Location fraud detection
First Claim
1. A computer-implemented method comprising:
- receiving, at a fraud management device, at least one base station identifier (BSID) associated with communication data from at least one machine type communication (MTC) device;
determining a location associated with the at least one BSID;
selecting data elements from the communication data;
applying known domain rules to the communication data;
identifying a connectivity pattern for the at least one MTC device based on the communication data;
applying an anomaly detection model to particular communication data associated with a particular MTC device based on the connectivity pattern; and
detecting at least one anomaly from the identified connectivity pattern based on the anomaly detection model.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving, at a fraud management device, at least one BSID associated with communication data from at least one MTC device. The fraud management device determines a location associated with the at least one BSID. Relevant data elements are selected from the communication data. The fraud management device applies known domain rules to the communication data and identifies a connectivity pattern for the at least one MTC device based on the communication data. An anomaly detection model is applied to particular communication data associated with a particular MTC device based on the connectivity pattern, and at least one anomaly from the identified connection pattern is detected based on the anomaly detection model.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, at a fraud management device, at least one base station identifier (BSID) associated with communication data from at least one machine type communication (MTC) device; determining a location associated with the at least one BSID; selecting data elements from the communication data; applying known domain rules to the communication data; identifying a connectivity pattern for the at least one MTC device based on the communication data; applying an anomaly detection model to particular communication data associated with a particular MTC device based on the connectivity pattern; and detecting at least one anomaly from the identified connectivity pattern based on the anomaly detection model. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A device, comprising:
-
a memory to store a plurality of instructions; and a processor configured to execute instructions in the memory to; receive at least one base station identifier (BSID) associated with communication data from at least one machine type communication (MTC) device; determine a location associated with the at least one BSID; select data elements from the communication data; apply known domain rules to the communication data; identify a connectivity pattern for the at least one MTC device based on the communication data; apply an anomaly detection model to particular communication data associated with a particular MTC device based on the connectivity pattern; and detect at least one anomaly from the identified connectivity pattern based on the anomaly detection model. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium including instructions to be executed by a processor, the instructions including one or more instructions, when executed by the processor, for causing the processor to:
-
receive at least one base station identifier (BSID) associated with communication data from at least one machine type communication (MTC) device; determine a location associated with the at least one BSID; select data elements from the communication data; apply known domain rules to the communication data; identify a connectivity pattern for the at least one MTC device based on the communication data; apply an anomaly detection model to particular communication data associated with a particular MTC device based on the connectivity pattern; and detect at least one anomaly from the identified connectivity pattern based on the anomaly detection model. - View Dependent Claims (20)
-
Specification