Method for preventing cellular telephone fraud
First Claim
Patent Images
1. A method of identifying the fraudulent use of a wireless telephone, said method comprising the steps of:
- initiating a communication session with a wireless telephone in a roaming region outside of a home region;
identifying that said wireless telephone is in said roaming region;
interrupting said communication session in response to said identifying step;
executing a first automated challenge-response authentication operation to generate a first authentication failure; and
escalating to a second operator-based challenge-response authentication operation in response to said first authentication failure to generate a second authentication failure and thereby identify the fraudulent use of said wireless telephone;
wherein said first automated challenge-response authentication operation of said executing step and said second operator-based challenge-response authentication operation of said escalating step are each performed in accordance with rotating subscriber queries of personal subscriber information.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of identifying the fraudulent use of a cellular telephone includes the step of identifying an initial call made from the cellular telephone. An automated challenge-response authentication operation is then executed with a rotating subscriber query, resulting in a first authentication failure. In response to the first authentication failure, an operator assisted escalated challenge-response authentication operation is performed with a rotating subscriber query to generate a second authentication failure, indicating the fraudulent use of the cellular telephone.
120 Citations
9 Claims
-
1. A method of identifying the fraudulent use of a wireless telephone, said method comprising the steps of:
-
initiating a communication session with a wireless telephone in a roaming region outside of a home region; identifying that said wireless telephone is in said roaming region; interrupting said communication session in response to said identifying step; executing a first automated challenge-response authentication operation to generate a first authentication failure; and escalating to a second operator-based challenge-response authentication operation in response to said first authentication failure to generate a second authentication failure and thereby identify the fraudulent use of said wireless telephone; wherein said first automated challenge-response authentication operation of said executing step and said second operator-based challenge-response authentication operation of said escalating step are each performed in accordance with rotating subscriber queries of personal subscriber information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification