System and method for detection of fraud in a wireless telephone system
First Claim
1. A system for the authorization of a present telephone communication with a wireless telephone in a wireless telephone system, the authorization system comprising:
- a signature analyzer to classify an unauthenticated wireless telephone as an authorized wireless telephone or a fraudulent wireless telephone based on analysis of a transmission characteristic of the unauthenticated wireless telephone detected during the present communication with the unauthenticated wireless telephone, the signature analyzer calculating a first data value indicative of a similarity with which the transmission characteristic of the unauthenticated wireless telephone matches a stored reference characteristic, and a first confidence value indicative of a measure of reliability of the first calculated data value;
a soft analyzer receiving and analyzing the first calculated data value and first confidence value from the signature analyzer to determine a likelihood that the present communication is a valid communication with the authorized wireless telephone or an invalid communication with the fraudulent wireless telephone, the soft analyzer generating a first authorization signal having a first binary level if the analysis determines that the present communication is the valid communication and a second binary level different from the first binary level if the analysis determines that the present communication is the invalid communication;
a deterministic analyzer analyzing the present communication in a deterministic fashion to determine if the present communication with the unauthenticated wireless telephone is the valid communication or the invalid communication, the deterministic analyzer generating a second authorization signal at a third binary level if the deterministic analyzer determines that the present communication is the valid communication and a fourth binary level different from the third binary level if the deterministic analyzer determines that the present communication is the invalid communication, the soft analyzer analyzing the first calculated data value and the first confidence value independently of the analysis by the deterministic analyzer; and
a combinatorial logic unit to combine the first and second authorization signals and generate an output signal at a fifth binary level to authorize the present communication only if the first and second authorization signals are both at the first and third binary levels, respectively, and generating the output signal at a sixth binary level different from the fifth binary level if either of the first and second authorization signals is at the second and fourth binary levels, respectively, to cause termination of the present communication as the invalid communication, the logic unit generating the output signal at the sixth binary level to cause termination of the present communication as the invalid communication regardless of the analysis by the soft analyzer if the deterministic analyzer determines that the present communication is the invalid communication.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for combining the results of different analysis portions to produce a single YES/NO decision regarding the validity of a present cellular telephone call. A soft data analysis portion of the system analyzes soft data, such as the results of a signature analyzer and a customer call profile and determines the likelihood that the particular call is a valid call from an authorized cellular telephone or an invalid call from a fraudulent cellular telephone. In addition, the system performs a deterministic analysis of the particular phone call to independently designate the particular phone call as valid or invalid. The outputs from the deterministic analyzer and the soft data analyzer portion are combined in a combinatorial logic circuit to produce a single binary output having one logic level for valid calls from the authorized cellular telephone and the opposite logic level for invalid calls from the fraudulent cellular telephone. In addition, the deterministic analyzer may include a control line to override the decision of the soft analyzer to permit calls to designated numbers, such as emergency numbers, even if the independent analysis indicates that the particular call is invalid. In one embodiment, the soft data analyzer portion is a fuzzy logic classifier receiving data inputs and confidence values from the various soft data portions of the system. The fuzzy logic classifier combines the various soft data inputs to produce a single binary output. A sensitivity input is used to vary the threshold of the binary output. The binary output of the fuzzy logic analyzer is combined with the outputs of the deterministic analyzer by the combinatorial logic circuit.
129 Citations
43 Claims
-
1. A system for the authorization of a present telephone communication with a wireless telephone in a wireless telephone system, the authorization system comprising:
-
a signature analyzer to classify an unauthenticated wireless telephone as an authorized wireless telephone or a fraudulent wireless telephone based on analysis of a transmission characteristic of the unauthenticated wireless telephone detected during the present communication with the unauthenticated wireless telephone, the signature analyzer calculating a first data value indicative of a similarity with which the transmission characteristic of the unauthenticated wireless telephone matches a stored reference characteristic, and a first confidence value indicative of a measure of reliability of the first calculated data value; a soft analyzer receiving and analyzing the first calculated data value and first confidence value from the signature analyzer to determine a likelihood that the present communication is a valid communication with the authorized wireless telephone or an invalid communication with the fraudulent wireless telephone, the soft analyzer generating a first authorization signal having a first binary level if the analysis determines that the present communication is the valid communication and a second binary level different from the first binary level if the analysis determines that the present communication is the invalid communication; a deterministic analyzer analyzing the present communication in a deterministic fashion to determine if the present communication with the unauthenticated wireless telephone is the valid communication or the invalid communication, the deterministic analyzer generating a second authorization signal at a third binary level if the deterministic analyzer determines that the present communication is the valid communication and a fourth binary level different from the third binary level if the deterministic analyzer determines that the present communication is the invalid communication, the soft analyzer analyzing the first calculated data value and the first confidence value independently of the analysis by the deterministic analyzer; and a combinatorial logic unit to combine the first and second authorization signals and generate an output signal at a fifth binary level to authorize the present communication only if the first and second authorization signals are both at the first and third binary levels, respectively, and generating the output signal at a sixth binary level different from the fifth binary level if either of the first and second authorization signals is at the second and fourth binary levels, respectively, to cause termination of the present communication as the invalid communication, the logic unit generating the output signal at the sixth binary level to cause termination of the present communication as the invalid communication regardless of the analysis by the soft analyzer if the deterministic analyzer determines that the present communication is the invalid communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for the authorization of a present telephone communication with an unauthenticated wireless telephone in a wireless telephone system based on soft data generated by analysis of characteristics of the unauthenticated wireless telephone with respect to stored characteristics associated with an authorized wireless telephone and based on deterministic data generated by analysis of characteristics of the present communication, the authorization system comprising:
-
a soft analyzer to receive and analyze the soft data to determine a likelihood that the present communication is a valid communication with the authorized wireless telephone or an invalid communication with a fraudulent wireless telephone, the soft analyzer generating a first authorization signal at a first binary level if the analysis determines that the present communication is the valid communication and at a second binary level different from the first binary level if the analysis determines that the present communication is the invalid communication; a deterministic analyzer to receive and analyze the deterministic data to determine if the present communication with the unauthenticated wireless telephone is the valid communication or the invalid communication, the deterministic analyzer generating a second authorization signal at a third binary level if the deterministic analyzer determines that the present communication is the valid communication and a fourth binary level different from the third binary level if the deterministic analyzer determines that the present communication is the invalid communication, the soft analyzer analyzing the soft data independently of the analysis by the deterministic analyzer; and a combinatorial logic unit to combine the first and second authorization signals and generate an output signal at a fifth binary level to authorize the present communication only if the first and second authorization signals are both at the first and third binary levels, respectively, and generating the output signal at a sixth binary level different from the fifth binary level if either of the first and second authorization signals is at the second and fourth binary levels, respectively, to cause termination of the present communication as the invalid communication, the logic unit generating the output signal at the sixth binary level to cause termination of the present communication as the invalid communication regardless of the analysis by the soft analyzer if the deterministic analyzer determines that the present communication is the invalid communication. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for the authorization of a present telephone communication with a wireless telephone in a wireless telephone system, the authorization system comprising:
-
a signature analyzer to classify an unauthenticated wireless telephone as an authorized wireless telephone or a fraudulent wireless telephone based on analysis of a transmission characteristic of the unauthenticated wireless telephone detected during the present communication with the unauthenticated wireless telephone, the signature analyzer calculating a first data value indicative of a similarity with which the transmission characteristic of the unauthenticated wireless telephone matches a stored reference characteristic, and a first confidence value indicative of a measure of reliability of the first calculated data value; a fuzzy logic classifier receiving and analyzing the first calculated data value and first confidence value from the signature analyzer to determine a likelihood that the present communication is a valid communication with the authorized wireless telephone or an invalid communication with the fraudulent wireless telephone, the fuzzy logic classifier generating a first authorization signal having a first binary level if the analysis determines that the present communication is the valid communication and a second binary level different from the first binary level if the analysis determines that the present communication is the invalid communication; a deterministic analyzer analyzing the present communication in a deterministic fashion to determine if the present communication with the unauthenticated wireless telephone is the valid communication or the invalid communication, the deterministic analyzer generating a second authorization signal at a third binary level if the deterministic analyzer determines that the present communication is the valid communication and a fourth binary level different from the third binary level if the deterministic analyzer determines that the present communication is the invalid communication, the fuzzy logic classifier analyzing the first calculated data value and the first confidence value independently of the analysis by the deterministic analyzer; and a combinatorial logic unit to combine the first and second authorization signals and generate an output signal at a fifth binary level to authorize the present communication only if the first and second authorization signals are both at the first and third binary levels, respectively, and generating the output signal at a sixth binary level different from the fifth binary level if either of the first and second authorization signals is at the second and fourth binary levels, respectively, to cause termination of the present communication as the invalid communication, the logic unit generating the output signal at the sixth binary level to cause termination of the present communication as the invalid communication regardless of the analysis by the fuzzy logic classifier if the deterministic analyzer determines that the present communication is the invalid communication.
