Method of recognizing fraudulent wireless emergency service calls
First Claim
Patent Images
1. A method of recognizing fraudulent emergency calls from a mobile station, comprising:
- identifying a source of an emergency call based on a mobile equipment identity received from a mobile station originating the emergency call;
generating a count of emergency calls received from the identified source; and
deciding whether an incoming emergency call from the identified source is fraudulent based on the count.
10 Assignments
0 Petitions
Accused Products
Abstract
In the method of recognizing fraudulent emergency calls from a mobile station, a mobile station originating an emergency call is identified based on a mobile equipment identity received from the mobile station. A count of emergency calls received from the identified mobile station is generated and an incoming emergency call from the identified mobile station is determined as fraudulent based on the count.
106 Citations
28 Claims
-
1. A method of recognizing fraudulent emergency calls from a mobile station, comprising:
-
identifying a source of an emergency call based on a mobile equipment identity received from a mobile station originating the emergency call;
generating a count of emergency calls received from the identified source; and
deciding whether an incoming emergency call from the identified source is fraudulent based on the count. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of recognizing fraudulent emergency calls from a mobile station, comprising:
-
performing, at a first network entity, the steps of, generating a first count of emergency calls received at the first network entity from a source, and deciding whether an incoming emergency call from the source is fraudulent based on the first count; and
performing, at a second network entity, the steps of, generating a second count of emergency calls received at the second network entity from the source, and deciding whether an incoming emergency call from the source is fraudulent based on the second count. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification