WO1998057514B1 - System and method for detecting unauthorized use of a cellular telephone - Google Patents

System and method for detecting unauthorized use of a cellular telephone

Info

Publication number
WO1998057514B1
WO1998057514B1 PCT/CA1998/000572 CA9800572W WO9857514B1 WO 1998057514 B1 WO1998057514 B1 WO 1998057514B1 CA 9800572 W CA9800572 W CA 9800572W WO 9857514 B1 WO9857514 B1 WO 9857514B1
Authority
WO
WIPO (PCT)
Prior art keywords
user
potential
destination location
records
switch
Prior art date
Application number
PCT/CA1998/000572
Other languages
French (fr)
Other versions
WO1998057514A1 (en
Filing date
Publication date
Application filed filed Critical
Priority to CA002293450A priority Critical patent/CA2293450A1/en
Priority to EP98928032A priority patent/EP0988765A1/en
Priority to AU80056/98A priority patent/AU8005698A/en
Publication of WO1998057514A1 publication Critical patent/WO1998057514A1/en
Publication of WO1998057514B1 publication Critical patent/WO1998057514B1/en

Links

Abstract

A system and method for detecting and preventing cellular fraud in a cellular network. The network includes a database such as a home location register that stores a listing of potential terminating numbers that the authorized user is allowed to call. Therefore, whenever a call is initiated by a cellular telephone using the identification number of the authorized user, the called number is compared to the listing. If the called number is in the listing, the call completes normally. If not, an additional level of security can be provided. For example, the caller may be prompted for a security code, the caller may be transferred to a service center, or the caller may be transferred to a cellular-fraud-prevention task force. If, in the first example, the caller supplies the correct security code, then it is assumed that he is the authorized user and the call completes normally. Furthermore, the called number may then be added to the listing. Otherwise, it is assumed that the caller is a fraudulent user and is handled accordingly.

Claims

AMENDED CLAIMS[received by the International Bureau on 5 January 1999 (05.01.99); original claims 1, 2, 3, 12, 13 and 15 amended; remaining claims unchanged (5 pages)]
1. A method for regulating the use of a wireless network, the method comprising the steps of: receiving an identification signal identifying a potential user and a destination signal identifying a potential destination location; accessing one or more records of predetermined destination locations associated with the identified potential user to determine if the potential destination location is included therewith; when the potential destination location is included in the one or more records, connecting the identified potential user to the potential destination location; and prompting the identified potential user for a code if the potential destination location is not included in the one or more records.
2. The method of claim 1 further comprising the step of: preventing the identified potential user from connecting to the potential destination location when the potential destination location is not included in the one or more records.
3. The method of claim 1 further comprising the step of connecting the identified potential user to the potential destination location in response to receipt of the code.
4. The method of claim 3 further comprising the step of: prohibiting the identified potential user from connecting to the potential destination location if the potential destination location is not included in the one or more records and the code is not received.
1 4
5. The method of claim 3 further comprising the step of: adding the potential destination location to the one or more records.
6. The method of claim 1 wherein the wireless network is a cellular telephone network.
7. The method of claim 1 wherein the signals are received by a switch and the step of accessing includes querying a database for the one or more records.
8. The method of claim 7 wherein the database is stored in the switch.
9. The method of claim 7 wherein the database is accessible via a network connected to the switch.
10. The method of claim 7 wherein the one or more records are first copied to the switch.
11. The method of claim 7 wherein the one or more records define general areas of potential destination locations.
1 5
12. A system for determining whether a mobile unit is a fraudulent user of a cellular communication network, the system comprising: a storage device for storing a listing of potential terminating numbers; " a receiver for receiving a call including an identification number from the mobile unit and a desired terminating number; a processing device for querying the listing of potential terminating numbers associated with the identification number, to determine if the desired terminating number is authorized; a switch for connecting the mobile unit to the destination location if the desired terminating number is authorized; and a mechanism for prompting the user for a code if the terminating number is not authorized; wherein the listing of potential terminating numbers was established by the user before the call was received.
13. A system for regulating the use of a wireless network by a caller, the system comprising: a receiver for receiving an identification number identifying a user and a destination number identifying a destination location; processing means for accessing a database to determine if connection to the destination location has been pre-allowed by an authorized user; means for connecting the caller to the destination location if it is determined that the connection has been pre-allowed; and means for prompting the user for a code if the connection has not been pre-allowed by the user.
14. The system of claim 13 wherein the means for connecting will not connect the caller to the destination location if the connection has not been pre- allowed by the user.
1 6
15. The system of claim 13 wherein the means for connecting connects the caller to the destination location in response to receipt of the code.
16. The system of claim 15 wherein the means for connecting will not connect the caller to the destination location if the connection has not been pre- allowed by the user.
17. The system of claim 15 wherein the processing means adds the destination location to the database upon receipt of the code.
18. The system of claim 13 wherein the wireless network is a cellular telephone network and the user is a cellular telephone.
19. The system of claim 13 wherein the numbers are received by a switch and the processing device is connected to the switch.
20. The system of claim 19 wherein the database is stored in the switch.
21. The system of claim 19 wherein the database is accessible via a network.
22. The system of claim 19 wherein the database is first copied to the switch.
1 7
23. The system of claim 19 wherein the database includes a listing of destination locations designated in advance by the user.
24. The system of claim 23 wherein the switch includes an index for identifying certain records of the pre-allowed destination locations.
PCT/CA1998/000572 1997-06-11 1998-06-10 System and method for detecting unauthorized use of a cellular telephone WO1998057514A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CA002293450A CA2293450A1 (en) 1997-06-11 1998-06-10 System and method for detecting unauthorized use of a cellular telephone
EP98928032A EP0988765A1 (en) 1997-06-11 1998-06-10 System and method for detecting unauthorized use of a cellular telephone
AU80056/98A AU8005698A (en) 1997-06-11 1998-06-10 System and method for detecting unauthorized use of a cellular telephone

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US87287997A 1997-06-11 1997-06-11
US08/872,879 1997-06-11

Publications (2)

Publication Number Publication Date
WO1998057514A1 WO1998057514A1 (en) 1998-12-17
WO1998057514B1 true WO1998057514B1 (en) 1999-02-25

Family

ID=25360511

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA1998/000572 WO1998057514A1 (en) 1997-06-11 1998-06-10 System and method for detecting unauthorized use of a cellular telephone

Country Status (4)

Country Link
EP (1) EP0988765A1 (en)
AU (1) AU8005698A (en)
CA (1) CA2293450A1 (en)
WO (1) WO1998057514A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI107983B (en) 1998-12-23 2001-10-31 Nokia Networks Oy Detecting and preventing fraudulent use in a telecommunications network
GB2413459B (en) * 2004-04-19 2007-06-06 Motorola Inc Apparatus and method of cell broadcasting
US7373137B2 (en) 2005-06-21 2008-05-13 International Business Machines Corporation Method to challenge cell phone user for fraudulent use
US9531695B2 (en) 2009-06-12 2016-12-27 Microsoft Technology Licensing, Llc Access control to secured application features using client trust levels
US9572036B2 (en) 2014-11-20 2017-02-14 At&T Intellectual Property I, L.P. Detection and blocking of cloned mobile devices
US9900777B2 (en) 2015-04-10 2018-02-20 Wal-Mart Stores, Inc. Systems and methods for controlling mobile device use

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NZ243768A (en) * 1991-07-31 1995-04-27 Telstra Corp Ltd Radio telephone network access control according to identity of calling unit

Similar Documents

Publication Publication Date Title
US6011976A (en) Telecommunications system with value added service directory and an integrated circuit module therefor
US6173172B1 (en) System and method for preventing the unauthorized use of a mobile communication device
US5454027A (en) Phantom mobile identification number method and apparatus
EP0820207B1 (en) Method and system for automatic activation of a wireless device
US7200220B1 (en) Portable telephone maintenance service system and maintenance service method
US5933785A (en) Telephone and method for concurrent registration of two identification numbers using multi-number sim card
US7505758B2 (en) Apparatus and method for setting use restriction of mobile communication terminal
US7657287B2 (en) Mobile station in a mobile communication system and method for accessing a service and/or a data record in the mobile station's standby mode
JPH07212460A (en) Security system for discontinuing fraudulent telephone speech
US5970405A (en) Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint analysis
EP1589779A2 (en) Function-limiting device and function-limiting method
GB2241133A (en) Radiotelephone having removable memory means for storing radio user validation code
CN103037062A (en) Method and terminal and server used for intercepting crank calls
WO2001062029A1 (en) Method of security storage of information
EP1092331B1 (en) Authorization method for operational changes on a mobile phone
JP2001230858A (en) Mobile phone system and mobile phone
CN101507247A (en) Method for call-theft detection
WO1998057514B1 (en) System and method for detecting unauthorized use of a cellular telephone
US6266543B1 (en) Electronic phone book dialing system combined with a vehicle-installed hand-free system of a cellular phone
JPH0746661A (en) System and equipment for mobile radio communication
EP0873032A1 (en) Authentication system for a mobile telephone
KR100245442B1 (en) Radio call receiver and receiver method
EP0988765A1 (en) System and method for detecting unauthorized use of a cellular telephone
WO1995024107A1 (en) Cellular telephone fraud control system and method
JPH03160591A (en) Prepaid card management system