Preventing misuse of a copied subscriber identity in a mobile communication system
First Claim
1. A method of preventing the use of a copied subscriber identity in a telecommunication system comprising at least one controller, several subscriber identities and several terminals, each terminal having an associated equipment identity, the method comprising:
- maintaining a set of protected subscriber identities and defining a set of allowable equipment identities for each protected subscriber identity;
sending from a terminal to the controller equipment identity and subscriber identity associated with the terminal;
checking by a controller if the subscriber identity sent is a protected subscriber identity, and if it is, the controller comparing whether the equipment identity sent is allowable to the subscriber identity sent; and
denying by the controller the use of the terminal if the equipment identity sent is not allowable to the subscriber identity sent.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method and an equipment of preventing the misuse of a copied subscriber identity in a mobile communication system. The use of a subscriber identity is restricted to predetermined terminals, each having an associated equipment identity in such a way that: a number of allowable equipment identities is defined for at least one subscriber identity, and a data base linking said subscriber identities and the equipment identities allowable to them is created; the terminal sends the terminal user subscriber identity and its dedicated equipment identity to the rest of the system; the rest of the system compares whether the equipment identity sent is allowable to the subscriber identity sent; as a response to the equipment identity sent being allowable to the subscriber identity sent, the use of the terminal is permitted, and otherwise the use is denied.
-
Citations
8 Claims
-
1. A method of preventing the use of a copied subscriber identity in a telecommunication system comprising at least one controller, several subscriber identities and several terminals, each terminal having an associated equipment identity, the method comprising:
-
maintaining a set of protected subscriber identities and defining a set of allowable equipment identities for each protected subscriber identity;
sending from a terminal to the controller equipment identity and subscriber identity associated with the terminal;
checking by a controller if the subscriber identity sent is a protected subscriber identity, and if it is, the controller comparing whether the equipment identity sent is allowable to the subscriber identity sent; and
denying by the controller the use of the terminal if the equipment identity sent is not allowable to the subscriber identity sent. - View Dependent Claims (2, 3, 4)
defining a subscriber-specific condition for at least some subscriber identities, the subscriber-specific condition indicating if the use of the subscriber identity is denied with non-allowable equipment identities; and
in response to the subscriber-specific condition indicating that the use of the subscriber identity is not denied with non-allowable equipment identities, permitting the use of the terminal irrespective of the equipment identity.
-
-
3. The method according to claim 2, wherein the controller is a mobile services switching center.
-
4. The method according to claim 1, wherein the controller is a mobile services switching center.
-
5. A mobile communication system comprising:
-
a controller;
a register comprising information on several subscriber identities, each subscriber identity identifying a subscriber;
a plurality of terminals, each terminal having an associated equipment identity and each terminal being adapted to send its equipment identity and subscriber identity of its user to the controller;
logic for preventing the use of a copied subscriber identity, the logic comprising;
memory for linking at least one subscriber identity with a set of equipment identities allowable to the subscriber identity; and
a comparator for comparing whether the equipment identity sent is allowable for the subscriber identity sent and for denying the use of the terminal unless the equipment identity sent is allowable to the subscriber identity sent. - View Dependent Claims (6, 7, 8)
-
Specification