Method and apparatus for preventing wireless fraud
First Claim
1. A method for use in completing calls from wireless telephones, each wireless telephone being served by one of a plurality of wireless carriers, the method comprising the steps of:
- receiving requests at mobile switching centers of said plurality of wireless carriers for completion of calls from said wireless telephones;
forwarding, from said mobile switching centers to an authentication platform serving said plurality of wireless carriers, those of said calls originated from wireless telephones having MINs that belong to a particular predefined group of MINs;
transmitting a challenge from said authentication platform to each of said wireless telephones via, said mobile switching centers of said plurality of wireless carriers; and
receiving at said authentication platform responses to said challenges;
terminating communication between said authentication platform and said wireless telephones providing proper responses and completing said call by causing said mobile switching center to establish a connection to a called party.
6 Assignments
0 Petitions
Accused Products
Abstract
The use of stolen mobile identification number (MIN) and electronic serial number (ESN) information to fraudulently place wireless calls is prevented by having the switches of multiple wireless carriers forward or direct, over a telephone connection, all calls placed from selected MINs to a central authentication platform that serves the multiple wireless carriers. The central authentication platform engages in a so-called "challenge-response" authentication with local processors that are interfaced to the wireless telephones from which non-fraudulent calls originate. The challenge-response authentication uses a shared secret key (S-Key) that is not broadcast over the air interface, thus preventing the key from being "stolen". A call from a wireless telephone that is not interfaced to a local processor capable of successfully completing the challenge-response authentication is blocked, while a call from a wireless telephone having a local processor capable of successfully completing the challenge-response authentication is completed to the number desired by the customer. Advantageously, since the central authentication platform serves multiple wireless carriers, the need for one wireless car to access the database of another is alleviated and the expense of providing additional security is reduced.
-
Citations
8 Claims
-
1. A method for use in completing calls from wireless telephones, each wireless telephone being served by one of a plurality of wireless carriers, the method comprising the steps of:
-
receiving requests at mobile switching centers of said plurality of wireless carriers for completion of calls from said wireless telephones; forwarding, from said mobile switching centers to an authentication platform serving said plurality of wireless carriers, those of said calls originated from wireless telephones having MINs that belong to a particular predefined group of MINs; transmitting a challenge from said authentication platform to each of said wireless telephones via, said mobile switching centers of said plurality of wireless carriers; and receiving at said authentication platform responses to said challenges; terminating communication between said authentication platform and said wireless telephones providing proper responses and completing said call by causing said mobile switching center to establish a connection to a called party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification