WO1995024107A1 - Cellular telephone fraud control system and method - Google Patents

Cellular telephone fraud control system and method Download PDF

Info

Publication number
WO1995024107A1
WO1995024107A1 PCT/US1995/002718 US9502718W WO9524107A1 WO 1995024107 A1 WO1995024107 A1 WO 1995024107A1 US 9502718 W US9502718 W US 9502718W WO 9524107 A1 WO9524107 A1 WO 9524107A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile telephone
caller
telephone unit
cli
frequency
Prior art date
Application number
PCT/US1995/002718
Other languages
French (fr)
Inventor
Singh Sikand Parminder
John Bradford Henel
Steven Michael Robb
Original Assignee
Harris Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harris Corporation filed Critical Harris Corporation
Publication of WO1995024107A1 publication Critical patent/WO1995024107A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the present invention relates to mobile telephone systems, and in particular to a system and method for authenticating the identity of a user of a caller mobile telephone unit to decrease the likelihood that access to the system will be fraudulently obtained.
  • Mobile telephones for example, are telephones such as automobile mounted telephones, hand-carried portable telephones that communicate via radio and are connected to a telephone exchange through an intermediate station.
  • Mobile telephone systems and are disclosed in the specification of U.S. Patent number 4,829,554.
  • a switching office 20 connects the mobile telephone system to a telephone exchange 22 and its subscribers 24.
  • the switching office 20 communicates with cell stations 26 that communicate with mobile telephone units 28 in their respective areas. Communication between the cell stations 26 and the switching office 20. and between the switching office 20 and the telephone exchange 22 may be by any conventional means, such as land line or radio. Communication between the mobile telephone units 28 and the cell stations 26 is typically via radio.
  • Radio communication between the cell stations 26 and the mobile telephone units 28 may use two sets of frequencies, one for establishing the communication link (the signal frequency) and one set for communicating (the voice frequency).
  • Full duplex communications between a mobile unit 28 and a cell station 26 may require signals having two different frequencies, or one frequency set.
  • the cell stations 26 and mobile telephone units 28 may operate on one or more sets of predetermined signal frequencies (e.g., Fl - F8) and on one or more of a set of predetermined voice frequencies (e.g., F9 - F40).
  • Each of the cell stations 26 may use only some of the frequencies in the set of signal frequencies to avoid interference from nearby cells, with the mobile telephone unit monitoring the entire set of signal frequencies to determine which are being used by the cell station with which it is to communicate.
  • Each of the mobile telephone units 28 is provided with a caller line identification (CLI) that does not change (in contrast to the telephone number of the mobile telephone unit that may change).
  • the CLI is typically part of the mobile telephone unit and may be affixed using conventional methods, such as hardwire or ready only memory.
  • the CLI may be used for various administrative purposes, including signaling the mobile telephone unit, authorizing use of the mobile telephone system and billing.
  • the protocol for placing a telephone call with a mobile telephone unit typically includes an exchange of signals with a cell station on a signal frequency, followed by establishment of voice communication on a voice frequency. For example, the protocol may be as follows: Cell A broadcasts - "I am signaling on signal frequency Fl.”
  • Mobile unit B Notes signal frequency Fl for Cell A.
  • Cell A to CLI (Mobile unit B) on signal frequency Fl (after verifying that the CLI is authorized) - "Use voice frequency F20.”
  • Cell A also establishes a communications link between the mobile unit 28 and the telephone exchange.
  • Mobile unit B communicates with subscriber at dialing number 555-1234 through Cell A using voice frequency F20.
  • This protocol is easy to use because it relies on a single means of identification, the CLI. It provides entry into the mobile telephone system and provides a means of billing a user.
  • the CLI also is the weak link in the security of the system.
  • the CLI is broadcast from the mobile telephone unit and may be received by anyone able to receive the signal frequency that is broadcast from the cell station.
  • a listener with appropriate radio receiving equipment can steal a CLI and use the CLI to obtain free, unauthorized access to the mobile telephone system.
  • the user to whom the bills for the stolen CLI are sent will likely not learn of the theft until the bill arrives with charges for calls the user did not make.
  • a mobile unit may be stolen and used by the thief while the CLI remains authorized.
  • An object of the present invention is to provide a novel mobile telephone authentication system and method that obviates known problems and increases the level of security without significant changes to existing mobile telephone systems, and to provide a mobile telephone authentication system and method that employs a caller authentication number that, when used with the existing CLI, identifies an authorized user of the caller mobile telephone unit.
  • a further object is to provide a mobile telephone authentication system and method that employs a caller authentication number that is transmitted on a frequency different than the signal frequency to provide another hurdle for a would-be thief, and that utilizes plural types of signals to authenticate proper usage.
  • a further object is to provide a mobile telephone authentication system and method that employs two identifiers, one that is automatically transmitted on a first frequency, and one that is selectively transmitted on a second frequency, and employs a caller authentication number that is transmitted on the voice frequency using a sequence of DTMF tones in response to a request for further identification, and furthermore increases the security of the cellular telephone system without abandoning the equipment already in place and without significantly adding to the cost of the present systems.
  • the present invention includes a mobile telephone system including a plurality of mobile telephone units for dialing a number to establish telephone communications between a telephone in a telephone exchange and the caller mobile telephone unit, in which each of the mobile telephone units is provided with a caller line identification (CLI) that is automatically transmitted from the caller mobile telephone unit to identify the caller mobile telephone unit, the system comprising a caller authentication number (CAN) assigned to a user of a mobile telephone unit that is selectively transmitted from the caller mobile telephone unit to identify the user of the caller mobile telephone unit, a switch for receiving the dialed number, said CAN and the CLI from the caller mobile telephone unit, and for providing the dialed number to the public telephone exchange, a comparator for determining whether said CAN and the CLI identify an authorized user of the caller mobile telephone unit, in the event said CAN and the CLI identify an authorized user, for allowing said switch to complete the call to the dialed number, and in the event said CAN and the CLI do not identify an authorized user, for not allowing
  • Figure 1 is a block diagram of a mobile telephone system of the prior art.
  • FIG. 2 is a block diagram of a mobile telephone system incorporating an embodiment of the present invention.
  • the present invention provides increased security to a mobile telephone system by assigning an authorized user of a mobile telephone unit a caller authentication number (CAN) that is different than the caller line identification (CLI), and by adding a verification unit for determining whether the CLI and the CAN identify an authorized user of the system.
  • the CAN may be transmitted from the caller mobile telephone unit in response to a request from the verification unit, and may be transmitted on a frequency different than the signal frequency to compound the problems faced by a would-be thief.
  • a mobile telephone system in which the present invention may find application may include a switching office 30 communicating with a telephone exchange 22 and subscribers 24.
  • the switching office 30 communicates with cell stations 32 that communicate with mobile telephone units 34 in their respective areas.
  • the switching office 30 receives the CLI and dialed number DN from the cell station 32 and passes the CLI to a verification unit 36 that prompts the user of the caller mobile telephone unit 34 to insert the CAN.
  • the CAN is provided to the verification unit 36 and with the CLI is verified against a database of authorized CAN and CLI combinations. If the CAN and CLI identify an authorized caller, the verification unit 36 allows the switching office to complete the connection with the telephone exchange 22.
  • the CLI may be transmitted on the signal frequency, as discussed above, and the CAN may be transmitted on a different frequency, such as the voice frequency.
  • the CAN may be any appropriate code that may be entered at the caller mobile telephone unit 34.
  • the CAN may be a predetermined sequence of numbers, letters, or symbols, such as three or more dual tone multiple frequency (DTMF) tones. The type of signal and number of numbers, letters or symbols may be selected for ease of entry and security.
  • DTMF dual tone multiple frequency
  • the user of the caller mobile telephone unit may enter the CAN on the keypad of the mobile telephone unit 34 to access the mobile telephone system.
  • the verification unit 36 desirably interfaces with the existing mobile telephone system so that major changes to the system are not required. It may include a comparator 38 that evaluates whether the CLI and CAN identify an authorized user of the caller mobile telephone unit. To this end, a database 40 and computer 42, or other appropriate data access and retrieval system, may be included in the comparator 38. The comparator 38 may provide instructions to a switch 44 that allows the switching office 30 to communicate with the telephone exchange 22, thereby connecting the subscriber 24 and caller mobile telephone unit 34. The switch 44 may be used to carry all traffic between the switching office 30 and the telephone exchange 22 or may enable a direct link 46 therebetween once the user of the caller mobile telephone unit has been identified as authorized.
  • Present day systems typically verify the CLI of the calling party to ensure that the caller mobile telephone unit is authorized access to the cellular system.
  • the use of the CAN substantially complicates the task of a would-be thief of telephone service.
  • a thief who stolen a mobile telephone unit (such as by stealing the automobile carrying the mobile telephone unit or by stealing the unit) would have a unit which automatically transmits an authorized CLI, but would not know the CAN.
  • Electronic thieves who intercept only the CLI on the signalling channel are similarly thwarted.
  • an electronic thief would have to (a) detect the CLI embedded in the digital signal on the signalling channel; (b) determine which of the many voice channels was to be used by the unit with the specified CLI; and, (c) detect the analog. DTMF tones coming from the unit with the specified CLI over one of the many voice channels.
  • the switch 44 may be any conventional switch suitable for the purpose, and in a preferred embodiment is a Harris Corporation Integrated Network Platform switch sold under the registered trade mark HARRIS 20-20.
  • the computer 42 may be any conventional computer suitable for the purpose, such as an IBM PC-AT or the like.
  • the protocol for placing a telephone call with a mobile telephone unit includes an exchange of signals with a cell station on a signal frequency, transmission of the CAN on a voice frequency, followed by establishment of voice communication on the voice frequency.
  • the protocol may be as follows: Cell A broadcasts - "I am signaling on signal frequency Fl .”
  • Mobile unit B Notes signal frequency Fl for Cell A. Mobile unit B to Cell A on signal frequency Fl - "Place call to dialing number 555-
  • Verification unit A to which Cell A is attached prompts Mobile unit B, using Cell A and signal frequency Fl - "Provide your CAN" Mobile unit B responds on voice frequency F20 - "My CAN is yyyy.”
  • Verification unit A checks that CLI "xxxx” and CAN "yyyy” identify an authorized user of Mobile unit B.
  • Cell A establishes a communications link with the telephone exchange.
  • Mobile unit B communicates with subscriber at dialing number 555-1234 through Cell
  • Mobile unit B If Mobile unit B is not positively identified, Cell A does not establish communications with the telephone exchange and Mobile unit B may be informed that the call cannot be made.
  • the prompt from the verification unit to the caller mobile telephone unit to provide the CAN may be a verbal message or one or more tones that the user will be able to identify as a request to provide the CAN.
  • the cell station 26 or validation computer 42 may stop all further processing of calls from the CLI until additional certification is obtained that the mobile unit is in authorized hands.
  • the CAN may be transmitted on the signal frequency, although the risk of interception and theft may be higher than when separate frequencies are used.
  • the verification unit 36 may be near or in the switching office 30, or may be remote therefrom and accessible by a secure communication link. Portions of the verification unit 36, such as the database 40, may be separated from the remaining portions so that a central database may serve more than one switching office to avoid duplication of data entries. Alternatively, plural databases 40 may be connected to a central data exchange that updates all of the databases 40 when information is provided to any one of the databases 40.
  • the verification unit 36 may also be used to screen dialed numbers and to determine whether the user of the caller mobile telephone unit is authorized to be connected to the dialed number. For example, in the protocol described above, the dialed number may be forwarded with the CLI and the CAN to verification unit 36 to determine whether the dialed number is on a list of proscribed numbers that may be stored in database 40 under the CLI. If the dialed number is on such a list, the call may be treated in the same manner as if the CLI and CAN did not identify the caller mobile telephone unit.
  • Plural CANs may be associated with one CLI to permit several different users to make calls from the same mobile telephone unit but with different billing and/or permitted call types and access.
  • Increased security for a mobile telephone system is provided by assigning each mobile telephone unit or authorized user thereof a caller authentication number (CAN) different than the caller line identification (CLI) that is normally assigned to all mobile telephone units.
  • a verification unit added to the conventional mobile telephone system determines whether the combination of the CLI and the CAN identify an authorized user of the system and completes connection of the switching office to the telephone exchange if the CAN and CLI identify an authorized user.
  • the CAN may be transmitted from the caller mobile telephone unit in response to a request from the verification unit, and may be transmitted on a frequency different than the signal frequency, such as the voice frequency.

Abstract

Increased security for a mobile telephone system is provided by assigning each mobile telephone unit or authorized user thereof a caller authentication number (CAN) different than the caller line identification (CLI) that is normally assigned to all mobile telephone units. A verification unit added to the conventional mobile telephone system determines whether the combination of the CLI and the CAN identify an authorized user of the system and completes connection of the switching office to the telephone exchange if the CAN and CLI identify an authorized user. The CAN may be transmitted from the caller mobile telephone unit in response to a request from the verification unit, and may be transmitted on a frequency different than the signal frequency, such as the voice frequency.

Description

CELLULAR TELEPHONE FRAUD CONTROL SYSTEM AND METHOD The present invention relates to mobile telephone systems, and in particular to a system and method for authenticating the identity of a user of a caller mobile telephone unit to decrease the likelihood that access to the system will be fraudulently obtained. Mobile telephones, for example, are telephones such as automobile mounted telephones, hand-carried portable telephones that communicate via radio and are connected to a telephone exchange through an intermediate station. Mobile telephone systems and are disclosed in the specification of U.S. Patent number 4,829,554. In such systems, and with reference to Figure 1, a switching office 20 connects the mobile telephone system to a telephone exchange 22 and its subscribers 24. The switching office 20 communicates with cell stations 26 that communicate with mobile telephone units 28 in their respective areas. Communication between the cell stations 26 and the switching office 20. and between the switching office 20 and the telephone exchange 22 may be by any conventional means, such as land line or radio. Communication between the mobile telephone units 28 and the cell stations 26 is typically via radio.
Radio communication between the cell stations 26 and the mobile telephone units 28 may use two sets of frequencies, one for establishing the communication link (the signal frequency) and one set for communicating (the voice frequency). Full duplex communications between a mobile unit 28 and a cell station 26 may require signals having two different frequencies, or one frequency set. The cell stations 26 and mobile telephone units 28 may operate on one or more sets of predetermined signal frequencies (e.g., Fl - F8) and on one or more of a set of predetermined voice frequencies (e.g., F9 - F40). Each of the cell stations 26 may use only some of the frequencies in the set of signal frequencies to avoid interference from nearby cells, with the mobile telephone unit monitoring the entire set of signal frequencies to determine which are being used by the cell station with which it is to communicate.
Each of the mobile telephone units 28 is provided with a caller line identification (CLI) that does not change (in contrast to the telephone number of the mobile telephone unit that may change). The CLI is typically part of the mobile telephone unit and may be affixed using conventional methods, such as hardwire or ready only memory. The CLI may be used for various administrative purposes, including signaling the mobile telephone unit, authorizing use of the mobile telephone system and billing. The protocol for placing a telephone call with a mobile telephone unit typically includes an exchange of signals with a cell station on a signal frequency, followed by establishment of voice communication on a voice frequency. For example, the protocol may be as follows: Cell A broadcasts - "I am signaling on signal frequency Fl."
Mobile unit B - Notes signal frequency Fl for Cell A.
Mobile unit B to Cell A on signal frequency Fl - "Place call to dialing number 555- 1234 (DN in the figures), my CLI is xxxx."
Cell A to CLI (Mobile unit B) on signal frequency Fl (after verifying that the CLI is authorized) - "Use voice frequency F20." Cell A also establishes a communications link between the mobile unit 28 and the telephone exchange.
Mobile unit B communicates with subscriber at dialing number 555-1234 through Cell A using voice frequency F20.
This protocol is easy to use because it relies on a single means of identification, the CLI. It provides entry into the mobile telephone system and provides a means of billing a user. Unfortunately, the CLI also is the weak link in the security of the system. The CLI is broadcast from the mobile telephone unit and may be received by anyone able to receive the signal frequency that is broadcast from the cell station. Thus, a listener with appropriate radio receiving equipment can steal a CLI and use the CLI to obtain free, unauthorized access to the mobile telephone system. The user to whom the bills for the stolen CLI are sent will likely not learn of the theft until the bill arrives with charges for calls the user did not make. Alternatively, a mobile unit may be stolen and used by the thief while the CLI remains authorized.
Mobile telephone systems that use this protocol are widespread with the considerable capital expenditures for building the systems already invested. While it is apparent that an increased level of security is desirable, it is has not been apparent how security can be increased without major and costly changes to the existing systems.
An object of the present invention is to provide a novel mobile telephone authentication system and method that obviates known problems and increases the level of security without significant changes to existing mobile telephone systems, and to provide a mobile telephone authentication system and method that employs a caller authentication number that, when used with the existing CLI, identifies an authorized user of the caller mobile telephone unit.
A further object is to provide a mobile telephone authentication system and method that employs a caller authentication number that is transmitted on a frequency different than the signal frequency to provide another hurdle for a would-be thief, and that utilizes plural types of signals to authenticate proper usage.
A further object is to provide a mobile telephone authentication system and method that employs two identifiers, one that is automatically transmitted on a first frequency, and one that is selectively transmitted on a second frequency, and employs a caller authentication number that is transmitted on the voice frequency using a sequence of DTMF tones in response to a request for further identification, and furthermore increases the security of the cellular telephone system without abandoning the equipment already in place and without significantly adding to the cost of the present systems.
The present invention includes a mobile telephone system including a plurality of mobile telephone units for dialing a number to establish telephone communications between a telephone in a telephone exchange and the caller mobile telephone unit, in which each of the mobile telephone units is provided with a caller line identification (CLI) that is automatically transmitted from the caller mobile telephone unit to identify the caller mobile telephone unit, the system comprising a caller authentication number (CAN) assigned to a user of a mobile telephone unit that is selectively transmitted from the caller mobile telephone unit to identify the user of the caller mobile telephone unit, a switch for receiving the dialed number, said CAN and the CLI from the caller mobile telephone unit, and for providing the dialed number to the public telephone exchange, a comparator for determining whether said CAN and the CLI identify an authorized user of the caller mobile telephone unit, in the event said CAN and the CLI identify an authorized user, for allowing said switch to complete the call to the dialed number, and in the event said CAN and the CLI do not identify an authorized user, for not allowing said switch to complete the call to the dialed number, with the CLI CAN transmitted on selective and predetermined but different frequencies.
The invention will now be described, by way of example, with reference to the accompanying drawings in which: Figure 1 is a block diagram of a mobile telephone system of the prior art.
Figure 2 is a block diagram of a mobile telephone system incorporating an embodiment of the present invention.
The present invention provides increased security to a mobile telephone system by assigning an authorized user of a mobile telephone unit a caller authentication number (CAN) that is different than the caller line identification (CLI), and by adding a verification unit for determining whether the CLI and the CAN identify an authorized user of the system. The CAN may be transmitted from the caller mobile telephone unit in response to a request from the verification unit, and may be transmitted on a frequency different than the signal frequency to compound the problems faced by a would-be thief. With reference now to Figure 2, a mobile telephone system in which the present invention may find application may include a switching office 30 communicating with a telephone exchange 22 and subscribers 24. The switching office 30 communicates with cell stations 32 that communicate with mobile telephone units 34 in their respective areas. The switching office 30 receives the CLI and dialed number DN from the cell station 32 and passes the CLI to a verification unit 36 that prompts the user of the caller mobile telephone unit 34 to insert the CAN. The CAN is provided to the verification unit 36 and with the CLI is verified against a database of authorized CAN and CLI combinations. If the CAN and CLI identify an authorized caller, the verification unit 36 allows the switching office to complete the connection with the telephone exchange 22. The CLI may be transmitted on the signal frequency, as discussed above, and the CAN may be transmitted on a different frequency, such as the voice frequency.
The CAN may be any appropriate code that may be entered at the caller mobile telephone unit 34. For example, the CAN may be a predetermined sequence of numbers, letters, or symbols, such as three or more dual tone multiple frequency (DTMF) tones. The type of signal and number of numbers, letters or symbols may be selected for ease of entry and security. When prompted by the verification unit 36, the user of the caller mobile telephone unit may enter the CAN on the keypad of the mobile telephone unit 34 to access the mobile telephone system.
The verification unit 36 desirably interfaces with the existing mobile telephone system so that major changes to the system are not required. It may include a comparator 38 that evaluates whether the CLI and CAN identify an authorized user of the caller mobile telephone unit. To this end, a database 40 and computer 42, or other appropriate data access and retrieval system, may be included in the comparator 38. The comparator 38 may provide instructions to a switch 44 that allows the switching office 30 to communicate with the telephone exchange 22, thereby connecting the subscriber 24 and caller mobile telephone unit 34. The switch 44 may be used to carry all traffic between the switching office 30 and the telephone exchange 22 or may enable a direct link 46 therebetween once the user of the caller mobile telephone unit has been identified as authorized.