-
-
21. A system for the authorization of a present telephone communication with an unauthenticated wireless telephone in a wireless telephone system based on soft data generated by analysis of characteristics of the unauthenticated wireless telephone with respect to stored characteristics associated with an authorized wireless telephone and based on deterministic data generated by analysis of characteristics of the present communication, the authorization system comprising:
-
a fuzzy logic classifier to receive and analyze the soft data to determine a likelihood that the present communication is a valid communication with the authorized wireless telephone or an invalid communication with a fraudulent wireless telephone, the fuzzy logic classifier generating a first authorization signal at a first binary level if the analysis determines that the present communication is the valid communication and at a second binary level different from the first binary level if the analysis determines that the present communication is the invalid communication; a deterministic analyzer to receive and analyze the deterministic data to determine if the present communication with the unauthenticated wireless telephone is the valid communication or the invalid communication, the deterministic analyzer generating a second authorization signal at a third binary level if the deterministic analyzer determines that the present communication is the valid communication and a fourth binary level different from the third binary level if the deterministic analyzer determines that the present communication is the invalid communication, the fizzy logic classifier analyzing the soft data independently of the analysis by the deterministic analyzer; and a combinatorial logic unit to combine the first and second authorization signals and generate an output signal at a fifth binary level to authorize the present communication only if the first and second authorization signals are both at the first and third binary levels, respectively, and generating the output signal at a sixth binary level different from the fifth binary level if either of the first and second authorization signals is at the second and fourth binary levels, respectively, to cause termination of the present communication as the invalid communication, the logic unit generating the output signal at the sixth binary level to cause termination of the present communication as the invalid communication regardless of the analysis by the fuzzy logic classifier if the deterministic analyzer determines that the present communication is the invalid communication. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A system for the authorization of a present telephone communication with an unauthenticated wireless telephone in a wireless telephone system based on soft data generated by analysis of characteristics of the unauthenticated wireless telephone with respect to stored characteristics associated with an authorized wireless telephone and based on deterministic data generated by analysis of characteristics of the present communication, the authorization system comprising:
-
a first analyzer to receive and analyze the soft data to determine a likelihood that the present communication is a valid communication with the authorized wireless telephone or an invalid communication with a fraudulent wireless telephone, the first analyzer generating a first authorization signal at a first binary level if the first analyzer determines that the present communication is the valid communication and at a second binary level different from the first binary level if the first analyzer determines that the present communication is the invalid communication; a second analyzer to receive and analyze the deterministic data to determine if the present communication with the unauthenticated wireless telephone is the valid communication or the invalid communication, the second analyzer generating a second authorization signal at a third binary level if the second analyzer determines that the present communication is the valid communication and a fourth binary level different from the third binary level if the second analyzer determines that the present communication is the invalid communication, the first analyzer analyzing the soft data independently of the analysis by the second analyzer; and a combinatorial logic unit to combine the first and second authorization signals and generate an output signal at a fifth binary level to authorize the present communication only if the first and second authorization signals are both at the first and third binary levels, respectively, and generating the output signal at a sixth binary level different from the fifth binary level if either of the first and second authorization signals is at the second and fourth binary levels, respectively, to cause termination of the present communication as the invalid communication, the logic unit generating the output signal at the sixth binary level to cause termination of the present communication as the invalid communication regardless of the analysis by the first analyzer if the second analyzer determines that the present communication is the invalid communication. - View Dependent Claims (30, 31, 32)
-
-
33. A method for the authorization of a present telephone communication with an unauthenticated wireless telephone in a wireless telephone system based on soft data generated by analysis of characteristics of the unauthenticated wireless telephone with respect to stored characteristics associated with an authorized wireless telephone and based on deterministic data generated by analysis of characteristics of the present communication, the authorization method comprising the steps of:
-
analyzing the soft data to determine a likelihood that the present communication is a valid communication with the authorized wireless telephone or an invalid communication with a fraudulent wireless telephone; generating a first authorization signal at a first binary level if the step of analyzing the soft data determines that the present communication is the valid communication and at a second binary level different from the first binary level if the step of analyzing the soft data determines that the present communication is the invalid communication; analyzing the deterministic data to determine if the present communication with the unauthenticated wireless telephone is the valid communication or the invalid communication; generating a second authorization signal at a third binary level if the step of analyzing the deterministic data determines that the present communication is the valid communication and at a fourth binary level different from the third binary level if the step of analyzing the deterministic data determines that the present communication is the invalid communication, wherein the steps of analyzing the soft data and generating the first authorization signal occur independently of the steps of analyzing the deterministic data and generating the second authorization signal; and combining the first and second authorization signals to generate an output signal at a fifth binary level to authorize the present communication only if the first and second authorization signals are both at the first and third binary levels, respectively, and to generate the output signal at a sixth binary level different from the fifth binary level if either of the first and second authorization signals is at the second and fourth binary levels, respectively, to cause termination of the present communication as the invalid communication, wherein the step of combining to generate the output signal at the sixth binary level occurs regardless of the binary level of the first authorization signal if the step of analyzing the deterministic data determines that the present communication is the invalid communication. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
Specification