SYSTEM AND METHOD FOR IDENTITY PROTECTION USING MOBILE DEVICE SIGNALING NETWORK DERIVED LOCATION PATTERN RECOGNITION
First Claim
1. A method for detecting identity theft of an entity based on an entity'"'"'s wireless device location obtained from a communications network, comprising:
- obtaining first data from a home network pertaining to the entity'"'"'s wireless device based upon a unique identifier of the entity'"'"'s wireless device;
obtaining second data from a visited network pertaining to the entity'"'"'s wireless device based upon the unique identifier of the entity'"'"'s wireless device; and
generating a pattern value based on the first data, based on the second data, and based on a time that at least one of the first data and the second data was obtained, wherein the generated pattern value indicates a likelihood of identity theft.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for recognizing patterns in wireless device locations using wireless device location data derived from a communications signaling network is provided. By using wireless network supported signaling operations and messages, location data concerning the whereabouts of wireless devices, and hence wireless device users, may be obtained. The location data derived from the communications signaling network may be statistically analyzed to reveal potential geographic patterns that may indicate meaningful behaviors of the purported users of the wireless devices.
-
Citations
17 Claims
-
1. A method for detecting identity theft of an entity based on an entity'"'"'s wireless device location obtained from a communications network, comprising:
-
obtaining first data from a home network pertaining to the entity'"'"'s wireless device based upon a unique identifier of the entity'"'"'s wireless device; obtaining second data from a visited network pertaining to the entity'"'"'s wireless device based upon the unique identifier of the entity'"'"'s wireless device; and generating a pattern value based on the first data, based on the second data, and based on a time that at least one of the first data and the second data was obtained, wherein the generated pattern value indicates a likelihood of identity theft. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for verifying an electronic activity of interest based on information pertaining to an entity'"'"'s wireless device, comprising:
-
communicating a request for information to a home network of the entity'"'"'s wireless device, wherein the request communicated to the home network includes a unique identifier of the entity'"'"'s wireless device; communicating a request for information to a visited network, wherein the request communicated to the visited network includes the unique identifier of the entity'"'"'s wireless device; receiving information pertaining to the entity'"'"'s wireless device from at least one of the home network and the visited network in response to communicating the request for information; receiving information pertaining to the electronic activity of interest; and statistically correlating the received home network information, the received visited network information, and the electronic activity of interest information; and generating a pattern value based on the statistical correlation, wherein the pattern value indicates a likelihood that the electronic activity of interest is valid.
-
-
17. A system that verifies an electronic activity of interest based on information pertaining to an entity'"'"'s wireless device, comprising:
-
a communications interface configured to communicatively interconnect to a communications signaling network, and configured to receive a request from a transaction entity for information pertaining to the likelihood that the electronic activity of interest is valid; a memory component configured to store a wireless device location module and at least one location recognition logic resource; and a processor communicatively coupled to the communications interface and the memory component, where in response to receiving the request from the transaction entity, the processor retrieves and executes the wireless device location module to generate a request for information to a home network of the entity'"'"'s wireless device and a request for information to a visited network, wherein the request for information to the home network and the visited network includes a unique identifier of the entity'"'"'s wireless device; wherein the request for information to the home network and the visited network is communicated from the communications interface to the home network and the visited network via a communications signaling network, wherein the communications interface receives the requested information from the home network and the visited network via the communications signaling network; wherein the processing system retrieves and executes the location recognition logic resource to statistically correlate the received information from the home network, the received information from the visited network, and information pertaining to the electronic activity of interest, and wherein the processing system generates a pattern value based on the statistical correlation, wherein the pattern value indicates a likelihood that the electronic activity of interest is valid.
-
Specification