WO1996028948A1 - Apparatus and method for preventing fraudulent activity in a communication network - Google Patents

Apparatus and method for preventing fraudulent activity in a communication network Download PDF

Info

Publication number
WO1996028948A1
WO1996028948A1 PCT/US1996/003597 US9603597W WO9628948A1 WO 1996028948 A1 WO1996028948 A1 WO 1996028948A1 US 9603597 W US9603597 W US 9603597W WO 9628948 A1 WO9628948 A1 WO 9628948A1
Authority
WO
WIPO (PCT)
Prior art keywords
signal
information
allocating
voice channel
call
Prior art date
Application number
PCT/US1996/003597
Other languages
French (fr)
Inventor
Eric A. Johnson
Original Assignee
Coral Systems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Coral Systems, Inc. filed Critical Coral Systems, Inc.
Priority to AU54243/96A priority Critical patent/AU5424396A/en
Publication of WO1996028948A1 publication Critical patent/WO1996028948A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Definitions

  • the present invention relates generally to monitoring the use of a communications network and, more particularly, to an apparatus and method for using characteristic information of a transmitter to determine whether the transmitter is authorized for use in a communications network prior to assigning the transmitter a network communication channel.
  • the invention is particularly useful for identifying clone cellular phones before they gain access to a cellular telecommunications network.
  • Communications networks are often monitored for security and record keeping purposes.
  • security involves monitoring access requests to ensure that network use is limited to authorized users. Record keeping may involve recording information relating to the users involved in a particular communication and the time and duration of the communication.
  • the case of a cellular telecommunications network is illustrative. Access to the network is initiated by transmission of a signal from a cellular telephone transmitter to a network receiver. The signal typically includes certain encoded information intended to identify the source and target transmitters.
  • the encoded information is used to verify that the source transmitter belongs to an authorized subscriber and, upon verification of the encoded information, a voice channel is allocated for the telephone call, i.e., communication between the source and the target user is initiated by providing access to a selected voice channel.
  • a network monitoring system begins recording information regarding the communication for billing purposes.
  • a hang ⁇ up signal is detected by the monitoring system which then terminates the voice channel and generates a billing report.
  • Clones are telephones which fraudulently access the network by employing stolen code information.
  • the code information is typically stolen by intercepting and decoding a radio frequency (RF) signal from a cellular telephone transmitter to a network receiver.
  • RF radio frequency
  • the present invention improves communications network security by using signal characteristics of a source transmitter to identify potentially fraudulent activity, e.g., use of a clone transmitter, to terminate an attempted access to the network before a communication channel is allocated.
  • signal characteristics of a source transmitter to identify potentially fraudulent activity
  • e.g., use of a clone transmitter to terminate an attempted access to the network before a communication channel is allocated.
  • signal characteristics in contrast to readily copied code information for identifying a transmitter, greatly reduces or substantially eliminates the opportunity for clone telephones to access a voice channel for fraudulent activities.
  • the present invention reduces record keeping and billing errors.
  • cellular telecom ⁇ munications networks generally begin recording billing information as soon as the voice channel is allocated. Accordingly, if the fraudulent communication is identified or terminated after channel allocation, a billing report is generated even though the voice channel may be terminated immediately upon identification of the fraud. As a result, erroneous billing statements are issued for authorized subscribers whose phones have been cloned. Correcting these statements creates a nuisance for subscribers and places a significant burden on network resources.
  • a communications network is provided with a receiver for receiving signal characteristic information of a source transmitter, an authorization system for using the received signal characteristic information to determine whether the source transmitter is authorized to access the network, and an output system for providing a security clearance signal, e.g., indicating that access is authorized or denied, based on the authorization determination.
  • the security clearance signal is communicated to the communication channel allocation system of the network so that a channel is only established upon receiving an indication that the source transmitter is authorized.
  • the transmission signals of a source transmitter have characteristics i.e., a signature, particular to that source. These characteristics can be identified in terms of amplitude and/or phase related or other parameters including derivative infor- mation such as time rate of change of amplitude/frequency and frequency band composition. Additionally, these characteristics can be recognized by analyses of the raw signal waveform or by various sampling techniques. Accordingly, the signal characteristic information can comprise the raw signal or characteristic information obtained by processing the signal.
  • the receiver includes an antenna for receiving the transmission signal and related circuitry for communicating signal information to the authorization system, which may be existing equipment utilized by a wireless telecommunications carrier.
  • the authorization system stores information pertaining to authorized transmitters and conducts security clearance based on a comparison of the received signal information to the stored information. Based on this comparison, a security clearance signal is communicated to the network communication channel allocation system according to a predetermined protocol.
  • the invention may also include structure/methodology for delaying channel allocation to ensure that the signal characteristic analysis can be completed before a channel is allocated. At the present time, the signal character ⁇ istic analysis can take longer than the time required to execute existing clearance procedures. Consequently, a communication channel could be allocated before the signal characteristic analysis was completed absent some delay to the existing clearance procedures.
  • An appropriate delay can be provided by implementing the signal characteristic analysis as a step within the existing clearance procedures or by otherwise inserting a pause or delay in the existing clearance procedures. In this manner, fraud management is enhanced and erroneous record keeping and billing is reduced at the expense of only a minor delay where necessary.
  • the present invention is incorporated into a conventional cellular telephone network.
  • the present invention can be integrated with existing network monitoring systems so that minimal alteration is required.
  • Conventional network monitoring systems analyze encoded information to identify authorized users prior to allocating a voice channel.
  • the functionality of such monitoring systems can be understood by reference to three sequential time periods. In the first time period, the stand-by period, the network stands prepared to process an incoming call including the encoded information. The stand-by period ends when a call is detected by a network receiver. The second time period, the set-up period, involves establishing a voice channel for the call.
  • a regional channel allocation system issues an authorization inquiry to an authorization system which compares the encoded information to predetermined authorization codes and outputs an authorization signal to the allocation system based on the comparison.
  • the set-up period ends when a voice channel is established by the allocation system.
  • the final period, the record keeping period, begins as soon as the voice channel is established.
  • a record of the communication is compiled which is used to generate billing statements.
  • security clearance based on signal characteristics of the source transmitter is completed during the set-up period.
  • the signal character- istic information is obtained via the remote receiver which detects the incoming call. This information is communicated to a signature device.
  • the signature device also receives the authorization inquiry from the voice channel allocation system which is encoded for communication to a conventional authorization system. The authenticity of the source transmitter is verified by the signature device based on both the conventional encoded ID information and the signal characteristic or signature information. The signature device then outputs a security signal to the channel allocation system in accordance with the network protocol to allocate or deny a voice channel based on the transmitter identification. In this manner, channel allocation is delayed if necessary until a positive transmitter identification based on code and signature information is completed.
  • Fig. 1A is a diagram illustrating a typical cellular telecommunications network
  • Fig. IB is a schematic illustration of a cellular telecommunications network that employs home location and visitor location registers
  • Fig. 1C is a block diagram illustrating pre-call communications between a home and a remote MSC
  • Fig. 2 is a schematic illustration of a cellular telecommunications network including a signature verification device according to the present invention
  • Fig. 3 is a schematic illustration of a cellular telecommunications network that employs home location and visitor location signature verification devices according to the present invention
  • Fig. 4 is a flow diagram illustrating the signature verification method of the present invention
  • Fig. 5 is a schematic illustration of a telecommunications network employing a signature device and a delay device according to the present invention.
  • Fig. 6 is a schematic illustration of a telecommunications network employing a signature device without conventional ID verification components according to the present invention.
  • the present invention is generally directed to reducing fraudulent activity in a communications network by identifying and terminating potentially fraudulent access requests before a communication channel is established.
  • FIG. 1A A diagram illustrating a typical cellular telecommunications network is illustrated in FIG. 1A.
  • each predetermined fixed geographic region is served by a separate Mobile Switching Center (MSC) .
  • MSC Mobile Switching Center
  • each MSC region may comprise one or more cells, wherein each cell is served by its own base station connected to the MSC for that region.
  • MSC Mobile Switching Center
  • Region I is served by a first MSC 101 while Region II is served by a second MSC 102.
  • Region I comprises four cells each having its own base station 104 connected to the first MSC 101.
  • Region II comprises three cells each having its own base station 106 connected to the second MSC 102.
  • a MSC One function of a MSC is to receive and route both cellular originated calls and cellular terminated calls.
  • a cellular originated call is one placed by a cellular telephone located within the MSC serving area to either another cellular telephone or a physical line telephone.
  • a cellular terminated call is one received by a cellular telephone located within the MSC serving area, regardless if placed by a cellular or physical line telephone.
  • the MSC which serves the geographic region in which a subscriber is based is considered a subscriber's "home" MSC.
  • MSC 101 would be the home MSC for a subscriber based in Region I.
  • MSC 102 would be the home MSC for a subscriber based in Region II.
  • each MSC is ultimately responsible for monitoring its home subscriber's usage.
  • the cellular telephone 103 communicates via a base station with the particular MSC serving that geographic region by means of wireless RF transmission. The subscriber may either remain within the particular cell from which the call was originated or the subscriber may roam across cell and MSC region boundaries.
  • a cellular call may be originated by a subscriber in Cell A and the call would be handled initially by the first MSC 101. However, because cellular telephones are mobile, the subscriber could travel from Cell A into Cell B during the course of the call. Upon crossing from Cell A into Cell B, the call would cease being handled by the first MSC 101 and may be picked up mid-call and handled by the second MSC 102.
  • MSCs are dispersed throughout the United States, and much of the world, so that a subscriber may call from any geographic region served by a MSC. Many of the various MSCs are interconnected so that tele ⁇ communications may occur between two cellular telephones. or between a cellular telephone and a physical line telephone, even if they are in different geographic regions.
  • Each subscriber's cellular telephone has its own unique ID code corresponding to a set of identification numbers.
  • the identification numbers comprise two individual identifiers — a Mobile Identification Number (MIN) , and (2) a Mobile Serial Number (MSN) also referred to as an Electronic Serial Number (ESN) .
  • the MSN/ESN is a unique serial number associated with the cellular telephone.
  • the MIN is a ten-digit number, corresponding to the ten-digit telephone number used in North America, having the format npa-nxx-xxxx, where npa corresponds to the first three digits in the area code in North America, nxx corresponds to the next three digits which identify the serving switch in North America, and xxxx corresponds to the last four digits which identify the individual subscriber or physical line number.
  • npa corresponds to the first three digits in the area code in North America
  • nxx corresponds to the next three digits which identify the serving switch in North America
  • xxxx corresponds to the last four digits which identify the individual subscriber or physical line number.
  • the format of the MIN may change based upon particular requirements. For example, the MIN may be modified to include a code which identifies the country in which the subscriber resides.
  • the combination of the npa and nxx components form a number which identifies a subscriber's "home" MSC.
  • the cellular telephone transmits to the MSC its unique combination of MIN and ESN.
  • the RF signal is received by an appropriate antenna associated with the base station receiver.
  • the base station receiver in turn transmits a signal either by RF or by land line telephone including the MIN and ESN to the regional MSC.
  • each MSC handling the call begins recording billing and record keeping information.
  • each MSC handling the call creates a separate Call Detail Record (CDR) which contains several items of information describing the call and the subscriber.
  • CDR contains the following call information items: MIN, ESN, number called, call duration, call origination date and time, country called, information identifying the MSC, etc.
  • each individual subscriber has a home MSC identified by the combination of the npa and nxx components of the subscriber's MIN.
  • the subscriber may only receive a cellular terminated call when that subscriber is within his or her home MSC region.
  • a subscriber may initiate a cellular originated call, however, from any MSC region without any special proactive requirements.
  • a subscriber who engages in telecommunication activity from a region other than his or her home MSC region is referred to as a "roamer.”
  • a subscriber based in Region I who originates a call from Region II would be considered a roaming subscriber in Region II.
  • the visited MSC incurs charges for the call. These charges are then billed back to the user's home MSC which, in turn, bills the user.
  • a MSC handling a roa er call is typically unable to independently verify the subscriber's ID code. Therefore, it is desirable to allow a MSC handling a roamer call to communicate with the home MSC to validate the particular call.
  • FIG. IB depicts a system whereby separate MSCs communicate to provide verification of the ESN/MIN ID code.
  • the MSC for Region I correspond's to a subscriber's home MSC 101 and the MSC 102 for Region II is a visited MSC.
  • the user's cellular telephone communicates with the visited MSC 102.
  • the visited MSC 102 upon determining that the attempted call is being placed by a roamer, communicates pre-call address information to Visitor Location Register (VLR) 130.
  • VLR Visitor Location Register
  • VLR 130 uses the pre- call address information to contact a Home Location Register (HLR) 142 associated with the subscriber's home MSC 101.
  • HLR Home Location Register
  • the subscriber's home HLR 142 uses the information to verify the ESN/MIN ID code. Substantially the same procedure occurs when a user roaming outside his or her home region turns the power to his or her cellular telephone on, or when a user crosses system or cell boundaries with the power on, or during an intermittent polling procedure initiated by the visited MSC 102. It should be appreciated that not all MSCs currently have an HLR, therefore, in such cases, VLRs are required to contact an independently maintained database of valid MIN/ESN combinations.
  • the HLR/VLR interface communicates pursuant to an industry standard, the IS-41 standard.
  • the IS-41 standard defines, among other things, the format of messages transmitted across the HLR/VLR interface between two MSCs. This format will be referred to as the IS-41 format. It should be appreciated, however, that the present invention is not limited to an architecture defined by the IS-41 standard and could be implemented using a different industry standard, including a proprietary standard.
  • FIG. 1C illustrates pre-call communications across an HLR/VLR interface.
  • the visited MSC 102 when a 'roaming' call is initiated, the visited MSC 102 generates a Registration Notification (REGNOT) message which, pursuant to the IS-41 standard, is passed to the VLR 130 associated with the visited MSC 102.
  • the VLR 130 forwards the REGNOT message to the HLR 142 associated with the user's home MSC 101 based on the pre-call address information.
  • the HLR 142 receives the REGNOT and utilizes portions of the REGNOT to determine whether the particular subscriber's current ESN/MIN is authorized.
  • REGNOT Registration Notification
  • the HLR 142 may then communicate a response to the visited MSC 102 via the HLR/VLR interface which indicates whether the particular subscriber's current ESN/MIN is authorized. Specifically, in accordance with the IS-41 standard, the HLR responds with, among other things, an authorization signal if the call is good, i.e., if the call request is by an authorized subscriber. If the call is bad, indicating an unauthorized ESN/MIN ID code, the HLR responds with an authorization denied signal. This information is communicated to the visited MSC 102 via the HLR/VLR interface and a voice channel is allocated or denied by the visited MSC 102 based on this information.
  • a clone can be constructed, for example, by intercepting the RF call request signal from the cellular telephone 103 to the base station 104 and decoding the ESN/MIN ID code. The code information can then be programmed into a clone which appears to be authorized to the MSC. As a result, fraudulent activities by such clones can escape detection by the FMS prior to channel allocation. Even if the fraudulent activity is later detected, a CDR may already have been generated by the MSC, resulting in a nuisance to the network provider and users and requiring significant resources to correct, particularly when considered on a network-wide basis.
  • An improved system for addressing the problems of clones and network management is shown in Fig. 2.
  • the call is placed by cellular telephone 103 via base station 104 in its home region.
  • the system conveniently makes use of various existing network components including the base station 104, MSC 101 and VLR 140.
  • the communications of the illustrated system 201 are fully compliant with the IS-41 standard.
  • the system 201 employs a signature device 202 to analyze the signal characteristics or signature of the source cellular telephone 103.
  • this signature can be defined by any of various signal characteristic information sufficient to identify the cellular telephone 103.
  • a function of the signature device is to store a database of subscriber-specific signature information, receive signature information for a particular call request and perform a comparison for the call request based on the database to determine whether the signature of the cellular telephone's call request signal matches the signature of an authorized subscriber.
  • the signature device 202 may either be a stand alone system or incorporated into the system's HLR (or vice versa) .
  • a signal including the signature information is communicated directly from a remote computing device at the base station 104 to the signature device 202.
  • the information is made available to the signature device without affecting the IS-41 standard communications.
  • the signature analysis is best performed based on data closely correlated to the raw request signal.
  • the signature information can be obtained before the signal loses valuable information due to buffering, filtering, analog-to-digital conversation or other conditioning or processing incident to transmission via the MSC.
  • a signal for use by the signature device 202 can be taken from the base station by a Y-link in the base station antenna substantially without disturbing base station/MSC communication.
  • the signal can be processed at the base station 104 and/or signature device 202.
  • An advantage of the illustrated system 201 is the ability to identify fraudulent activity prior to allocating a voice channel. This is accomplished by incorporating the signature device 202 into the IS-41 standard pre-call protocol. Referring to Figs. 2 and 4, a call is initiated when a call request is transmitted from the cellular telephone 103 to the base station 104. As part of the call set-up process, the ESN/MIN ID code information is transmitted from the base station 104 to the MSC 101. Signature information is also transmitted from the base station to the signature device 202 as described above.
  • the MSC 101 is programmed to treat all call requests as roamers. That is, for all call requests, the MSC 101 communicates pre-call address information to the VLR in accordance with the IS-41 standard. In this case, the pre- call address information directs the VLR to communicate a REGNOT to the signature device 202.
  • the signature device 202 performs the IS-41 standard ESN/MIN ID code check and also conducts the signature check. In this regard, the ESN/MIN ID code can be utilized by the signature device 202 to facilitate location of the corresponding signature information in the signature information database.
  • the system's HLR can be queried by the VLR provided the HLR is programmed to query the signature device 202 for a signature check prior to responding to the VLR.
  • both the code check and the signature check indicate that the call request originated from an authorized subscriber, then the IS-41 standard authorization signal is communicated from the signature device 202 or the HLR 202 to the MSC 101 via the VLR 140 and channel allocation ensues. Otherwise, the IS-41 standard authorization denied signal is output by the signature device 202 or the HLR and the attempted fraudulent activity is prevented.
  • a similar procedure is employed for call requests initiated by roamers. Referring to Fig. 3, for the purposes of illustration it is assumed that the cellular telephone 103 is now roaming in Region II outside of its home. Region I.
  • a call request initiated by cellular telephone 103 is received by visited base station 106 serviced by MSC 102 of Region II.
  • a signal including the signature information is communicated from a remote computing device at the visited base station 106 to the home signature device 202 directly, via inter-signature device connections or, through a modification to the IS-41 standard, along with the VLR/HLR communication.
  • the ESN/MIN ID code information is communicated from the visited base station 106 to the visited MSC 102.
  • the MSC is programmed to treat all call requests, including true roaming requests, as roaming requests.
  • the visited MSC communicates pre- call address information to the VLR 130 which issues a REGNOT to the home signature device 202 and/or the system HLR.
  • the signature device 202 conducts an ESN/MIN ID code check and a signature check as described above.
  • the home signature device 202 communicates an IS-41 standard authorization or authorization denied signal to the visited MSC 102 via the visited VLR 130 so that the MSC is directed to allocate a voice channel or prevent allocation based on the ESN/MIN ID code and signature information.
  • One purpose of conducting communication between the signature device 202 and the MSC 101 via the VLR 130 as described above, is to provide a delay in the conventional channel allocation process.
  • the signature checking process can take longer than the conventional ESN/MIN ID checking process.
  • a voice channel could be allocated prior to completion of the signature check absent a delay.
  • record keeping and billing functions are generally instigated as soon as a voice channel is allocated thereby potentially resulting in erroneous records in the case of fraudulent activity.
  • an appropriate delay is provided by inserting the signature check as a step within the existing fraud management system.
  • any other mechanism for providing a suitable delay may be employed.
  • Fig. 5 One such alternative system for providing a suitable delay is shown in Fig. 5.
  • the illustrated system employs a base station 104, MSC 101, VLR 140 and HLR 142 which are employed to conduct an authorization check based on the ESN/MIN ID code as discussed above.
  • the system also employs conventional interfaces between the VLR 140 and HLR 142 and corresponding components of other regional MSCs to handle roamers as previously discussed.
  • the illustrated system also employs the signature device 202 to conduct a signature check based on signal characteristics of the call request signal from cellular telephone 103.
  • the signature check is conducted outside of the MSC/VLR/HLR protocol.
  • the signature device 202 receives a signal including signature information from the base station or remote computing device at the base station 104, performs a signature check and communicates with the MSC 101 to enable voice channel allocation for authorized call requests without involving the VLR 140.
  • a delay device 210 is employed to provide an appropriate delay of voice channel allocation by the MSC 101.
  • the delay can be for a predetermined time sufficient to allow completion of the signature check or, optionally, the delay device 210 can be interconnected to the signature device 202 to receive a signal indicating that the signature check is complete, thereby determining the delay interval.
  • the MSC does not decide whether or not to allocate a voice channel until the results of both the ESN/MIN ID check and signature check are received, a number of system configurations are possible.
  • the MSC can be structured to postpone the allocation decision until the results of both checks have been received.
  • Fig. 6 illustrates a further alternative system in which the check provided by the signature device 202 is relied upon to the exclusion of the conventional ESN/MIN ID check.
  • the specific signature for a cellular telephone 103 can be represented as a digital code which can serve functions similar to the conventional ESN/MIN ID code, e.g., the "signature code" can be used to identify an authorized subscriber for record keeping and billing purposes.
  • the signature device receives a signal including signature information from the base station or a remote computing device at the base station 104, conducts a signature check and outputs a signal to the MSC 101 including voice channel security clearance information and subscriber identification information for record keeping purposes.
  • the ESN/MIN ID code may be employed by the signature device 202 to refer call requests by roamers to a signature device of the roamer's home region. While various embodiments of the present invention have been described in detail, it is apparent that further modifications and adaptations of the invention will occur to those skilled in the art. However, it is to be expressly understood that such modifications and adaptations are within the spirit and scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention allows for identification of potentially fraudulent activity in a communications network before a communication channel is established for the fraudulent activity. In one embodiment, an anti-fraud system (201) is employed in a cellular telecommunications network. The system (201) includes a signature device (202) which compares a signal characteristics of a call request signal from a cellular telephone (103) to stored signal characteristic information. This signal characteristic check is incorporated into an existing, pre-voice channel allocation, authorization protocol such that the signal characteristic check is completed prior to voice channel allocation.

Description

APPARATUS AND METHOD FOR PREVENTING FRAUDULENT ACTIVITY IN A COMMUNICATION NETWORK
FIELD OF THE INVENTION
The present invention relates generally to monitoring the use of a communications network and, more particularly, to an apparatus and method for using characteristic information of a transmitter to determine whether the transmitter is authorized for use in a communications network prior to assigning the transmitter a network communication channel. The invention is particularly useful for identifying clone cellular phones before they gain access to a cellular telecommunications network.
BACKGROUND OF THE INVENTION Communications networks are often monitored for security and record keeping purposes. In restricted access systems, e.g., systems made available only to paying subscribers, security involves monitoring access requests to ensure that network use is limited to authorized users. Record keeping may involve recording information relating to the users involved in a particular communication and the time and duration of the communication. The case of a cellular telecommunications network is illustrative. Access to the network is initiated by transmission of a signal from a cellular telephone transmitter to a network receiver. The signal typically includes certain encoded information intended to identify the source and target transmitters. Within the network, the encoded information is used to verify that the source transmitter belongs to an authorized subscriber and, upon verification of the encoded information, a voice channel is allocated for the telephone call, i.e., communication between the source and the target user is initiated by providing access to a selected voice channel. Once the voice channel is allocated, a network monitoring system begins recording information regarding the communication for billing purposes. When the call is completed, a hang¬ up signal is detected by the monitoring system which then terminates the voice channel and generates a billing report.
A growing concern to cellular network providers is the problem of clone cellular telephones. Clones are telephones which fraudulently access the network by employing stolen code information. The code information is typically stolen by intercepting and decoding a radio frequency (RF) signal from a cellular telephone transmitter to a network receiver. Once the stolen code information is programmed into a clone, access to the network by the clone may be billed to an unsuspecting subscriber. It is estimated that this form of fraud is currently costing network providers and subscribers millions of dollars per year.
SUMMARY OF THE INVENTION The present invention improves communications network security by using signal characteristics of a source transmitter to identify potentially fraudulent activity, e.g., use of a clone transmitter, to terminate an attempted access to the network before a communication channel is allocated. In a cellular telecommunications network, such use of signal characteristics, in contrast to readily copied code information for identifying a transmitter, greatly reduces or substantially eliminates the opportunity for clone telephones to access a voice channel for fraudulent activities.
Moreover, by identifying and terminating potentially fraudulent activity before a communication channel is established, the present invention reduces record keeping and billing errors. For example, cellular telecom¬ munications networks generally begin recording billing information as soon as the voice channel is allocated. Accordingly, if the fraudulent communication is identified or terminated after channel allocation, a billing report is generated even though the voice channel may be terminated immediately upon identification of the fraud. As a result, erroneous billing statements are issued for authorized subscribers whose phones have been cloned. Correcting these statements creates a nuisance for subscribers and places a significant burden on network resources. According to the present invention, fraudulent activity can be pre-empted such that a voice channel is never established for the fraudulent activity, record keeping functions of the network are not instigated in connection with the attempted fraudulent activity and billing reports or other communication summary data are not disseminated through network systems. According to one aspect of the present invention, a communications network is provided with a receiver for receiving signal characteristic information of a source transmitter, an authorization system for using the received signal characteristic information to determine whether the source transmitter is authorized to access the network, and an output system for providing a security clearance signal, e.g., indicating that access is authorized or denied, based on the authorization determination. The security clearance signal is communicated to the communication channel allocation system of the network so that a channel is only established upon receiving an indication that the source transmitter is authorized. In this manner, fraudulent activity can be identified based on signal characteristics before channel allocation is completed and a channel termination procedure is unnecessary for security purposes. That is, the channel monitoring and record keeping/billing functions of the network are substantially unaffected by the fraud management of the present invention. It will be appreciated that the transmission signals of a source transmitter have characteristics i.e., a signature, particular to that source. These characteristics can be identified in terms of amplitude and/or phase related or other parameters including derivative infor- mation such as time rate of change of amplitude/frequency and frequency band composition. Additionally, these characteristics can be recognized by analyses of the raw signal waveform or by various sampling techniques. Accordingly, the signal characteristic information can comprise the raw signal or characteristic information obtained by processing the signal.
Preferably, the receiver includes an antenna for receiving the transmission signal and related circuitry for communicating signal information to the authorization system, which may be existing equipment utilized by a wireless telecommunications carrier. The authorization system stores information pertaining to authorized transmitters and conducts security clearance based on a comparison of the received signal information to the stored information. Based on this comparison, a security clearance signal is communicated to the network communication channel allocation system according to a predetermined protocol. The invention may also include structure/methodology for delaying channel allocation to ensure that the signal characteristic analysis can be completed before a channel is allocated. At the present time, the signal character¬ istic analysis can take longer than the time required to execute existing clearance procedures. Consequently, a communication channel could be allocated before the signal characteristic analysis was completed absent some delay to the existing clearance procedures. An appropriate delay can be provided by implementing the signal characteristic analysis as a step within the existing clearance procedures or by otherwise inserting a pause or delay in the existing clearance procedures. In this manner, fraud management is enhanced and erroneous record keeping and billing is reduced at the expense of only a minor delay where necessary.
In one embodiment, the present invention is incorporated into a conventional cellular telephone network. Conveniently, the present invention can be integrated with existing network monitoring systems so that minimal alteration is required. Conventional network monitoring systems analyze encoded information to identify authorized users prior to allocating a voice channel. Generally, the functionality of such monitoring systems can be understood by reference to three sequential time periods. In the first time period, the stand-by period, the network stands prepared to process an incoming call including the encoded information. The stand-by period ends when a call is detected by a network receiver. The second time period, the set-up period, involves establishing a voice channel for the call. During this time period, a regional channel allocation system issues an authorization inquiry to an authorization system which compares the encoded information to predetermined authorization codes and outputs an authorization signal to the allocation system based on the comparison. The set-up period ends when a voice channel is established by the allocation system. The final period, the record keeping period, begins as soon as the voice channel is established. During this period, a record of the communication is compiled which is used to generate billing statements. In the cellular telecommunications network embodiment of the present invention, security clearance based on signal characteristics of the source transmitter is completed during the set-up period. The signal character- istic information is obtained via the remote receiver which detects the incoming call. This information is communicated to a signature device. The signature device also receives the authorization inquiry from the voice channel allocation system which is encoded for communication to a conventional authorization system. The authenticity of the source transmitter is verified by the signature device based on both the conventional encoded ID information and the signal characteristic or signature information. The signature device then outputs a security signal to the channel allocation system in accordance with the network protocol to allocate or deny a voice channel based on the transmitter identification. In this manner, channel allocation is delayed if necessary until a positive transmitter identification based on code and signature information is completed.
BRIEF DESCRIPTION OF THE DRAWINGS For a more complete understanding of the present invention and further understanding thereof, reference is now made to the following detailed description taken in conjunction with the drawings, in which:
Fig. 1A is a diagram illustrating a typical cellular telecommunications network; Fig. IB is a schematic illustration of a cellular telecommunications network that employs home location and visitor location registers;
Fig. 1C is a block diagram illustrating pre-call communications between a home and a remote MSC;
Fig. 2 is a schematic illustration of a cellular telecommunications network including a signature verification device according to the present invention;
Fig. 3 is a schematic illustration of a cellular telecommunications network that employs home location and visitor location signature verification devices according to the present invention;
Fig. 4 is a flow diagram illustrating the signature verification method of the present invention; Fig. 5 is a schematic illustration of a telecommunications network employing a signature device and a delay device according to the present invention; and
Fig. 6 is a schematic illustration of a telecommunications network employing a signature device without conventional ID verification components according to the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
The present invention is generally directed to reducing fraudulent activity in a communications network by identifying and terminating potentially fraudulent access requests before a communication channel is established.
This is accomplished by verifying the identity of a source transmitter based on its transmission signal signature as part of the set-up procedures preliminary to channel allocation. It will thus be appreciated that various aspects of the invention are applicable to a broad range of communications networks employing transmitters which are identifiable by virtue of their specific transmission signatures. In the following description, the invention is set forth with respect to specific implementations in the context of a cellular telecommunications network. A diagram illustrating a typical cellular telecommunications network is illustrated in FIG. 1A. Referring to FIG. 1A, each predetermined fixed geographic region is served by a separate Mobile Switching Center (MSC) . Additionally, each MSC region may comprise one or more cells, wherein each cell is served by its own base station connected to the MSC for that region. In FIG. 1A, Region I is served by a first MSC 101 while Region II is served by a second MSC 102. Region I comprises four cells each having its own base station 104 connected to the first MSC 101. Region II comprises three cells each having its own base station 106 connected to the second MSC 102.
One function of a MSC is to receive and route both cellular originated calls and cellular terminated calls. A cellular originated call is one placed by a cellular telephone located within the MSC serving area to either another cellular telephone or a physical line telephone. A cellular terminated call is one received by a cellular telephone located within the MSC serving area, regardless if placed by a cellular or physical line telephone.
The MSC which serves the geographic region in which a subscriber is based is considered a subscriber's "home" MSC. For example, MSC 101 would be the home MSC for a subscriber based in Region I. Similarly, MSC 102 would be the home MSC for a subscriber based in Region II. In addition to routing calls, each MSC is ultimately responsible for monitoring its home subscriber's usage. When a subscriber originates a call, the cellular telephone 103 communicates via a base station with the particular MSC serving that geographic region by means of wireless RF transmission. The subscriber may either remain within the particular cell from which the call was originated or the subscriber may roam across cell and MSC region boundaries. For example, a cellular call may be originated by a subscriber in Cell A and the call would be handled initially by the first MSC 101. However, because cellular telephones are mobile, the subscriber could travel from Cell A into Cell B during the course of the call. Upon crossing from Cell A into Cell B, the call would cease being handled by the first MSC 101 and may be picked up mid-call and handled by the second MSC 102.
Multiple MSCs are dispersed throughout the United States, and much of the world, so that a subscriber may call from any geographic region served by a MSC. Many of the various MSCs are interconnected so that tele¬ communications may occur between two cellular telephones. or between a cellular telephone and a physical line telephone, even if they are in different geographic regions.
Each subscriber's cellular telephone has its own unique ID code corresponding to a set of identification numbers. The identification numbers comprise two individual identifiers — a Mobile Identification Number (MIN) , and (2) a Mobile Serial Number (MSN) also referred to as an Electronic Serial Number (ESN) . The MSN/ESN is a unique serial number associated with the cellular telephone. The MIN is a ten-digit number, corresponding to the ten-digit telephone number used in North America, having the format npa-nxx-xxxx, where npa corresponds to the first three digits in the area code in North America, nxx corresponds to the next three digits which identify the serving switch in North America, and xxxx corresponds to the last four digits which identify the individual subscriber or physical line number. It will be appreciated by one of ordinary skill in the art that the format of the MIN may change based upon particular requirements. For example, the MIN may be modified to include a code which identifies the country in which the subscriber resides. The combination of the npa and nxx components form a number which identifies a subscriber's "home" MSC. At the initiation of each call, the cellular telephone transmits to the MSC its unique combination of MIN and ESN. The RF signal is received by an appropriate antenna associated with the base station receiver. The base station receiver in turn transmits a signal either by RF or by land line telephone including the MIN and ESN to the regional MSC.
Once a voice channel for a call has been allocated, each MSC handling the call begins recording billing and record keeping information. At the termination of each call, whether cellular originated or cellular terminated, each MSC handling the call creates a separate Call Detail Record (CDR) which contains several items of information describing the call and the subscriber. For example., the CDR contains the following call information items: MIN, ESN, number called, call duration, call origination date and time, country called, information identifying the MSC, etc.
As mentioned above, each individual subscriber has a home MSC identified by the combination of the npa and nxx components of the subscriber's MIN. In many cases today, unless a cellular subscriber has previously notified the home MSC of his or her whereabouts, the subscriber may only receive a cellular terminated call when that subscriber is within his or her home MSC region. In many cases, a subscriber may initiate a cellular originated call, however, from any MSC region without any special proactive requirements.
A subscriber who engages in telecommunication activity from a region other than his or her home MSC region is referred to as a "roamer." For example, a subscriber based in Region I who originates a call from Region II would be considered a roaming subscriber in Region II. In current practice, when a roaming subscriber places a call, the visited MSC incurs charges for the call. These charges are then billed back to the user's home MSC which, in turn, bills the user. Because only the subscriber's home MSC or independent databases maintain records of that subscriber's ID code and usage data, a MSC handling a roa er call is typically unable to independently verify the subscriber's ID code. Therefore, it is desirable to allow a MSC handling a roamer call to communicate with the home MSC to validate the particular call.
FIG. IB depicts a system whereby separate MSCs communicate to provide verification of the ESN/MIN ID code. In the description of FIG. IB, it is presumed that the MSC for Region I correspond's to a subscriber's home MSC 101 and the MSC 102 for Region II is a visited MSC. As illustrated in FIG. IB, when a roaming subscriber attempts to place a call in Region II, the user's cellular telephone communicates with the visited MSC 102. The visited MSC 102, upon determining that the attempted call is being placed by a roamer, communicates pre-call address information to Visitor Location Register (VLR) 130. VLR 130 uses the pre- call address information to contact a Home Location Register (HLR) 142 associated with the subscriber's home MSC 101. The subscriber's home HLR 142 then uses the information to verify the ESN/MIN ID code. Substantially the same procedure occurs when a user roaming outside his or her home region turns the power to his or her cellular telephone on, or when a user crosses system or cell boundaries with the power on, or during an intermittent polling procedure initiated by the visited MSC 102. It should be appreciated that not all MSCs currently have an HLR, therefore, in such cases, VLRs are required to contact an independently maintained database of valid MIN/ESN combinations.
The HLR/VLR interface communicates pursuant to an industry standard, the IS-41 standard. The IS-41 standard defines, among other things, the format of messages transmitted across the HLR/VLR interface between two MSCs. This format will be referred to as the IS-41 format. It should be appreciated, however, that the present invention is not limited to an architecture defined by the IS-41 standard and could be implemented using a different industry standard, including a proprietary standard.
FIG. 1C illustrates pre-call communications across an HLR/VLR interface. As illustrated in FIG. 1C, when a 'roaming' call is initiated, the visited MSC 102 generates a Registration Notification (REGNOT) message which, pursuant to the IS-41 standard, is passed to the VLR 130 associated with the visited MSC 102. The VLR 130 forwards the REGNOT message to the HLR 142 associated with the user's home MSC 101 based on the pre-call address information. The HLR 142 receives the REGNOT and utilizes portions of the REGNOT to determine whether the particular subscriber's current ESN/MIN is authorized. The HLR 142 may then communicate a response to the visited MSC 102 via the HLR/VLR interface which indicates whether the particular subscriber's current ESN/MIN is authorized. Specifically, in accordance with the IS-41 standard, the HLR responds with, among other things, an authorization signal if the call is good, i.e., if the call request is by an authorized subscriber. If the call is bad, indicating an unauthorized ESN/MIN ID code, the HLR responds with an authorization denied signal. This information is communicated to the visited MSC 102 via the HLR/VLR interface and a voice channel is allocated or denied by the visited MSC 102 based on this information.
An increasing problem associated with the system as described above is clone telephones. A clone can be constructed, for example, by intercepting the RF call request signal from the cellular telephone 103 to the base station 104 and decoding the ESN/MIN ID code. The code information can then be programmed into a clone which appears to be authorized to the MSC. As a result, fraudulent activities by such clones can escape detection by the FMS prior to channel allocation. Even if the fraudulent activity is later detected, a CDR may already have been generated by the MSC, resulting in a nuisance to the network provider and users and requiring significant resources to correct, particularly when considered on a network-wide basis. An improved system for addressing the problems of clones and network management is shown in Fig. 2. Referring to Fig. 2, it is assumed for the purposes of illustration that the call is placed by cellular telephone 103 via base station 104 in its home region. The system conveniently makes use of various existing network components including the base station 104, MSC 101 and VLR 140. In addition, as will be described below, the communications of the illustrated system 201 are fully compliant with the IS-41 standard.
In order to distinguish calls initiated by authorized subscribers from fraudulent activity involving clones, the system 201 employs a signature device 202 to analyze the signal characteristics or signature of the source cellular telephone 103. As previously noted, this signature can be defined by any of various signal characteristic information sufficient to identify the cellular telephone 103. A function of the signature device, then, is to store a database of subscriber-specific signature information, receive signature information for a particular call request and perform a comparison for the call request based on the database to determine whether the signature of the cellular telephone's call request signal matches the signature of an authorized subscriber. The signature device 202 may either be a stand alone system or incorporated into the system's HLR (or vice versa) .
In the illustrated system 201, a signal including the signature information is communicated directly from a remote computing device at the base station 104 to the signature device 202. In this manner, the information is made available to the signature device without affecting the IS-41 standard communications. Additionally, the signature analysis is best performed based on data closely correlated to the raw request signal. By directly communicating with the remote computing device at the base station, the signature information can be obtained before the signal loses valuable information due to buffering, filtering, analog-to-digital conversation or other conditioning or processing incident to transmission via the MSC. In this regard, a signal for use by the signature device 202 can be taken from the base station by a Y-link in the base station antenna substantially without disturbing base station/MSC communication. To obtain derivative signature information based on the call request signal, the signal can be processed at the base station 104 and/or signature device 202. An advantage of the illustrated system 201 is the ability to identify fraudulent activity prior to allocating a voice channel. This is accomplished by incorporating the signature device 202 into the IS-41 standard pre-call protocol. Referring to Figs. 2 and 4, a call is initiated when a call request is transmitted from the cellular telephone 103 to the base station 104. As part of the call set-up process, the ESN/MIN ID code information is transmitted from the base station 104 to the MSC 101. Signature information is also transmitted from the base station to the signature device 202 as described above.
The MSC 101 is programmed to treat all call requests as roamers. That is, for all call requests, the MSC 101 communicates pre-call address information to the VLR in accordance with the IS-41 standard. In this case, the pre- call address information directs the VLR to communicate a REGNOT to the signature device 202. The signature device 202 performs the IS-41 standard ESN/MIN ID code check and also conducts the signature check. In this regard, the ESN/MIN ID code can be utilized by the signature device 202 to facilitate location of the corresponding signature information in the signature information database. Alternatively, the system's HLR can be queried by the VLR provided the HLR is programmed to query the signature device 202 for a signature check prior to responding to the VLR. If both the code check and the signature check indicate that the call request originated from an authorized subscriber, then the IS-41 standard authorization signal is communicated from the signature device 202 or the HLR 202 to the MSC 101 via the VLR 140 and channel allocation ensues. Otherwise, the IS-41 standard authorization denied signal is output by the signature device 202 or the HLR and the attempted fraudulent activity is prevented.
A similar procedure is employed for call requests initiated by roamers. Referring to Fig. 3, for the purposes of illustration it is assumed that the cellular telephone 103 is now roaming in Region II outside of its home. Region I. A call request initiated by cellular telephone 103 is received by visited base station 106 serviced by MSC 102 of Region II. A signal including the signature information is communicated from a remote computing device at the visited base station 106 to the home signature device 202 directly, via inter-signature device connections or, through a modification to the IS-41 standard, along with the VLR/HLR communication. The ESN/MIN ID code information is communicated from the visited base station 106 to the visited MSC 102.
As before, the MSC is programmed to treat all call requests, including true roaming requests, as roaming requests. In this case, the visited MSC communicates pre- call address information to the VLR 130 which issues a REGNOT to the home signature device 202 and/or the system HLR. The signature device 202 conducts an ESN/MIN ID code check and a signature check as described above. In response to these checks, the home signature device 202 communicates an IS-41 standard authorization or authorization denied signal to the visited MSC 102 via the visited VLR 130 so that the MSC is directed to allocate a voice channel or prevent allocation based on the ESN/MIN ID code and signature information. One purpose of conducting communication between the signature device 202 and the MSC 101 via the VLR 130 as described above, is to provide a delay in the conventional channel allocation process. At the present time, the signature checking process can take longer than the conventional ESN/MIN ID checking process. As a result, a voice channel could be allocated prior to completion of the signature check absent a delay. As previously noted, this is problematic in that record keeping and billing functions are generally instigated as soon as a voice channel is allocated thereby potentially resulting in erroneous records in the case of fraudulent activity. In the system 201 of Figs. 2-4, an appropriate delay is provided by inserting the signature check as a step within the existing fraud management system. However, any other mechanism for providing a suitable delay may be employed.
One such alternative system for providing a suitable delay is shown in Fig. 5. Referring to Fig. 5, the illustrated system employs a base station 104, MSC 101, VLR 140 and HLR 142 which are employed to conduct an authorization check based on the ESN/MIN ID code as discussed above. Although not shown, the system also employs conventional interfaces between the VLR 140 and HLR 142 and corresponding components of other regional MSCs to handle roamers as previously discussed.
The illustrated system also employs the signature device 202 to conduct a signature check based on signal characteristics of the call request signal from cellular telephone 103. However, as shown in Fig. 5, the signature check is conducted outside of the MSC/VLR/HLR protocol. In particular, the signature device 202 receives a signal including signature information from the base station or remote computing device at the base station 104, performs a signature check and communicates with the MSC 101 to enable voice channel allocation for authorized call requests without involving the VLR 140. In order to ensure that a voice channel is not allocated prior to completion of the signature check, a delay device 210 is employed to provide an appropriate delay of voice channel allocation by the MSC 101. In this regard, the delay can be for a predetermined time sufficient to allow completion of the signature check or, optionally, the delay device 210 can be interconnected to the signature device 202 to receive a signal indicating that the signature check is complete, thereby determining the delay interval.
As long as the MSC does not decide whether or not to allocate a voice channel until the results of both the ESN/MIN ID check and signature check are received, a number of system configurations are possible. As another example, the MSC can be structured to postpone the allocation decision until the results of both checks have been received.
Fig. 6 illustrates a further alternative system in which the check provided by the signature device 202 is relied upon to the exclusion of the conventional ESN/MIN ID check. It will be appreciated that the specific signature for a cellular telephone 103 can be represented as a digital code which can serve functions similar to the conventional ESN/MIN ID code, e.g., the "signature code" can be used to identify an authorized subscriber for record keeping and billing purposes. In the illustrated system, the signature device receives a signal including signature information from the base station or a remote computing device at the base station 104, conducts a signature check and outputs a signal to the MSC 101 including voice channel security clearance information and subscriber identification information for record keeping purposes. Alternatively, the ESN/MIN ID code may be employed by the signature device 202 to refer call requests by roamers to a signature device of the roamer's home region. While various embodiments of the present invention have been described in detail, it is apparent that further modifications and adaptations of the invention will occur to those skilled in the art. However, it is to be expressly understood that such modifications and adaptations are within the spirit and scope of the present invention.

Claims

What is claimed is:
1. A wireless communications system, comprising: means for receiving a signal from a wireless telephone requesting the establishment of a voice channel with another telephone, wherein once a voice channel is established, charges begin to accrue for use of said voice channel; and means for performing an analysis of the RF characteristics of said signal to determine if said signal is indicative of potential fraud and if indicative thereof, prevent establishment of said voice channel.
2. The system of Claim 1, wherein said request signal includes encoded information different than said RF characteristics, and said means for receiving comprises means for decoding said encoded information.
3. The system of Claim 1, wherein said means for performing comprises means for analyzing said request signal to determine one of amplitude or phase related information.
4. The system of Claim 1, wherein said system further comprises means for allocating said voice channel and said means for performing comprises means for communicating a authorization signal to said means for allocating based on said analysis of said RF characteristics of said request signal, wherein said means for allocating employs said authorization signal to selectively allocate said voice channel.
5. The system of Claim 1, wherein said system further comprises means for analyzing said request signal to obtain encoded user identification information and selectively allocating said voice channel based on said encoded user identification information, said means for analyzing operating in accordance with an industry standard communication protocol, and said means for performing comprises means for communicating information relating to said analysis of said RF characteristics of said request signal to a voice channel allocating component in accordance with said industry standard communication protocol.
6. The system of Claim 1, further comprising means for delaying allocation of said voice channel until said analysis of said RF characteristics of said request signal is completed.
7. The system of Claim 6, wherein said system further comprises means for allocating said voice channel based on a security clearance signal and said delay means comprises means for preventing said security clearance signal from being communicated to said means for allocating until said analysis is completed.
8. The system of Claim 1, wherein said system further comprises: means for allocating said voice channel; means for communicating a first signal to said means for allocating based on said analysis of said RF signal characteristics; and means for communicating a second signal to said means for allocating based on encoded user identification information.
9. The system of Claim 1, wherein said means for performing an analysis comprises a first signal analyzer associated with a first region of said cellular communications system, a second signal analyzer associated with a second region of said cellular communications system and means for selectively referring said request signal to one of said first and second signal analyzers.
10. The system of Claim l, wherein said system further comprises means for allocating said voice channel and said means for performing is serially interposed between said means for receiving and said means for allocating.
11. An anti-fraud apparatus for use in a communications system, comprising: receiver means for receiving a transmission signal from a transmitter, said transmission signal including first identification information comprising code information encoded in said transmission signal and second identification information comprising signal characteristic information relating to said transmission signal; first identification means, associated with said receiver means, for receiving said first identification information and providing a first indication relative to the identity of said transmitter based on said first identification information; second identification means, associated with said receiver means, for receiving said second identification information and providing a second indication relative to the identity of said transmitter based on said second identification information; and communication channel prevention means, associated with said first and second identification means, for selectively preventing establishment of a communication channel for use by said transmitter based on said first and second indications, whereby communication channel allocation is determined relative to code information and signal characteristic information.
12. The apparatus of Claim 11, wherein said second identification means comprises means for analyzing said transmission signal to determine one of amplitude or phase related information.
13. The apparatus of Claim 11, further comprising means for communicating an authorization signal in accordance with an industry standard protocol to said communication channel prevention means based on said first and second indications, wherein said communication channel prevention means selectively allocates said communication channel based on said authorization signal.
14. The apparatus of Claim 11, further comprising means for preventing allocation of said communication channel until said second indication is provided by said second identification means.
15. The apparatus of Claim 11, further comprising means for receiving said first and second indications and providing an authorization signal to said communication channel prevention means, wherein said communication channel is allocated or denied in response to said authorization signal.
16. The apparatus of Claim 11, wherein said communication channel prevention means comprises a first signal analyzer associated with a first region of said communications system, and second signal analyzer associated with a second region of said communications system and means for selectively referring said second identification information to one of said first and second signal analyzers.
17. A device for preventing fraudulent activity in a cellular telephone network by analyzing a call request signal to identify fraudulent requests before a voice channel for the requested call is established by a channel allocating system of the cellular telephone network, said call request signal including encoded information for identifying a source of the call and being further defined by signal characteristic information different than said encoded information, which is substantially specific to the source of the call, said device comprising: means for receiving said signal characteristic information; means for using said received signal characteristic information to determine whether said source of said call is authorized to access said cellular telephone network and providing authorization information responsive thereto; and means, employing said authorization information, for selectively providing said security clearance signal to said channel allocating system, whereby said voice channel is only established after receiving an indication that said source is authorized to access said cellular telephone network based on said signal characteristic information.
18. The device of Claim 17, wherein said means for selectively providing comprises means for providing one of an authorization signal and an authorization denied signal to said channel allocating system.
19. The device of Claim 17, wherein said means for using said received signal characteristic information comprises a first signal analyzer associated with a first region of said cellular telephone network and a second signal analyzer associated with a second region of said cellular telephone network.
PCT/US1996/003597 1995-03-15 1996-03-15 Apparatus and method for preventing fraudulent activity in a communication network WO1996028948A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU54243/96A AU5424396A (en) 1995-03-15 1996-03-15 Apparatus and method for preventing fraudulent activity in a communication network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US40464195A 1995-03-15 1995-03-15
US404,641 1995-03-15

Publications (1)

Publication Number Publication Date
WO1996028948A1 true WO1996028948A1 (en) 1996-09-19

Family

ID=23600437

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1996/003597 WO1996028948A1 (en) 1995-03-15 1996-03-15 Apparatus and method for preventing fraudulent activity in a communication network

Country Status (2)

Country Link
AU (1) AU5424396A (en)
WO (1) WO1996028948A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2755339A1 (en) * 1996-10-25 1998-04-30 Motorola Inc METHOD FOR CUTTING WIRELESS COMMUNICATION FROM A MOBILE COMMUNICATION UNIT AND SYSTEM FOR IDENTIFYING A MOBILE FRAUDULENT COMMUNICATION UNIT
WO1998032086A1 (en) * 1997-01-21 1998-07-23 Northern Telecom Limited Monitoring and retraining neural network
WO1998032085A1 (en) * 1997-01-21 1998-07-23 Northern Telecom Limited Generic processing capability
EP0862344A2 (en) * 1997-02-28 1998-09-02 Cellular Technical Services Company, Inc. Distributed system and method of operation for validation of a wireless communication device
EP0996303A2 (en) * 1998-10-23 2000-04-26 Alcatel Improving eavesdropping security of mobile phones
US9374848B1 (en) 2015-03-16 2016-06-21 Wipro Limited Method and device for improving lawful interception of a call
US10846623B2 (en) 2014-10-15 2020-11-24 Brighterion, Inc. Data clean-up method for improving predictive model training
US10896421B2 (en) 2014-04-02 2021-01-19 Brighterion, Inc. Smart retail analytics and commercial messaging
US10929777B2 (en) 2014-08-08 2021-02-23 Brighterion, Inc. Method of automating data science services
US10977655B2 (en) 2014-10-15 2021-04-13 Brighterion, Inc. Method for improving operating profits with better automated decision making with artificial intelligence
US10984423B2 (en) 2014-10-15 2021-04-20 Brighterion, Inc. Method of operating artificial intelligence machines to improve predictive model training and performance
US10997599B2 (en) 2014-10-28 2021-05-04 Brighterion, Inc. Method for detecting merchant data breaches with a computer network server
US11023894B2 (en) 2014-08-08 2021-06-01 Brighterion, Inc. Fast access vectors in real-time behavioral profiling in fraudulent financial transactions
US11030527B2 (en) 2015-07-31 2021-06-08 Brighterion, Inc. Method for calling for preemptive maintenance and for equipment failure prevention
US11062317B2 (en) 2014-10-28 2021-07-13 Brighterion, Inc. Data breach detection
US11080793B2 (en) 2014-10-15 2021-08-03 Brighterion, Inc. Method of personalizing, individualizing, and automating the management of healthcare fraud-waste-abuse to unique individual healthcare providers
US11080709B2 (en) 2014-10-15 2021-08-03 Brighterion, Inc. Method of reducing financial losses in multiple payment channels upon a recognition of fraud first appearing in any one payment channel
US11348110B2 (en) 2014-08-08 2022-05-31 Brighterion, Inc. Artificial intelligence fraud management solution
US11496480B2 (en) 2018-05-01 2022-11-08 Brighterion, Inc. Securing internet-of-things with smart-agent technology
US20230213660A1 (en) * 2014-04-23 2023-07-06 Opentv, Inc. Techniques for securing live positioning signals
US11948048B2 (en) 2014-04-02 2024-04-02 Brighterion, Inc. Artificial intelligence for context classifier

