Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint analysis
First Claim
1. A method of preventing fraudulent calls by users of a wireless telephone system including a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone using a first threshold for the fingerprint analysis, the method comprising the steps of:
- maintaining a plurality of locally valid data, each locally valid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be valid for the corresponding specific authorized wireless telephone;
maintaining a suspicious data containing at least one destination considered to be called by fraudulent wireless telephones;
receiving from an unauthenticated wireless telephone a call request containing a designated destination and identifying an authorized wireless telephone;
determining whether the designated destination is in the locally valid data corresponding to the identified authorized wireless telephone;
classifying the call as valid when the designated destination is determined to be in the corresponding locally valid data regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as fraudulent;
determining whether the designated destination is in the suspicious data; and
when the designated destination is determined to be in the suspicious data, performing a fingerprint analysis by the fingerprint analyzer using a second threshold higher than the first threshold to require an increased matching between the transmission characteristic of the unauthenticated wireless telephone and the stored fingerprint of the identified authorized wireless telephone in order to identify the unauthenticated wireless telephone as authorized.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for the detection of fraudulent use of a wireless telephone system includes a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint of the unauthenticated wireless telephone. The system maintains a valid destination list specific for each authorized wireless telephone. Each valid destination list contains destinations considered to be valid for that particular authorized wireless telephone. When an unauthenticated wireless telephone transmits a call request containing a destination, the system classifies the call as valid when the destination is in the valid destination list for the authorized wireless telephone regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as fraudulent. The system may bypass or terminate the fingerprint analysis, or simply ignore the result of the fingerprint analysis by the fingerprint analyzer. The system also maintains an invalid destination list specific for each authorized wireless telephone with destinations considered to be invalid for that particular authorized wireless telephone. Calls to such destinations are blocked. The system further maintains a suspicious destination list containing destinations considered to be potentially fraudulent. When the destination contained in the call request is in the suspicious destination list, the fingerprint analysis is performed with a higher threshold to require a closer match between a fingerprint of the unauthenticated wireless telephone and a stored fingerprint of the corresponding authorized wireless telephone.
103 Citations
63 Claims
-
1. A method of preventing fraudulent calls by users of a wireless telephone system including a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone using a first threshold for the fingerprint analysis, the method comprising the steps of:
-
maintaining a plurality of locally valid data, each locally valid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be valid for the corresponding specific authorized wireless telephone; maintaining a suspicious data containing at least one destination considered to be called by fraudulent wireless telephones; receiving from an unauthenticated wireless telephone a call request containing a designated destination and identifying an authorized wireless telephone; determining whether the designated destination is in the locally valid data corresponding to the identified authorized wireless telephone; classifying the call as valid when the designated destination is determined to be in the corresponding locally valid data regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as fraudulent; determining whether the designated destination is in the suspicious data; and when the designated destination is determined to be in the suspicious data, performing a fingerprint analysis by the fingerprint analyzer using a second threshold higher than the first threshold to require an increased matching between the transmission characteristic of the unauthenticated wireless telephone and the stored fingerprint of the identified authorized wireless telephone in order to identify the unauthenticated wireless telephone as authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of preventing fraudulent calls by users of a wireless telephone system including a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone using a first threshold for the fingerprint analysis, the method comprising the steps of:
-
maintaining a suspicious data containing at least one destination considered to be called by fraudulent wireless telephones; receiving from an unauthenticated wireless telephone a call request containing a designated destination and identifying an authorized wireless telephone; determining whether the designated destination is in the suspicious data; and when the designated destination is determined to be in the suspicious data, performing a fingerprint analysis by the fingerprint analyzer using a second threshold higher than the first threshold to require an increased matching between the transmission characteristic of the unauthenticated wireless telephone and the stored fingerprint of the identified authorized wireless telephone in order to identify the unauthenticated wireless telephone as authorized. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method of preventing fraudulent calls by users of a wireless telephone system including a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone, the method comprising the steps of:
-
