Methods and systems to substantially prevent fraudulent use of a wireless unit roaming in a visited system
First Claim
1. A method to prevent fraudulent use of a wireless unit that is roaming in a visited system, the method comprising:
- as a part of registration of the wireless unit with a visited mobile switching center (MSC-V) of the visited system, causing the MSC-V to implement denial of originating communication service with respect to the wireless unit;
after the registration of the wireless unit with the MSC-V and the denial of the originating communication service with respect to the wireless unit, receiving at the MSC-V a code and identification information from the wireless unit;
in response to the receipt of the code, causing the MSC-V to transmit a message including the identification information to a verification element functionally connected to the visited system and a home system of the wireless unit;
in response to receipt of the message, causing the verification element to carry out a verification of the identificatino information;
in response to making a positive verification, causing the verification element to transit a response to the MSC-V, the response including the positive verification; and
based on the positive verification received in the response, causing the MSC-V to remove the denial of the originating communication service with respect to the wireless unit, thereby initiating the communication service with respect to the wireless unit, wherein prior to receiving at the MSC-V the code and the identification information from the wireless unit, the method further comprises;
receiving at the MSC-V a call attempt from the wireless unit; and
causing the MSC-V in response to the call attempt to provide the wireless unit with an announcement.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus that substantially prevent the fraudulent use of wireless units roaming in visited systems. A visited mobile switching center (MSC-V) registers a wireless unit that is roaming in the visited system, but denies originating communication service to the unit. To make a call, the unit provides a code and identification information. The MSC-V routes the code and identification information to a verification entity. The entity determines whether the wireless unit is a verified or authentic unit. If the wireless unit is a verified unit, the verification entity responds positively to the MSC-V. Based on the verification, the MSC-V removes the denial of originating communication service from the wireless unit. Advantageously, the home system need not be consulted by the MSC-V with respect to the authenticity of the wireless unit.
-
Citations
28 Claims
-
1. A method to prevent fraudulent use of a wireless unit that is roaming in a visited system, the method comprising:
-
as a part of registration of the wireless unit with a visited mobile switching center (MSC-V) of the visited system, causing the MSC-V to implement denial of originating communication service with respect to the wireless unit;
after the registration of the wireless unit with the MSC-V and the denial of the originating communication service with respect to the wireless unit, receiving at the MSC-V a code and identification information from the wireless unit;
in response to the receipt of the code, causing the MSC-V to transmit a message including the identification information to a verification element functionally connected to the visited system and a home system of the wireless unit;
in response to receipt of the message, causing the verification element to carry out a verification of the identificatino information;
in response to making a positive verification, causing the verification element to transit a response to the MSC-V, the response including the positive verification; and
based on the positive verification received in the response, causing the MSC-V to remove the denial of the originating communication service with respect to the wireless unit, thereby initiating the communication service with respect to the wireless unit, wherein prior to receiving at the MSC-V the code and the identification information from the wireless unit, the method further comprises;
receiving at the MSC-V a call attempt from the wireless unit; and
causing the MSC-V in response to the call attempt to provide the wireless unit with an announcement. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system to prevent fraudulent use of a wireless unit that is roaming in a visited system, the system comprising:
-
a visited mobile switching center (MSC-V) operative to carry out a registration of the wireless unit in the visited system, to implement, after the registration, denial of originating communication service with respect to the wireless unit;
to receive after the denial, a code and identification information in a call from the wireless unit;
to recognize the code as a feature request with respect to a network element, and to route a feature request message including the identification information to the network element;
the network element operative in response to receipt of the identification information to provide a verification in a feature request response to the MSC-V, the network element being functionally connected to the visited system and a home system of the wireless unit; and
the MSC-V also operative to remove the denial if the verification comprises a positive verification, wherein, after the registration of the wireless unit with the visited system and prior to the denial of originating communication service to the wireless unit the MSC-V is operative to receive a call attempt from the wireless unit, and in response to the call attempt, is operative to provide an instruction to the wireless unit to dial the code and provide the identification information. - View Dependent Claims (7, 8)
-
-
9. A storage device, readable by a machine of a wireless system, tangibly embodying instructions executable by the machine to cause the machine to perform operations comprising:
-
registering a wireless unit visiting a current wireless system, and initially denying originating communication by the wireless unit on the current wireless system;
receiving a call attempt from the wireless unit;
responding to the wireless unit with an announcement in response to the call attempt;
receiving identifying information from the wireless unit;
transmitting the identifying information to a verification entity, the verification entity being capable of determining authenticity of the wireless unit;
receiving an authentication response from the verification entity; and
in the event the authentication response is positive, initiating communication service with respect to the wireless unit on the current wireless system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus of a wireless communication system, said apparatus adapted to perform a method comprising:
-
registering a wireless unit visiting said wireless communication system, while initially denying originating communication by the wireless unit on said wireless communication system;
receiving a call attempt from the wireless unit;
responding to the wireless unit with an announcement in response to the call attempt;
receiving identifying information from the wireless unit;
transmitting the identifying information to a verification entity, the verification entity being capable of determining authenticity of the wireless unit;
receiving an authentication response from the verification entity; and
in the event the authentication response is positive, initiating communication service with respect to the wireless unit on said wireless communication system. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A method comprising:
-
registering a wireless unit following an initial authentication process, while initially denying originating communication by the wireless unit on the current wireless system;
in response to a call attempt by the wireless unit, providing an announcement to the wireless unit;
receiving identifying information from the wireless unit;
transmitting the identifying information to a verification node, the verification node being capable of determining authenticity of the wireless unit;
receiving an authentication response from the verification node; and
in the event the authentication response is positive, initiating communication service with respect to the wireless unit on the current wireless system. - View Dependent Claims (24, 25, 26, 27, 28)
-
Specification