Mobile terminal theft detection system
First Claim
1. A method to detect the theft of a mobile terminal connected to a radiocommunication network, the method performed by a device operatively coupled to the network and comprising the steps of:
- initially storing an IMSI identity and an IMEI number related to the mobile terminal in a database managed by a location register operatively coupled to the network, and initially storing a secret data associated with an owner of the mobile terminal to create a stored IMSI identity, a stored IMEI number and a stored secret data;
after authentication of the mobile terminal, obtaining a retrieved IMSI identity and a retrieved IMEI number retrieved from the mobile terminal during authentication;
comparing the retrieved IMSI identity and the retrieved IMEI number with the stored IMSI identity and the stored IMEI number;
if either the retrieved IMSI identity or the retrieved IMEI number are different from the stored IMSI identity or the stored IMEI number, obtaining entered secret data by sending a query to the mobile terminal requesting entry of secret data;
if the entered secret data is different from the stored secret data, detecting a theft of the mobile terminal.
11 Assignments
0 Petitions
Accused Products
Abstract
To detect the theft of a mobile terminal (TM) connected to a radiocommunication network (RR), a device (DA) capable of communicating with a location register (HLR) initially stores an IMSI identity and an IMEI number for the mobile terminal (TM) together with secret data (DonS) provided by the owner of the mobile terminal. After authentication of the mobile terminal by a network entity, the device retrieves the IMSI identity and IMEI number for the mobile terminal, compares the retrieved IMSI identity and IMEI number with the initially stored IMSI identity and IMEI number, queries the mobile terminal (TM) by asking the user of the mobile terminal to provide the secret data if either the retrieved IMSI identity or IMEI number are different from the initially stored IMSI identity or IMEI number, and detects a theft of the mobile terminal if the secret data provided are different from the initially stored secret data (DonS).
11 Citations
20 Claims
-
1. A method to detect the theft of a mobile terminal connected to a radiocommunication network, the method performed by a device operatively coupled to the network and comprising the steps of:
-
initially storing an IMSI identity and an IMEI number related to the mobile terminal in a database managed by a location register operatively coupled to the network, and initially storing a secret data associated with an owner of the mobile terminal to create a stored IMSI identity, a stored IMEI number and a stored secret data; after authentication of the mobile terminal, obtaining a retrieved IMSI identity and a retrieved IMEI number retrieved from the mobile terminal during authentication; comparing the retrieved IMSI identity and the retrieved IMEI number with the stored IMSI identity and the stored IMEI number; if either the retrieved IMSI identity or the retrieved IMEI number are different from the stored IMSI identity or the stored IMEI number, obtaining entered secret data by sending a query to the mobile terminal requesting entry of secret data; if the entered secret data is different from the stored secret data, detecting a theft of the mobile terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus, operatively coupled to a radiocommunication network, to detect the theft of a mobile terminal connected to the radiocommunication network, said apparatus further comprising:
-
storage means for initially storing an IMSI identity and an IMEI number related to the mobile terminal in a database managed by a location register operatively coupled to the network, and for initially storing a secret data associated with an owner of the mobile terminal to create a stored IMSI identity, a stored IMEI number and a stored secret data; means to obtain a retrieved IMSI identity and a retrieved IMEI number from a network entity capable of communicating with the location register, after authentication of the mobile terminal said retrieved IMSI identity and retrieved IMEI number received from the mobile terminal during authentication; means to compare the retrieved IMSI identity and the retrieved IMEI number with the stored IMSI identity and the stored IMEI number; means to query the mobile terminal to obtain entered secret data by requesting entry of secret data, if either the retrieved IMSI identity or the retrieved IMEI number are different from the stored IMSI identity or the stored IMEI number; means to communicate an alert message, if the entered secret data is different from the stored secret data. - View Dependent Claims (11, 12)
-
-
13. A non-transitory computer-readable storage device storing computer-executable instructions which, when executed by a processor of a computing device, causes the processor perform a method of detecting the theft of a mobile terminal connected to a radiocommunication network when the program is run on a programmable device operatively coupled to the network, the method comprising the steps of:
-
initially storing an IMSI identity and an IMEI number related to the mobile terminal in a database managed by a location register operatively coupled to the network, and initially storing a secret data associated with an owner of the mobile terminal to create a stored IMSI identity, a stored IMEI number and a stored secret data; after authentication of the mobile terminal, obtaining a retrieved IMSI identity and a retrieved IMEI number retrieved from the mobile terminal during authentication; comparing the retrieved IMSI identity and the retrieved IMEI number with the stored IMSI identity and the stored IMEI number; if either the retrieved IMSI identity or the retrieved IMEI number are different from the stored IMSI identity or the stored IMEI number, obtaining entered secret data by sending a query to the mobile terminal requesting entry of secret data; if the entered secret data is different from the stored secret data, detecting a theft of the mobile terminal. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification