×

System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network

  • US 9,532,227 B2
  • Filed: 05/23/2016
  • Issued: 12/27/2016
  • Est. Priority Date: 09/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting fraudulent transactions relating to a mobile device, comprising:

  • monitoring, at a first processing node associated with a first network interconnecting a provider agent and a customer care center, a first mirrored live-data flow of a first live data flow passing through the first processing node in a non-intrusive manner that does not affect the first live-data flow passing through the first processing node, wherein the first live-data flow comprises first data that is in active transmission between endpoints in the first network and prior to storage of the first data in a database;

    monitoring, at a second processing node associated with a mobile device network, a second mirrored live-data flow of a second live data flow passing through the second processing node in the non-intrusive manner that does not affect the second live-data flow passing through the second processing node, wherein the second live-data flow comprises second data that is in active transmission between endpoints in the mobile device network and prior to onward storage of the second data in a second database;

    comparing, at each of the first and second processing nodes, the first data associated with the first mirrored live-data flow and the second data associated with the second mirrored live-data flow respectively with predetermined or deduced conditions to detect a potentially fraudulent condition;

    placing a hold on a transaction associated with the first live-data flow and the second live-data flow responsive to detection of the potentially fraudulent condition at the first processing node or the second processing node;

    generating, at a third processing node, an interactive verification communication responsive to the first data associated with the first live-data flow and the second data associated with the second live-data flow to establish a validity of the transaction;

    releasing the hold on the transaction responsive to the interactive verification communication determining the potentially fraudulent condition relates to a non-fraudulent transaction; and

    generating a fraud detection response responsive to the interactive verification communication determining the potentially fraudulent condition relates to a fraudulent transaction before the transaction completes.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×