主权项 |
1. A method for detecting fraudulent transactions relating to a mobile device, comprising:
monitoring, at a first processing node associated with a first network interconnecting a provider agent and a customer care center, a first mirrored live-data flow of a first live data flow passing through the first processing node in a non-intrusive manner that does not affect the first live-data flow passing through the first processing node, wherein the first live-data flow comprises first data that is in active transmission between endpoints in the first network and prior to storage of the data in a database; monitoring, at a second processing node associated with a mobile device network, a second mirrored live-data flow of a second live data flow passing through the second processing node in the non-intrusive manner that does not affect the second live-data flow passing through the second processing node, wherein the second live-data flow comprises second data that is in active transmission between endpoints in the mobile device network and prior to onward storage of the second data in a second database; comparing, at each of the first and second processing nodes, first data associated with the first mirrored live-data flow and second data associated with the second mirrored live-data flow respectively with predetermined or deduced conditions to detect a potentially fraudulent condition; placing a hold on a transaction associated with the first live-data flow and the second live-data flow responsive to detection of the potentially fraudulent condition at the first processing node or the second processing node; generating, at a third processing node, an interactive verification communication responsive to the first data associated with the first live-data flow and the second data associated with the second live-data flow to establish a validity of the transaction; releasing the hold on the transaction responsive to the interactive verification communication determining the potentially fraudulent condition relates to a non-fraudulent transaction; and generating a fraud detection response responsive to the interactive verification communication determining the potentially fraudulent condition relates to a fraudulent transaction before the transaction completes. |