Systems, Methods and Programs for Detecting Unauthorized Use of Text Based Communications Services
First Claim
1. A method, comprising:
- receiving a message;
determining a plurality of deviations, each of the plurality of deviations associated with a respective authorized profile of a plurality of authorized profiles, each of the plurality of deviations being a difference between a language pattern extracted from the message and a language pattern associated with the respective authorized profile;
comparing, by a processor, each of the plurality of deviations with an allowable amount of deviation associated with the respective authorized profile, the allowable amount of deviation based on an amount of samples used in creating the respective authorized profile; and
determining whether the message is an unauthorized user account communication based on the comparing.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and programs for generating an authorized profile for a text communication device or account, may sample a text communication generated by the text communication device or account during communication and may store the text sample. The systems, methods, and programs may extract a language pattern from the stored text sample and may create an authorized profile based on the language pattern. Systems, methods, and programs for detecting unauthorized use of a text communication device or account may sample a text communication generated by the device or account during communication, may extract a language pattern from the audio sample, and may compare extracted language pattern of the sample with an authorized user profile.
1 Citation
20 Claims
-
1. A method, comprising:
-
receiving a message; determining a plurality of deviations, each of the plurality of deviations associated with a respective authorized profile of a plurality of authorized profiles, each of the plurality of deviations being a difference between a language pattern extracted from the message and a language pattern associated with the respective authorized profile; comparing, by a processor, each of the plurality of deviations with an allowable amount of deviation associated with the respective authorized profile, the allowable amount of deviation based on an amount of samples used in creating the respective authorized profile; and determining whether the message is an unauthorized user account communication based on the comparing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer readable medium storing computer program instructions, which, when executed on a processor, cause the processor to perform operations comprising:
-
determining a plurality of deviations, each of the plurality of deviations associated with a respective authorized profile of a plurality of authorized profiles, each of the plurality of deviations being a difference between a language pattern extracted from a message and a language pattern associated with the respective authorized profile; comparing each of the plurality of deviations with an allowable amount of deviation associated with the respective authorized profile, the allowable amount of deviation based on an amount of samples used in creating the respective authorized profile; and determining whether the message is an unauthorized user account communication based on the comparing. - View Dependent Claims (13, 14, 15)
-
-
16. An apparatus, comprising:
-
a processor; and a memory to store computer program instructions, the computer program instructions when executed on the processor cause the processor to perform operations comprising; receiving a message; determining a plurality of deviations, each of the plurality of deviations associated with a respective authorized profile of a plurality of authorized profiles, each of the plurality of deviations being a difference between a language pattern extracted from the message and a language pattern associated with the respective authorized profile; comparing each of the plurality of deviations with an allowable amount of deviation associated with the respective authorized profile, the allowable amount of deviation based on an amount of samples used in creating the respective authorized profile; and determining whether the message is an unauthorized user account communication based on the comparing. - View Dependent Claims (17, 18, 19, 20)
-
Specification