×

Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint analysis

  • US 5,970,405 A
  • Filed: 02/28/1997
  • Issued: 10/19/1999
  • Est. Priority Date: 02/28/1997
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of preventing fraudulent calls by users of a wireless telephone system including a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint analysis of comparing a transmission characteristic of the unauthenticated wireless telephone with a stored fingerprint of a corresponding authorized wireless telephone using a first threshold for the fingerprint analysis, the method comprising the steps of:

  • maintaining a plurality of locally valid data, each locally valid data corresponding to a specific authorized wireless telephone and containing at least one destination considered to be valid for the corresponding specific authorized wireless telephone;

    maintaining a suspicious data containing at least one destination considered to be called by fraudulent wireless telephones;

    receiving from an unauthenticated wireless telephone a call request containing a designated destination and identifying an authorized wireless telephone;

    determining whether the designated destination is in the locally valid data corresponding to the identified authorized wireless telephone;

    classifying the call as valid when the designated destination is determined to be in the corresponding locally valid data regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as fraudulent;

    determining whether the designated destination is in the suspicious data; and

    when the designated destination is determined to be in the suspicious data, performing a fingerprint analysis by the fingerprint analyzer using a second threshold higher than the first threshold to require an increased matching between the transmission characteristic of the unauthenticated wireless telephone and the stored fingerprint of the identified authorized wireless telephone in order to identify the unauthenticated wireless telephone as authorized.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×