EP0988765A1 - Systeme et procede de detection des utilisations non autorisees des telephones cellulaires - Google Patents

Systeme et procede de detection des utilisations non autorisees des telephones cellulaires

Info

Publication number
EP0988765A1
EP0988765A1 EP98928032A EP98928032A EP0988765A1 EP 0988765 A1 EP0988765 A1 EP 0988765A1 EP 98928032 A EP98928032 A EP 98928032A EP 98928032 A EP98928032 A EP 98928032A EP 0988765 A1 EP0988765 A1 EP 0988765A1
Authority
EP
European Patent Office
Prior art keywords
potential
user
destination location
caller
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP98928032A
Other languages
German (de)
English (en)
Inventor
Richard N. Thurley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nortel Networks Ltd
Original Assignee
Nortel Networks Ltd
Nortel Networks Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nortel Networks Ltd, Nortel Networks Corp filed Critical Nortel Networks Ltd
Publication of EP0988765A1 publication Critical patent/EP0988765A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Definitions

  • This invention relates generally to wireless communication networks, and in particular, to a system and method for detecting and preventing an unauthorized cellular telephone user from fraudulently using account information of another to complete a call.
  • each MSC may serve a network of 100 or more cell sites, or base stations, each of which defining a particular cell.
  • a mobile unit such as a cellular telephone subscribes to a group of MSCs, hereinafter represented by a single "home" MSC.
  • the home MSC maintains a home location register
  • HLR home location register
  • MIN mobile identification number
  • ESN electronic serial number
  • the particular cell containing the mobile unit is then identified from a reverse control channel used for the mobile response and a cellular link is then set up. If the MSC providing service for the call (the "serving" MSC) recognizes the MIN and ESN, as well as other certain parameters, a cellular link is established with the mobile unit and the call is completed to the destination number.
  • cellular fraud occurs when an unauthorized cellular device uses the MIN and ESN associated with a legitimate mobile unit. Once the MIN and ESN have been discovered, the unauthorized cellular device may utilize the cellular communication network at the expense of the legitimate mobile unit. Furthermore, due to the very nature of mobile units, it is extremely difficult to track down the unauthorized device.
  • One solution to prevent cellular fraud is to require a personal identification number (“PIN”) to be included with each call. However, this solution is often ineffective because the PIN can be stolen as easily as the MIN and ESN.
  • PIN personal identification number
  • a database such as a home location register stores a listing of potential terminating numbers that the authorized user may call. Therefore, whenever a call is initiated by a cellular telephone using the identification numbers of the authorized user, the called number is compared to the listing. If the called number is in the listing, the call completes normally. If not, an additional level of security can be provided. For example, the caller may be prompted for a secxirity code, the caller may be transferred to a service center, or the caller may be transferred to a cellular-fraud-prevention task force.
  • the caller supplies the correct security code, then it is assumed that he is the authorized user and the call completes normally. Furthermore, the called number may then be added to the listing. Otherwise, it is assumed that the caller is a fraudulent user and is handled accordingly.
  • An advantage with the present invention is that it adapts easily and inexpensively to existing cellular telephones and switches.
  • Another advantage with the present invention is that since the security code is seldom used, it is difficult to steal.
  • Fig. 1 illustrates an exemplary cellular communication network.
  • Fig. 2 is a flowchart illustrating a method for detecting and preventing cellular fraud, such as may occur in the cellular communication network of Fig. 1. Description of the Preferred Embodiment
  • the reference numeral 10 designates a simplified communication network.
  • the communication network 10 includes a first cellular network 12, a second cellular network 14 and a public switched telephone network ("PSTN") 15.
  • the first cellular network 12 is graphically represented by an MSC 16 and two cell sites 18 and 20.
  • the MSC 16 serves to interconnect the PSTN 15 with a cellular telephone 22 through the cell site 18.
  • the second cellular network 14 is graphically represented by an MSC 26 and two cell sites 28 and 30.
  • the MSC 26 serves to interconnect the PSTN 15 with a cellular telephone 32 through the cell site
  • the PSTN 15 is also connected to two land-line telephones 34 and 36 and an interactive voice response system ("INR") 38.
  • ILR interactive voice response system
  • MSCs 16, 26 Associated with each of the MSCs 16, 26 are internal processing and storage devices (not shown) and NLRs 16a, 26a, respectively. It is understood that although the cellular networks 12 and 14 are shown as separate and distinct, they may alternatively represent subsets of a single, larger cellular network.
  • the MSCs 16, 26, as well as the INR 38, are also connected to an intelligent network ("IN") 40.
  • the IN 40 includes a conventional signaling protocol such as Signaling System 7 and is capable of accessing data from a signal control point ("SCP") database 42 and an HLR 44 associated with the MSC 16.
  • SCP signal control point
  • HLR 44 associated with the MSC 16.
  • the IN 40 may be used for various conventional purposes, including facilitating roaming of the cellular telephone 22 between the two cellular networks 12 and 14.
  • a routine 100 is used to prevent cellular fraud by an unauthorized cellular telephone.
  • the routine will be applied to the communications network 10 of Fig. 1.
  • the cellular telephone 22 is an authorized user with a valid MIN and ESN and a subscriber to the MSC 16 while the cellular telephone 32 has obtained the MIN and ESN of the cellular telephone 22 and is attempting use thereof.
  • the authorized user defines a listing of potential phone numbers that he is allowed to call. Tables 1 and 2 below give examples of such listings.
  • the first column CDNIDX of each table provides index values with which the individual rows, or records, of may be identified. For each authorized user, one or more indices may be used to determine which terminating telephone numbers have been pre- allowed.
  • the second column RGE of each table indicates whether a range of numbers (Table 1) has been pre-allowed or individual numbers (Table 2) have been pre-allowed. Referring to Table 1, the third and fourth columns, FROMDIGS and TODIGS, provide the range of potential terminating telephone numbers for domestic calls.
  • the fifth column INTL is an indicator of whether international calls are allowed.
  • the sixth and seventh columns, FRO and TO provide a range of potential terminating telephone numbers for international numbers.
  • the third, fourth and fifth columns, NUM1, NUM2 and NUM3, indicate individual potential terminating telephone numbers.
  • the number of columns in Table 2 is dynamic, being determined by the number of pre-allowed potential terminating telephone numbers.
  • the authorized user may establish personalized information that may be used to denote authorization.
  • the personalized information may be security code, a mother's maiden name or some other password.
  • the information of Tables 1 and 2, along with the personalized information, may be stored in several different places. For one, it may be stored in a database (HLR 44) associated with the user's home network (cellular network 12). Alternatively or in addition, the information may be stored in a database (SCP 42) connected to the serving switch (MSC 26) through an intelligent network (IN 40).
  • HLR 44 database associated with the user's home network
  • SCP 42 database connected to the serving switch (MSC 26) through an intelligent network (IN 40).
  • the authorized user has established the listing as indicated by CDNIDX index 3.
  • the phone number for the land-line telephone 34 is 7135551111 and is included in the range of potential terminating telephone numbers associated with CDNIDX index 3.
  • the phone number for the land-line telephone 36 is 2145551111 and is not included in the range of potential terminating telephone numbers associated with CDNIDX index 3.
  • a caller (cellular telephone 32) initiates a call to a destination phone (telephone 34 or 36) by contacting the serving switch (MSC 26).
  • the serving switch accesses the listing of potential terminating telephone numbers that was established at step 102 (Tables 1 and 2).
  • the serving switch may automatically access the listings, or may be triggered by a certain code stored along with the caller's general profile information.
  • the serving switch can access the listing by querying (using CDNIDX index 3) a database (HLR 44) and copying the retrieved information (the potential terminating telephone numbers associated with the CDNIDX index 3) into one of its own databases (VLR 26a).
  • the serving switch can access the listing by querying another database (SCP 42) attached to the switch through an intelligent network (IN 40).
  • the listing may presently exist in the serving switch.
  • the routine 100 may be tested and implemented in a single switch.
  • step 108 a determination is made as to whether the initiated call is authorized. (Is it is to one of the potential terminating telephone numbers associated with CDNIDX index 3?) If so (telephone 34), execution proceeds to step 110 where the call is completed. If not (telephone 36), execution proceeds to step 112 and the call is directed to a service provider
  • the caller may be prompted (by the INR 38) for a security code, his response being compared to the security code stored during step 102.
  • the caller may be transferred to a service center that asks questions such as the caller's mother's maiden name.
  • the caller may be transferred to a cellular-fraud-prevention task force who then takes steps to track down the caller.
  • execution proceeds to step 110 where the call is completed.
  • the service provider may also add the called number (telephone 36) to the list of potential terminating telephone numbers. If the caller is not authorized, the call is not completed. Instead execution proceeds to step 116 where the unauthorized caller is appropriately handled.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention concerne l'utilisation d'oligonucléotides antisens dirigés contre des séquences d'acides nucléiques spécifiques qui codent pour des récepteurs, seuls ou en combinaison, afin d'inhiber la réaction inflammatoire présente dans l'asthme, l'atopie ou l'hyperéosinophilie, et pour inhiber une prolifération de cellules néoplasiques. Les oligonucléotides antisens de l'invention sont utilisés pour traiter et/ou prévenir l'asthme, des allergies, l'hyperéosinophilie, une inflammation générale ou le cancer. Les oligonucléotides de l'invention sont plus spécifiquement dirigés contre des séquences d'acides nucléiques qui codent pour un récepteur de CCR3, pour une sous-unité commune de récepteurs d'IL-4 et d'IL-13, ou pour une sous-unité commune de récepteurs d'IL-3, d'IL-5 et du GM-CSF.
EP98928032A 1997-06-11 1998-06-10 Systeme et procede de detection des utilisations non autorisees des telephones cellulaires Withdrawn EP0988765A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US87287997A 1997-06-11 1997-06-11
US872879 1997-06-11
PCT/CA1998/000572 WO1998057514A1 (fr) 1997-06-11 1998-06-10 Oligonucleotides antisens servant a traiter ou a prevenir des maladies atopiques et une proliferation de cellules neoplasiques

Publications (1)

Publication Number Publication Date
EP0988765A1 true EP0988765A1 (fr) 2000-03-29

Family

ID=25360511

Family Applications (1)

Application Number Title Priority Date Filing Date
EP98928032A Withdrawn EP0988765A1 (fr) 1997-06-11 1998-06-10 Systeme et procede de detection des utilisations non autorisees des telephones cellulaires

Country Status (4)

Country Link
EP (1) EP0988765A1 (fr)
AU (1) AU8005698A (fr)
CA (1) CA2293450A1 (fr)
WO (1) WO1998057514A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9900777B2 (en) 2015-04-10 2018-02-20 Wal-Mart Stores, Inc. Systems and methods for controlling mobile device use

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI107983B (fi) 1998-12-23 2001-10-31 Nokia Networks Oy Vilpillisen käytön havaitseminen ja estäminen tietoliikenneverkossa
GB2413459B (en) * 2004-04-19 2007-06-06 Motorola Inc Apparatus and method of cell broadcasting
US7373137B2 (en) 2005-06-21 2008-05-13 International Business Machines Corporation Method to challenge cell phone user for fraudulent use
US9531695B2 (en) 2009-06-12 2016-12-27 Microsoft Technology Licensing, Llc Access control to secured application features using client trust levels
US9572036B2 (en) 2014-11-20 2017-02-14 At&T Intellectual Property I, L.P. Detection and blocking of cloned mobile devices

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NZ243768A (en) * 1991-07-31 1995-04-27 Telstra Corp Ltd Radio telephone network access control according to identity of calling unit

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9857514A1 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9900777B2 (en) 2015-04-10 2018-02-20 Wal-Mart Stores, Inc. Systems and methods for controlling mobile device use
US10104551B2 (en) 2015-04-10 2018-10-16 Walmart Apollo, Llc Systems and methods for controlling mobile device use
US10397786B2 (en) 2015-04-10 2019-08-27 Walmart Apollo, Llc Systems and methods for controlling mobile device use

Also Published As

Publication number Publication date
WO1998057514A1 (fr) 1998-12-17
CA2293450A1 (fr) 1998-12-17
AU8005698A (en) 1998-12-30

Similar Documents

Publication Publication Date Title
US6560455B2 (en) Roaming authorization system
US6324396B1 (en) Calling party number provisioning
CA2329479C (fr) Systeme et procede de definition de services de localisation
US6393283B1 (en) Wireless communications system and method of operation for reducing fraud
US6449479B1 (en) Apparatus and method for mobile subscriber service modification
CN1162033C (zh) 用于授权定位业务的系统与方法
US8898004B2 (en) Method for the determination of a receiver for location information
US6161012A (en) Short code dialling
US6463276B1 (en) Mobile terminal having conditional blocking of outgoing call requests
US20090029684A1 (en) Dynamic identity association within a wireless network
MXPA97000887A (es) Sistema de autorizacion para comunicacion fuera de area domestica
JP2002505056A (ja) ターミナル装置の使用を制限する方法
WO1998059503A1 (fr) Services pour telephones mobiles en fonction de la localisation
US7974602B2 (en) Fraud detection techniques for wireless network operators
US6308067B1 (en) Wireless communications system and method of operation for reducing fraud
EP0886979B1 (fr) Indicatifs de numerotation abregee
EP0988765A1 (fr) Systeme et procede de detection des utilisations non autorisees des telephones cellulaires
US6044269A (en) Method for enhanced control of mobile call delivery
WO1997026769A1 (fr) Procede et systeme de reduction de la fraude dans un systeme de telecommunications cellulaire
KR100417525B1 (ko) 분실된 이동 통신 단말기를 찾기 위한 이동 서비스 교환센터의 서비스 제공 방법
JP2012503348A (ja) ホーム基地局のための信号伝送トラフィック最小化
WO1998057514B1 (fr) Oligonucleotides antisens servant a traiter ou a prevenir des maladies atopiques et une proliferation de cellules neoplasiques
AU746292B2 (en) Method of performing home zone service in mobile radio communication system
EP1185118A1 (fr) Procédé d'obtention, pour une unité mobile, d'informations relatives aux tarifs de roaming
WO2000027144A1 (fr) Translation de numero appele

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19991220

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): DE FR GB

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: NORTEL NETWORKS LIMITED

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Withdrawal date: 20020529