System and method for detection of fraud in a wireless telephone system
First Claim
1. A system for the detection of wireless telephone fraud, the system comprising:
- a signature analyzer to classify an unauthenticated wireless telephone as authorized or fraudulent based on a transmission characteristic of said unauthenticated wireless telephone in a communication with said unauthenticated wireless telephone;
an origin data storage area to store data related to a place of origin of a particular wireless telephone for each of a plurality of different communications with said particular wireless telephone classified by said signature analyzer as said authorized wireless telephone;
a timer to determine a time period associated with each of said plurality of different communications with said authorized wireless telephone;
a time storage area to store said time period in association with each of said plurality of different communications; and
a decision engine to analyze a communication with an unauthenticated wireless telephone classified by said signature analyzer as said fraudulent wireless telephone at a time subsequent to said plurality of different communications with said authorized wireless telephone, said decision engine designating said subsequent communication as valid regardless of whether said signature analyzer identified said unauthenticated wireless telephone as said fraudulent wireless telephone if a place of origin of said subsequent communication matches one of said places of origin in said origin data storage area and if a time period of said subsequent communication matches one of said time periods in said time storage area.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for the detection of fraudulent use of a wireless telephone system includes a signature analyzer to analyze the transmission characteristic of an unauthenticated transmitter. If the system authenticates the transmitter, based on stored records, the system establishes a customer call profile, based on the geographical location of the wireless telephone at the time of the calls, as well as a time period in which the communication occurs. The system uses these records to establish a customer call profile. The system analyzes a subsequent call and the customer call profile to designate the subsequent call as valid or invalid. The system overrides the decision of the signature analyzer that a particular unauthenticated wireless telephone is fraudulent if the values for call parameters of the subsequent call are sufficiently close to the corresponding parameter values in the customer call profile. The system is adaptive in that old call data records are periodically deleted, thus allowing their replacement with newer call data records.
105 Citations
32 Claims
-
1. A system for the detection of wireless telephone fraud, the system comprising:
-
a signature analyzer to classify an unauthenticated wireless telephone as authorized or fraudulent based on a transmission characteristic of said unauthenticated wireless telephone in a communication with said unauthenticated wireless telephone; an origin data storage area to store data related to a place of origin of a particular wireless telephone for each of a plurality of different communications with said particular wireless telephone classified by said signature analyzer as said authorized wireless telephone; a timer to determine a time period associated with each of said plurality of different communications with said authorized wireless telephone; a time storage area to store said time period in association with each of said plurality of different communications; and a decision engine to analyze a communication with an unauthenticated wireless telephone classified by said signature analyzer as said fraudulent wireless telephone at a time subsequent to said plurality of different communications with said authorized wireless telephone, said decision engine designating said subsequent communication as valid regardless of whether said signature analyzer identified said unauthenticated wireless telephone as said fraudulent wireless telephone if a place of origin of said subsequent communication matches one of said places of origin in said origin data storage area and if a time period of said subsequent communication matches one of said time periods in said time storage area.
-
-
2. A system for the processing of wireless telephone communications, the system comprising:
-
a signature analyzer to classify an unauthenticated wireless telephone as authorized or fraudulent based on a transmission characteristic associated with said unauthenticated wireless telephone; a parameter data storage area to store data for one or more parameters which are unrelated to transmission characteristics and which are associated with each of a plurality of different communications with a particular wireless telephone classified by said signature analyzer as an authorized wireless telephone; a data storage area to store data for one or more corresponding parameters associated with a subsequent communication with an unauthenticated wireless telephone at a time subsequent to said plurality of different communications with said authorized wireless telephone; and a decision engine to analyze said subsequent communication with said unauthenticated wireless telephone classified by said signature analyzer as fraudulent, said decision engine designating said subsequent communication as valid based on said data for one or more stored parameters and said data for one or more corresponding parameters irrespective of the classification by said signature analyzer to thereby reduce false rejections by said signature analyzer.
-
-
3. A system for the processing of wireless telephone communications, the system comprising:
-
a signature analyzer to classify an unauthenticated wireless telephone as authorized or fraudulent based on a transmission characteristic of said unauthenticated wireless telephone in a communication with said unauthenticated wireless telephone; a parameter data storage area to store data for one or more parameters associated with each of a plurality of different communications with a particular wireless telephone classified by said signature analyzer as an authorized wireless telephone, said parameter data storage area also storing data for one or more corresponding parameters associated with a communication with an unauthenticated wireless telephone at a time subsequent to said plurality of different communications with said authorized wireless telephone; and a decision engine to analyze said subsequent communication with said unauthenticated wireless telephone classified by said signature analyzer as fraudulent, said decision engine designating said subsequent communication as valid based on said signature analyzer classification, said data for one or more parameters, and said data for one or more corresponding parameters. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for the processing of wireless telephone communications, the system comprising:
-
a signature analyzer to classify an unauthenticated wireless telephone as authorized or fraudulent based on a transmission characteristic of said unauthenticated wireless telephone in a communication with said unauthenticated wireless telephone; a data storage area to store customer profile data associated with a plurality of different communications with a particular wireless telephone classified by said signature analyzer as an authorized wireless telephone; and a decision engine to analyze a subsequent communication with an unauthenticated wireless telephone at a time subsequent to said plurality of different communications with said authorized wireless telephone when said unauthenticated wireless telephone in said subsequent communication has been classified as fraudulent by said signature analyzer, said decision engine alternatively designating said subsequent communication as valid or invalid based on said customer profile data. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A method for the processing of wireless telephone communications, the method comprising:
-
classifying an unauthenticated wireless telephone as authorized or fraudulent based on a transmission characteristic of said unauthenticated wireless telephone; storing customer profile data associated with a plurality of different communications with a particular wireless telephone classified as an authorized wireless telephone; classifying a subsequent communication with an unauthenticated wireless telephone at a time subsequent to said plurality of different communications with said authorized wireless telephone to designate said unauthenticated wireless telephone as fraudulent based on said transmission characteristic of said unauthenticated wireless telephone during said subsequent communication; and analyzing said subsequent communication and designating said subsequent communication with said unauthenticated wireless telephone as valid or invalid based on said customer profile data irrespective of said classification of said wireless telephone as fraudulent based on said transmission characteristic of said wireless telephone during said subsequent communication. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A method for the processing of wireless telephone calls, the method comprising:
-
storing customer profile data associated with a plurality of different calls with a particular wireless telephone that has been classified as an authorized wireless telephone in each of said plurality of different calls based on a transmission characteristic of said particular wireless telephone in each of said plurality of different calls; classifying a subsequent call with an unauthenticated wireless telephone at a time subsequent to said plurality of different calls with said authorized wireless telephone to designate said unauthenticated wireless telephone as fraudulent based on said transmission characteristic of said unauthenticated wireless telephone during said subsequent call; and analyzing said subsequent call with respect to said customer profile data and overriding said fraudulent classification to classify said unauthenticated wireless telephone as said authorized wireless telephone irrespective of said classification of said wireless telephone as fraudulent based on said transmission characteristic of said wireless telephone during said subsequent communication.
-
Specification