System and method for identity protection using mobile device signaling network derived location pattern recognition
First Claim
1. A method for detecting theft of an identity of an entity based on the entity'"'"'s wireless device location obtained from a communications network, comprising:
- obtaining, based upon a unique identifier of the entity'"'"'s wireless device, first data from a home network characterizing use of the entity'"'"'s wireless device in the home network;
obtaining, based upon the unique identifier of the entity'"'"'s wireless device, second data from a visited network characterizing use of the entity'"'"'s wireless device in the visited network; and
generating a pattern value based on the first data, based on the second data, and based on a difference in respective times at which the first data and the second data were obtained, wherein the generated pattern value indicates a likelihood of identity theft.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for recognizing patterns in wireless device locations using wireless device location data derived from a communications signaling network is provided. By using wireless network supported signaling operations and messages, location data concerning the whereabouts of wireless devices, and hence wireless device users, may be obtained. The location data derived from the communications signaling network may be statistically analyzed to reveal potential geographic patterns that may indicate meaningful behaviors of the purported users of the wireless devices.
67 Citations
17 Claims
-
1. A method for detecting theft of an identity of an entity based on the entity'"'"'s wireless device location obtained from a communications network, comprising:
-
obtaining, based upon a unique identifier of the entity'"'"'s wireless device, first data from a home network characterizing use of the entity'"'"'s wireless device in the home network; obtaining, based upon the unique identifier of the entity'"'"'s wireless device, second data from a visited network characterizing use of the entity'"'"'s wireless device in the visited network; and generating a pattern value based on the first data, based on the second data, and based on a difference in respective times at which the first data and the second data were obtained, wherein the generated pattern value indicates a likelihood of identity theft. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for verifying an electronic activity of interest based on information pertaining to an entity'"'"'s wireless device, comprising:
-
communicating a request for information to a home network of the entity'"'"'s wireless device, wherein the request communicated to the home network includes a unique identifier of the entity'"'"'s wireless device; communicating a request for information to a visited network, wherein the request communicated to the visited network includes the unique identifier of the entity'"'"'s wireless device; receiving information pertaining to the entity'"'"'s wireless device from at least one of the home network and the visited network in response to communicating the request for information; receiving information pertaining to the electronic activity of interest; and statistically correlating the received home network information, the received visited network information, a difference in respective times at which the information from the home network and the information from the visited network were received, and the electronic activity of interest information; and generating a pattern value based on the statistical correlation, wherein the pattern value indicates a likelihood that the electronic activity of interest is valid.
-
-
17. A system that verifies an electronic activity of interest based on information pertaining to an entity'"'"'s wireless device, comprising:
-
a communications interface configured to communicatively interconnect to a communications signaling network, and configured to receive a request from a transaction entity for information pertaining to the likelihood that the electronic activity of interest is valid; a memory component configured to store a wireless device location module and at least one location recognition logic resource; and a processor communicatively coupled to the communications interface and the memory component, where in response to receiving the request from the transaction entity, the processor retrieves and executes the wireless device location module to generate a request for information to a home network of the entity'"'"'s wireless device and a request for information to a visited network, wherein the request for information to the home network and the visited network includes a unique identifier of the entity'"'"'s wireless device; wherein the request for information to the home network and the visited network is communicated from the communications interface to the home network and the visited network via a communications signaling network, wherein the communications interface receives the requested information from the home network and the visited network via the communications signaling network; wherein the processing system retrieves and executes the location recognition logic resource to statistically correlate the received information from the home network, the received information from the visited network, a difference in respective times at which the information from the home network and the information from the visited network were received, and information pertaining to the electronic activity of interest, and wherein the processing system generates a pattern value based on the statistical correlation, wherein the pattern value indicates a likelihood that the electronic activity of interest is valid.
-
Specification