Method of detecting unauthorized use of a communication unit
First Claim
1. In a wireless communication system, a method for detecting unauthorized use of a communication unit, the method comprising the steps of:
- a) transmitting, by the communication unit, an affiliation message to a central controller via the wireless communication system;
b) determining, by the central controller, whether a location information is included in the affiliation message;
c) when the location message is not included in the affiliation message, transmitting, by the central controller, a request for the location information to the communication unit via the wireless communication system;
d) determining, by the central controller, whether the location information of the communication unit deviates from a historical location pattern of the communication unit; and
e) when the location information deviates from the historical location pattern, indicating, by the central controller, that the communication unit is a potential unauthorized communication unit.
4 Assignments
0 Petitions
Accused Products
Abstract
Unauthorized use of a communication unit 102 in a wireless communication system 100 may be prevented by determining the location of the communication unit 102 each time it transmits an affiliation request or a service request. Knowing the location of the communication unit 102, the controller 101 can determine whether the location of the unit fits within a historical location pattern for that unit. If the location does not fit within the pattern, the controller 101 can deny the request or send an indication to a system manager 110 asking the system manager 110 to decide what should be done with this unit.
68 Citations
9 Claims
-
1. In a wireless communication system, a method for detecting unauthorized use of a communication unit, the method comprising the steps of:
-
a) transmitting, by the communication unit, an affiliation message to a central controller via the wireless communication system; b) determining, by the central controller, whether a location information is included in the affiliation message; c) when the location message is not included in the affiliation message, transmitting, by the central controller, a request for the location information to the communication unit via the wireless communication system; d) determining, by the central controller, whether the location information of the communication unit deviates from a historical location pattern of the communication unit; and e) when the location information deviates from the historical location pattern, indicating, by the central controller, that the communication unit is a potential unauthorized communication unit. - View Dependent Claims (2, 3, 4)
-
-
5. In a wireless communication system, a method for detecting unauthorized use of a communication unit, the method comprising the steps of:
-
a) transmitting, by the communication unit, a service request message to a central controller via the wireless communication system; b) determining, by the central controller, whether a location information is included in the service request message; c) when the location information is not included in the service request message, transmitting, by the central controller, a request for the location information to the communication unit via the wireless communication system; d) determining, by the central controller, whether the location information of the communication unit deviates from a historical location pattern of the communication unit; and e) when the location information deviates from the historical location pattern, indicating, by the central controller, that the communication unit is a potential unauthorized communication unit. - View Dependent Claims (6, 7, 8)
-
-
9. In a wireless communication system, a method for detecting unauthorized use of a communication unit, the method comprising the steps of:
-
at turn-on of the communication unit; a) transmitting, by the communication unit, an affiliation message to a central controller via the wireless communication system; b) determining, by the central controller, whether a location information is included in the affiliation message; c) when the location message is not included in the affiliation message, transmitting, by the central controller, a request for the location information to the communication unit via the wireless communication system; d) determining, by the central controller, whether the location information of the communication unit deviates from a historical location pattern of the communication unit; e) when the location information deviates from the historical location pattern, indicating, by the central controller, that the communication unit is a potential unauthorized communication unit; during operation of the communication unit; f) transmitting, by the communication unit, a service request message to the central controller via the wireless communication system; g) determining, by the central controller, whether another location information is included in the service request message; h) when the location message is not included in the service request message, transmitting, by the central controller, another request for the location information to the communication unit via the wireless communication system; i) determining, by the central controller, whether the location information of the communication unit deviates from the historical location pattern of the communication unit; and j) when the location information deviates from the historical location pattern, indicating, by the central controller, that the communication unit is another potential unauthorized communication unit.
-
Specification