Fraud detection techniques for wireless network operators
First Claim
1. A method of detecting unauthorized terminal use in a wireless network environment having a geographic location manager that receives positioning information regarding movement of a terminal, said method comprising:
- filtering received positioning information about locations of a terminal;
performing a statistical analysis of the locations of said terminal;
monitoring a current location of said terminal substantially in real-time; and
requesting clarification from a user of said terminal upon detection of a deviation between said statistical analysis of the location of said terminal and said current location of said terminal,wherein said geographic location manager receives, filters, and performs a statistical analysis on the positioning information regarding said terminal in a database, andwherein the statistical analysis of the location of said terminal produces a normalized histogram of a location of said terminal and records said histogram in said database.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided by which a network operator is able to detect fraudulent use of a subscriber'"'"'s terminal, regardless of whether or not the subscriber is aware of the fraudulent use of her terminal. Detecting unauthorized terminal use in a wireless network includes recording a history of terminal location and registration patterns, analyzing the recorded history of location and registration patterns of the terminal, monitoring current location and registration patterns of the terminal, and requesting clarification when a deviation between said statistical analysis of the location and registration patterns of said terminal and said current location and registration patterns of said terminal is detected.
13 Citations
26 Claims
-
1. A method of detecting unauthorized terminal use in a wireless network environment having a geographic location manager that receives positioning information regarding movement of a terminal, said method comprising:
-
filtering received positioning information about locations of a terminal; performing a statistical analysis of the locations of said terminal; monitoring a current location of said terminal substantially in real-time; and requesting clarification from a user of said terminal upon detection of a deviation between said statistical analysis of the location of said terminal and said current location of said terminal, wherein said geographic location manager receives, filters, and performs a statistical analysis on the positioning information regarding said terminal in a database, and wherein the statistical analysis of the location of said terminal produces a normalized histogram of a location of said terminal and records said histogram in said database. - View Dependent Claims (2, 3, 4, 5, 6, 19)
-
-
7. A system for detecting fraudulent use of network subscribing terminals in a wireless network environment having a geographic location manager that receives positioning information regarding the movement of a terminal, comprising:
-
a database that derives and records a normalized histogram of a location of said terminal in a network; and a control entity that monitors a current location of said terminal substantially in real-time and requests clarification from a user of said terminal upon detection of a deviation between the normalized histogram of the location said terminal and the current location of said terminal. - View Dependent Claims (8, 9, 10, 11, 20)
-
-
12. A non-transitory computer-readable medium having computer-executable instructions for detecting unauthorized terminal use of a terminal in a wireless network environment having a geographic location manager that receives positioning information regarding a movement of said terminal, said computer-executable instructions comprising:
-
filtering the received information about locations of a terminal; performing a statistical analysis of the location of said terminal; monitoring a current location of said terminal substantially in real-time; and requesting clarification from a user of said terminal upon detection of a deviation between said statistical analysis of the location of said terminal and said current location of said terminal, wherein the statistical analysis of the location of said terminal produces a normalized histogram of a location of said terminal, and records said normalized histogram in a database. - View Dependent Claims (13, 14, 15, 16, 17, 18, 21)
-
-
22. A method of detecting unauthorized terminal use in a wireless network environment having a geographic location manager that receives positioning information regarding movement of a terminal, said method comprising:
-
receiving previous positioning information about locations of a terminal; performing a statistical analysis of the previous locations of said terminal and producing a normalized histogram of the previous locations; receiving a current position of said terminal substantially in real-time; and challenging a user of said terminal upon detection of a deviation between said normalized histogram of said statistical analysis of the previous locations of said terminal and said current location of said terminal. - View Dependent Claims (23, 24)
-
-
25. A system for detecting fraudulent use of network subscribing terminals in a wireless network environment having a geographic location manager that receives positioning information regarding the movement of a terminal, comprising:
-
a database that derives and records a normalized histogram of a location of said terminal in a network; and a control entity that monitors a current location of said terminal substantially in real-time and challenges a user of said terminal upon detection of a deviation between the normalized histogram of the previous locations of said terminal and the current location of said terminal. - View Dependent Claims (26)
-
Specification