System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network
First Claim
1. A method for detecting fraudulent transactions relating to a mobile device, comprising:
- monitoring, at a first processing node associated with a first network interconnecting a provider agent and a customer care center, a first mirrored live-data flow of a first live data flow passing through the first processing node in a non-intrusive manner that does not affect the first live-data flow passing through the first processing node, wherein the first live-data flow comprises first data that is in active transmission between endpoints in the first network and prior to storage of the first data in a database;
monitoring, at a second processing node associated with a mobile device network, a second mirrored live-data flow of a second live data flow passing through the second processing node in the non-intrusive manner that does not affect the second live-data flow passing through the second processing node, wherein the second live-data flow comprises second data that is in active transmission between endpoints in the mobile device network and prior to onward storage of the second data in a second database;
comparing, at each of the first and second processing nodes, the first data associated with the first mirrored live-data flow and the second data associated with the second mirrored live-data flow respectively with predetermined or deduced conditions to detect a potentially fraudulent condition;
placing a hold on a transaction associated with the first live-data flow and the second live-data flow responsive to detection of the potentially fraudulent condition at the first processing node or the second processing node;
generating, at a third processing node, an interactive verification communication responsive to the first data associated with the first live-data flow and the second data associated with the second live-data flow to establish a validity of the transaction;
releasing the hold on the transaction responsive to the interactive verification communication determining the potentially fraudulent condition relates to a non-fraudulent transaction; and
generating a fraud detection response responsive to the interactive verification communication determining the potentially fraudulent condition relates to a fraudulent transaction before the transaction completes.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method monitors for fraudulent transactions relating to a mobile device. Either of first and second processing nodes places a hold on a transaction associated with the first live-data flow and the second live-data flow responsive to detection of a potentially fraudulent condition. A third processing node generates an interactive verification communication responsive to the first data associated with the first live-data flow and the second data associated with the second live-data flow to establish a validity of the transaction. The third processing node releases the hold on the transaction responsive to the interactive verification communication determining the potentially fraudulent condition relates to a non-fraudulent transaction and generates a fraud detection response responsive to the interactive verification communication determining the potentially fraudulent condition relates to a fraudulent transaction before the transaction completes.
-
Citations
30 Claims
-
1. A method for detecting fraudulent transactions relating to a mobile device, comprising:
-
monitoring, at a first processing node associated with a first network interconnecting a provider agent and a customer care center, a first mirrored live-data flow of a first live data flow passing through the first processing node in a non-intrusive manner that does not affect the first live-data flow passing through the first processing node, wherein the first live-data flow comprises first data that is in active transmission between endpoints in the first network and prior to storage of the first data in a database; monitoring, at a second processing node associated with a mobile device network, a second mirrored live-data flow of a second live data flow passing through the second processing node in the non-intrusive manner that does not affect the second live-data flow passing through the second processing node, wherein the second live-data flow comprises second data that is in active transmission between endpoints in the mobile device network and prior to onward storage of the second data in a second database; comparing, at each of the first and second processing nodes, the first data associated with the first mirrored live-data flow and the second data associated with the second mirrored live-data flow respectively with predetermined or deduced conditions to detect a potentially fraudulent condition; placing a hold on a transaction associated with the first live-data flow and the second live-data flow responsive to detection of the potentially fraudulent condition at the first processing node or the second processing node; generating, at a third processing node, an interactive verification communication responsive to the first data associated with the first live-data flow and the second data associated with the second live-data flow to establish a validity of the transaction; releasing the hold on the transaction responsive to the interactive verification communication determining the potentially fraudulent condition relates to a non-fraudulent transaction; and generating a fraud detection response responsive to the interactive verification communication determining the potentially fraudulent condition relates to a fraudulent transaction before the transaction completes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
16. A system for detecting fraudulent transactions relating to a mobile device, comprising:
-
a first processor associated with a first network interconnecting a provider agent and a customer care center, the first processor implementing a first processing node for monitoring a first mirrored live-data flow of a first live data flow passing through the first processing node in a non-intrusive manner that does not affect the first live-data flow passing through the first processing node, wherein the first live-data flow comprises first data that is in active transmission between endpoints in the first network prior to storage of the first data in a database; a second processor associated with a mobile device network, the second processor implementing a second processing node for monitoring a second mirrored live-data flow of a second live data flow passing through the second processing node in the non-intrusive manner that does not affect the second live-data flow passing through the second processing node, wherein the second live-data flow comprises second data that is in active transmission between endpoints in the mobile device network and prior to onward storage of the second data in a second database; wherein the first and second processing nodes at each of the first and second processors further compares the first data associated with the first mirrored live-data flow and the second data associated with the second mirrored live-data flow respectively to predetermined or deduced conditions to detect a potentially fraudulent condition; wherein the first or second processing nodes at each of the first and second processors further places a hold on a transaction associated with the first live-data flow and the second live-data flow responsive to detection of the potentially fraudulent condition at the first or second processing node; a third processor communicating with the first processor and the second processor, the third processor implementing a third processing node for; generating an interactive verification communication responsive to the first data associated with the first live-data flow and the second data associated with the second live-data flow to establish a validity of the transaction; releasing the hold on the transaction responsive to the interactive verification communication determining the potentially fraudulent condition relates to a non-fraudulent transaction; and generating a fraud detection response responsive to the verification communication determining the potentially fraudulent condition relates to a fraudulent transaction before the transaction completes.
-
Specification