Present day systems typically verify the CLI of the calling party to ensure that the caller mobile telephone unit is authorized access to the cellular system. Thus, most if not all of the hardware components for the improved security system of the present invention exist in present systems. The use of the CAN substantially complicates the task of a would-be thief of telephone service. A thief who stole a mobile telephone unit (such as by stealing the automobile carrying the mobile telephone unit or by stealing the unit) would have a unit which automatically transmits an authorized CLI, but would not know the CAN. Electronic thieves who intercept only the CLI on the signalling channel are similarly thwarted. To succeed in stealing the full authorized codes, an electronic thief would have to (a) detect the CLI embedded in the digital signal on the signalling channel; (b) determine which of the many voice channels was to be used by the unit with the specified CLI; and, (c) detect the analog. DTMF tones coming from the unit with the specified CLI over one of the many voice channels.
The switch 44 may be any conventional switch suitable for the purpose, and in a preferred embodiment is a Harris Corporation Integrated Network Platform switch sold under the registered trade mark HARRIS 20-20. The computer 42 may be any conventional computer suitable for the purpose, such as an IBM PC-AT or the like. In an embodiment of the present invention, the protocol for placing a telephone call with a mobile telephone unit includes an exchange of signals with a cell station on a signal frequency, transmission of the CAN on a voice frequency, followed by establishment of voice communication on the voice frequency. The protocol may be as follows: Cell A broadcasts - "I am signaling on signal frequency Fl ."
Mobile unit B - Notes signal frequency Fl for Cell A. Mobile unit B to Cell A on signal frequency Fl - "Place call to dialing number 555-
1234 (DN in the figures), my CLI is xxxx."
Cell A to CLI (Mobile unit B) on signal frequency Fl - "Use voice frequency F20."
Verification unit A to which Cell A is attached prompts Mobile unit B, using Cell A and signal frequency Fl - "Provide your CAN" Mobile unit B responds on voice frequency F20 - "My CAN is yyyy."
Verification unit A checks that CLI "xxxx" and CAN "yyyy" identify an authorized user of Mobile unit B.
If the user of Mobile unit B is authorized, Cell A establishes a communications link with the telephone exchange.
Mobile unit B communicates with subscriber at dialing number 555-1234 through Cell
A using voice frequency F20.
If Mobile unit B is not positively identified, Cell A does not establish communications with the telephone exchange and Mobile unit B may be informed that the call cannot be made.
The prompt from the verification unit to the caller mobile telephone unit to provide the CAN may be a verbal message or one or more tones that the user will be able to identify as a request to provide the CAN. In the event that an improper access is attempted, or a predetermined number of improper attempts to obtain access are made within a certain time period, the cell station 26 or validation computer 42 may stop all further processing of calls from the CLI until additional certification is obtained that the mobile unit is in authorized hands.
In an alternative embodiment, the CAN may be transmitted on the signal frequency, although the risk of interception and theft may be higher than when separate frequencies are used.
The verification unit 36 may be near or in the switching office 30, or may be remote therefrom and accessible by a secure communication link. Portions of the verification unit 36, such as the database 40, may be separated from the remaining portions so that a central database may serve more than one switching office to avoid duplication of data entries. Alternatively, plural databases 40 may be connected to a central data exchange that updates all of the databases 40 when information is provided to any one of the databases 40.
The verification unit 36 may also be used to screen dialed numbers and to determine whether the user of the caller mobile telephone unit is authorized to be connected to the dialed number. For example, in the protocol described above, the dialed number may be forwarded with the CLI and the CAN to verification unit 36 to determine whether the dialed number is on a list of proscribed numbers that may be stored in database 40 under the CLI. If the dialed number is on such a list, the call may be treated in the same manner as if the CLI and CAN did not identify the caller mobile telephone unit.
Plural CANs may be associated with one CLI to permit several different users to make calls from the same mobile telephone unit but with different billing and/or permitted call types and access.
Increased security for a mobile telephone system is provided by assigning each mobile telephone unit or authorized user thereof a caller authentication number (CAN) different than the caller line identification (CLI) that is normally assigned to all mobile telephone units. A verification unit added to the conventional mobile telephone system determines whether the combination of the CLI and the CAN identify an authorized user of the system and completes connection of the switching office to the telephone exchange if the CAN and CLI identify an authorized user. The CAN may be transmitted from the caller mobile telephone unit in response to a request from the verification unit, and may be transmitted on a frequency different than the signal frequency, such as the voice frequency.

Claims

WHAT IS CLAIMED IS:
1. A mobile telephone system including a plurality of mobile telephone units for dialing a number to establish telephone communications between a telephone in a telephone exchange and the caller mobile telephone unit, in which each of the mobile telephone units is provided with a caller line identification (CLI) that is automatically transmitted from the caller mobile telephone unit to identify the caller mobile telephone unit, the system comprising a caller authentication number (CAN) assigned to a user of a mobile telephone unit that is selectively transmitted from the caller mobile telephone unit to identify the user of the caller mobile telephone unit, a switch for receiving the dialed number, said CAN and the CLI from the caller mobile telephone unit, and for providing the dialed number to the public telephone exchange, a comparator for determining whether said CAN and the CLI identify an authorized user of the caller mobile telephone unit, in the event said CAN and the CLI identify an authorized user, for allowing said switch to complete the call to the dialed number, and in the event said CAN and the CLI do not identify an authorized user, for not allowing said switch to complete the call to the dialed number, with the CLI CAN transmitted on selective and predetermined but different frequencies.
2. A system as claimed in claim 1 wherein the CLI is transmitted on a signal frequency and said CAN is transmitted on a voice frequency, and comprising a central switching station in which said switch and said comparator are located in said central switching station.
3. A system as claimed in claim 1 or 2, including a switching office with said switch being located in said switching office and said comparator is remote therefrom, and said comparator also determining whether the user of the mobile telephone unit is authorized to establish telephone communications with the dialed number.
4. A system as claimed in any one of claim 1 to 3, wherein said CAN comprises a predetermined sequence of at least three DTMF tones, said comparator comprises a database remote from said switch, in which the CLI and said CAN are transmitted selectively in different signalling formats, and preferably the CLI is transmitted in digital format and the CAN is transmitted in DTMF format.
5. A call authenticator for a mobile telephone system comprising a first caller identifier that is automatically transmitted on a first frequency from a caller mobile telephone unit, a second caller identifier that is selectively transmitted on a second frequency from the caller mobile telephone unit, the combination of said first and second caller identifiers uniquely identifying an authorized user of the caller mobile telephone unit means for evaluating said first and second caller identifiers before connecting the caller mobile telephone unit to a dialed number to determine whether said first and second caller identifiers identify an authorized user of the caller mobile telephone unit, with said first frequency being a signal frequency for establishing telephone communications with the caller mobile telephone unit, and said second frequency is a voice frequency for communicating with the caller mobile telephone unit.
6. An authenticator as claimed in claim 5 wherein said means for evaluating comprises a computer for determining whether the combination of said first and second caller identifiers identify an authorized user of the caller mobile telephone unit, and said means for evaluation further comprises a switch for connecting the caller mobile telephone unit to the dialed number responsive to the determination made by said computer.
7. An authenticator as claimed in claims 5 or 6, wherein said means for evaluation further comprises means for determining whether the user of the caller mobile telephone unit is authorized to be connected to the dialed number.
8. A system for authenticating caller identification in a mobile telephone system comprising means for transmitting a first identifier automatically from a mobile telephone unit on a first frequency during initiation of a communication link with the mobile telephone unit and for transmitting a second identifier selectively from the mobile telephone unit on a second frequency.
9. A method of connecting a caller mobile telephone unit to a telephone exchange in which each mobile telephone unit is provided with a caller line identification (CLI) that is automatically transmitted from the caller mobile telephone unit to identify the caller mobile telephone unit, the method comprising the steps of:
(a) providing a user of the caller mobile telephone unit with a caller authentication number (CAN), the combination of the CLI and the CAN identifying an authorized user of the caller mobile telephone unit; (b) selectively transmitting the CAN from the caller mobile telephone unit to identify the user of the caller mobile telephone unit before connecting the caller mobile telephone unit to a telephone exchange;
(c) determining whether the CAN and the CLI identify an authorized user of the caller mobile telephone unit; and
(d) in the event the CAN and the CLI identify an authorized user of the caller mobile telephone unit, connecting the caller mobile telephone unit to the telephone exchange.
10. A method as claimed in claim 9 wherein the CAN and the CLI are transmitted on different frequencies, and preferably the CAN is transmitted on a voice frequency and the CLI is transmitted on a signal frequency.
11. A method as claimed in claims 9 or 10 wherein the step of determining whether the CAN and CLI identify an authorized user of the caller mobile telephone unit further comprises the step of evaluating whether the caller mobile telephone unit is authorized to be connected to a telephone number in the telephone exchange dialed by the caller mobile telephone unit.
12. A method of authenticating caller identification in a mobile telephone system comprising the steps of:
(a) automatically transmitting a first caller identifier on a first frequency from a caller mobile telephone unit;
(b) selectively transmitting a second caller identifier on a second frequency from the caller mobile telephone unit, the combination of the first and second caller identifiers identifying an authorized user of the caller mobile telephone unit; and
(c) evaluating the first and second caller identifiers before connecting the caller mobile telephone unit to a dialed number to determine whether said first and second caller identifiers identify an authorized use of caller mobile telephone unit.
13. A method as claimed in claim 12 wherein the first frequency is a signal frequency for establishing telephone communications with the caller mobile telephone unit, and the second frequency is a voice frequency for communicating with the caller mobile telephone unit.
14. A call authenticator for a mobil telephone system comprising a first caller identifier that is automatically transmitted on a first frequency from a caller mobile telephone unit; plural second caller identifiers, one of which is selectively transmitted from the caller mobile telephone unit, the combination of said first and one of said second caller identifiers uniquely identifying a particular authorized user of said mobile telephone unit; and means for evaluating said first and second caller identifiers before connecting the caller mobile telephone unit to a dialed number to determine whether said first and second caller identifiers uniquely identify one of the authorized users of the caller mobile telephone unit.
15. An authenticator as claimed in claim 14 wherein said first frequency is a signal frequency for establishing telephone communications with the caller mobile telephone unit, with one of said second caller identifiers is transmitted on a second frequency that is a voice frequency for communicating with the caller mobile telephone unit.
16. An authenticator as claimed in claim 15 wherein said means for evaluation further comprises a switch for connecting the caller mobile telephone unit to the dialed number, and includes means for determining whether the caller mobile telephone unit is authorized to be connected to the dialed number, with said first caller identifier and one of said second caller identifiers are transmitted in different signalling formats.
PCT/US1995/002718 1994-03-01 1995-03-01 Cellular telephone fraud control system and method WO1995024107A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US20358594A 1994-03-01 1994-03-01
US08/203,585 1994-03-01

Publications (1)

Publication Number Publication Date
WO1995024107A1 true WO1995024107A1 (en) 1995-09-08

Family

ID=22754571

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1995/002718 WO1995024107A1 (en) 1994-03-01 1995-03-01 Cellular telephone fraud control system and method

Country Status (1)

Country Link
WO (1) WO1995024107A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0841828A2 (en) * 1996-11-12 1998-05-13 Nokia Mobile Phones Ltd. A system and a method for retrieving data from a database
EP0873032A1 (en) * 1997-04-07 1998-10-21 Harris Corporation Authentication system for a mobile telephone
WO1999044374A1 (en) * 1998-02-27 1999-09-02 Ericsson Inc. Method and apparatus for personally identifying a calling party to a called party
WO2005011253A1 (en) * 2003-07-25 2005-02-03 Siemens Aktiengesellschaft Centralized telephone control and blockage system, gateway and method of controlling and blocking telephones
US20150043724A1 (en) * 2013-08-06 2015-02-12 Verizon Patent And Licensing Inc. Caller id verification
US10154134B1 (en) 2016-04-05 2018-12-11 State Farm Mutual Automobile Insurance Company Systems and methods for authenticating a caller at a call center

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5660126A (en) * 1979-10-22 1981-05-23 Nippon Telegr & Teleph Corp <Ntt> Limitation system for user of mobile body communication
GB2193861A (en) * 1986-08-15 1988-02-17 British Telecomm Communications system
EP0433465A1 (en) * 1989-06-30 1991-06-26 Nippon Telegraph And Telephone Corporation Personal communication system
FR2678459A1 (en) * 1991-06-26 1992-12-31 Remery Patrick Method of authenticating a subscriber making a call, for telephone billing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5660126A (en) * 1979-10-22 1981-05-23 Nippon Telegr & Teleph Corp <Ntt> Limitation system for user of mobile body communication
GB2193861A (en) * 1986-08-15 1988-02-17 British Telecomm Communications system
EP0433465A1 (en) * 1989-06-30 1991-06-26 Nippon Telegraph And Telephone Corporation Personal communication system
FR2678459A1 (en) * 1991-06-26 1992-12-31 Remery Patrick Method of authenticating a subscriber making a call, for telephone billing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PATENT ABSTRACTS OF JAPAN vol. 005, no. 121 (E - 068) 5 August 1981 (1981-08-05) *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0841828A2 (en) * 1996-11-12 1998-05-13 Nokia Mobile Phones Ltd. A system and a method for retrieving data from a database
EP0841828A3 (en) * 1996-11-12 1999-07-14 Nokia Mobile Phones Ltd. A system and a method for retrieving data from a database
US6094573A (en) * 1996-11-12 2000-07-25 Nokia Mobile Phones Limited System and a method for selective data retrieval from a remote database on basis of caller line identification and user specific access codes
EP0873032A1 (en) * 1997-04-07 1998-10-21 Harris Corporation Authentication system for a mobile telephone
WO1999044374A1 (en) * 1998-02-27 1999-09-02 Ericsson Inc. Method and apparatus for personally identifying a calling party to a called party
WO2005011253A1 (en) * 2003-07-25 2005-02-03 Siemens Aktiengesellschaft Centralized telephone control and blockage system, gateway and method of controlling and blocking telephones
US20150043724A1 (en) * 2013-08-06 2015-02-12 Verizon Patent And Licensing Inc. Caller id verification
US9979818B2 (en) * 2013-08-06 2018-05-22 Verizon Patent And Licensing Inc. Caller ID verification
US10154134B1 (en) 2016-04-05 2018-12-11 State Farm Mutual Automobile Insurance Company Systems and methods for authenticating a caller at a call center
US10158754B1 (en) 2016-04-05 2018-12-18 State Farm Mutual Automobile Insurance Company Systems and methods for authenticating a caller at a call center
US10594860B1 (en) 2016-04-05 2020-03-17 State Farm Mutual Automobile Insurance Company Systems and methods for authenticating a caller at a call center
US10721353B1 (en) 2016-04-05 2020-07-21 State Farm Mutual Automobile Insurance Company Systems and methods for authenticating a caller at a call center
US11140261B1 (en) 2016-04-05 2021-10-05 State Farm Mutual Automobile Insurance Company Systems and methods for authenticating a caller at a call center
US11425242B1 (en) 2016-04-05 2022-08-23 State Farm Mutual Automobile Insurance Company Systems and methods for authenticating a caller at a call center

Similar Documents

Publication Publication Date Title
US5822691A (en) Method and system for detection of fraudulent cellular telephone use
US6434378B1 (en) Pre-paid cellular telephone system
US5579376A (en) Phantom mobile-identification number method and apparatus
JP3054225B2 (en) Wireless phone service access method
US6199161B1 (en) Management of authentication keys in a mobile communication system
EP1562394B1 (en) Apparatus and method for setting use restriction of mobile communication terminal
US5809125A (en) Method and apparatus for intercepting potentially fraudulent telephone calls
CA2184302C (en) Personal identification number security system incorporating a time dimension
US5351290A (en) Telecommunications fraud prevention system and method
US20130040618A1 (en) Communication device and method for a mobile communication network
JPH11504481A (en) How to check subscriber unit access rights
US5448764A (en) Cordless telephone set with secure communication protocol
CA2359738C (en) System and method for providing access to a wireless communication service to a group of subscribers who share a set of modems
US5884158A (en) Cellular telephone authentication system using a digital certificate
EP0873032A1 (en) Authentication system for a mobile telephone
WO1995024107A1 (en) Cellular telephone fraud control system and method
CN1110222C (en) Method for establishing connection in mobile communication network
JPH0984124A (en) Method for preventing unauthorized use of personal communication terminal
US5953654A (en) Wireless communications system for identifying unauthorized mobile units
GB2285200A (en) An analogue mobile telephone system
JPH10304444A (en) Mobile terminal clone detection exclusion method
JP3396149B2 (en) Mobile station authentication method and system
US6208722B1 (en) Method of accepting charges in individual connections and a telephone network and terminal
JP2001320764A (en) Clone terminal detection system and clone terminal detection method
JPH09322251A (en) Mobile communication system and illegal use detection method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA CN GB JP SE

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2183877

Country of ref document: CA

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA