Detecting Fraudulent Traffic in a Telecommunications System
First Claim
1. A monitoring network node for detecting fraudulent traffic in a telecommunications system, the monitoring network node comprising:
- one or more processors configured to;
monitor traffic to or from a user in the telecommunications system; and
apply to the monitored traffic a fraud profile associated with the user to determine whether the monitored traffic comprises fraudulent traffic;
a transmitter configured to transmit data notifying whether the monitored traffic comprises traffic determined to be fraudulent traffic; and
a receiver configured to receive data identifying an updated fraud profile for the user,wherein the one or more processors are configured to apply the identified updated fraud profile to detect further fraudulent traffic in monitored traffic transmitted to or from the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for detecting fraudulent traffic associated with a user of a telecommunications system. A system comprises a monitoring network node comprising a traffic monitor configured to monitor traffic transmitted to or from a user in the telecommunications system, a fraud detector configured to apply to the monitored traffic a fraud profile associated with the user to determine whether the monitored traffic comprises fraudulent traffic, a transmitter configured to transmit data to a receiver of a profiling network node notifying whether the monitored traffic comprises fraudulent traffic. The profiling network node further comprises a fraud profiler configured to determine an updated fraud profile associated with the user based at least on the received data and a transmitter configured to transmit data identifying the updated fraud profile to one or both of a receiver of a subscription profile repository and a receiver of the monitoring network node.
18 Citations
27 Claims
-
1. A monitoring network node for detecting fraudulent traffic in a telecommunications system, the monitoring network node comprising:
-
one or more processors configured to; monitor traffic to or from a user in the telecommunications system; and apply to the monitored traffic a fraud profile associated with the user to determine whether the monitored traffic comprises fraudulent traffic; a transmitter configured to transmit data notifying whether the monitored traffic comprises traffic determined to be fraudulent traffic; and a receiver configured to receive data identifying an updated fraud profile for the user, wherein the one or more processors are configured to apply the identified updated fraud profile to detect further fraudulent traffic in monitored traffic transmitted to or from the user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for detecting fraudulent traffic in a telecommunications system, the method comprising:
-
monitoring, by one or more processors, traffic to or from a user in the telecommunications system; determining, by the one or more processors, whether the monitored traffic comprises fraudulent traffic by applying a fraud profile associated with the user to the monitored traffic; transmitting, by a transmitter, data notifying whether the monitored traffic comprises traffic determined to be fraudulent traffic; receiving, by a receiver, data identifying an updated fraud profile associated with the user; and applying, by the one or more processors, the identified updated fraud profile to detect further fraudulent traffic transmitted to or from the user. - View Dependent Claims (8)
-
-
9. A profiling network node for determining a fraud profile associated with a user of a telecommunications system, the profiling network node comprising:
-
a receiver configured to receive data notifying whether monitored traffic transmitted to or from a user in the telecommunications system is determined to comprise fraudulent traffic; one or more processors configured to determine a fraud profile associated with the user based at least on the received data, wherein the fraud profile is for use detecting further fraudulent traffic; and a transmitter configured to transmit data identifying the fraud profile. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method for determining a fraud profile for a user of a telecommunications system, the method comprising:
-
receiving, by a receiver, data notifying whether monitored traffic transmitted to or from a user in the telecommunications system is determined to comprise fraudulent traffic; determining, by one or more processors, a fraud profile associated with the user based at least on the received data, wherein the fraud profile is for use detecting further fraudulent traffic; and transmitting, by a transmitter, data identifying the fraud profile. - View Dependent Claims (17)
-
-
18-21. -21. (canceled)
-
22. A telecommunications system for detecting fraudulent traffic, the system comprising:
-
a monitoring network node comprising one or more processors configured to monitor traffic transmitted to or from a user in the telecommunications system; the one or more processors configured to apply to the monitored traffic a fraud profile associated with the user to determine whether the monitored traffic comprises fraudulent traffic; a transmitter configured to transmit data to a receiver of a profiling network node notifying whether the monitored traffic comprises fraudulent traffic, wherein the one or more processors are further configured to determine an updated fraud profile associated with the user based at least on the received data and a transmitter configured to transmit data identifying the updated fraud profile to one or both of a receiver of a subscription profile repository and a receiver of the monitoring network node. - View Dependent Claims (23, 24, 25)
-
-
26. A method for operating a telecommunications system, the method comprising:
-
monitoring, by one or more processors of a monitoring network node, traffic transmitted to or from a user in the telecommunications system; applying, by the one or more processors of the monitoring network node, a fraud profile associated with the user to the monitored traffic to determine whether the monitored traffic comprises fraudulent traffic; transmitting, by a transmitter of the monitoring network node, data to a receiver of a profiling network node notifying whether the monitored traffic comprises fraudulent traffic; determining, by the one or more processors of the profiling network node, an updated fraud profile associated with the user based at least on the received data; transmitting, by a transmitter of the profiling network node, the data identifying the updated fraud profile to one or both of a receiver of a subscription profile repository and a receiver of the monitoring network node. - View Dependent Claims (27)
-
Specification