maintaining a plurality of locally valid data, each locally valid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be valid for the corresponding specific authorized wireless telephone; maintaining a plurality of locally invalid data, each locally invalid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be invalid for the corresponding specific authorized wireless telephone; receiving from an unauthenticated wireless telephone a call request containing a designated destination and identifying an authorized wireless telephone; determining whether the designated destination is in the locally valid data corresponding to the identified authorized wireless telephone; classifying the call as valid when the designated destination is determined to be in the corresponding locally valid data regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as fraudulent; determining whether the designated destination is in the locally invalid data corresponding to the identified authorized wireless telephone; and classifying the call as invalid when the designated destination is determined to be in the corresponding locally invalid data regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as authorized. - View Dependent Claims (16, 17, 18)
-
-
19. A method of preventing fraudulent calls by users of a wireless telephone system including a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone, the method comprising the steps of:
-
maintaining a plurality of locally valid data, each locally valid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be valid for the corresponding specific authorized wireless telephone; receiving from an unauthenticated wireless telephone a call request containing a designated destination and identifying an authorized wireless telephone; determining whether the designated destination is in the locally valid data corresponding to the identified authorized wireless telephone; and classifying the call as valid when the designated destination is determined to be in the corresponding locally valid data regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as fraudulent. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A method of preventing fraudulent calls by users of a wireless telephone system including a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone using a selected threshold for the fingerprint analysis, the method comprising the steps of:
-
maintaining a plurality of locally valid data, each locally valid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be valid for the corresponding specific authorized wireless telephone; maintaining a suspicious data containing at least one destination considered to be called by fraudulent wireless telephones; receiving from an unauthenticated wireless telephone a call request containing a designated destination and identifying an authorized wireless telephone; determining whether the designated destination is in the locally valid data corresponding to the identified authorized wireless telephone; setting a first threshold different from the selected threshold if the designated destination is determined to be in the corresponding locally valid data; determining whether the designated destination is in the suspicious data; setting a second threshold different from the selected threshold if the designated destination is determined to be in the suspicious data; and performing a fingerprint analysis by the fingerprint analyzer using the first threshold if the designated destination is determined to be in the corresponding locally valid data and using the second threshold if the designated destination is determined to be in the suspicious data, with the first and second thresholds each being selected to require a corresponding selected matching between the transmission characteristic of the unauthenticated wireless telephone and the stored fingerprint of the identified authorized wireless telephone in order to identify the unauthenticated wireless telephone as authorized. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method of preventing fraudulent calls by users of a wireless telephone system including a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone using a selected threshold for the fingerprint analysis, the method comprising the steps of:
-
maintaining a suspicious data containing at least one destination considered to be called by fraudulent wireless telephones; receiving from an unauthenticated wireless telephone a call request containing a designated destination and identifying an authorized wireless telephone; determining whether the designated destination is in the suspicious data; setting a first threshold different from the selected threshold if the designated destination is determined to be in the suspicious data; and performing a fingerprint analysis by the fingerprint analyzer using the first threshold if the designated destination is determined to be in the suspicious data, with the first threshold being selected to require a corresponding selected matching between the transmission characteristic of the unauthenticated wireless telephone and the stored fingerprint of the identified authorized wireless telephone in order to identify the unauthenticated wireless telephone as authorized. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A method of preventing fraudulent calls by users of a wireless telephone system including a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone using a selected threshold for the fingerprint analysis, the method comprising the steps of:
-
maintaining a plurality of locally valid data, each locally valid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be valid for the corresponding specific authorized wireless telephone; maintaining a plurality of locally invalid data, each locally invalid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be invalid for the corresponding specific authorized wireless telephone; receiving from an unauthenticated wireless telephone a call request containing a designated destination and identifying an authorized wireless telephone; determining whether the designated destination is in the locally valid data corresponding to the identified authorized wireless telephone; setting a first threshold different from the selected threshold if the designated destination is determined to be in the corresponding locally valid data; determining whether the designated destination is in the locally invalid data corresponding to the identified authorized wireless telephone; setting a second threshold different from the selected threshold if the designated destination is determined to be in the corresponding locally invalid data; and performing a fingerprint analysis by the fingerprint analyzer using the first threshold if the designated destination is determined to be in the corresponding locally valid data and using the second threshold if the designated destination is determined to be in the corresponding locally invalid data, with the first and second thresholds each being selected to require a corresponding selected matching between the transmission characteristic of the unauthenticated wireless telephone and the stored fingerprint of the identified authorized wireless telephone in order to identify the unauthenticated wireless telephone as authorized. - View Dependent Claims (45, 46, 47, 48, 49)
-
-
50. A method of preventing fraudulent calls by users of a wireless telephone system including a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone using a selected threshold for the fingerprint analysis, the method comprising the steps of:
-
maintaining a plurality of locally valid data, each locally valid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be valid for the corresponding specific authorized wireless telephone; receiving from an unauthenticated wireless telephone a call request containing a designated destination and identifying an authorized wireless telephone; determining whether the designated destination is in the locally valid data corresponding to the identified authorized wireless telephone; setting a first threshold different from the selected threshold if the designated destination is determined to be in the corresponding locally valid data; and performing a fingerprint analysis by the fingerprint analyzer using the first threshold if the designated destination is determined to be in the corresponding locally valid data, with the first threshold being selected to require a corresponding selected matching between the transmission characteristic of the unauthenticated wireless telephone and the stored fingerprint of the identified authorized wireless telephone in order to identify the unauthenticated wireless telephone as authorized. - View Dependent Claims (51, 52, 53, 54, 55)
-
-
56. A system for preventing fraudulent calls by users of a wireless telephone network comprising:
-
a storage device operable to store a designated destination contained in a call request from an unauthenticated wireless telephone, the storage device operable to store a plurality of locally valid data, each locally valid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be valid for the corresponding specific authorized wireless telephone; a fingerprint analyzer that identifies the unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone; and a processor connected to the fingerprint analyzer and the storage device, and operable to determine whether the designated destination is in the locally valid data for the corresponding authorized wireless telephone and to classify the call as valid when the designated destination is determined to be in the corresponding locally valid data regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as fraudulent. - View Dependent Claims (57, 58, 59, 60, 61)
-
-
62. A system for preventing fraudulent calls by users of a wireless telephone network, comprising:
-
a storage device operable to store a designated destination contained in a call request from an unauthenticated wireless telephone, the storage device operable to store a suspicious data containing at least one destination considered to be called by fraudulent wireless telephones; a fingerprint analyzer that identifies the unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone using a first threshold and a second threshold higher than the first threshold to require an increased matching between the transmission characteristic of the unauthenticated wireless telephone and the stored fingerprint of the corresponding authorized wireless telephone; and a processor connected to the fingerprint analyzer and the storage device, and operable to determine whether the designated destination is in the suspicious data and to execute through the fingerprint analyzer a fingerprint analysis using the second threshold when the designated destination is determined to be in the suspicious data.
-
-
63. A system for preventing fraudulent calls in a wireless telephone system comprising:
-
a storage device operable to store a designated destination contained in a call request from an unauthenticated wireless telephone, the storage device operable to store a suspicious data containing at least one destination considered to be called by fraudulent wireless telephones and to store a plurality of locally invalid data, each locally invalid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be invalid for the corresponding specific authorized wireless telephone; a fingerprint analyzer that identifies the unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone using a first threshold and a second threshold higher than the first threshold to require an increased matching between the transmission characteristic of the unauthenticated wireless telephone and the stored fingerprint of the corresponding authorized wireless telephone; and a processor connected to the fingerprint analyzer and the storage device, and operable to determine whether the designated destination is in the suspicious data or the locally invalid data for the corresponding authorized wireless telephone and to execute through the fingerprint analyzer a fingerprint analysis using the second threshold when the designated destination is determined to be in the suspicious data, the processor operable to classify the call as invalid when the designated destination is determined to be in the locally invalid data for the corresponding authorized wireless telephone regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as authorized.
-
Specification