Cellular fraud prevention using selective roaming

Telecommunications – Radiotelephone system – Security or fraud prevention

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C455S433000, C380S029000

Reexamination Certificate

active

06285871

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates in general to a method of preventing cellular telephone fraud, and more specifically to a method of preventing cellular phone fraud using a pre-authorization technique for subscriber roaming privileges.
2. Description of Related Art
Cellular telephones combine the mobility of the radio link and the world-wide land telephone network to provide a communication link to any other telephone in the world. However, as cellular phones have become more prevalent throughout the country, fraud has become a major problem. Cellular fraud robs service providers of hundreds of millions of dollars every year. Like all crimes, there are several varieties of cellular fraud, including “cloning.” Cloning fraud, which occurs when a legitimate subscriber's mobile identification number/electronic serial number (MIN/ESN) combination is used for illegal purposes, is among the most sophisticated and difficult forms of fraud to prevent. Often, the pirate will use simple electronic devices to “capture” the legitimate MIN/ESN combination during its transmission by radio frequency (RF). In these cases, the legitimate subscriber often does not know fraud is being committed with his or her MIN/ESN combination until they receive their bill. This is currently the most popular method of gaining illegal access to a cellular system, because the legitimacy of the stolen MIN/ESN combinations makes cloning difficult to catch.
Often, cloning fraud occurs outside of the home area of the subscriber. Once the MIN/ESN information has been cloned, the MIN/ESN combination is valid for access to the cellular telephone system anywhere. Roamer fraud is committed by a local thief using a MIN/ESN imported from another service area, and thus not representing a true roaming subscriber. The exploited MIN/ESN is usually gathered through the use of a MIN/ESN reader in a home service area for the cellular phone.
There are certain steps that can be taken to prevent cloning fraud. For example, U.S. Pat. No. 5,249,230 discloses a “challenge-response” system, wherein the cellular system “challenges” a cellular phone subscriber prior to granting access. The subscriber must manually “respond” to the challenge by entering a Personal Identification Number (PIN) or other code that is then verified against a centralized database maintained by the cellular system. However, this method is not attractive to most subscribers since it requires additional work and inconvenience.
In another example, U.S. Pat. No. 5,239,294 discloses a technique that encrypts a PIN that is permanently programmed into the cellular phone, wherein the PIN is automatically transmitted to the cellular network during call setup. However, this method is expensive to implement, and is still subject to cloning, since the cloner need not discriminate between encrypted and unencrypted PINs to merely repeat a sequence of numbers observed being transmitting to the cellular system.
Call pattern monitoring is another method used to prevent cellular phone fraud. This method works because most subscribers call only a specific set of phone numbers. When a call for a subscriber falls outside of that usual group, a challenge-response action can be initiated by the service provider. However, for new subscribers who have no previous calling history, or for subscribers who have a wide range of calling patterns, this method is ineffective.
It can be seen, then, that there is a need for more effective techniques for preventing cellular phone fraud. Furthermore, such techniques must be easy and inexpensive to implement, and must not put unacceptable demands on subscribers.
SUMMARY OF THE INVENTION
To overcome the limitations in the prior art described above, and to overcome other limitations that will become apparent upon reading and understanding the present specification, the present invention discloses a powerful and highly productive method for preventing roaming fraud. The present invention uses different levels of roaming privileges for individual subscribers. The present invention also provides a method for authenticating subscribers when the subscriber initiates a call in a foreign service area that exceeds their roaming privileges.
One object of the present invention is to prevent cellular fraud by use of authentication techniques for roaming subscribers. Another object of the present invention is to make the authentication technique as convenient and inexpensive to the subscribers as possible.
These and various other advantages and features of novelty which characterize the invention are pointed out with particularity in the claims annexed hereto and form a part hereof. However, for a better understanding of the invention, its advantages, and the objects obtained by its use, reference should be made to the drawings which form a further part hereof, and to accompanying descriptive matter, in which there is illustrated and described specific examples of an apparatus in accordance with the invention.


REFERENCES:
patent: 3579186 (1971-05-01), Dunham et al.
patent: 4263595 (1981-04-01), Vogel
patent: 4264782 (1981-04-01), Konheim
patent: 4284851 (1981-08-01), Schweitzer et al.
patent: 4626845 (1986-12-01), Ley
patent: 4756020 (1988-07-01), Fodale
patent: 4860352 (1989-08-01), Laurance
patent: 4893330 (1990-01-01), Franco
patent: 4906988 (1990-03-01), Copella
patent: 5091942 (1992-02-01), Dent
patent: 5124984 (1992-06-01), Engel
patent: 5148472 (1992-09-01), Freese et al.
patent: 5237612 (1993-08-01), Raith
patent: 5239294 (1993-08-01), Flanders et al.
patent: 5249230 (1993-09-01), Mihm, Jr.
patent: 5299263 (1994-03-01), Beller et al.
patent: 5309501 (1994-05-01), Kozik et al.
patent: 5335278 (1994-08-01), Matchett et al.
patent: 5345595 (1994-09-01), Johnson
patent: 5420908 (1995-05-01), Hodges et al.
patent: 5541977 (1996-07-01), Hodges et al.
patent: 5668875 (1997-09-01), Brown et al.
patent: 5670950 (1997-09-01), Otsuka
patent: 5799249 (1998-08-01), Kennedy, III et al.
patent: 5839063 (1998-11-01), Lee
patent: 6058301 (2000-05-01), Daniels
patent: 93/11646 (1993-06-01), None

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cellular fraud prevention using selective roaming does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cellular fraud prevention using selective roaming, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cellular fraud prevention using selective roaming will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2438129

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.