System and method for detection of redial fraud in a cellular telephone system
First Claim
1. A system for the detection of repeat wireless telephone fraud, the system comprising:
- signature analysis means for identifying a particular wireless telephone a fraudulent based on an initial telephone transmission from said fraudulent wireless telephone;
a timer to determine a time at which said initial telephone transmission from said fraudulent wireless telephone occurred;
an identification storage area to store an identification number transmitted by said fraudulent wireless telephone;
an origin data storage area to store data related to a place of origin of said initial telephone transmission from said fraudulent wireless telephone;
a destination data storage area to store destination data associated with an intended recipient of said initial telephone transmission from said fraudulent wireless telephone; and
a processor to analyze a subsequent telephone call from an unauthenticated wireless telephone, said processor denying said subsequent telephone call if said subsequent telephone call is placed within a predetermined period of time from said time of said initial telephone transmission, if a transmitted identification from said unauthenticated wireless telephone matches said stored identification number, if a place of origin of said subsequent telephone call matches said stored place of origin, and if destination data associated with an intended recipient of said subsequent telephone transmission from said unauthenticated wireless telephone matches said stored destination data.
1 Assignment
0 Petitions
Accused Products
Abstract
A system analyzes telephone calls that have been determined by signature analysis to be fraudulent and stores parameter data associated with the fraudulent cell phone. During subsequent cell phone calls, the system compares the stored parameter data associated with the fraudulent cell phone to corresponding parameters from a subsequent call to determine whether the subsequent call is from the fraudulent cellular telephone. In this manner, the system may reject subsequent cellular telephone calls as fraudulent without the need for time consuming signature analysis. Parameters analyzed by the system can include the time of day of the fraudulent call, the origin from which the fraudulent call was placed, the transmitted identification numbers of the fraudulent telephone, and the destination telephone number of the fraudulent call. The system can analyze one or more of these parameters in combination to determine that the subsequent call is fraudulent.
-
Citations
26 Claims
-
1. A system for the detection of repeat wireless telephone fraud, the system comprising:
-
signature analysis means for identifying a particular wireless telephone a fraudulent based on an initial telephone transmission from said fraudulent wireless telephone; a timer to determine a time at which said initial telephone transmission from said fraudulent wireless telephone occurred; an identification storage area to store an identification number transmitted by said fraudulent wireless telephone; an origin data storage area to store data related to a place of origin of said initial telephone transmission from said fraudulent wireless telephone; a destination data storage area to store destination data associated with an intended recipient of said initial telephone transmission from said fraudulent wireless telephone; and a processor to analyze a subsequent telephone call from an unauthenticated wireless telephone, said processor denying said subsequent telephone call if said subsequent telephone call is placed within a predetermined period of time from said time of said initial telephone transmission, if a transmitted identification from said unauthenticated wireless telephone matches said stored identification number, if a place of origin of said subsequent telephone call matches said stored place of origin, and if destination data associated with an intended recipient of said subsequent telephone transmission from said unauthenticated wireless telephone matches said stored destination data.
-
-
2. A system for the detection of repeat wireless telephone fraud, the system comprising:
-
signature analysis means for identifying a particular wireless telephone as fraudulent based on an initial telephone transmission from said fraudulent wireless telephone; a timer to determine a time at which said initial telephone transmission from said fraudulent wireless telephone occurred; an identification storage area to store an identification number transmitted by said fraudulent wireless telephone; an origin data storage area to store data related to a place of origin of said initial telephone transmission from said fraudulent wireless telephone; and a processor to analyze a subsequent telephone communication with an unauthenticated cellular telephone, said processor denying said subsequent communication if said subsequent communication occurs within a predetermined period of time from said time of said initial telephone transmission, if a transmitted identification from said unauthenticated cellular telephone matches said stored identification number, and if a place of origin of said unauthenticated cellular telephone matches said stored place of origin.
-
-
3. A system for the detection of repeat wireless telephone fraud, the system comprising:
-
signature analysis means for identifying a particular wireless telephone as fraudulent based on an initial telephone transmission from said fraudulent wireless telephone; a storage area to store one or more parameters associated with said fraudulent wireless telephone; and a processor to receive one or more parameters associated with an unauthenticated wireless telephone having a wireless communication subsequent to said initial telephone transmission, said processor denying said subsequent communication if said one or more parameters associated with said unauthenticated wireless telephone match said stored one or more parameters. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for the detection of repeat wireless telephone fraud, the method comprising the steps of:
-
identifying a particular wireless telephone as fraudulent based on signature analysis of an initial telephone transmission from said fraudulent wireless telephone; storing one or more parameters associated with said fraudulent wireless telephone; receiving one or more parameters associated with a communication with an unauthenticated wireless telephone subsequent to said initial telephone transmission; and denying said subsequent communication if said one or more parameters associated with said unauthenticated wireless telephone match said stored one or more parameters. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification