Method and apparatus for preventing wireless fraud
First Claim
1. A method for use in completing a call from a wireless telephone to its destination, the method comprising the steps of:
- receiving a request at a mobile switching center of a wireless carrier for wireless telephone service from a wireless telephone having a particular MIN;
placing a call from said mobile switching center to an authentication platform serving a plurality of wireless carriers so that a voice path exists from said authentication platform through said mobile switching center to said wireless telephone if said particular MIN belongs to a particular predefined group of MINs;
transmitting a challenge from said authentication platform to said wireless telephone over said voice path; and
denying said request if a proper response to said challenge is not received.
4 Assignments
0 Petitions
Accused Products
Abstract
The use of stolen mobile identification number (MIN) and electronic serial number (ESN) information to fraudulently place wireless calls is prevented by having the switches of multiple wireless carriers forward or direct, over a telephone connection, all calls placed from selected MINs to a central authentication platform that serves the multiple wireless carriers. The central authentication platform engages in a so-called "challenge-response" authentication with local processors that are interfaced to the wireless telephones from which non-fraudulent calls originate. The challenge-response authentication uses a shared secret key (S-Key) that is not broadcast over the air interface, thus preventing the key from being "stolen". A call from a wireless telephone that is not interfaced to a local processor capable of successfully completing the challenge-response authentication is blocked, while a call from a wireless telephone having a local processor capable of successfully completing the challenge-response authentication is completed to the number desired by the customer. Advantageously, since the central authentication platform serves multiple wireless carriers, the need for one wireless carrier to access the database of another is alleviated and the expense of providing additional security is reduced.
-
Citations
7 Claims
-
1. A method for use in completing a call from a wireless telephone to its destination, the method comprising the steps of:
-
receiving a request at a mobile switching center of a wireless carrier for wireless telephone service from a wireless telephone having a particular MIN; placing a call from said mobile switching center to an authentication platform serving a plurality of wireless carriers so that a voice path exists from said authentication platform through said mobile switching center to said wireless telephone if said particular MIN belongs to a particular predefined group of MINs; transmitting a challenge from said authentication platform to said wireless telephone over said voice path; and denying said request if a proper response to said challenge is not received. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification