Telecommunications – Radiotelephone system – Security or fraud prevention
Reexamination Certificate
1998-12-17
2001-07-24
Chang, Vivian (Department: 2682)
Telecommunications
Radiotelephone system
Security or fraud prevention
C455S411000
Reexamination Certificate
active
06266525
ABSTRACT:
FIELD OF THE INVENTION
The present invention relates to a method for detecting fraudulent use of a communications system, such as a digital wireless communication system, an analog wireless communication system, a digital cellular system, an analog cellular system, a personal communications service, or the like.
BACKGROUND OF THE INVENTION
Authentication is a procedure used by a communications system to validate a subscriber station's identity upon a request for access to the communications system. The communications system may grant or deny the subscriber station's request for access according to the authentication procedure. Over time, authentication schemes have become more sophisticated to foil fraud as older analog cellular equipment is supplemented or replaced with newer digital equipment.
In many analog cellular systems in wide-spread use throughout the U.S., each authorized cellular phone is assigned a unique Mobile Identification Number (MIN) to prevent fraudulent use of the cellular phone if it is stolen. However, the unique MIN of an authorized cellular phone may be readily programmed into any compatible unauthorized cellular phone. For example, when an authorized user makes a call from an authorized cellular phone, a fraudulent perpetrator may eavesdrop on a cellular call setup sequence of the authorized cellular phone to obtain the MIN. The fraudulent perpetrator then programs the unauthorized cellular phone to have the same MIN that the authorized cellular phone has. Because the unauthorized cellular phone now has the same identity as the authorized cellular phone, the fraudulent perpetrator can make calls from the unauthorized cellular phone that are billed to the user of the authorized cellular phone.
The GSM (Group Special Mobile) cellular system features a more complex approach to authentication and fraud prevention than many analog cellular systems do. GSM determines a traffic channel encoding key at the fixed end for comparison to a traffic channel encoding key determined at the mobile station. At the fixed end, the GSM cellular system has an authentication center including a random number generator, a database for subscriber ciphering keys, and a ciphering/deciphering algorithm. The random number generator generates a random number in response to a mobile station's request for access. The ciphering/deciphering algorithm derives a traffic channel encoding key from the random number and a subscriber ciphering key from the database. The authentication center sends the random number to the base station through communication lines. The base station transmits the random number to the mobile station via radio frequency (RF) communication.
At the mobile end, the mobile station receives the random number and generates the same traffic channel encoding key as the fixed end does. The mobile station generates the same traffic channel encoding key from the random number and its locally-stored subscriber ciphering key. The traffic channel encoding key is generated for use only during a single call between the base station and the mobile station and is regenerated for each new communication.
In addition, to the above authentication procedure, GSM further includes a signed response algorithm for generating a signed response from the subscriber ciphering key and the random generator. If the signed response calculated at the authentication center matches the signed response calculated at the mobile unit, the communication access of the mobile is valid. The comparison of the signed response of the mobile unit and the authentication center is made in the fixed end equipment after the mobile transmits the signed response to the base station.
However, GSM cellular systems may be subject to the same fraudulent use as less sophisticated communication systems because of the subscriber identity configuration. GSM uses an elaborate subscriber identity configuration which includes an international mobile subscriber identity (IMSI) and an international mobile station equipment identity (IMEI). The IMSI is stored on a smart card which is intended to interface with any GSM cellular phone. The GSM cellular phone itself includes an international mobile station equipment identity (IMEI).
The IMSI is normally communicated to the communication system during an access request by the mobile station prior to encryption as described above. The mobile switching center (MSC) may request the transmission of the IMSI from the mobile station for land-line originated calls. Accordingly, an unauthorized eavesdropper may gain information to misappropriate the identity of the valid subscriber's smart card during the unencrypted transmission. In sum, both MIN's and IMSI's are vulnerable to fraudulent activity.
Therefore, a need exists for detecting fraudulent use of a communications system. In particular, a need exists for detecting fraudulent use of conventional analog cellular systems, GSM cellular systems, TDMA cellular systems, and CDMA cellular systems, among others.
SUMMARY OF THE PRESENT INVENTION
In accordance with the present invention, a method for detecting fraud in a wireless communications system includes establishing one or more call events in a wireless call sequence. In response to occurrences of the call events, codes are assigned corresponding to the subscriber stations such that each subscriber station has a distinguishable code from all other subscriber stations. The codes are distinguishable even if at least two of the subscriber stations share a common subscriber identity. A database of subscriber identities is maintained and supplemented by the codes such that a unique combination of the code and the subscriber identity uniquely identifies each subscriber station. Identical or common subscriber identities are identified with corresponding different codes in the database. Any common subscriber identities with different codes indicate potentially fraudulent activity on the communications system.
The method of the invention permits detection and monitoring of fraudulent activity by permitting a legitimate subscriber station and an illegitimate subscriber station to have two different codes after the legitimate subscriber station's identity has been misappropriated. In a preferred embodiment, the codes are random codes which are dynamically updated to discourage fraudulent activity on the communications system.
In one aspect of the invention, the legitimate subscriber station may be identified if the legitimate subscriber makes a key phone call or a call conforming to an historical call pattern. Once the legitimate subscriber station is identified, the illegitimate subscriber station may be monitored by tracking a unique combination of a random code and a subscriber identity, which represents the illegitimate subscriber identity.
In another aspect of the invention after the legitimate subscriber station is identified, the illegitimate subscriber station is deactivated and the subscriber-resident random code of the legitimate subscriber station is synchronized with a database-resident random code in the fixed end.
REFERENCES:
patent: 4471216 (1984-09-01), Herve
patent: 5196840 (1993-03-01), Leith et al.
patent: 5241598 (1993-08-01), Raith
patent: 5335265 (1994-08-01), Cooper et al.
patent: 5335278 (1994-08-01), Matchett et al.
patent: 5345595 (1994-09-01), Johnson et al.
patent: 5467382 (1995-11-01), Schorman
patent: 5555551 (1996-09-01), Rudokas et al.
patent: 5572193 (1996-11-01), Flanders et al.
patent: 5613214 (1997-03-01), Shirasawa et al.
patent: 5839063 (1998-11-01), Lee
patent: 5918173 (1999-06-01), Rosa
patent: 5953652 (1999-09-01), Amin et al.
patent: 5978669 (1999-11-01), Sanmugam
patent: 5991617 (1999-11-01), Powell
patent: 6091945 (2000-07-01), Oka
patent: 6094572 (2000-07-01), Sandre et al.
patent: 119889 (1984-09-01), None
Appiah Charles N.
Chang Vivian
Lucent Technologies - Inc.
LandOfFree
Method for detecting fraudulent use of a communications system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for detecting fraudulent use of a communications system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for detecting fraudulent use of a communications system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2451889