Method of detecting use of a stolen communication unit
First Claim
1. In a wireless communication system, a method for detecting unauthorized use of a communication unit, the method comprising the steps of;
- a) transmitting, via a second transceiver of the communication unit, a user identification signal to a proximity user card over a second RF communication path;
b) determining, by the communication unit, whether a response has been received via the second transceiver from the proximity user card over the second RF communication path;
c) when the response has not been received, setting, by the communication unit, a proximity message to produce an invalid proximity message; and
d) transmitting, via a first transceiver of the communication unit, a service request and the invalid proximity message over a first RF communication path to a central controller of the wireless communication system.
3 Assignments
0 Petitions
Accused Products
Abstract
Unauthorized access of a wireless communication system may be prevented by providing a communication apparatus. The communication apparatus includes a communication unit (102) and a proximity user card (115). The proximity user card (115) communicates user identification information with the communication unit (102) over a second RF communication path (119). The user identification information indicates whether the proximity (115) is within a predetermined distance of the communication unit (102). When the proximity user card (115) is separated by more than the predetermined distance, the communication unit (102) will transmit an invalid proximity message to the central controller (101).
45 Citations
10 Claims
-
1. In a wireless communication system, a method for detecting unauthorized use of a communication unit, the method comprising the steps of;
-
a) transmitting, via a second transceiver of the communication unit, a user identification signal to a proximity user card over a second RF communication path; b) determining, by the communication unit, whether a response has been received via the second transceiver from the proximity user card over the second RF communication path; c) when the response has not been received, setting, by the communication unit, a proximity message to produce an invalid proximity message; and d) transmitting, via a first transceiver of the communication unit, a service request and the invalid proximity message over a first RF communication path to a central controller of the wireless communication system. - View Dependent Claims (2, 3, 4)
-
-
5. In a wireless communication system, a method for detecting unauthorized use of a communication unit, the method comprising the steps of;
-
a) transmitting, via a second transceiver of the communication unit, a user identification signal to a proximity user card over a second RF communication path; b) determining, by the communication unit, that a response has been received via the second transceiver from the proximity user card over the second RF communication path; c) when the received response is invalid, setting, by the communication unit, a proximity message to produce an invalid proximity message; and d) transmitting, via a first transceiver of the communication unit, a service request and the invalid proximity message over a first RF communication path to a central controller of the wireless communication system. - View Dependent Claims (6, 7, 8)
-
-
9. In a wireless communication system, a method for detecting authorized use of a communication unit, the method comprising the steps of;
-
a) transmitting, via a second transceiver of the communication unit, a user identification signal to a proximity user card over a second RF communication path; b) determining, by the communication unit, that a response has been received via a second transceiver from the proximity user card over the second RF communication path; c) when the received response is valid, clearing, by the communication unit, a proximity message to produce a valid proximity message; and d) transmitting, via a first transceiver of the communication unit, a service request and the valid proximity message over a first RF communication path to a central controller of the wireless communication system. - View Dependent Claims (10)
-
Specification