WO2004043051A1 - A telephone fraud prevention system - Google Patents

A telephone fraud prevention system Download PDF

Info

Publication number
WO2004043051A1
WO2004043051A1 PCT/IB2003/004934 IB0304934W WO2004043051A1 WO 2004043051 A1 WO2004043051 A1 WO 2004043051A1 IB 0304934 W IB0304934 W IB 0304934W WO 2004043051 A1 WO2004043051 A1 WO 2004043051A1
Authority
WO
WIPO (PCT)
Prior art keywords
hook
signal
fraud detection
termination unit
detection controller
Prior art date
Application number
PCT/IB2003/004934
Other languages
French (fr)
Inventor
Andies Petrus De Wet
Eric David Cartwright
Russel Munro Bason
Original Assignee
Telkom Sa Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telkom Sa Limited filed Critical Telkom Sa Limited
Priority to EP03810554A priority Critical patent/EP1561335A1/en
Priority to AU2003276504A priority patent/AU2003276504A1/en
Publication of WO2004043051A1 publication Critical patent/WO2004043051A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/70Administration or customization aspects; Counter-checking correct charges
    • H04M15/73Validating charges
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/47Fraud detection or prevention means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/48Secure or trusted billing, e.g. trusted elements or encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6027Fraud preventions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/609Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/01Details of billing arrangements
    • H04M2215/0148Fraud detection or prevention means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/01Details of billing arrangements
    • H04M2215/0156Secure and trusted billing, e.g. trusted elements, encryption, digital signature, codes or double check mechanisms to secure billing calculation and information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2215/00Metering arrangements; Time controlling arrangements; Time indicating arrangements
    • H04M2215/70Administration aspects, modify settings or limits or counter-check correct charges
    • H04M2215/7072Validate charges
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2272Subscriber line supervision circuits, e.g. call detection circuits

Definitions

  • This invention relates to a telephone fraud prevention system.
  • So-called clip-on fraud is a common form of a fraud on a telecommunications network.
  • a fraudster connects a telecommunications device onto a line between a customer premises equipment and a central exchange. The fraudster is then able to make telephone calls which are charged to the unsuspecting customer.
  • the fraudster often sets up foreign conference calls to allow parties in different countries to speak to one another and all of these calls are charged to the unsuspecting customer.
  • the present invention seeks to address this type of clip-on fraud.
  • a telephone fraud prevention system comprising:
  • a maintenance termination unit adapted to detect when customer premises equipment goes off hook and to transmit a signal in response to the off hook detection
  • a fraud detection controller adapted to wait for an off hook signal indicating that the maintenance termination unit has detected that the customer premises equipment is off hook, and if the off hook signal is not received within a predetermined amount of time to block communication on a line between the customer premises equipment and a switch on a telecommunications network.
  • the maintenance termination unit includes an encryption means which encrypts the signal transmitted, and wherein the fraud detection controller includes a decryption means for decrypting the signal received.
  • the maintenance termination unit may be directly or indirectly connected to the fraud detection controller so that the signal transmitted from the maintenance termination unit is the off hook signal received by the fraud detection controller.
  • the fraud detection controller is adapted so that in the event it does not receive an off hook signal within the predetermined amount of time, it detects if the number being dialled is an emergency or service number before blocking the line.
  • the present invention further extends to a fraud detection controller including: a receiver for receiving a signal from a maintenance termination unit, the signal indicating that customer premises equipment is off hook;
  • decryption means for decrypting the signal received
  • blocking means for blocking a call on the line from the customer premises equipment to a switch on a telecommunications network if an off hook signal is not received from the maintenance termination unit within a predetermined amount of time.
  • the controller may be located on a digital line between a line interface and a core processing plant.
  • FIG. 1 is a block diagram overview of the system of the present invention
  • Figure 2 is a schematic block diagram of the maintenance termination unit of Figure 1 ;
  • Figure 3 is a schematic block diagram of the fraud detection node of Figure 1 ;
  • Figure 4 is a schematic block diagram of the fraud detection card of Figure 1 ;
  • Figure 5 is a schematic block diagram of the remote management card of Figure 1 ;
  • Figures 6 to 12 show a call sequence of a normal call according to the present invention.
  • Figures 7 to 21 show a call sequence of a clip on fraud attempt according to the present invention.
  • a maintenance termination unit (MTU) 10 is placed at the customer premises terminating the copper telephone line 12 from the exchange.
  • Customer premises equipment (CPE) 14 in the form of a telephone (Fax, modem etc) is removably connected to the maintenance termination unit 10.
  • a fraud detection controller (FDC) card 16 is placed in a switching room between a line interface unit (LIU) 18 and a core processing plant (CPP) 20.
  • the fraud detection controller 16 intercepts the receive path between the line interface unit 18 and the core processing plant 20.
  • a remote manager card (RMC) 22 is co-located and connected to the fraud detection controllerl ⁇ via a sub rack system back-plane.
  • the remote manager card 22 connects to a management network via an Ethernet port (not shown) and a remote workstation 24 logs into the remote manager card 22 via a management network 26.
  • a method of detecting and preventing clip-on fraud is implemented by the system which intercepts and monitors the concentrated digital transmission between the line interface unit 18 and core processing plant 20 for encrypted authorization codes.
  • the line interface unit 18 digitizes the analogue information and transmits the data through the fraud detection controller 16 to the core processing plant 20.
  • the fraud detection controller 16 decrypts, decodes and validates the message. If the message is correctly validated, the fraud detection controller 16 patches the timeslot through to the core processing plant 20 and the call progresses in the normal way. Should the message not be received or be invalid, the fraud detection controller 16 will block the sent information and the call will not be setup. Should a clip-on attack take place before the maintenance termination unit 10, the required message will not be transmitted to the switch and the call will be blocked.
  • the remote manager card 22 is the link between the fraud detection controller 16 and the management network 26 and is used to set up the message databases remotely.
  • the activation and deactivation of the blocking functions by the fraud detection controller 16 are controlled by secure workstations 24 connected to the network 26, which in turn is connected to the remote manager card 22. All activities can be remotely monitored.
  • FIG. 2 is a block diagram of the maintenance termination unit 10 of Figure 1.
  • the maintenance termination unit 10 includes an off hook detection means 28 for detecting when the customer premises equipment is off hook.
  • the off hook detection means 28 is implemented as a line loop detection device, which devices are well known. The fact that the telephone 14 is off hook, indicates that a call is in progress. Thus, the line loop detection circuit 28 enables the maintenance termination unit 10 to know when an encrypted message must be transmitted.
  • An encryption means 30 encrypts a unique code for transmission in response to the off hook detection.
  • Any one of a number of known encryption methods can be used, obviously as long as the encryption and decryption devices are synchronized.
  • Transmitting means in the form of a tone transmitter 32 transmits the encrypted message towards the exchange.
  • the fraud detection controller 16 has a receiver path 34 from the line interface unit 18 and a path 36 to the core processing plant 36.
  • terminals 24 can be connected simultaneously to one or more remote manager cards 22.
  • FIG. 4 illustrates the fraud detection card 16 in more detail.
  • the card includes a receiver 38 for receiving encrypted signals which were transmitted from the maintenance termination unit 10, via the line interface unit 18 to the fraud detection card 16.
  • a tone detection and signal extraction unit 40 extracts the unique code which was encrypted and transmitted by the maintenance termination unit 10. This encrypted code is sent to decryption means in the form of decryption and validation unit 42.
  • the receiver path stream is routed to a timeslot switch 44 by the tone detection and signal extraction unit 40.
  • This timeslot switch routes the receive path stream through the fraud detection card to a transmitter unit 46, once instructed to do so by the validation unit 42.
  • the decryption and validation unit 42 decrypts and analyses the received code. If the code is present and valid then the validation unit 42 instructs the time-slot switch 44 to switch the receive path stream from the signal extraction unit through to the transmitter 46. If the code is not present or is invalid or a non emergency number then the validation unit will instruct the time-slot switch to block the receive path stream, thus preventing the call from being set up.
  • the validation unit will transmit via the back-plane interface any invalid code instances, errors or other relevant data to the remote manager card 22.
  • a back-plane interface 48 forms a communication link with the remote manager card 22.
  • the back-plane interface 48 receives and processes instructions sent to the fraud detection controller 16 by the remote manager card 22, which can include configuration settings for the other units mentioned above.
  • the back-plane interface will also transmit pertinent data from the fraud detection controller 16 to the remote manager card 22.
  • the fraud detection controller16 monitors the receive path for outgoing calls from the customer.
  • the fraud detection controller 16 expects to see a unique encrypted message transmitted within a predetermined amount of time from the maintenance termination unit 10 once an off-hook condition has been detected. This message is decrypted and the call is validated.
  • the fraud detection controller 16 will then patch the time slot from the line interface unit 18 through to the core processing plant 20. If the call fails to validate or an encrypted message is not received then the fraud detection controller 16 will block the call if it is a non emergency number.
  • the fraud detection controller 16 obtains all the information it requires from the remote manager card 22.
  • the remote manager card 22 can manage multiple fraud detection controllers 16.
  • the fraud detection controller16 communicates all pertinent information, such as blocked calls, to the remote manager card 22.
  • the remote manager card 22 allows users with the required access rights to logon from a remote server 50 ( Figure 3).
  • the server 50 holds all user accounts and is a central repository for all critical information required by the remote manager cards 22. A user is able to log onto the server from a terminal and the server will establish a logon connection to the desired remote manager card22 if the user has access permission.
  • the server 50 also collates all information passed to it from the remote manager cards enabling users to view the information and determine where fraudulent calls are being attempted.
  • the remote management card 22 includes a local area network (LAN) interface 52 which connects the card to the server 50 via a communications network 26. All configuration instructions as well as all requests are received and transmitted via this interface.
  • LAN local area network
  • the CPU 54 forms the heart of the card and all commands are processed by the CPU 54.
  • the local operating data used to configure the fraud detection controller 16 is kept in the CPU 54. If any invalid or missing code events are received by the remote manager card 22, the CPU call will log them and send notification to the server 50 via the network 26.
  • the Figures illustrate a call sequence for a normal call and in the event of a clip on fraud attempt.
  • the Figure illustrates the call sequence for a normal call.
  • a telephone 14 has gone off hook typically by a user of the telephone lifting the handset to begin making the call.
  • the digital line unit (DLU) which is essentially an analogue to digital converter detects that the telephone 14 is off hook on port 0 and transmits a message to the fraud detection controller (FDC) 16.
  • the messages are transmitted in time-slot 16 as illustrated in the Figure. Signalling always takes place in time-slot 16 which is a fixed time-slot dedicated for signalling
  • the message is transferred through the FDC 16 to the Line Trunk Group (LTG) 20.
  • the message is that port 0 is off hook.
  • the LTG 20 transmits a message back in time slot 16 to the DLU 18 via the FDC 16 to allocate time slot 2(Keep in mind that Timeslots are dynamically allocated and not always TS 2 as in this example) to port 0.
  • the abovementioned procedure takes approximately 50 milliseconds. From 50 milliseconds the Subscriber Line Interface Circuit (SLIC) stabilises and the MTU 10 detects a line loop current from the telephone 14, as has been described above.
  • SLIC Subscriber Line Interface Circuit
  • the MTU transmits its authorisation code from the MTU to the DLU 18 and on to the FDC 16. It is important to note that the line must be unbarred otherwise the FDC 16 will not be able to receive the message transmitted from the MTU 10.
  • Figure 13 illustrates a scenario whereby there is an attempted clip on fraud with the fraudster using a clip on fraud device 56.
  • the LTG 20 allocates time-slot 2 to Port 0, in exactly the same way as was described above for a normal call.
  • the FDC waits one second to receive an authentication message from the MTU 10. If the FDC 16 does not receive an authentication message within a second, the call is not validated. In any event, dial tone is applied and the digits dialled are detected as illustrated in Figure 19.
  • the time-slot is blocked in both directions and the line is barred thus preventing the clip on fraudsters from making a telephone call.
  • the FDC 16 is connected in series between the LTG 20 and the DLU 18. Under normal conditions, data is simply transferred from one side of the FDC 16 straight through to the other side i.e. transparently. When a timeslot is blocked, that particular timeslot is simply not passed through the FDC 16, thereby blocking the speech path and thus preventing conversation or data.
  • the line is not normally barred and is only barred if the FDC does not receive a valid authorisation code within one second and the number dialled is not a valid emergency or service call.
  • the present invention has numerous advantages over similar technologies such as the system described in SA Patent No 2002/4083.
  • Signal detection and decryption takes place on the digital side after concentration. This means that many MTU's can work to a single FDC in any timeslot.
  • the FDC is transparent to the switch

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A telephone fraud prevention system includes a maintenance termination unit adapted to detect when customer premises equipment goes off hook and to transmit a signal in response to the off hook detection. A fraud detection controller waits for an off hook signal indicating that the maintenance termination unit has detected that the customer premises equipment is off hook, and if the off hook signal is not received within a predetermined amount of time, controller blocks communication on a line between the customer premises equipment and a switch on a telecommunications network.

Description

A TELEPHONE FRAUD PREVENTION SYSTEM
BACKGROUND OF THE INVENTION
This invention relates to a telephone fraud prevention system.
So-called clip-on fraud is a common form of a fraud on a telecommunications network. A fraudster connects a telecommunications device onto a line between a customer premises equipment and a central exchange. The fraudster is then able to make telephone calls which are charged to the unsuspecting customer.
In addition, the fraudster often sets up foreign conference calls to allow parties in different countries to speak to one another and all of these calls are charged to the unsuspecting customer.
The present invention seeks to address this type of clip-on fraud. SUMMARY OF THE INVENTION
According to the present invention there is provided a telephone fraud prevention system comprising:
a maintenance termination unit adapted to detect when customer premises equipment goes off hook and to transmit a signal in response to the off hook detection; and
a fraud detection controller adapted to wait for an off hook signal indicating that the maintenance termination unit has detected that the customer premises equipment is off hook, and if the off hook signal is not received within a predetermined amount of time to block communication on a line between the customer premises equipment and a switch on a telecommunications network.
Preferably, the maintenance termination unit includes an encryption means which encrypts the signal transmitted, and wherein the fraud detection controller includes a decryption means for decrypting the signal received.
The maintenance termination unit may be directly or indirectly connected to the fraud detection controller so that the signal transmitted from the maintenance termination unit is the off hook signal received by the fraud detection controller.
Preferably, the fraud detection controller is adapted so that in the event it does not receive an off hook signal within the predetermined amount of time, it detects if the number being dialled is an emergency or service number before blocking the line.
The present invention further extends to a fraud detection controller including: a receiver for receiving a signal from a maintenance termination unit, the signal indicating that customer premises equipment is off hook;
decryption means for decrypting the signal received; and
blocking means for blocking a call on the line from the customer premises equipment to a switch on a telecommunications network if an off hook signal is not received from the maintenance termination unit within a predetermined amount of time.
The controller may be located on a digital line between a line interface and a core processing plant.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a block diagram overview of the system of the present invention;
Figure 2 is a schematic block diagram of the maintenance termination unit of Figure 1 ;
Figure 3 is a schematic block diagram of the fraud detection node of Figure 1 ;
Figure 4 is a schematic block diagram of the fraud detection card of Figure 1 ;
Figure 5 is a schematic block diagram of the remote management card of Figure 1 ; Figures 6 to 12 show a call sequence of a normal call according to the present invention; and
Figures 7 to 21 show a call sequence of a clip on fraud attempt according to the present invention.
DESCRIPTION OF EMBODIMENTS
Referring to the accompanying drawings, a maintenance termination unit (MTU) 10 is placed at the customer premises terminating the copper telephone line 12 from the exchange. Customer premises equipment (CPE) 14 in the form of a telephone (Fax, modem etc) is removably connected to the maintenance termination unit 10.
A fraud detection controller (FDC) card 16 is placed in a switching room between a line interface unit (LIU) 18 and a core processing plant (CPP) 20. The fraud detection controller 16 intercepts the receive path between the line interface unit 18 and the core processing plant 20.
A remote manager card (RMC) 22 is co-located and connected to the fraud detection controllerlδ via a sub rack system back-plane. The remote manager card 22 connects to a management network via an Ethernet port (not shown) and a remote workstation 24 logs into the remote manager card 22 via a management network 26.
