System and method for identifying mobile communication devices
First Claim
Patent Images
1. A method comprising:
- receiving, at a server of a mobile communication service provider from a detection server, a request to identify mobile communication devices located within a threshold distance of an access point, the request sent by the detection server in response to detection of an unauthorized data request associated with the access point, wherein the request includes a network address of the access point;
estimating a location of the access point based on the network address;
retrieving information associated with a plurality of mobile communication devices located within a coverage area of a base station of the mobile communication service provider, wherein the location of the access point is within the coverage area of the base station;
sending a location query to each of the plurality of mobile communication devices within the coverage area of the base station, wherein a particular location query requests positioning information from a particular mobile communication device;
identifying a mobile communication device of the plurality of mobile communication devices within the coverage area of the base station located within the threshold distance of the access point; and
transmitting a message to a correlation server via a network, wherein the message includes information identifying the mobile communication device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes detecting, at a device coupled to a network, a communication transmitted over the network. The method includes determining whether the communication is associated with an unauthorized data request, and, in response to determining that the communication is associated with the unauthorized data request, determining an access point associated with a source of the communication. The method further includes transmitting a message to a service provider. The message may request identification of mobile communication devices that are located within a threshold distance of the access point.
-
Citations
23 Claims
-
1. A method comprising:
-
receiving, at a server of a mobile communication service provider from a detection server, a request to identify mobile communication devices located within a threshold distance of an access point, the request sent by the detection server in response to detection of an unauthorized data request associated with the access point, wherein the request includes a network address of the access point; estimating a location of the access point based on the network address; retrieving information associated with a plurality of mobile communication devices located within a coverage area of a base station of the mobile communication service provider, wherein the location of the access point is within the coverage area of the base station; sending a location query to each of the plurality of mobile communication devices within the coverage area of the base station, wherein a particular location query requests positioning information from a particular mobile communication device; identifying a mobile communication device of the plurality of mobile communication devices within the coverage area of the base station located within the threshold distance of the access point; and transmitting a message to a correlation server via a network, wherein the message includes information identifying the mobile communication device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-readable storage device comprising instructions that, when executed by a processor, cause the processor to perform operations including:
-
receiving first data identifying mobile communication devices located within a threshold distance of a first access point in response to detection by a detection server of a first unauthorized data request associated with the first access point, wherein the first data is received from a mobile communication service provider at a first time; receiving second data identifying mobile communication devices located within the threshold distance of the first access point in response to detection by the detection server of a second unauthorized data request associated with the first access point, wherein the second data is received from the mobile communication service provider at a second time; correlating the first data and the second data to generate correlation data; storing the correlation data at a database; and identifying a mobile communication device identified by the first data and the second data based on the correlation data. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
a processor; and a memory accessible to the processor, the memory comprising instructions executable by the processor to perform operations including; receiving a request to identify mobile communication devices located within a threshold distance of an access point from a detection server in response to detection of a first unauthorized data request associated with the access point; identifying a mobile communication device located within the threshold distance of the access point; and transmitting a message to a correlation server via a network, wherein the message includes information identifying the mobile communication device, wherein the correlation server generates first correlation data that indicates that the mobile communication device was identified as being located near the access point at multiple times when unauthorized data requests associated with the access point occurred, and wherein the correlation server generates second correlation data that indicates that a particular mobile communication device was identified as being located proximate to a plurality of access points when a second set of multiple unauthorized data requests associated with the plurality of access points occurred. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A method comprising:
-
receiving, at a server of a mobile communication service provider from a detection server, a request to identify mobile communication devices located within a threshold distance of an access point, the request sent by the detection server in response to detection of an unauthorized data request associated with the access point; identifying a mobile communication device located within the threshold distance of the access point; transmitting a message to a correlation server via a network, wherein the message includes information identifying the mobile communication device; receiving, at the server of the mobile communication service provider from the detection server, a second request to identify an additional mobile communication device located within a second threshold distance of an additional access point; identifying the additional mobile communication device located within the second threshold distance of the additional access point; and transmitting a second message to the correlation server via the network, wherein the second message includes information identifying the additional mobile communication device located within the second threshold distance of the additional access point. - View Dependent Claims (22, 23)
-
Specification