US 12,302,417 B2
Identification of fraudulent network data sessions
Anil Kumar Mariyani, Ashburn, VA (US); and Ramesh Kalathur, Fairfax, VA (US)
Assigned to T-Mobile USA, Inc., Bellevue, WA (US)
Filed by T-Mobile USA, Inc., Bellevue, WA (US)
Filed on Jun. 30, 2022, as Appl. No. 17/855,541.
Prior Publication US 2024/0008101 A1, Jan. 4, 2024
Int. Cl. H04W 76/10 (2018.01); H04M 15/00 (2006.01); H04W 60/04 (2009.01); H04W 84/04 (2009.01)
CPC H04W 76/10 (2018.02) [H04M 15/66 (2013.01); H04W 60/04 (2013.01); H04W 84/042 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for wireless communication, comprising:
a policy control node in a home public land mobile network, and
a data management node in the home public land mobile network in communication with the policy control node,
wherein the policy control node is configured to:
receive a message from a network node in a visiting public land mobile network, wherein the message is associated with an establishment of a bearer or a session for a device that impersonates a terminal device in the home public land mobile network, the message comprising a first identifier indicating the visiting public land mobile network associated with the establishment of the bearer or the session;
transmit a query to the data management node to obtain an identifier of the home public land mobile network associated with a registration of the terminal device; and
reject the establishment of the bearer or the session for the device that impersonates the terminal device in the home public land mobile network upon determining that the identifier indicating the visiting public land mobile network is different from the identifier of the home public land mobile network.