Access management for wireless communication devices failing authentication for a communication network
First Claim
1. A method of operating a network access control system to manage access to a communication network, the method comprising:
- receiving a failure notification transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with the communication network, wherein the notification includes a device identifier that identifies the wireless communication device;
retrieving device information, network data, and a user profile associated with the wireless communication device based on the device identifier;
processing the device information, the network data, and the user profile to generate a network access score for the wireless communication device;
if the network access score exceeds a priority threshold, transferring a priority notification for delivery to the service node that instructs the service node to bypass the authentication for the wireless communication device;
if the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, transferring an access notification for delivery to the service node that instructs the service node to bypass the authentication for the wireless communication device and monitoring subsequent usage of the wireless communication device for fraudulent activity; and
if the network access score does not exceed the legitimate user threshold, transferring a suspect notification for delivery to the service node that instructs the service node to maintain the authentication for the wireless communication device.
6 Assignments
0 Petitions
Accused Products
Abstract
When a failure notification is received that was transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with a communication network, device information, network data, and a user profile associated with the wireless communication device is retrieved and processed to generate a network access score for the wireless communication device. If the network access score exceeds a priority threshold, a priority notification is transferred instructing the service node to bypass the authentication for the wireless communication device. If the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, an access notification is transferred instructing the service node to bypass the authentication for the wireless communication device, and subsequent usage of the wireless communication device is monitored for fraudulent activity. If the network access score does not exceed the legitimate user threshold, a suspect notification is transferred instructing the service node to maintain the authentication for the wireless communication device.
85 Citations
20 Claims
-
1. A method of operating a network access control system to manage access to a communication network, the method comprising:
-
receiving a failure notification transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with the communication network, wherein the notification includes a device identifier that identifies the wireless communication device; retrieving device information, network data, and a user profile associated with the wireless communication device based on the device identifier; processing the device information, the network data, and the user profile to generate a network access score for the wireless communication device; if the network access score exceeds a priority threshold, transferring a priority notification for delivery to the service node that instructs the service node to bypass the authentication for the wireless communication device; if the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, transferring an access notification for delivery to the service node that instructs the service node to bypass the authentication for the wireless communication device and monitoring subsequent usage of the wireless communication device for fraudulent activity; and if the network access score does not exceed the legitimate user threshold, transferring a suspect notification for delivery to the service node that instructs the service node to maintain the authentication for the wireless communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A network access control system to manage access to a communication network, the system comprising:
-
a communication transceiver configured to receive a failure notification transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with the communication network, wherein the notification includes a device identifier that identifies the wireless communication device; and a processing system configured to retrieve device information, network data, and a user profile associated with the wireless communication device based on the device identifier, process the device information, the network data, and the user profile to generate a network access score for the wireless communication device, and if the network access score exceeds a priority threshold, direct the communication transceiver to transfer a priority notification for delivery to the service node that instructs the service node to bypass the authentication for the wireless communication device; the processing system configured to, if the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, direct the communication transceiver to transfer an access notification for delivery to the service node that instructs the service node to bypass the authentication for the wireless communication device, and the processing system further configured to monitor subsequent usage of the wireless communication device for fraudulent activity; and the processing system configured to, if the network access score does not exceed the legitimate user threshold, direct the communication transceiver to transfer a suspect notification for delivery to the service node that instructs the service node to maintain the authentication for the wireless communication device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of operating a network access control system to manage access to a communication network, the method comprising:
-
receiving a failure notification transmitted from a service node indicating a failure of a wireless communication device to pass an authentication when attempting to register with the communication network, wherein the notification includes a device identifier that identifies the wireless communication device; retrieving device information, network data, and a user profile associated with the wireless communication device based on the device identifier; processing the device information, the network data, and the user profile to generate a network access score for the wireless communication device; if the network access score exceeds a priority threshold, transferring a priority notification for delivery to the service node that instructs the service node to bypass the authentication for the wireless communication device; if the network access score exceeds a legitimate user threshold but does not exceed the priority threshold, transferring an access notification for delivery to the service node that instructs the service node to bypass the authentication for the wireless communication device, imposing restrictions on subsequent usage of the wireless communication device, and monitoring the subsequent usage of the wireless communication device for fraudulent activity by comparing a service usage history of the wireless communication device to the subsequent usage of the wireless communication device to detect the fraudulent activity; and if the network access score does not exceed the legitimate user threshold, transferring a suspect notification for delivery to the service node that instructs the service node to maintain the authentication for the wireless communication device.
-
Specification