A method of detecting and preventing clip-on fraud is implemented by the system which intercepts and monitors the concentrated digital transmission between the line interface unit 18 and core processing plant 20 for encrypted authorization codes. When the telephone 14, or any other customer premises equipment such as a fax or modem, for example, which is located behind the maintenance termination unit goes off-hook, a unique encrypted message is transmitted by the maintenance termination unit 10 to the switch. The line interface unit 18 digitizes the analogue information and transmits the data through the fraud detection controller 16 to the core processing plant 20. The fraud detection controller 16 decrypts, decodes and validates the message. If the message is correctly validated, the fraud detection controller 16 patches the timeslot through to the core processing plant 20 and the call progresses in the normal way. Should the message not be received or be invalid, the fraud detection controller 16 will block the sent information and the call will not be setup. Should a clip-on attack take place before the maintenance termination unit 10, the required message will not be transmitted to the switch and the call will be blocked.
The remote manager card 22 is the link between the fraud detection controller 16 and the management network 26 and is used to set up the message databases remotely. The activation and deactivation of the blocking functions by the fraud detection controller 16 are controlled by secure workstations 24 connected to the network 26, which in turn is connected to the remote manager card 22. All activities can be remotely monitored.
Figure 2 is a block diagram of the maintenance termination unit 10 of Figure 1.
The maintenance termination unit 10 includes an off hook detection means 28 for detecting when the customer premises equipment is off hook. The off hook detection means 28 is implemented as a line loop detection device, which devices are well known. The fact that the telephone 14 is off hook, indicates that a call is in progress. Thus, the line loop detection circuit 28 enables the maintenance termination unit 10 to know when an encrypted message must be transmitted. An encryption means 30 encrypts a unique code for transmission in response to the off hook detection.
Any one of a number of known encryption methods can be used, obviously as long as the encryption and decryption devices are synchronized.
Transmitting means in the form of a tone transmitter 32 transmits the encrypted message towards the exchange.
Referring to Figure 3, the fraud detection controller 16 has a receiver path 34 from the line interface unit 18 and a path 36 to the core processing plant 36.
It will be appreciated from the drawing that a number of terminals 24 can be connected simultaneously to one or more remote manager cards 22.
Figure 4 illustrates the fraud detection card 16 in more detail.
The card includes a receiver 38 for receiving encrypted signals which were transmitted from the maintenance termination unit 10, via the line interface unit 18 to the fraud detection card 16.
A tone detection and signal extraction unit 40 extracts the unique code which was encrypted and transmitted by the maintenance termination unit 10. This encrypted code is sent to decryption means in the form of decryption and validation unit 42.
In addition, the receiver path stream is routed to a timeslot switch 44 by the tone detection and signal extraction unit 40. This timeslot switch routes the receive path stream through the fraud detection card to a transmitter unit 46, once instructed to do so by the validation unit 42. The decryption and validation unit 42 decrypts and analyses the received code. If the code is present and valid then the validation unit 42 instructs the time-slot switch 44 to switch the receive path stream from the signal extraction unit through to the transmitter 46. If the code is not present or is invalid or a non emergency number then the validation unit will instruct the time-slot switch to block the receive path stream, thus preventing the call from being set up. The validation unit will transmit via the back-plane interface any invalid code instances, errors or other relevant data to the remote manager card 22.
A back-plane interface 48 forms a communication link with the remote manager card 22. The back-plane interface 48 receives and processes instructions sent to the fraud detection controller 16 by the remote manager card 22, which can include configuration settings for the other units mentioned above. The back-plane interface will also transmit pertinent data from the fraud detection controller 16 to the remote manager card 22.
In general, the fraud detection controller16 monitors the receive path for outgoing calls from the customer. The fraud detection controller 16 expects to see a unique encrypted message transmitted within a predetermined amount of time from the maintenance termination unit 10 once an off-hook condition has been detected. This message is decrypted and the call is validated. The fraud detection controller 16 will then patch the time slot from the line interface unit 18 through to the core processing plant 20. If the call fails to validate or an encrypted message is not received then the fraud detection controller 16 will block the call if it is a non emergency number.
The fraud detection controller 16 obtains all the information it requires from the remote manager card 22. The remote manager card 22 can manage multiple fraud detection controllers 16. The fraud detection controller16 communicates all pertinent information, such as blocked calls, to the remote manager card 22. The remote manager card 22 allows users with the required access rights to logon from a remote server 50 (Figure 3). The server 50 holds all user accounts and is a central repository for all critical information required by the remote manager cards 22. A user is able to log onto the server from a terminal and the server will establish a logon connection to the desired remote manager card22 if the user has access permission. The server 50 also collates all information passed to it from the remote manager cards enabling users to view the information and determine where fraudulent calls are being attempted.
Referring to Figure 5, the remote management card 22 includes a local area network (LAN) interface 52 which connects the card to the server 50 via a communications network 26. All configuration instructions as well as all requests are received and transmitted via this interface.
The CPU 54 forms the heart of the card and all commands are processed by the CPU 54. The local operating data used to configure the fraud detection controller 16 is kept in the CPU 54. If any invalid or missing code events are received by the remote manager card 22, the CPU call will log them and send notification to the server 50 via the network 26.
Referring to Figures 6 to 21 , the Figures illustrate a call sequence for a normal call and in the event of a clip on fraud attempt.
In the sequence of Figures, like reference numerals have been used to reference like parts.
Referring to Figure 6, the Figure illustrates the call sequence for a normal call. In the Figure, a telephone 14 has gone off hook typically by a user of the telephone lifting the handset to begin making the call. Referring to Figure 7, the digital line unit (DLU) which is essentially an analogue to digital converter detects that the telephone 14 is off hook on port 0 and transmits a message to the fraud detection controller (FDC) 16. The messages are transmitted in time-slot 16 as illustrated in the Figure. Signalling always takes place in time-slot 16 which is a fixed time-slot dedicated for signalling
The message is transferred through the FDC 16 to the Line Trunk Group (LTG) 20. The message is that port 0 is off hook.
Referring to Figures 8 and 9, the LTG 20 transmits a message back in time slot 16 to the DLU 18 via the FDC 16 to allocate time slot 2(Keep in mind that Timeslots are dynamically allocated and not always TS 2 as in this example) to port 0.
It should be noted that the line status throughout this procedure is unbarred or this procedure will fail. Once the timeslot is allocated, the exchange does a cross-check to verify that the channel is open.
The abovementioned procedure takes approximately 50 milliseconds. From 50 milliseconds the Subscriber Line Interface Circuit (SLIC) stabilises and the MTU 10 detects a line loop current from the telephone 14, as has been described above.
In Figure 11 , the MTU transmits its authorisation code from the MTU to the DLU 18 and on to the FDC 16. It is important to note that the line must be unbarred otherwise the FDC 16 will not be able to receive the message transmitted from the MTU 10.
Referring to Figure 12, if the FDC 16 receive a valid authorisation code, the call is authenticated and no action is taken allowing the call to proceed. Figure 13 illustrates a scenario whereby there is an attempted clip on fraud with the fraudster using a clip on fraud device 56.
In Figure 14, the clip on telephone 56 goes off hook on the port zero. A message is transmitted in Figure 15 from the DLU 18, via the FDC 16 to the LTG 20.
In Figure 16, the LTG 20 allocates time-slot 2 to Port 0, in exactly the same way as was described above for a normal call.
Referring to Figures 17 and 18, the FDC waits one second to receive an authentication message from the MTU 10. If the FDC 16 does not receive an authentication message within a second, the call is not validated. In any event, dial tone is applied and the digits dialled are detected as illustrated in Figure 19.
In Figure 20, if the detected digits dialled are a valid emergency or service call then the call is completed.
However, if the dialled number is not an emergency or service call number, the time-slot is blocked in both directions and the line is barred thus preventing the clip on fraudsters from making a telephone call. The FDC 16 is connected in series between the LTG 20 and the DLU 18. Under normal conditions, data is simply transferred from one side of the FDC 16 straight through to the other side i.e. transparently. When a timeslot is blocked, that particular timeslot is simply not passed through the FDC 16, thereby blocking the speech path and thus preventing conversation or data. Thus it will be appreciated that the line is not normally barred and is only barred if the FDC does not receive a valid authorisation code within one second and the number dialled is not a valid emergency or service call.
The present invention has numerous advantages over similar technologies such as the system described in SA Patent No 2002/4083.
Signal detection and decryption takes place on the digital side after concentration. This means that many MTU's can work to a single FDC in any timeslot.
The is no additional processing requirements from the switch. The FDC is transparent to the switch
If the FDC fails, the system will fail-safe to be un-barred.
The system cannot be bypassed by staff of the telecommunications company which do not have access to decryption keys etc. When using pin code barring there is always a risk that the staff can simply access the switch and obtain the pin code, even if the system regularly changes the codes.

Claims

Claims
1. A telephone fraud prevention system comprising:
a maintenance termination unit adapted to detect when customer premises equipment goes off hook and to transmit a signal in response to the off hook detection; and
a fraud detection controller adapted to wait for an off hook signal indicating that the maintenance termination unit has detected that the customer premises equipment is off hook, and if the off hook signal is not received within a predetermined amount of time to block communication on a line between the customer premises equipment and a switch on a telecommunications network.
2. A telephone fraud prevention system according to claim 1 wherein the maintenance termination unit includes an encryption means which encrypts the signal transmitted, and wherein the fraud detection controller includes a decryption means for decrypting the signal received.
3. A telephone fraud prevention system according to claim 1 or claim 2 wherein the maintenance termination unit is directly or indirectly connected to the fraud detection controller so that the signal transmitted from the maintenance termination unit is the off hook signal received by the fraud detection controller.
4. A telephone fraud prevention system according to any preceding claim wherein the fraud detection controller is adapted so that in the event it does not receive an off hook signal within the predetermined amount of time, it detects if the number being dialled is an emergency or service number before blocking the line.
5. A fraud detection controller including:
a receiver for receiving a signal from a maintenance termination unit, the signal indicating that customer premises equipment is off hook;
decryption means for decrypting the signal received; and
blocking means for blocking a call on the line from the customer premises equipment to a switch on a telecommunications network if an off hook signal is not received from the maintenance termination unit within a predetermined amount of time.
6. A fraud detection controller according to claim 5 wherein the controller is located on a digital line between a line interface and a core processing plant.
7. A fraud detection controller substantially as herein described with reference to the accompanying drawings.
8. A telephone fraud prevention system substantially as herein described with reference to the accompanying drawings.
PCT/IB2003/004934 2002-11-06 2003-11-05 A telephone fraud prevention system WO2004043051A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP03810554A EP1561335A1 (en) 2002-11-06 2003-11-05 A telephone fraud prevention system
AU2003276504A AU2003276504A1 (en) 2002-11-06 2003-11-05 A telephone fraud prevention system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
ZA2002/9020 2002-11-06
ZA200209020 2002-11-06
ZA2003/6032 2003-08-05
ZA200306032A ZA200306032B (en) 2002-11-06 2003-08-05 A telephone fraud prevention system.

Publications (1)

Publication Number Publication Date
WO2004043051A1 true WO2004043051A1 (en) 2004-05-21

Family

ID=32314639

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2003/004934 WO2004043051A1 (en) 2002-11-06 2003-11-05 A telephone fraud prevention system

Country Status (4)

Country Link
EP (1) EP1561335A1 (en)
AU (1) AU2003276504A1 (en)
WO (1) WO2004043051A1 (en)
ZA (1) ZA200306032B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566637A (en) * 2017-08-30 2018-01-09 珠海市魅族科技有限公司 Long-range control method and device, terminal and storage medium
CN107580121A (en) * 2017-08-30 2018-01-12 珠海市魅族科技有限公司 Long-range guard method and device, terminal and storage medium
US10681206B1 (en) 2018-12-05 2020-06-09 At&T Intellectual Property I, L.P. Detecting a spoofed call
US10819851B2 (en) 2017-02-28 2020-10-27 At&T Intellectual Property I, L.P. System and method for processing an automated call based on preferences and conditions

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0571291A1 (en) * 1992-05-22 1993-11-24 France Telecom Telephone line access control device
US5668875A (en) * 1994-07-29 1997-09-16 Motorola, Inc. Method and apparatus for authentication in a communication system
WO1998000956A2 (en) * 1996-06-28 1998-01-08 Mci Communications Corporation System and method for preventing cellular fraud
US5825871A (en) * 1994-08-05 1998-10-20 Smart Tone Authentication, Inc. Information storage device for storing personal identification information
US5930345A (en) * 1997-05-20 1999-07-27 Lucent Technology Inc. Public telephone clip-on fraud prevention system
US6014441A (en) * 1994-08-05 2000-01-11 Smart Tone Authentication, Inc. Method and system for generation of tone signals over a transmission channel
WO2000070850A1 (en) * 1999-05-17 2000-11-23 Ipm International Sa Method and device for detecting the unauthorized use of a telephone line
US6324271B1 (en) * 1999-08-17 2001-11-27 Nortel Networks Limited System and method for authentication of caller identification

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0571291A1 (en) * 1992-05-22 1993-11-24 France Telecom Telephone line access control device
US5668875A (en) * 1994-07-29 1997-09-16 Motorola, Inc. Method and apparatus for authentication in a communication system
US5825871A (en) * 1994-08-05 1998-10-20 Smart Tone Authentication, Inc. Information storage device for storing personal identification information
US6014441A (en) * 1994-08-05 2000-01-11 Smart Tone Authentication, Inc. Method and system for generation of tone signals over a transmission channel
WO1998000956A2 (en) * 1996-06-28 1998-01-08 Mci Communications Corporation System and method for preventing cellular fraud
US5930345A (en) * 1997-05-20 1999-07-27 Lucent Technology Inc. Public telephone clip-on fraud prevention system
WO2000070850A1 (en) * 1999-05-17 2000-11-23 Ipm International Sa Method and device for detecting the unauthorized use of a telephone line
US6324271B1 (en) * 1999-08-17 2001-11-27 Nortel Networks Limited System and method for authentication of caller identification

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10819851B2 (en) 2017-02-28 2020-10-27 At&T Intellectual Property I, L.P. System and method for processing an automated call based on preferences and conditions
CN107566637A (en) * 2017-08-30 2018-01-09 珠海市魅族科技有限公司 Long-range control method and device, terminal and storage medium
CN107580121A (en) * 2017-08-30 2018-01-12 珠海市魅族科技有限公司 Long-range guard method and device, terminal and storage medium
US10681206B1 (en) 2018-12-05 2020-06-09 At&T Intellectual Property I, L.P. Detecting a spoofed call
US11070667B2 (en) 2018-12-05 2021-07-20 At&T Intellectual Property I, L.P. Detecting a spoofed call
US11659080B2 (en) 2018-12-05 2023-05-23 At&T Intellectual Property I, L.P. Detecting a spoofed call

Also Published As

Publication number Publication date
EP1561335A1 (en) 2005-08-10
ZA200306032B (en) 2005-03-11
AU2003276504A1 (en) 2004-06-07

Similar Documents

Publication Publication Date Title
US5327488A (en) Remotely initiated telemetry calling system
EP1084542B1 (en) System and method for secured network access
US6301339B1 (en) System and method for providing a remote user with a virtual presence to an office
US6167042A (en) Communications between service providers and customer premises equipment
EP0779003B1 (en) User authentication in a communications network
US5187732A (en) Board-to-board test unit for a digital subscriber line
EP0474407B1 (en) Telemetry access arrangement
US5870465A (en) Telephony adapter system for providing a user with a virtual presence to an office
EP0424495B1 (en) Voice messaging for pay phone telephone systems
US6496483B1 (en) Secure detection of an intercepted targeted IP phone from multiple monitoring locations
US5280529A (en) Communication network intended for secure transmissions
US6370122B1 (en) Method for monitoring and checking subscriber connections to ISDN
CA2193077C (en) Telemetry access arrangement
JPS61500292A (en) Interface channel device
US5995604A (en) Method of preventing fraudulent toll calls by key system users
AU668553B2 (en) Remotely initiated telemetry calling system
US6687353B1 (en) System and method for bringing an in-line device on-line and assuming control of calls
AU712703B2 (en) Process and device for transmitting confidential connection establishment and service information between subscriber terminals and one or more digital exchanges
CN105007360A (en) Mobile phone address book system fused with VoIP phone function
WO2004043051A1 (en) A telephone fraud prevention system
US20080254762A1 (en) Method and apparatus for call protection over a telephone system
US20070081517A1 (en) Method for remotely associating a communications device with a computer
US7177411B1 (en) System for implementing telephone services, control unit for an automatic switch and telephone and computer integration server
JP3678568B2 (en) Voice network access method
JPH0795284A (en) Communications terminal provided with function for detecting and preventing lie branching

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2003810554

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2003810554

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP