AU2230500A - Method for preventing illegal use of a mobile station - Google Patents
Method for preventing illegal use of a mobile station Download PDFInfo
- Publication number
- AU2230500A AU2230500A AU22305/00A AU2230500A AU2230500A AU 2230500 A AU2230500 A AU 2230500A AU 22305/00 A AU22305/00 A AU 22305/00A AU 2230500 A AU2230500 A AU 2230500A AU 2230500 A AU2230500 A AU 2230500A
- Authority
- AU
- Australia
- Prior art keywords
- illegal
- user
- esn
- imsi
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/04—Interfaces between hierarchically different network devices
- H04W92/10—Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface
Description
AUSTRALIA
Patents Act 1990 COMPLETE SPECIFICATION STANDARD PATENT a
D
Applicant(s): SAMSUNG ELECTRONICS CO., LTD.
Invention Title: METHOD FOR PREVENTING ILLEGAL USE OF A MOBILE STATION The following statement is a full description of this invention, including the best method of performing it known to me/us: METHOD FOR PREVENTING ILLEGAL USE OF A MOBILE STATION BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method for preventing illegal use of a mobile. station (MS) in a S: personal communication system (PCS).
e 2. Description of the related art *o Conventionally, the PCS complying with STD-008) for the air interface requires such information as the location, state, and slot cycle of the MS, etc., provided by the location registration of the MS. Namely, the MS transmits the location registration message to a base station (BS) while the home location register (HLR)/visitor location register (VLR)/authentication center (AUC)/mobile station center (MSC) determines whether the location registration should be permitted based on the TMSI/IMSI/MIN/ESN, location information, authentication information (AUTHR/RANDC/COUNT/RAND), etc. provided by the MS. In this way, the HLR/VLR/AUC/MSC detects the illegal use of the MS.
Referring to Fig. 1, the conventional PCS transmits the information Lock Until-Cycled Order/Maintenance Required Order to the MS 6 to control the illegal use of the MS. Namely, when the location updating reject message received from the MSC 4 has a reject cause representing 'illegal MS', the BS 5 transmits Lock Until Power-Cycled Order/Maintenance Required Order. However, such conventional method of the HLR/VLR/AUC/MSC cannot enable the BS to treat the illegal user according to the types of the illegal use.
SUMMARY OF THE INVENTION It is an object of the present invention to provide a method for enabling the base station to control the illegal user of an MS according to the types of the illegal use in a PCS.
According to the present invention, a method for enabling the base station to reject the location registration request of the illegal user of an MS detected by the HLR/VLR/AUC/MSC in a PCS complying with IS-634 of the air interface, comprises the steps of causing the HLR/VLR/AUC/MSC to classify the illegal users according to illegal use type, causing the HLR/VLR/AUC/MSC to determine the illegal user as a particular illegal use type based on the previous classification of the illegal use types, S: transmitting a location updating reject message with a reject cause corresponding to the particular illegal use type to the base station, and causing the base station to transmit the information 'Lock Until Power-Cycled Order' or 'Maintenance Required Order' according to the reject cause.
Preferably, the location updating reject message includes different reject causes according to the illegal use types. The illegal use types include fee unsettled MS, lost MS, illegal IMSI/MIN/ESN MS, authentication failed MS, and unregistered MS. The fee unsettled MS represents the user with fee unsettled, the lost MS the user with the MS lost, the illegal IMSI/MIN/ESN MS the user with the IMSI/MIN/ESN illegally altered or copied, the authentication failed MS the user failing to enter valid authentication, and the unregistered MS the unregistered in HLR/VLR. The illegal IMSI/MIN/ESN MS is detected by comparing the IMSI/MIN/ESN entered by the user with the registered IMSI/MIN/ESN. The authentication failed MS is detected by comparing the authentication of the MS requesting revision of the location registration with the existing authentication. The authentication consists of
AUTHR/RANDC/COUNT/RAND.
The present invention will now be described more specifically with reference to the drawings attached only by way of example.
o BRIEF DESCRIPTION OF THE ATTACHED DRAWINGS .:600: Fig. 1 is a block diagram for illustrating the conventional control system for rejecting the location registration request of the illegal user of an MS in a PCS system; and Fig. 2 is a view similar to Fig. 1 but embodied with the inventive process.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Referring to Fig. 2 for illustrating the control system for rejecting the illegal user of an MS in a PCS system, the BS 5 receives the location updating reject S" message from the MSC 4 in response to the location updating request message from the MS 6. To this end, the HLR l/VLR .I 2/AUC 3/MSC 4 checks the location updating request message to determine the type of the illegal use. Then, the MSC 4 makes the reject cause of the location updating reject :...message including the information of the illegal use type.
To this end, the location updating reject message defined the conventional air interface should have the reject S cause revised. Namely, the reject cause conventionally expressed by 'illegal MS' should express a particular illegal use type. The illegal use types may include fee unsettled MS, lost MS, illegal IMSI/MIN/ESN MS, authentication failed MS, unregistered MS, etc., whose values should be defined. This enables the BS 5 to process the reject cause of the location updating reject message according to the illegal use types, effectively controlling the use of the MS 6.
The illegal use types are specifically described as follows: 1. Fee Unsettled MS: Representing the user who has unsettled the fee.
2. Lost MS: Representing the user with another's MS that has been lost, in order to prevent the illegal use of the MS.
3. Illegal IMSI/MIN/ESN MS: Representing the user with the IMSI/MIN/ESN illegally altered or copied. The illegal IMSI/MIN/ESN MS is detected by comparing the IMSI/MIN/ESN entered by the user with the registered IMSI/MIN/ESN.
4. Authentication Failed MS: Representing the user failing to enter valid authentication. It is detected by comparing the authentication of the MS requesting revision of the location registration with the existing authentication. The authentication consists of AUTHR/RANDC/COUNT/RAND.
Unregistered MS: Representing the MS unregistered in HLR/VLR, in order to prevent the system from being overloaded due to the use of the unregistered MSs.
Thus, the HLR 1/VLR 2/AUC 3/MSC 4 provides the reject cause with a particular illegal use type, based on which *o* the BS 5 controls the MS 6. In this case, if the illegal use type represents to prevent the use of the MS, the BS transmits 'Lock Until Power-Cycled Order/Maintenance Required Order, thus properly controlling the MS 6. In addition, this may serve a part of the authentication function by revising the air interface before extensively applying the authentication function to the system.
While the present invention has been described in connection with specific embodiments accompanied by the attached drawings, it will be readily appreciated that 8 various changes and modifications may be made thereto without departing the gist of the present invention.
For the purposes of this specification it will be clearly understood that the word "comprising" means "including but not limited to", and that the word "comprises" has a corresponding meaning.
a• a
Claims (6)
1. A method for enabling the base station to reject the location registration request of the illegal user of an MS detected by the HLR/VLR/AUC/MSC in a PCS complying with IS- 634 of the air interface, comprising the steps of: causing said HLR/VLR/AUC/MSC to classify the illegal users according to illegal use type; °oo causing said HLR/VLR/AUC/MSC to determine said illegal user as a particular illegal use type based on the previous classification of the illegal use types; transmitting a location updating reject message with a reject cause corresponding to said particular illegal use type to said base station; and causing said base station to transmit the information 'Lock Until Power-Cycled Order' or 'Maintenance Required Order' according to said reject cause.
2. A method as defined in Claim 1, wherein said location updating reject message includes different reject causes according to said illegal use types.
3. A method as defined in Claim 2, wherein said illegal use types include fee unsettled MS, lost MS, illegal IMSI/MIN/ESN MS, authentication failed MS, and unregistered MS.
4. A method as defined in Claim 3, wherein said fee unsettled MS represents the user with fee unsettled, said lost MS the user with the MS lost, said illegal IMSI/MIN/ESN MS the user with the IMSI/MIN/ESN illegally altered or copied, said authentication failed MS the user failing to enter valid authentication, and said unregistered MS the unregistered in HLR/VLR. A method as defined in Claim 4, wherein said illegal IMSI/MIN/ESN MS is detected by comparing the IMSI/MIN/ESN entered by the user with the registered IMSI/MIN/ESN.
6. A method as defined in Claim 5, wherein said authentication failed MS is detected by comparing the authentication of the MS requesting revision of the location registration with the existing authentication.
