Anti-piracy system for wireless telephony
First Claim
1. In a method of detecting fraud in a wireless communications system, the system including a carrier facility and a plurality of wireless communications devices, each wireless communications device providing identification data to the carrier facility used by said facility in detecting fraudulent use of the device, the identification data comprising a plurality of symbols, each wireless device sending voice data corresponding to a user'"'"'s voice to the carrier facility, an improvement comprising:
- altering the voice data to steganographically embed verification data therein, said verification data comprising a plurality of symbols;
steganographically detecting said verification data from the voice data at the carrier facility, and using said detected verification data to confirm authorized use of the wireless device, wherein the user'"'"'s voice data serves as the carrier of the verification data from the wireless device to the carrier facility.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and system are described for reducing the theft of wireless telephony services, such as cellular systems and PCS systems, altering voice data to steganographically embed verification data therein. The verification data comprises a plurality of symbols which are steganographically detected at the carrier facility to confirm authorized use of the wireless device.
-
Citations
10 Claims
-
1. In a method of detecting fraud in a wireless communications system, the system including a carrier facility and a plurality of wireless communications devices, each wireless communications device providing identification data to the carrier facility used by said facility in detecting fraudulent use of the device, the identification data comprising a plurality of symbols, each wireless device sending voice data corresponding to a user'"'"'s voice to the carrier facility, an improvement comprising:
- altering the voice data to steganographically embed verification data therein, said verification data comprising a plurality of symbols;
steganographically detecting said verification data from the voice data at the carrier facility, and using said detected verification data to confirm authorized use of the wireless device, wherein the user'"'"'s voice data serves as the carrier of the verification data from the wireless device to the carrier facility. - View Dependent Claims (2, 3, 4, 5)
- altering the voice data to steganographically embed verification data therein, said verification data comprising a plurality of symbols;
- 6. In a wireless personal communications transceiver, said transceiver including a microphone coupled to a transmitter and a receiver coupled to a speaker, the transceiver including means for transmitting a wireless signal modulated with a voice signal corresponding to a user'"'"'s voice, an improvement comprising means for altering said voice signal to steganographically embed a multi-symbol auxiliary data string therein, wherein transmission of the wireless voice signal also conveys the auxiliary signal hidden therein.
Specification