Method for reducing fraudulent system access
First Claim
1. A method of reducing fraudulent access to communication system resources by a mobile station, the method comprising the steps of:
- transmitting a first message to invoke performance of a first authentication procedure;
receiving a second message containing a first parameter indicating a status of the first authentication procedure and containing at least a second parameter associated with a second authentication procedure; and
in response to receiving the second message, determining whether the first parameter indicates that the first authentication procedure completed successfully; and
when the first parameter indicates that the first authentication completed successfully, initiating call setup before the second authentication procedure has completed.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of reducing access to communication system resources by a fraudulent Mobile Station (102). The Mobile Switching Center (104) sends a message to the Authentication Center (106) to invoke a first authentication procedure. The Authentication Center responds with a message including the results of the first procedure, and possibly, parameters for performance of an additional authentication procedure. Based on the contents of the message, the Mobile Switching Center decides whether to delay call setup until after the additional authentication procedure has completed successfully or whether to initiate call setup in parallel with the additional authentication procedure.
-
Citations
4 Claims
-
1. A method of reducing fraudulent access to communication system resources by a mobile station, the method comprising the steps of:
-
transmitting a first message to invoke performance of a first authentication procedure; receiving a second message containing a first parameter indicating a status of the first authentication procedure and containing at least a second parameter associated with a second authentication procedure; and in response to receiving the second message, determining whether the first parameter indicates that the first authentication procedure completed successfully; and when the first parameter indicates that the first authentication completed successfully, initiating call setup before the second authentication procedure has completed. - View Dependent Claims (2, 3, 4)
-
Specification