Method and apparatus for fraud control in cellular telephone systems
First Claim
Patent Images
1. A method of identifying a fraudulent RF signature of a cellular telephone in a cellular telephone system, comprising:
- (a) comparing a call made by the cellular telephone with call records of the cellular telephone system;
(b) assigning a fraud probability to the call based on the comparison of the call with the call records;
(c) associating the fraud probability of the call with a radio frequency (RF) signature of the cellular telephone; and
(d) identifying the RF signature of the cellular telephone as being fraudulent or valid based on the associated fraud probability of the call.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for fraud control in cellular telephone systems. The invention identifies relative fraud probabilities for call records from the cellular telephone system, associates the call records with radio frequency (RF) signatures, and identifies the radio frequency signatures as being fraudulent or valid based on the relative fraud probabilities for the associated call records.
-
Citations
23 Claims
-
1. A method of identifying a fraudulent RF signature of a cellular telephone in a cellular telephone system, comprising:
-
(a) comparing a call made by the cellular telephone with call records of the cellular telephone system;
(b) assigning a fraud probability to the call based on the comparison of the call with the call records;
(c) associating the fraud probability of the call with a radio frequency (RF) signature of the cellular telephone; and
(d) identifying the RF signature of the cellular telephone as being fraudulent or valid based on the associated fraud probability of the call. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
(e) comparing the RF signature of the cellular telephone to RF signatures identified as fraudulent or valid, and (f) preventing the call from completing when the comparison indicates the RF signature of the cellular telephone is fraudulent.
-
-
8. The method of claim 1, wherein the step of assigning the fraud probability includes the step of identifying the call as being to a known fraudulent telephone number.
-
9. The method of claim 1, wherein the step of assigning the fraud probability includes the step of identifying a previous call to the cellular telephone by a known fraudulent account.
-
10. The method of claim 1, wherein the step of assigning the fraud probability includes the step of identifying the call as being to a frequently called number.
-
11. The method of claim 1, wherein the assigning step includes computing a score for dialed digits associated with the call based on at least one characteristic selected from a group comprising:
-
a duration of calls placed by the cellular telephone;
a number of calls placed by the cellular telephone;
a number of calls placed by the cellular telephone within a known time period;
a number of international call attempts made by the cellular telephone within a known time period;
a number of three-way conference calls made by the cellular telephone within a given time period;
a number of call attempts made to specific manufacturer codes made by the cellular telephone within a given time period;
a call made by the cellular telephone that overlap a call made by another cellular telephone where a MIN/ESN of the cellular telephone matches a MIN/ESN of the other cellular telephone during a given time period; and
a call made by the cellular telephone to a known fraudulent cellular telephone.
-
-
12. The method of claim 1, wherein the step of assigning includes computing a score for each set of dialed digits in a dialed digits database for a cellular telephone, wherein the score is based on the number of days dialed digits are called, the number of calls made to the dialed digits, the duration of calls made to the dialed digits, and the call locations for the calls to the dialed digits.
-
13. The method of claim 1, wherein the step of identifying RF frequency signatures is effected at substantially the same time that a telephone call is made.
-
14. The method of claim 1, wherein the step of identifying RF signatures is effected at a time after a telephone call is made.
-
15. An apparatus for identifying valid or fraudulent phones in a cellular telephone system, comprising:
-
a computer system coupled to a switch in the cellular telephone system, the computer system including means for;
(1) comparing a call made by the cellular telephone with call records of the cellular telephone system;
(2) assigning a fraud probability to the call based on the comparison of the call with the call records;
(3) associating the fraud probability of the call with a radio frequency (RF) signature of the cellular telephone; and
(4) identifying the RF signature of the cellular telephone as being fraudulent or valid based on the associated fraud probability for the call. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for characterizing the validity of a cellular telephone in a cellular telephone system, comprising the steps of:
-
(a) comparing a call made with the cellular telephone with call records of the cellular telephone system;
(b) assigning a fraud probability to the call based on a result of the comparison step;
(c) linking the fraud probability of the call to a radio frequency (RF) signature of the cellular telephone used to make the call; and
(d) identifying the cellular telephone as fraudulent or valid based on the fraud probability of the call associated with the RF signature of the cellular telephone.
-
-
23. A method of identifying a fraudulent cellular telephone in a cellular telephone system, comprising the steps of:
-
(a) comparing a call made by the cellular telephone with call records of the cellular telephone system;
(b) assigning a fraud probability to the call based on the comparison of the call with the call records; and
(c) terminating the call when the assigned fraud probability exceeds a predetermined amount.
-
Specification