NETWORK ASSISTED FRAUD DETECTION APPARATUS AND METHODS
First Claim
Patent Images
1. A method for executing a fraud protocol, comprising:
- responsive to receiving a request for activation, extracting one or more data from the request, wherein the extracted one or more data corresponds to a first activation state;
verifying the one of more data, based at least in part on the first activation state; and
executing a fraud protocol in response to unsuccessful verification of the one or more data.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for detecting fraudulent device operation. In one exemplary embodiment of the present disclosure, a device is issued a user access control client that is uniquely associated with a shared secret that is securely stored within the network and the access control client. Subsequent efforts to activate or deactivate the access control client require verification of the shared secret. Each change in state includes a change to the shared secret. Consequently, requests for a change to state which do not have the proper shared secret will be disregarded, and/or flagged as fraudulent.
-
Citations
20 Claims
-
1. A method for executing a fraud protocol, comprising:
-
responsive to receiving a request for activation, extracting one or more data from the request, wherein the extracted one or more data corresponds to a first activation state; verifying the one of more data, based at least in part on the first activation state; and executing a fraud protocol in response to unsuccessful verification of the one or more data. - View Dependent Claims (2, 3, 4)
-
-
5. An appliance apparatus useful in the execution of a fraud detection protocol, the appliance apparatus comprising:
-
a processor; a state database configured to store activation state information for each respective access control client of a plurality of access control clients; and a computer readable apparatus having a non-transitory storage medium with at least one computer program stored thereon, the at least one computer program configured to, when executed on the processor, cause the appliance apparatus to; receive an access control client request from a mobile device, the access control client request comprising at least activation state information; cause retrieval, from the state database, of current state information corresponding to the requested access control client; verify the validity of the request by at least a comparison of the activation state information against the retrieved current state information; and when the request is determined to be invalid, effectuate a fraud protocol. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A non-transitory computer readable medium comprising a plurality of instructions for detecting fraudulent device activation, the plurality of instructions configured to, when executed, cause a network entity to:
-
receive a access control client request from a mobile device, the request comprising at least state information of the access control client and a secret key of the mobile device; determine if the at least state information corresponds to an expected state for the access control client, and if the secret key is valid; and when (i) the state information does not correspond to the expected state, and/or (ii) when the secret key is invalid, implement a fraud protocol for the access control client.
-
-
11. A method for detecting fraudulent device activation, the method comprising:
-
transmitting a request for an access control client; receiving information associated with an access control client of the access control client request; validating the received information; and upon a validation of the received information, performing an action associated with the request for the access control client. - View Dependent Claims (12, 13, 14)
-
-
15. A mobile device configured for execution of a fraud detection protocol, the mobile device comprising:
-
a processor; a secure element configured to store one or more access control clients; at least one wireless interface in data communication with the processor; and a computer readable apparatus having a non-transitory storage medium with at least one computer program stored thereon, the at least one computer program configured to, when executed on the processor, cause the mobile device to; transmit a request relating to an access control client, where the request comprises at least information related to an activation status of the access control client; receive a response indicative of a determined validity of the request; and execute a fraud protocol when the response is indicative of an invalid request. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A non-transitory computer readable medium comprising a plurality of instructions for detecting fraudulent device activation, the plurality of instructions configured to, when executed, cause a mobile device to:
-
transmit an access control client request to an activation service, the request comprising at least a current activation status of the access control client; receive a message from the activation service, where the message is configured to indicate a validity of the request; and when the message indicated that the request is invalid, implement a fraud procedure on at least the access control client.
-
Specification