage value, a first session associated with the first usage value, a first authenticated user associated with the first usage value, or a combination thereof; determining a second usage value for the user account during the time interval based on session information from a plurality of network devices of the network; determining second usage data based on the session information, wherein the second usage data identifies a second location associated with the second usage value, a second session associated with the second usage value, a second authenticated user associated with the second usage value, or a combination thereof; and in response to one or more inconsistencies between the first usage data and the second usage data, detecting an indication of a fraudulent activity. - View Dependent Claims (17, 18, 19)
-
Specification