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5420910A (en) * 1993-06-29 1995-05-30 Airtouch Communications Mehtod and apparatus for fraud control in cellular telephone systems utilizing RF signature comparison
US5448760A (en) * 1993-06-08 1995-09-05 Corsair Communications, Inc. Cellular telephone anti-fraud system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5448760A (en) * 1993-06-08 1995-09-05 Corsair Communications, Inc. Cellular telephone anti-fraud system
US5420910A (en) * 1993-06-29 1995-05-30 Airtouch Communications Mehtod and apparatus for fraud control in cellular telephone systems utilizing RF signature comparison
US5420910B1 (en) * 1993-06-29 1998-02-17 Airtouch Communications Inc Method and apparatus for fraud control in cellular telephone systems utilizing rf signature comparison

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2755339A1 (en) * 1996-10-25 1998-04-30 Motorola Inc METHOD FOR CUTTING WIRELESS COMMUNICATION FROM A MOBILE COMMUNICATION UNIT AND SYSTEM FOR IDENTIFYING A MOBILE FRAUDULENT COMMUNICATION UNIT
WO1998032086A1 (en) * 1997-01-21 1998-07-23 Northern Telecom Limited Monitoring and retraining neural network
WO1998032085A1 (en) * 1997-01-21 1998-07-23 Northern Telecom Limited Generic processing capability
EP0862344A2 (en) * 1997-02-28 1998-09-02 Cellular Technical Services Company, Inc. Distributed system and method of operation for validation of a wireless communication device
EP0862344A3 (en) * 1997-02-28 1999-09-01 Cellular Technical Services Company, Inc. Distributed system and method of operation for validation of a wireless communication device
EP0996303A3 (en) * 1998-10-23 2000-09-06 Alcatel Improving eavesdropping security of mobile phones
EP0996303A2 (en) * 1998-10-23 2000-04-26 Alcatel Improving eavesdropping security of mobile phones
US11948048B2 (en) 2014-04-02 2024-04-02 Brighterion, Inc. Artificial intelligence for context classifier
US10896421B2 (en) 2014-04-02 2021-01-19 Brighterion, Inc. Smart retail analytics and commercial messaging
US11892548B2 (en) * 2014-04-23 2024-02-06 Opentv, Inc. Techniques for securing live positioning signals
US20230213660A1 (en) * 2014-04-23 2023-07-06 Opentv, Inc. Techniques for securing live positioning signals
US11023894B2 (en) 2014-08-08 2021-06-01 Brighterion, Inc. Fast access vectors in real-time behavioral profiling in fraudulent financial transactions
US10929777B2 (en) 2014-08-08 2021-02-23 Brighterion, Inc. Method of automating data science services
US11348110B2 (en) 2014-08-08 2022-05-31 Brighterion, Inc. Artificial intelligence fraud management solution
US10984423B2 (en) 2014-10-15 2021-04-20 Brighterion, Inc. Method of operating artificial intelligence machines to improve predictive model training and performance
US11080793B2 (en) 2014-10-15 2021-08-03 Brighterion, Inc. Method of personalizing, individualizing, and automating the management of healthcare fraud-waste-abuse to unique individual healthcare providers
US11080709B2 (en) 2014-10-15 2021-08-03 Brighterion, Inc. Method of reducing financial losses in multiple payment channels upon a recognition of fraud first appearing in any one payment channel
US10977655B2 (en) 2014-10-15 2021-04-13 Brighterion, Inc. Method for improving operating profits with better automated decision making with artificial intelligence
US10846623B2 (en) 2014-10-15 2020-11-24 Brighterion, Inc. Data clean-up method for improving predictive model training
US11062317B2 (en) 2014-10-28 2021-07-13 Brighterion, Inc. Data breach detection
US10997599B2 (en) 2014-10-28 2021-05-04 Brighterion, Inc. Method for detecting merchant data breaches with a computer network server
US9374848B1 (en) 2015-03-16 2016-06-21 Wipro Limited Method and device for improving lawful interception of a call
US11030527B2 (en) 2015-07-31 2021-06-08 Brighterion, Inc. Method for calling for preemptive maintenance and for equipment failure prevention
US11496480B2 (en) 2018-05-01 2022-11-08 Brighterion, Inc. Securing internet-of-things with smart-agent technology

Also Published As

Publication number Publication date
AU5424396A (en) 1996-10-02

Similar Documents

Publication Publication Date Title
WO1996028948A1 (en) Apparatus and method for preventing fraudulent activity in a communication network
US5420910A (en) Mehtod and apparatus for fraud control in cellular telephone systems utilizing RF signature comparison
EP1917822B1 (en) Method and database for performing a permission status check on a mobile equipment
US5950121A (en) Method and apparatus for fraud control in cellular telephone systems
US7565146B2 (en) Intercepting a call connection to a mobile subscriber roaming in a visited PLMN (VPLMN)
US6161012A (en) Short code dialling
EP0788287B1 (en) Roaming authorization system
EP1523827B1 (en) Informing a lawful interception system of the serving system serving an intercepted target
US9237443B2 (en) Mobile telecommunications network roaming
US20090163173A1 (en) Unauthorized call activity detection in a cellular communication system
US6044263A (en) Method for providing a location independent dialing procedure within a mobile telecommunications network
US9491613B2 (en) Method and apparatus for steering of roaming
KR20050115289A (en) Authenticating between a cdma network and a gsm network
MXPA97000887A (en) Authorization system for communication out of domest area
US7623498B2 (en) Charge advice in telecommunication systems
KR20090065913A (en) Method and system for protection of usage of a stolen equipment by forced re-location
CA2315709A1 (en) System and method for the early detection of cellular telephone piracy
AU713799B2 (en) Short code dialling
MXPA05001666A (en) Identity protection in a lan-universal radiotelephone system.
US6044269A (en) Method for enhanced control of mobile call delivery
WO2011080638A1 (en) Illegal carrier detection platform and method
WO2003037026A1 (en) System and method for the positioning of a subscriber during an emergency call performed by a mobile phone without a valid sim card
JP2012503348A (en) Signal transmission traffic minimization for home base stations
KR100974310B1 (en) Method and apparatus for permitting the use of network based on subscriber information and user equipment information

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BB BG BR BY CA CH CN CZ DE DK EE ES FI GB GE HU IS JP KE KG KP KR KZ LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG UZ VN AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA