×

System and method for detection of fraud in a wireless telephone system

  • US 5,956,634 A
  • Filed: 02/28/1997
  • Issued: 09/21/1999
  • Est. Priority Date: 02/28/1997
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for the authorization of a present telephone communication with a wireless telephone in a wireless telephone system, the authorization system comprising:

  • a signature analyzer to classify an unauthenticated wireless telephone as an authorized wireless telephone or a fraudulent wireless telephone based on analysis of a transmission characteristic of the unauthenticated wireless telephone detected during the present communication with the unauthenticated wireless telephone, the signature analyzer calculating a first data value indicative of a similarity with which the transmission characteristic of the unauthenticated wireless telephone matches a stored reference characteristic, and a first confidence value indicative of a measure of reliability of the first calculated data value;

    a soft analyzer receiving and analyzing the first calculated data value and first confidence value from the signature analyzer to determine a likelihood that the present communication is a valid communication with the authorized wireless telephone or an invalid communication with the fraudulent wireless telephone, the soft analyzer generating a first authorization signal having a first binary level if the analysis determines that the present communication is the valid communication and a second binary level different from the first binary level if the analysis determines that the present communication is the invalid communication;

    a deterministic analyzer analyzing the present communication in a deterministic fashion to determine if the present communication with the unauthenticated wireless telephone is the valid communication or the invalid communication, the deterministic analyzer generating a second authorization signal at a third binary level if the deterministic analyzer determines that the present communication is the valid communication and a fourth binary level different from the third binary level if the deterministic analyzer determines that the present communication is the invalid communication, the soft analyzer analyzing the first calculated data value and the first confidence value independently of the analysis by the deterministic analyzer; and

    a combinatorial logic unit to combine the first and second authorization signals and generate an output signal at a fifth binary level to authorize the present communication only if the first and second authorization signals are both at the first and third binary levels, respectively, and generating the output signal at a sixth binary level different from the fifth binary level if either of the first and second authorization signals is at the second and fourth binary levels, respectively, to cause termination of the present communication as the invalid communication, the logic unit generating the output signal at the sixth binary level to cause termination of the present communication as the invalid communication regardless of the analysis by the soft analyzer if the deterministic analyzer determines that the present communication is the invalid communication.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×