AU2230500A - Method for preventing illegal use of a mobile station - Google Patents

Method for preventing illegal use of a mobile station Download PDF

Info

Publication number
AU2230500A
AU2230500A AU22305/00A AU2230500A AU2230500A AU 2230500 A AU2230500 A AU 2230500A AU 22305/00 A AU22305/00 A AU 22305/00A AU 2230500 A AU2230500 A AU 2230500A AU 2230500 A AU2230500 A AU 2230500A
Authority
AU
Australia
Prior art keywords
illegal
user
esn
imsi
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU22305/00A
Other versions
AU736371B2 (en
Inventor
Bong-Sik Seo
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Publication of AU2230500A publication Critical patent/AU2230500A/en
Application granted granted Critical
Publication of AU736371B2 publication Critical patent/AU736371B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/10Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface

Description

AUSTRALIA
Patents Act 1990 COMPLETE SPECIFICATION STANDARD PATENT a
D
Applicant(s): SAMSUNG ELECTRONICS CO., LTD.
Invention Title: METHOD FOR PREVENTING ILLEGAL USE OF A MOBILE STATION The following statement is a full description of this invention, including the best method of performing it known to me/us: METHOD FOR PREVENTING ILLEGAL USE OF A MOBILE STATION BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method for preventing illegal use of a mobile. station (MS) in a S: personal communication system (PCS).
e 2. Description of the related art *o Conventionally, the PCS complying with STD-008) for the air interface requires such information as the location, state, and slot cycle of the MS, etc., provided by the location registration of the MS. Namely, the MS transmits the location registration message to a base station (BS) while the home location register (HLR)/visitor location register (VLR)/authentication center (AUC)/mobile station center (MSC) determines whether the location registration should be permitted based on the TMSI/IMSI/MIN/ESN, location information, authentication information (AUTHR/RANDC/COUNT/RAND), etc. provided by the MS. In this way, the HLR/VLR/AUC/MSC detects the illegal use of the MS.
Referring to Fig. 1, the conventional PCS transmits the information Lock Until-Cycled Order/Maintenance Required Order to the MS 6 to control the illegal use of the MS. Namely, when the location updating reject message received from the MSC 4 has a reject cause representing 'illegal MS', the BS 5 transmits Lock Until Power-Cycled Order/Maintenance Required Order. However, such conventional method of the HLR/VLR/AUC/MSC cannot enable the BS to treat the illegal user according to the types of the illegal use.
SUMMARY OF THE INVENTION It is an object of the present invention to provide a method for enabling the base station to control the illegal user of an MS according to the types of the illegal use in a PCS.
According to the present invention, a method for enabling the base station to reject the location registration request of the illegal user of an MS detected by the HLR/VLR/AUC/MSC in a PCS complying with IS-634 of the air interface, comprises the steps of causing the HLR/VLR/AUC/MSC to classify the illegal users according to illegal use type, causing the HLR/VLR/AUC/MSC to determine the illegal user as a particular illegal use type based on the previous classification of the illegal use types, S: transmitting a location updating reject message with a reject cause corresponding to the particular illegal use type to the base station, and causing the base station to transmit the information 'Lock Until Power-Cycled Order' or 'Maintenance Required Order' according to the reject cause.
Preferably, the location updating reject message includes different reject causes according to the illegal use types. The illegal use types include fee unsettled MS, lost MS, illegal IMSI/MIN/ESN MS, authentication failed MS, and unregistered MS. The fee unsettled MS represents the user with fee unsettled, the lost MS the user with the MS lost, the illegal IMSI/MIN/ESN MS the user with the IMSI/MIN/ESN illegally altered or copied, the authentication failed MS the user failing to enter valid authentication, and the unregistered MS the unregistered in HLR/VLR. The illegal IMSI/MIN/ESN MS is detected by comparing the IMSI/MIN/ESN entered by the user with the registered IMSI/MIN/ESN. The authentication failed MS is detected by comparing the authentication of the MS requesting revision of the location registration with the existing authentication. The authentication consists of
AUTHR/RANDC/COUNT/RAND.
The present invention will now be described more specifically with reference to the drawings attached only by way of example.
o BRIEF DESCRIPTION OF THE ATTACHED DRAWINGS .:600: Fig. 1 is a block diagram for illustrating the conventional control system for rejecting the location registration request of the illegal user of an MS in a PCS system; and Fig. 2 is a view similar to Fig. 1 but embodied with the inventive process.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Referring to Fig. 2 for illustrating the control system for rejecting the illegal user of an MS in a PCS system, the BS 5 receives the location updating reject S" message from the MSC 4 in response to the location updating request message from the MS 6. To this end, the HLR l/VLR .I 2/AUC 3/MSC 4 checks the location updating request message to determine the type of the illegal use. Then, the MSC 4 makes the reject cause of the location updating reject :...message including the information of the illegal use type.
To this end, the location updating reject message defined the conventional air interface should have the reject S cause revised. Namely, the reject cause conventionally expressed by 'illegal MS' should express a particular illegal use type. The illegal use types may include fee unsettled MS, lost MS, illegal IMSI/MIN/ESN MS, authentication failed MS, unregistered MS, etc., whose values should be defined. This enables the BS 5 to process the reject cause of the location updating reject message according to the illegal use types, effectively controlling the use of the MS 6.
The illegal use types are specifically described as follows: 1. Fee Unsettled MS: Representing the user who has unsettled the fee.
2. Lost MS: Representing the user with another's MS that has been lost, in order to prevent the illegal use of the MS.
3. Illegal IMSI/MIN/ESN MS: Representing the user with the IMSI/MIN/ESN illegally altered or copied. The illegal IMSI/MIN/ESN MS is detected by comparing the IMSI/MIN/ESN entered by the user with the registered IMSI/MIN/ESN.
4. Authentication Failed MS: Representing the user failing to enter valid authentication. It is detected by comparing the authentication of the MS requesting revision of the location registration with the existing authentication. The authentication consists of AUTHR/RANDC/COUNT/RAND.
Unregistered MS: Representing the MS unregistered in HLR/VLR, in order to prevent the system from being overloaded due to the use of the unregistered MSs.
Thus, the HLR 1/VLR 2/AUC 3/MSC 4 provides the reject cause with a particular illegal use type, based on which *o* the BS 5 controls the MS 6. In this case, if the illegal use type represents to prevent the use of the MS, the BS transmits 'Lock Until Power-Cycled Order/Maintenance Required Order, thus properly controlling the MS 6. In addition, this may serve a part of the authentication function by revising the air interface before extensively applying the authentication function to the system.
While the present invention has been described in connection with specific embodiments accompanied by the attached drawings, it will be readily appreciated that 8 various changes and modifications may be made thereto without departing the gist of the present invention.
For the purposes of this specification it will be clearly understood that the word "comprising" means "including but not limited to", and that the word "comprises" has a corresponding meaning.
a• a

Claims (6)

1. A method for enabling the base station to reject the location registration request of the illegal user of an MS detected by the HLR/VLR/AUC/MSC in a PCS complying with IS- 634 of the air interface, comprising the steps of: causing said HLR/VLR/AUC/MSC to classify the illegal users according to illegal use type; °oo causing said HLR/VLR/AUC/MSC to determine said illegal user as a particular illegal use type based on the previous classification of the illegal use types; transmitting a location updating reject message with a reject cause corresponding to said particular illegal use type to said base station; and causing said base station to transmit the information 'Lock Until Power-Cycled Order' or 'Maintenance Required Order' according to said reject cause.
2. A method as defined in Claim 1, wherein said location updating reject message includes different reject causes according to said illegal use types.
3. A method as defined in Claim 2, wherein said illegal use types include fee unsettled MS, lost MS, illegal IMSI/MIN/ESN MS, authentication failed MS, and unregistered MS.
4. A method as defined in Claim 3, wherein said fee unsettled MS represents the user with fee unsettled, said lost MS the user with the MS lost, said illegal IMSI/MIN/ESN MS the user with the IMSI/MIN/ESN illegally altered or copied, said authentication failed MS the user failing to enter valid authentication, and said unregistered MS the unregistered in HLR/VLR. A method as defined in Claim 4, wherein said illegal IMSI/MIN/ESN MS is detected by comparing the IMSI/MIN/ESN entered by the user with the registered IMSI/MIN/ESN.
6. A method as defined in Claim 5, wherein said authentication failed MS is detected by comparing the authentication of the MS requesting revision of the location registration with the existing authentication.
7. A method as defined in Claim 6, wherein said authentication consists of AUTHR/RANDC/COUNT/RAND. Dated this 15th day of March 2000 SAMSUNG ELECTRONICS CO., LTD. By their Patent Attorneys GRIFFITH HACK Fellows Institute of Patent and Trade Mark Attorneys of Australia S S
AU22305/00A 1999-03-15 2000-03-15 Method for preventing illegal use of a mobile station Ceased AU736371B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR99/8559 1999-03-15
KR1019990008559A KR100291040B1 (en) 1999-03-15 1999-03-15 method for controlling illegal users in PCS

