System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network
First Claim
1. A method for detecting a fraudulent attempt to activate a new PIN, SIM Card or mobile device comprising:
- monitoring, at a first processing node associated with a network interconnecting a first network point and a second network point, a mirrored live-data flow of a live data flow passing through the first processing node in a non-intrusive manner that does not affect the first live-data flow passing through the first processing node, wherein the live-data flow comprises data that is in active transmission between the first network point and the second network point and prior to storage of the data in a database;
detecting that a transaction within the monitored live-data flow relates to an activation of the new PIN, SIM card or mobile device;
comparing the detected transaction to a list of known fraud situations stored in the first processing node to determine if the detected transaction relates to a known fraud situation;
generating an alert indication responsive to a determination the detected data relates to one of a plurality of known fraud situations;
identifying the detected transaction as a potential fraud situation responsive to a determination the detected data does not relate to one of the plurality of known fraud situations; and
performing an automatically generated dialog verification with a party requesting the new PIN, SIM Card or mobile device to verify identity of the party requesting the new PIN, SIM Card or mobile device for the detected transaction identified as the potential fraud situation.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for detecting a fraudulent attempt to activate a new PIN, SIM Card or mobile device includes monitoring, at a first processing node associated with a network interconnecting a first network point and a second network point, a mirrored live-data flow of a live data flow passing through the first processing node in a non-intrusive manner that does not affect the first live-data flow passing through the first processing node. The live-data flow comprises data that is in active transmission between the first network point and the second network point and prior to storage of the data in a database. The first processing node detects that a transaction within the monitored live-data flow relates to an activation of the new PIN, SIM card or mobile device and compares the detected transaction to a list of known fraud situations stored in the first processing node to determine if the detected transaction relates to a known fraud situation. The first processing node generates an alert indication responsive to a determination the detected data relates to one of a plurality of known fraud situations. The first processing node identifies the detected transaction as a potential fraud situation responsive to a determination the detected data does not relate to one of the plurality known fraud situations. An automatically generated dialog verification with a party requesting the new PIN, SIM Card or mobile device is performed to verify identity of the party requesting the new PIN, SIM Card or mobile device for the detected transaction identified as the potential fraud situation.
44 Citations
20 Claims
-
1. A method for detecting a fraudulent attempt to activate a new PIN, SIM Card or mobile device comprising:
-
monitoring, at a first processing node associated with a network interconnecting a first network point and a second network point, a mirrored live-data flow of a live data flow passing through the first processing node in a non-intrusive manner that does not affect the first live-data flow passing through the first processing node, wherein the live-data flow comprises data that is in active transmission between the first network point and the second network point and prior to storage of the data in a database; detecting that a transaction within the monitored live-data flow relates to an activation of the new PIN, SIM card or mobile device; comparing the detected transaction to a list of known fraud situations stored in the first processing node to determine if the detected transaction relates to a known fraud situation; generating an alert indication responsive to a determination the detected data relates to one of a plurality of known fraud situations; identifying the detected transaction as a potential fraud situation responsive to a determination the detected data does not relate to one of the plurality of known fraud situations; and performing an automatically generated dialog verification with a party requesting the new PIN, SIM Card or mobile device to verify identity of the party requesting the new PIN, SIM Card or mobile device for the detected transaction identified as the potential fraud situation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for detecting a fraudulent attempt to activate a new PIN, SIM Card or mobile device comprising:
a first processor associated with a network for implementing a first processing node, the first processing node configured to; monitor, at the first processing node associated with a network interconnecting a first network point and a second network point, a mirrored live-data flow of a live data flow passing through the first processing node in a non-intrusive manner that does not affect the first live-data flow passing through the first processing node, wherein the live-data flow comprises data that is in active transmission between the first network point and the second network point and prior to storage of the data in a database; detect that a transaction within the monitored live-data flow relates to an activation of the new PIN, SIM card or mobile device; compare the detected transaction to a list of known fraud situations stored in the first processing node to determine if the detected transaction relates to a known fraud situation; generate an alert indication responsive to a determination the detected data relates to one of a plurality of known fraud situations; identify the detected transaction as a potential fraud situation responsive to a determination the detected data does not relate to one of the plurality of known fraud situations; and perform an automatically generated dialog verification with a party requesting the new PIN, SIM Card or mobile device to verify identity of the party requesting the new PIN, SIM Card or mobile device, for the detected transaction identified as the potential fraud situation. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A method for detecting a fraudulent attempt to activate a new PIN, SIM Card or mobile device comprising:
-
monitoring, at a first processing node associated with a network interconnecting a first network point and a second network point, a mirrored live-data flow of a live data flow passing through the first processing node in a non-intrusive manner that does not affect the first live-data flow passing through the first processing node, wherein the live-data flow comprises data that is in active transmission between the first network point and the second network point and prior to storage of the data in a database; detecting that a transaction within the monitored live-data flow relates to an activation of the new PIN, SIM card or mobile device; comparing the detected transaction to a list of a known fraud numbers or known fraud scenarios stored in the first processing node to determine if the detected transaction relates to a known fraud number or known fraud scenario; generating an alert indication responsive to a determination the detected data relates to one of a plurality of known fraud situations; identifying the detected transaction as a potential fraud situation responsive to a determination the detected data does not relate to a known fraud number or known fraud scenario; determining a manner for contacting the party requesting the new PIN, SIM Card or mobile device; forwarding the data associated with the detected transaction from the first processing node to a second processing node; and performing an automatically generated dialog verification with a party requesting the new PIN, SIM Card or mobile device to verify identity of the party requesting the new PIN, SIM Card or mobile device from the second processing node, for the detected transaction identified as the potential fraud situation. - View Dependent Claims (18, 19, 20)
-
Specification