7. A method as defined in Claim 6, wherein said authentication consists of AUTHR/RANDC/COUNT/RAND. Dated this 15th day of March 2000 SAMSUNG ELECTRONICS CO., LTD. By their Patent Attorneys GRIFFITH HACK Fellows Institute of Patent and Trade Mark Attorneys of Australia S S
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR99/8559 | 1999-03-15 | ||
KR1019990008559A KR100291040B1 (en) | 1999-03-15 | 1999-03-15 | method for controlling illegal users in PCS |
Publications (2)
Publication Number | Publication Date |
---|---|
AU2230500A true AU2230500A (en) | 2000-09-21 |
AU736371B2 AU736371B2 (en) | 2001-07-26 |
Family
ID=19576548
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU22305/00A Ceased AU736371B2 (en) | 1999-03-15 | 2000-03-15 | Method for preventing illegal use of a mobile station |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR100291040B1 (en) |
AU (1) | AU736371B2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100466844B1 (en) * | 2002-04-24 | 2005-01-15 | 에스케이 텔레콤주식회사 | Method and System for Controlling of Transaction in HRPD |
KR100732482B1 (en) * | 2004-05-10 | 2007-06-27 | 에스케이 텔레콤주식회사 | Method and System for Managing Mobile Phone Disappearance with Authentication |
KR101068291B1 (en) * | 2004-10-27 | 2011-09-28 | 에스케이 텔레콤주식회사 | Method And Apparatus For Checking Frauds Of Usage In Mobile Terminal |
KR100905072B1 (en) * | 2007-12-18 | 2009-06-30 | 주식회사 케이티프리텔 | Method and System for protection of usage of a stolen equipment by forced re-location |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6161006A (en) * | 1997-12-22 | 2000-12-12 | Ericsson Inc. | System and method for the early detection of cellular telephone piracy |
AU3348599A (en) * | 1998-03-25 | 1999-10-18 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method of authenticating a mobile station's identity and handling authentication failures in a radio telecommunications network |
US6211462B1 (en) * | 1998-11-05 | 2001-04-03 | Texas Instruments Incorporated | Low inductance power package for integrated circuits |
-
1999
- 1999-03-15 KR KR1019990008559A patent/KR100291040B1/en not_active IP Right Cessation
-
2000
- 2000-03-15 AU AU22305/00A patent/AU736371B2/en not_active Ceased
Also Published As
Publication number | Publication date |
---|---|
KR100291040B1 (en) | 2001-05-15 |
AU736371B2 (en) | 2001-07-26 |
KR20000060342A (en) | 2000-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20160123604A (en) | Method for managing of beacon device, and apparatus thereof | |
US7158803B1 (en) | Emergency services for wireless data access networks | |
US7088988B2 (en) | Over-the-air subsidy lock resolution | |
AU684434B2 (en) | Method and apparatus for authentication in a communication system | |
EP1830513A4 (en) | A method for implementing the function of the scene security and a system thereof | |
JP4040047B2 (en) | Mobile communication terminal use restriction setting device and method | |
US8718602B2 (en) | Method and system for remote control of smart card | |
CN102318386B (en) | To the certification based on service of network | |
KR101810150B1 (en) | THIRD PARTY'S SECURITY AUTHENTICATION SYSTEM BETWEEN MOBILE DEVICE AND IoT DEVICES AND METHOD THEREOF | |
EP1964328B1 (en) | Validating user identity by cooperation between core network and access controller | |
HK1077950A1 (en) | Access point, terminal, encryption key configuration system, encryption key configuration method, and program | |
WO2003013161A3 (en) | Wireless bridge for roaming in network environment | |
EP1324541A3 (en) | Communication system, wireless communication apparatus, and communication method | |
CN102859966A (en) | Wireless network authentication apparatus and methods | |
WO2004084473A3 (en) | Authenticating between a cdma network and a gsm network | |
EP1124397A3 (en) | Simplified security for handoff in wireless communications | |
EP1577735A3 (en) | Method and system enforcing computer security utilizing an adaptive lattice mechanism | |
JP2009055454A (en) | Base station apparatus | |
ATE389285T1 (en) | METHOD FOR DISCONNECTING A WLAN USER FROM A WLAN ACCESS NETWORK | |
EP1315391A3 (en) | Authentication system, mobile terminal, and authentication method | |
US20030220094A1 (en) | Mobile equipment theft deterrent system and method | |
AU2230500A (en) | Method for preventing illegal use of a mobile station | |
JP4690423B2 (en) | Core network method and apparatus | |
JPH0746661A (en) | System and equipment for mobile radio communication | |
KR101208722B1 (en) | Method for accessing closed groups in radio access networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGA | Letters patent sealed or granted (standard patent) |