Publications (2)

Publication Number Publication Date
AU2230500A true AU2230500A (en) 2000-09-21
AU736371B2 AU736371B2 (en) 2001-07-26

Family

ID=19576548

Family Applications (1)

Application Number Title Priority Date Filing Date
AU22305/00A Ceased AU736371B2 (en) 1999-03-15 2000-03-15 Method for preventing illegal use of a mobile station

Country Status (2)

Country Link
KR (1) KR100291040B1 (en)
AU (1) AU736371B2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100466844B1 (en) * 2002-04-24 2005-01-15 에스케이 텔레콤주식회사 Method and System for Controlling of Transaction in HRPD
KR100732482B1 (en) * 2004-05-10 2007-06-27 에스케이 텔레콤주식회사 Method and System for Managing Mobile Phone Disappearance with Authentication
KR101068291B1 (en) * 2004-10-27 2011-09-28 에스케이 텔레콤주식회사 Method And Apparatus For Checking Frauds Of Usage In Mobile Terminal
KR100905072B1 (en) * 2007-12-18 2009-06-30 주식회사 케이티프리텔 Method and System for protection of usage of a stolen equipment by forced re-location

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6161006A (en) * 1997-12-22 2000-12-12 Ericsson Inc. System and method for the early detection of cellular telephone piracy
AU3348599A (en) * 1998-03-25 1999-10-18 Telefonaktiebolaget Lm Ericsson (Publ) System and method of authenticating a mobile station's identity and handling authentication failures in a radio telecommunications network
US6211462B1 (en) * 1998-11-05 2001-04-03 Texas Instruments Incorporated Low inductance power package for integrated circuits

Also Published As

Publication number Publication date
KR100291040B1 (en) 2001-05-15
AU736371B2 (en) 2001-07-26
KR20000060342A (en) 2000-10-16

Similar Documents

Publication Publication Date Title
KR20160123604A (en) Method for managing of beacon device, and apparatus thereof
US7158803B1 (en) Emergency services for wireless data access networks
US7088988B2 (en) Over-the-air subsidy lock resolution
AU684434B2 (en) Method and apparatus for authentication in a communication system
EP1830513A4 (en) A method for implementing the function of the scene security and a system thereof
JP4040047B2 (en) Mobile communication terminal use restriction setting device and method
US8718602B2 (en) Method and system for remote control of smart card
CN102318386B (en) To the certification based on service of network
KR101810150B1 (en) THIRD PARTY'S SECURITY AUTHENTICATION SYSTEM BETWEEN MOBILE DEVICE AND IoT DEVICES AND METHOD THEREOF
EP1964328B1 (en) Validating user identity by cooperation between core network and access controller
HK1077950A1 (en) Access point, terminal, encryption key configuration system, encryption key configuration method, and program
WO2003013161A3 (en) Wireless bridge for roaming in network environment
EP1324541A3 (en) Communication system, wireless communication apparatus, and communication method
CN102859966A (en) Wireless network authentication apparatus and methods
WO2004084473A3 (en) Authenticating between a cdma network and a gsm network
EP1124397A3 (en) Simplified security for handoff in wireless communications
EP1577735A3 (en) Method and system enforcing computer security utilizing an adaptive lattice mechanism
JP2009055454A (en) Base station apparatus
ATE389285T1 (en) METHOD FOR DISCONNECTING A WLAN USER FROM A WLAN ACCESS NETWORK
EP1315391A3 (en) Authentication system, mobile terminal, and authentication method
US20030220094A1 (en) Mobile equipment theft deterrent system and method
AU2230500A (en) Method for preventing illegal use of a mobile station
JP4690423B2 (en) Core network method and apparatus
JPH0746661A (en) System and equipment for mobile radio communication
KR101208722B1 (en) Method for accessing closed groups in radio access networks

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)