Method and apparatus for fraud control in cellular telephone systems
First Claim
Patent Images
1. A method of identifying valid or fraudulent RF signatures of phones in a cellular telephone system, comprising the steps of:
- (a) identifying relative valid or fraud probabilities using call records from the cellular telephone system;
(b) associating the calls with corresponding-radio frequency (RF) signatures; and
(c) identifying the radio frequency signatures as being fraudulent or valid based on the relative fraud probabilities for the associated calls.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for fraud control in cellular telephone systems. The invention identifies relative fraud probabilities for call records from the cellular telephone system, associates the call records with radio frequency (RF) signatures, and identifies the radio frequency signatures as being fraudulent or valid based on the relative fraud probabilities for the associated call records.
-
Citations
22 Claims
-
1. A method of identifying valid or fraudulent RF signatures of phones in a cellular telephone system, comprising the steps of:
-
(a) identifying relative valid or fraud probabilities using call records from the cellular telephone system; (b) associating the calls with corresponding-radio frequency (RF) signatures; and (c) identifying the radio frequency signatures as being fraudulent or valid based on the relative fraud probabilities for the associated calls. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus for identifying valid or fraudulent phones in a cellular telephone system, comprising:
-
a computer system coupled to a switch in the cellular telephone system, the computer system including means for; (1) identifying relative valid or fraud probabilities using call records received from the switch in the cellular telephone system; (2) associating the call with corresponding radio frequency (RF) signatures; and (3) identifying the radio frequency signatures as being fraudulent or valid based on the relative fraud probabilities for the associated calls. - View Dependent Claims (19, 20, 21, 22)
-
Specification