Detection and blocking of cloned mobile devices
First Claim
1. A method for blocking a cloned mobile device, the method comprising:
- receiving, by a processor of a network, a first registration from a first mobile device at a first location, wherein the first registration includes a device identifier and a phone number;
confirming, by the processor, that a second registration from a second mobile device at a second location includes the device identifier and the phone number;
calculating, by the processor, a first fraud score for the first mobile device and a second fraud score for the second mobile device;
determining, by the processor, the second mobile device is the cloned mobile device, when the second fraud score exceeds the first fraud score;
blocking the cloned mobile device from registering on the network; and
transmitting a message to the first mobile device notifying that a usage of the cloned mobile device has been detected and requesting that a subscriber identity module of the first mobile device be replaced.
2 Assignments
0 Petitions
Accused Products
Abstract
A method is disclosed for blocking a cloned mobile device by a processor of a network. The processor receives a first registration from a first mobile device at a first location. The first registration includes a device identifier and a phone number. The processor then confirms that a second registration from a second mobile device at a second location includes the device identifier and the phone number and calculates a first fraud score for the first mobile device and a second fraud score for the second mobile device. The processor then determines that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score, and blocks the cloned mobile device from registering on the network.
-
Citations
20 Claims
-
1. A method for blocking a cloned mobile device, the method comprising:
-
receiving, by a processor of a network, a first registration from a first mobile device at a first location, wherein the first registration includes a device identifier and a phone number; confirming, by the processor, that a second registration from a second mobile device at a second location includes the device identifier and the phone number; calculating, by the processor, a first fraud score for the first mobile device and a second fraud score for the second mobile device; determining, by the processor, the second mobile device is the cloned mobile device, when the second fraud score exceeds the first fraud score; blocking the cloned mobile device from registering on the network; and transmitting a message to the first mobile device notifying that a usage of the cloned mobile device has been detected and requesting that a subscriber identity module of the first mobile device be replaced. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium storing a plurality of instructions which, when executed by a processor of a network, cause the processor to perform operations for blocking a cloned mobile device, the operations comprising:
-
receiving a first registration from a first mobile device at a first location, wherein the first registration includes a device identifier and a phone number; confirming that a second registration from a second mobile device at a second location includes the device identifier and the phone number; calculating a first fraud score for the first mobile device and a second fraud score for the second mobile device; determining that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score; blocking the cloned mobile device from registering on the network; and transmitting a message to the first mobile device notifying that a usage of the cloned mobile device has been detected and requesting that a subscriber identity module of the first mobile device be replaced.
-
-
17. An apparatus for blocking a cloned mobile device, the apparatus comprising:
-
a processor of a network; and a computer-readable medium storing instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising; receiving a first registration from a first mobile device at a first location, wherein the first registration includes a device identifier and a phone number; confirming that a second registration from a second mobile device at a second location includes the device identifier and the phone number; calculating a first fraud score for the first mobile device and a second fraud score for the second mobile device; determining that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score; blocking the cloned mobile device from registering on the network; and transmitting a message to the first mobile device notifying that a usage of the cloned mobile device has been detected and requesting that a subscriber identity module of the first mobile device be replaced. - View Dependent Claims (18, 19, 20)
-
Specification