Fraud detection techniques for wireless network operators
First Claim
1. A method of detecting unauthorized terminal use in a network, comprising:
- recording a history of usage of a terminal;
analyzing the usage of said terminal;
monitoring current usage of said terminal; and
requesting clarification upon detection of a deviation between said statistical analysis of the usage of said terminal and said current usage of said terminal.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided by which a network operator is able to detect fraudulent use of a subscriber'"'"'s terminal, regardless of whether or not the subscriber is aware of the fraudulent use of her terminal. Detecting unauthorized terminal use in a wireless network includes recording a history of terminal location and registration patterns, analyzing the recorded history of location and registration patterns of the terminal, monitoring current location and registration patterns of the terminal, and requesting clarification when a deviation between said statistical analysis of the location and registration patterns of said terminal and said current location and registration patterns of said terminal is detected.
37 Citations
32 Claims
-
1. A method of detecting unauthorized terminal use in a network, comprising:
-
recording a history of usage of a terminal;
analyzing the usage of said terminal;
monitoring current usage of said terminal; and
requesting clarification upon detection of a deviation between said statistical analysis of the usage of said terminal and said current usage of said terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for detecting fraudulent use of network subscribing terminals, comprising:
-
a database that records a history of usage of a terminal in a network and analyzes the usage of said terminal;
a control entity that monitors current usage of said terminal and requests clarification upon detection of a deviation between the statistical analysis of the usage of said terminal and the current usage of said terminal. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-readable medium having computer-executable instructions for detecting unauthorized terminal use in a wireless network, said computer-executable instructions comprising:
-
recording a history of usage of a terminal;
analyzing the usage of said terminal;
monitoring current usage of said terminal; and
requesting clarification upon detection of a deviation between said statistical analysis of the usage of said terminal and said current usage of said terminal. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification