摘要:
A system and method for combining the results of different analysis portions to produce a single YES/NO decision regarding the validity of a present cellular telephone call. A soft data analysis portion of the system analyzes soft data, such as the results of a signature analyzer and a customer call profile and determines the likelihood that the particular call is a valid call from an authorized cellular telephone or an invalid call from a fraudulent cellular telephone. In addition, the system performs a deterministic analysis of the particular phone call to independently designate the particular phone call as valid or invalid. The outputs from the deterministic analyzer and the soft data analyzer portion are combined in a combinatorial logic circuit to produce a single binary output having one logic level for valid calls from the authorized cellular telephone and the opposite logic level for invalid calls from the fraudulent cellular telephone. In addition, the deterministic analyzer may include a control line to override the decision of the soft analyzer to permit calls to designated numbers, such as emergency numbers, even if the independent analysis indicates that the particular call is invalid. In one embodiment, the soft data analyzer portion is a fuzzy logic classifier receiving data inputs and confidence values from the various soft data portions of the system. The fuzzy logic classifier combines the various soft data inputs to produce a single binary output. A sensitivity input is used to vary the threshold of the binary output. The binary output of the fuzzy logic analyzer is combined with the outputs of the deterministic analyzer by the combinatorial logic circuit.
摘要:
A system for the authorization of wireless telephone communications establishes two sets of authorized telephone numbers. A first set of authorized telephone numbers are supplied by the customer, and the second set of authorized numbers are derived from customer bills paid by the customer. The system analyzes transmission characteristics from an unauthenticated cellular telephone and attempts to verify its authenticity based on the transmission characteristic by analyzing the transmission characteristic with respect to stored reference waveforms for the authentic wireless telephone. However, the results of this signature analysis if negative may be overridden if the telephone number dialed by the unauthenticated cellular telephone matches a telephone number in either the first or second sets of authorized telephone numbers. The system also includes a technique for modifying the reference waveforms to compensate for changes in the transmission characteristic. The system will only consider the inclusion of transmission characteristics from the present communication if the dialed digits for the present communication match one of the telephone numbers in either the first or second sets of authorized telephone numbers.
摘要:
An illustrative behavior analysis system and a corresponding method are designed to analyze telecommunications-event records and other relevant records associated with wireless terminals to infer whether a wireless user's pattern of behavior is substantially similar or even identical to the pattern of behavior of another user, possibly a known actor, A pattern of behavior typically comprises call-related and location attributes over a period of time. Accordingly, the illustrative embodiment infers an identity or a substantial similarity as between two seemingly distinct users of wireless terminals, based on: (i) how precisely a candidate's pattern of behavior matches a pre-defined pattern of behavior, and/or (ii) how precisely a candidate's pattern of behavior matches another candidate's pattern of behavior.
摘要:
A system and method for collecting reference waveforms from authorized wireless telephones in a wireless telephone network. The collected reference waveforms are used by a fingerprint analyzer to distinguish telephone calls made by the authorized wireless telephone from telephone calls made by an unauthorized wireless telephone. The system maintains a pool of specially designated unassigned telephone numbers and selects one telephone number from the pool at random which is provided to a valid subscriber of an authorized wireless telephone. The randomly selected telephone number is to be called by the valid subscriber using the authorized cellular telephone for the purpose of collecting reference waveforms by the system. A radio frequency (RF) receiver of the system monitors and receives transmission signals from a plurality of wireless telephones. Each transmission signal contains a destination telephone number and an identification of its wireless telephone such as MIN/ESN identifiers. The system selects for purposes of collecting reference waveforms the transmission signal whose destination and wireless telephone identification respectively correspond to the randomly selected destination and the identification of the authorized wireless telephone. This ensures that that particular transmission signal belongs to the authorized wireless telephone of the valid subscriber rather than an unauthorized wireless telephone belonging to a pirate since the pirate has no way of knowing the randomly selected telephone number provided to the valid subscriber. The processor then extracts the reference waveform that represents a transmission characteristic of the authorized wireless telephone and stores the extracted reference waveform in memory for use by the fingerprint analyzer.
摘要:
An illustrative geo-temporal analysis system analyzes telecommunications-event records and other records associated with wireless terminals to infer a collaborative relationship between users who do not telecommunicate with each other, based on how precisely a first geo-temporal pattern matches a second geo-temporal pattern. When a collaborative relationship is inferred, the system transmits an indication thereof and a request for an estimated location of the respective wireless terminals.
摘要:
A behavior analysis system analyzes large volumes of records that report on telecommunications events associated with wireless terminals. The behavior analysis system filters the large volume of available records based on investigation-specific rules, resulting in a set of candidate wireless terminals. The illustrative embodiment determines a pattern of behavior for each candidate. Each candidate is measured for how precisely it satisfies the investigation-specific rules. Each candidate is further analyzed for aberrations, if any, relative to the established pattern of behavior. An aberration tends to prove or disprove whether a candidate is more likely to be a true suspect in the given investigation. The illustrative embodiment ranks the set of candidates based on (i) a measure of how precisely each candidate wireless terminal satisfies the investigation-specific rule(s), and (ii) a measure of the aberration in behavior of each candidate wireless terminal relative to the respective pattern of behavior thereof.
摘要:
An illustrative behavior analysis system and a corresponding method are designed to analyze telecommunications-event records and other relevant records associated with wireless terminals to infer whether a wireless user's pattern of behavior is substantially similar or even identical to the pattern of behavior of another user, possibly a known actor. A pattern of behavior typically comprises call-related and location attributes over a period of time. Accordingly, the illustrative embodiment infers an identity or a substantial similarity as between two seemingly distinct users of wireless terminals, based on: (i) how precisely a candidate's pattern of behavior matches a pre-defined pattern of behavior, and/or (ii) how precisely a candidate's pattern of behavior matches another candidate's pattern of behavior.
摘要:
A system analyzes telephone calls that have been determined by signature analysis to be fraudulent and stores parameter data associated with the fraudulent cell phone. During subsequent cell phone calls, the system compares the stored parameter data associated with the fraudulent cell phone to corresponding parameters from a subsequent call to determine whether the subsequent call is from the fraudulent cellular telephone. In this manner, the system may reject subsequent cellular telephone calls as fraudulent without the need for time consuming signature analysis. Parameters analyzed by the system can include the time of day of the fraudulent call, the origin from which the fraudulent call was placed, the transmitted identification numbers of the fraudulent telephone, and the destination telephone number of the fraudulent call. The system can analyze one or more of these parameters in combination to determine that the subsequent call is fraudulent.
摘要:
An illustrative geo-temporal analysis system analyzes telecommunications-event records and other records associated with wireless terminals to infer a collaborative relationship between users who do not telecommunicate with each other, based on how precisely a first geo-temporal pattern matches a second geo-temporal pattern. When a collaborative relationship is inferred, the system transmits an indication thereof and a request for an estimated location of the respective wireless terminals.
摘要:
A system and method for the detection of fraudulent use of a wireless telephone system includes a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint of the unauthenticated wireless telephone. The system maintains a valid destination list specific for each authorized wireless telephone. Each valid destination list contains destinations considered to be valid for that particular authorized wireless telephone. When an unauthenticated wireless telephone transmits a call request containing a destination, the system classifies the call as valid when the destination is in the valid destination list for the authorized wireless telephone regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as fraudulent. The system may bypass or terminate the fingerprint analysis, or simply ignore the result of the fingerprint analysis by the fingerprint analyzer. The system also maintains an invalid destination list specific for each authorized wireless telephone with destinations considered to be invalid for that particular authorized wireless telephone. Calls to such destinations are blocked. The system further maintains a suspicious destination list containing destinations considered to be potentially fraudulent. When the destination contained in the call request is in the suspicious destination list, the fingerprint analysis is performed with a higher threshold to require a closer match between a fingerprint of the unauthenticated wireless telephone and a stored fingerprint of the corresponding authorized wireless telephone.