Methods and systems to substantially prevent fraudulent use of a wireless unit roaming in a visited system
First Claim
1. A method to prevent fraudulent use of a wireless unit that is roaming in a visited system, the method comprising:
- as a part of registration of the wireless unit with a visited mobile switching center (MSC-V) of the visited system, causing the MSC-V to implement denial of originating communication service with respect to the wireless unit;
after the registration of the wireless unit with the MSC-V and the denial of the originating communication service with respect to the wireless unit, receiving at the MSC-V a code and identification information from the wireless unit;
in response to the receipt of the code, causing the MSC-V to transmit a message including the identification information to a verification element functionally connected to the visited system and a home system of the wireless unit;
in response to receipt of the message, causing the verification element to carry out a verification of the identification information;
in response to making a positive verification, causing the verification element to transit a response to the MSC-V, the response including the positive verification; and
based on the positive verification received in the response, causing the MSC-V to remove the denial of the originating communication service with respect to the wireless unit, thereby initiating the communication service with respect to the wireless unit, wherein prior to receiving at the MSC-V the code and the identification information from the wireless unit, the method further comprises;
receiving at the MSC-V a call attempt from the wireless unit; and
causing the MSC-V in response to the call attempt to provide the wireless unit with an announcement.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus that substantially prevent the fraudulent use of wireless units roaming in visited systems. A visited mobile switching center (MSC-V) registers a wireless unit that is roaming in the visited system, but denies originating communication service to the unit. To make a call, the unit provides a code and identification information. The MSC-V routes the code and identification information to a verification entity. The entity determines whether the wireless unit is a verified or authentic unit. If the wireless unit is a verified unit, the verification entity responds positively to the MSC-V. Based on the verification, the MSC-V removes the denial of originating communication service from the wireless unit. Advantageously, the home system need not be consulted by the MSC-V with respect to the authenticity of the wireless unit.
-
Citations
8 Claims
-
1. A method to prevent fraudulent use of a wireless unit that is roaming in a visited system, the method comprising:
-
as a part of registration of the wireless unit with a visited mobile switching center (MSC-V) of the visited system, causing the MSC-V to implement denial of originating communication service with respect to the wireless unit;
after the registration of the wireless unit with the MSC-V and the denial of the originating communication service with respect to the wireless unit, receiving at the MSC-V a code and identification information from the wireless unit;
in response to the receipt of the code, causing the MSC-V to transmit a message including the identification information to a verification element functionally connected to the visited system and a home system of the wireless unit;
in response to receipt of the message, causing the verification element to carry out a verification of the identification information;
in response to making a positive verification, causing the verification element to transit a response to the MSC-V, the response including the positive verification; and
based on the positive verification received in the response, causing the MSC-V to remove the denial of the originating communication service with respect to the wireless unit, thereby initiating the communication service with respect to the wireless unit, wherein prior to receiving at the MSC-V the code and the identification information from the wireless unit, the method further comprises;
receiving at the MSC-V a call attempt from the wireless unit; and
causing the MSC-V in response to the call attempt to provide the wireless unit with an announcement. - View Dependent Claims (2, 3, 4, 5)
wherein the method further comprises;
causing the MSC-V to update information the MSC-V retains in a visitor location resister (VLR) relating to the wireless unit with the origination/termination service information; and
after removal of the denial of the originating communication service with respect to the wireless unit, causing the MSC-V to provide communication services to the wireless unit based on the origination/termination service information.
-
-
3. The method of claim 1, wherein the message including the identification information comprises a feature request message, and wherein the identification information comprises a personal identification number (PIN);
- and
wherein causing the MSC-V to transmit a message comprises causing the MSC-V to transmit the feature request message including the PIN to the verification element.
- and
-
4. The method of claim 3, wherein the response comprises a feature request response;
- and
wherein causing the verification element to transmit a response to the MSC-V comprises causing the verification element to transmit a feature request response to the MSC-V.
- and
-
5. The method of claim 1, wherein the announcement comprises an instruction to the wireless unit to dial the code and provide the identification information.
-
6. A system to prevent fraudulent use of a wireless unit that is roaming in a visited system, the system comprising:
-
a visited mobile switching center (MSC-V) operative to carry out a registration of the wireless unit in the visited system, to implement, after the registration, denial of originating communication service with respect to the wireless unit;
to receive after the denial, a code and identification information in a call from the wireless unit;
to recognize the code as a feature request with respect to a network element, and to route a feature request message including the identification information to the network element;
the network element operative in response to receipt of the identification information to provide a verification in a feature request response to the MSC-V, the network element being functionally connected to the visited system and a home system of the wireless unit; and
the MSC-V also operative to remove the denial if the verification comprises a positive verification, wherein, after the registration of the wireless unit with the visited system and prior to the denial of originating communication service to the wireless unit the MSC-V is operative to receive a call attempt from the wireless unit, and in response to the call attempt, is operative to provide an instruction to the wireless unit to dial the code and provide the identification information. - View Dependent Claims (7, 8)
wherein the MSSC-V comprises a visitor location register (VLR) including information relating to the wireless unit; and
wherein the MSC-V is operative to update the information in the VLR with the origination/termination service information.
-
-
8. The system of claim 7, wherein, after the removal of the denial, the MSC-V is operative to provide communication services to the wireless unit based on the origination/termination service information.
Specification