WO1997004602A2 - Method for using personal identification numbers with telecommunications calls - Google Patents
Method for using personal identification numbers with telecommunications calls Download PDFInfo
- Publication number
- WO1997004602A2 WO1997004602A2 PCT/US1996/012072 US9612072W WO9704602A2 WO 1997004602 A2 WO1997004602 A2 WO 1997004602A2 US 9612072 W US9612072 W US 9612072W WO 9704602 A2 WO9704602 A2 WO 9704602A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- pin
- cell phone
- called
- numbers
- list
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 20
- 230000001413 cellular effect Effects 0.000 claims abstract description 10
- 230000000737 periodic effect Effects 0.000 claims description 3
- 238000012544 monitoring process Methods 0.000 claims 2
- 230000005540 biological transmission Effects 0.000 abstract description 5
- 238000010367 cloning Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000006854 communication Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 230000000717 retained effect Effects 0.000 description 2
- 230000007175 bidirectional communication Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q3/00—Selecting arrangements
- H04Q3/0016—Arrangements providing connection between exchanges
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13095—PIN / Access code, authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13096—Digital apparatus individually associated with a subscriber line, digital line circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13097—Numbering, addressing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13098—Mobile subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/13139—Fraud detection/prevention
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2213/00—Indexing scheme relating to selecting arrangements in general and for multiplex systems
- H04Q2213/1322—PBX
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention generally relates to a method for using personal identification numbers, PINs, with telecommunications calls such as cellular telephones and other mobile communications devices for the purpose of reducing fraudulent use, and particularly, to such methods which minimize such PIN usage.
- Telecommunications systems which use account subscriptions for income purposes are subject to fraudulent use and increased costs therefrom.
- Cellular telephone companies are currently losing a great deal of money on the fraudulent cloning of cellular telephones, or cell phones.
- the fraudulent process involves intercepting a registered user's identification numbers off of a live transmission and then programming a different cell phone to use those numbers.
- the numbers required are the MIN, mobile identification number of the cell phone account, and the ESN, the electronic serial number of the specific cell phone.
- the cell phone user inputs a number to be called and presses the Send button in the usual manner.
- a responding cellular base station then proceeds through a call setup routine where it determines that the calling phone account is in good standing and has not been previously cloned along with a routing path for the specific call.
- the call setup routine then transmits a voice channel assignment over the forward control channel and requests the cell phone or subscriber PIN over the assigned voice channels.
- the cell phone user then enters the PIN and the base station connects the call to the appropriate land line or cell phone facility after verifying the PIN.
- PIN use is disadvantageous because of added cost, inconvenience and the remaining danger of PIN interception. It is inconvenient for a user to input a PIN. Also, if the call does not go through or is disconnected after the PIN has been inputted, the auto redial function will usually not work because the PIN was the last number dialed. This inconvenience can also be a safety factor if the user is simultaneously engaged in another activity such as driving. Further, the transmission of PINs over voice channels requires increased system traffic load and ultimate consumer cost. Lastly, PINs can still be intercepted and combined with the MINs and ESNs for fraudulent use.
- PIN use with telecommunications calls such as cellular phones such as cellular phones.
- the present invention provides a method for the use of personal identification numbers, PINs, with cellular telephones, cell phones, comprising the steps of maintaining a separate calling list of telephone numbers called by each respective cell phone or each respective cell phone subscriber, determining whether each call placed from a cell phone or a cell phone subscriber is one of the numbers on its respective calling list, requiring the inputting of a PIN for each cell phone call where the number called does not appear on the respective calling list, and allowing cell phone calls to numbers on the respective calling list to be connected without requiring the inputting of a PIN.
- the present invention provides a method for the use of personal identification numbers, PINs, with telecommunications calls, comprising the steps of maintaining a separate contact list of entities called by each respective telecommunications device or each respective telecommunications subscriber, determining whether each call placed by a telecommunications device or subscriber is one of the entities on its respective contact list, requiring the inputting of a PIN for each call where the entity called does not appear on the respective contact list, and allowing telecommunications calls to entities Iisted on the respective contact list to be connected without requiring the inputting of a PIN.
- One embodiment of the present invention is applicable to cellular telephones and maintains a separate calling list or subscriber profile of telephone numbers called by each respective cell phone or each respective cell phone subscriber. While the cell phone account is checked for validity upon placing a call, this calling list is referenced for the respective cell phone account. This procedure compares the telephone number being called with the calling list data to determine if the number being called is on the list. If the number being called appears on the respective calling list, the call setup routine bypasses the PIN request and connects the call. If the number being called does not appear on the respective calling list, the user is requested to input a PIN and the call is only connected after a proper PIN is received and verified by the cell phone service provider.
- the calling list typically includes the telephone numbers that are regularly called by that cell phone or subscriber.
- the separate calling Iists may be supplemented by telephone numbers belonging to various public institutions, which numbers may be considered to be on all Iists so long as they are not likely to be called on cloned phones. Such numbers may include 911 and other emergency numbers, governmental offices and agencies, schools, hospitals, etc..
- the size of the calling list could also be economized by including all numbers in any private branch exchange, PBX, once a caller makes one call to that exchange. This could appear in the list as the exchange prefix with wild card identifiers for the last series of digits, depending upon the size of the exchange.
- the calling list can be updated each time that a number not appearing on the list is called and the user inputs a proper PIN.
- the called number would be added to the calling list, at least on a temporary basis. Updating may also occur on a monthly or other periodic basis using billing information from the service provider. Such billing information can include usage as well as calling frequency to every number called and thus provide the basis for determining which numbers are best retained on a calling list.
- the preference for numbers to be retained on each calling list is any number which is called regularly. Whereas, a new number may be added when it is called the first time, it could be deleted if it is not called again in the succeeding month or two. Thus, if a situation required the calling of one number numerous times within a short period, that number could still be deleted if it did not show up in several succeeding months of billing information.
- Such monthly updates of calling Iists may also be effected using billing information from a cell phone subscriber's land line account. This could include either or both of a subscriber' business and personal accounts and could depend upon the subscriber's preference.
- the present embodiment may further include the step of checking the number being called against a list of telephone numbers which are called by cloned cell phones.
- Other embodiments of the present invention are equally applicable to the types of telecommunications calls which derive income from account subscriptions. Such systems may have different ways of identifying the entities being called besides just telephone numbers. It may be possible to place calls to specific people, specific organizations, specific locations or specific communications devices. Such calls may not be bi-directional communications but only one-way contacts. The present invention is equally applicable to such systems with specifics which may vary depending upon those systems.
- the most significant advantages of the present invention are reductions in the cost and inconvenience to consumers and a greatly reduced likelihood that the PIN transmission will be intercepted. Whenever a number from the calling list is called, the caller does not suffer the delay or distraction of inputting additional numbers. Further the use time of the assigned voice channel is reduced thus improving system capacity and reducing the ultimate cost paid by the subscriber. The safety of phone usage is also improved because phone users engaged in other activity do not have to alternate between holding the phone next to their ear and looking at the key pad to enter their PIN. The present invention provides a significant reduction in fraudulent use because the
- PINs are transmitted over the air at a greatly reduced incidence, thus making their interception much less likely. This reduced incidence also allows early detection of fraudulent use whenever increased PIN usage occurs.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Personal identification numbers, PINs, are used with cellular telephones to reduce fraudulent cellular usage of stolen and cloned cell phones. Wireless transmission of PINs can result in interception thereof by the same means that are used to intercept cell phone account numbers and serial numbers to produce cloned cell phones. Wireless transmission of PINs is reduced by only requiring the use of a PIN when a telephone number being called by a cell phone or subscriber does not match a list of numbers previously called by that particular cell phone or subscriber. The invention is useful wherever PINs are used to reduce cell phone fraud.
Description
METHOD FOR USING PERSONAL IDENTIFICATION NUMBERS WITH TELECOMMUNICATIONS CALLS
Background of the Invention Field of the Invention
The present invention generally relates to a method for using personal identification numbers, PINs, with telecommunications calls such as cellular telephones and other mobile communications devices for the purpose of reducing fraudulent use, and particularly, to such methods which minimize such PIN usage. Statement of the Prior Art
Telecommunications systems which use account subscriptions for income purposes are subject to fraudulent use and increased costs therefrom. Cellular telephone companies are currently losing a great deal of money on the fraudulent cloning of cellular telephones, or cell phones. The fraudulent process involves intercepting a registered user's identification numbers off of a live transmission and then programming a different cell phone to use those numbers. The numbers required are the MIN, mobile identification number of the cell phone account, and the ESN, the electronic serial number of the specific cell phone.
To combat this practice, some cell phone service providers have required the use of PINs, personal identification numbers, by their subscribers. In such a system, the cell phone user inputs a number to be called and presses the Send button in the usual manner. A responding cellular base station then proceeds through a call setup routine where it determines that the calling phone account is in good standing and has not been previously cloned along with a routing path for the specific call. The call setup routine then transmits a voice channel assignment over the forward control channel and requests the cell phone or subscriber PIN over the assigned voice channels. The cell phone user then enters the PIN and the base station connects the call to the appropriate land line or cell phone facility after verifying the PIN.
Unfortunately, PIN use is disadvantageous because of added cost, inconvenience and the remaining danger of PIN interception. It is inconvenient for a user to input a PIN. Also, if the call does not go through or is disconnected after the PIN has been inputted, the auto redial function will usually not work because the PIN was the last number dialed. This inconvenience can also be a safety factor if the user is simultaneously engaged in another activity such as driving.
Further, the transmission of PINs over voice channels requires increased system traffic load and ultimate consumer cost. Lastly, PINs can still be intercepted and combined with the MINs and ESNs for fraudulent use.
SUMMARY OF THE INVENTION Accordingly, it is a object of the present invention to provide a method for reducing
PIN use with telecommunications calls such as cellular phones.
It is a further object of the present invention to provide such a method which retains the advantages of PIN use for reducing fraudulent usage.
It is a still further object of the present invention to provide such a method which enhances upon the use of PINs by making them less likely to be intercepted.
In one form, the present invention provides a method for the use of personal identification numbers, PINs, with cellular telephones, cell phones, comprising the steps of maintaining a separate calling list of telephone numbers called by each respective cell phone or each respective cell phone subscriber, determining whether each call placed from a cell phone or a cell phone subscriber is one of the numbers on its respective calling list, requiring the inputting of a PIN for each cell phone call where the number called does not appear on the respective calling list, and allowing cell phone calls to numbers on the respective calling list to be connected without requiring the inputting of a PIN.
In another form, the present invention provides a method for the use of personal identification numbers, PINs, with telecommunications calls, comprising the steps of maintaining a separate contact list of entities called by each respective telecommunications device or each respective telecommunications subscriber, determining whether each call placed by a telecommunications device or subscriber is one of the entities on its respective contact list, requiring the inputting of a PIN for each call where the entity called does not appear on the respective contact list, and allowing telecommunications calls to entities Iisted on the respective contact list to be connected without requiring the inputting of a PIN. DETAILED DESCRIPTION OF THE EMBODIMENTS One embodiment of the present invention is applicable to cellular telephones and maintains a separate calling list or subscriber profile of telephone numbers called by each respective cell phone or each respective cell phone subscriber. While the cell phone account is checked for validity upon placing a call, this calling list is referenced for the respective cell phone account. This procedure compares the telephone number being called with the calling list data to determine if the number being called is on the list. If the number being called appears on the respective calling list, the call setup routine bypasses the PIN request and connects the call. If the number being called does not appear on the
respective calling list, the user is requested to input a PIN and the call is only connected after a proper PIN is received and verified by the cell phone service provider.
The calling list typically includes the telephone numbers that are regularly called by that cell phone or subscriber. The separate calling Iists may be supplemented by telephone numbers belonging to various public institutions, which numbers may be considered to be on all Iists so long as they are not likely to be called on cloned phones. Such numbers may include 911 and other emergency numbers, governmental offices and agencies, schools, hospitals, etc.. The size of the calling list could also be economized by including all numbers in any private branch exchange, PBX, once a caller makes one call to that exchange. This could appear in the list as the exchange prefix with wild card identifiers for the last series of digits, depending upon the size of the exchange.
The calling list can be updated each time that a number not appearing on the list is called and the user inputs a proper PIN. The called number would be added to the calling list, at least on a temporary basis. Updating may also occur on a monthly or other periodic basis using billing information from the service provider. Such billing information can include usage as well as calling frequency to every number called and thus provide the basis for determining which numbers are best retained on a calling list. The preference for numbers to be retained on each calling list is any number which is called regularly. Whereas, a new number may be added when it is called the first time, it could be deleted if it is not called again in the succeeding month or two. Thus, if a situation required the calling of one number numerous times within a short period, that number could still be deleted if it did not show up in several succeeding months of billing information.
Such monthly updates of calling Iists may also be effected using billing information from a cell phone subscriber's land line account. This could include either or both of a subscriber' business and personal accounts and could depend upon the subscriber's preference.
The operation of the present embodiment as described thus far, results in greatly reduced usage of PINs. This feature enables a further function which is the detection of newly cloned cell phones. Cloning will result in an unusually high rate or number of calls to telephone numbers not previously called by a given cell phone. These calls will result in an unusually high or increased rate of required PIN usage, which is readily detectable with the present invention. This potential fraud may then be readily verified by communication with the subscriber. Any practical standard may be set for detecting unusually high PIN usage. The simplest standard would be required PIN usage on more than a predetermined percentage of the calls placed from any particular cell phone.
Thus, the present embodiment allows the early identification of possibly cloned phones even when the cloner has intercepted the PIN. The present embodiment may further include the step of checking the number being called against a list of telephone numbers which are called by cloned cell phones. Other embodiments of the present invention are equally applicable to the types of telecommunications calls which derive income from account subscriptions. Such systems may have different ways of identifying the entities being called besides just telephone numbers. It may be possible to place calls to specific people, specific organizations, specific locations or specific communications devices. Such calls may not be bi-directional communications but only one-way contacts. The present invention is equally applicable to such systems with specifics which may vary depending upon those systems.
The most significant advantages of the present invention are reductions in the cost and inconvenience to consumers and a greatly reduced likelihood that the PIN transmission will be intercepted. Whenever a number from the calling list is called, the caller does not suffer the delay or distraction of inputting additional numbers. Further the use time of the assigned voice channel is reduced thus improving system capacity and reducing the ultimate cost paid by the subscriber. The safety of phone usage is also improved because phone users engaged in other activity do not have to alternate between holding the phone next to their ear and looking at the key pad to enter their PIN. The present invention provides a significant reduction in fraudulent use because the
PINs are transmitted over the air at a greatly reduced incidence, thus making their interception much less likely. This reduced incidence also allows early detection of fraudulent use whenever increased PIN usage occurs.
The embodiments described above are intended to be taken in an illustrative and not a limiting sense. Various modifications and changes may be made to the above embodiments by persons skilled in the art without departing from the scope of the present invention as defined in the appended claims.
Claims
1. A method for the use of personal identification numbers, PINs, with cellular telephones, cell phones, comprising the steps of: maintaining a separate calling list of telephone numbers called by each respective cell phone or each respective cell phone subscriber; determining whether each call placed from a cell phone or a cell phone subscriber is one of the numbers on its respective calling list; requiring the inputting of a PIN for each cell phone call where the number called does not appear on the respective calling list; and allowing cell phone calls to numbers on the respective calling list to be connected without requiring the inputting of a PIN.
2. The method of claim 1 , further comprising the step of placing on the respective calling list each telephone number called which requires the inputting of a PIN, if a proper PIN is received.
3. The method of claim 2, further comprising the step of updating the calling Iists on a periodic basis using cell phone account billing information including the removal of telephone numbers which are not regularly called.
4. The method of claim 3, wherein the step of updating is performed using billing information from a corresponding subscriber land line account.
5. The method of claim 1 , further comprising the step of monitoring for unusually high PIN usage and checking such unusual usage to identify newly cloned cell phones.
6. A method for the use of personal identification numbers, PINs, with telecommunications calls, comprising the steps of: maintaining a separate contact list of entities called by each respective telecommunications device or each respective telecommunications subscriber; determining whether each call placed by a telecommunications device or subscriber is one of the entities on its respective contact list; requiring the inputting of a PIN for each call where the entity called does not appear on the respective contact list; and allowing telecommunications calls to entities Iisted on the respective contact list to be connected without requiring the inputting of a PIN.
7. The method of claim 6, further comprising the step of placing on the respective contact list each entity call which requires the inputting of a PIN, if a proper PIN is received.
8. The method of claim 7, further comprising the step of updating the contact
Iists on a periodic basis using telecommunications account billing information including the removal of entities which are not regularly called.
9. The method of claim 6, further comprising the step of monitoring for unusually high PIN usage and checking such unusual usage to identify fraudulent PIN usage.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US50427195A | 1995-07-19 | 1995-07-19 | |
US08/504,271 | 1995-07-19 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1997004602A2 true WO1997004602A2 (en) | 1997-02-06 |
WO1997004602A3 WO1997004602A3 (en) | 1997-04-17 |
Family
ID=24005562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1996/012072 WO1997004602A2 (en) | 1995-07-19 | 1996-07-19 | Method for using personal identification numbers with telecommunications calls |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO1997004602A2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0896486A2 (en) * | 1997-08-06 | 1999-02-10 | Lucent Technologies Inc. | A wireless terminal and wireless telecommunications system adapted to prevent the theft of wireless service |
WO1999030521A1 (en) * | 1997-12-05 | 1999-06-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile terminal having conditional blocking of outgoing call requests |
US6600902B1 (en) | 1999-10-22 | 2003-07-29 | Koninklijke Philips Electronics N.V. | Multiple link data object conveying method for conveying data objects to wireless stations |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5200995A (en) * | 1990-12-24 | 1993-04-06 | Gaukel John J | Universal outgoing call restriction circuit |
US5325418A (en) * | 1991-09-27 | 1994-06-28 | Telemac Cellular Corporation | Cellular phone accounting system |
US5335278A (en) * | 1991-12-31 | 1994-08-02 | Wireless Security, Inc. | Fraud prevention system and process for cellular mobile telephone networks |
US5345595A (en) * | 1992-11-12 | 1994-09-06 | Coral Systems, Inc. | Apparatus and method for detecting fraudulent telecommunication activity |
US5509052A (en) * | 1994-05-25 | 1996-04-16 | Motorola, Inc. | Base storage of handset's base registrations |
US5517555A (en) * | 1991-12-12 | 1996-05-14 | Cellular Technical Services Company, Inc. | Real time information system for cellular telephones |
US5555551A (en) * | 1993-06-29 | 1996-09-10 | Airtouch Communications, Inc. | Method and apparatus for fraud control in cellular telephone systems |
-
1996
- 1996-07-19 WO PCT/US1996/012072 patent/WO1997004602A2/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5200995A (en) * | 1990-12-24 | 1993-04-06 | Gaukel John J | Universal outgoing call restriction circuit |
US5325418A (en) * | 1991-09-27 | 1994-06-28 | Telemac Cellular Corporation | Cellular phone accounting system |
US5517555A (en) * | 1991-12-12 | 1996-05-14 | Cellular Technical Services Company, Inc. | Real time information system for cellular telephones |
US5335278A (en) * | 1991-12-31 | 1994-08-02 | Wireless Security, Inc. | Fraud prevention system and process for cellular mobile telephone networks |
US5345595A (en) * | 1992-11-12 | 1994-09-06 | Coral Systems, Inc. | Apparatus and method for detecting fraudulent telecommunication activity |
US5555551A (en) * | 1993-06-29 | 1996-09-10 | Airtouch Communications, Inc. | Method and apparatus for fraud control in cellular telephone systems |
US5509052A (en) * | 1994-05-25 | 1996-04-16 | Motorola, Inc. | Base storage of handset's base registrations |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0896486A2 (en) * | 1997-08-06 | 1999-02-10 | Lucent Technologies Inc. | A wireless terminal and wireless telecommunications system adapted to prevent the theft of wireless service |
EP0896486A3 (en) * | 1997-08-06 | 2000-03-22 | Lucent Technologies Inc. | A wireless terminal and wireless telecommunications system adapted to prevent the theft of wireless service |
WO1999030521A1 (en) * | 1997-12-05 | 1999-06-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Mobile terminal having conditional blocking of outgoing call requests |
US6463276B1 (en) | 1997-12-05 | 2002-10-08 | Telefonaktiebolaget L M Ericsson (Publ) | Mobile terminal having conditional blocking of outgoing call requests |
US6600902B1 (en) | 1999-10-22 | 2003-07-29 | Koninklijke Philips Electronics N.V. | Multiple link data object conveying method for conveying data objects to wireless stations |
Also Published As
Publication number | Publication date |
---|---|
WO1997004602A3 (en) | 1997-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5579376A (en) | Phantom mobile-identification number method and apparatus | |
US4162377A (en) | Data base auto bill calling using CCIS direct signaling | |
US7349697B2 (en) | Mobile communication system, mobile terminal, subscriber information management apparatus, mobile network system, location area information registration method and call control method | |
US5809125A (en) | Method and apparatus for intercepting potentially fraudulent telephone calls | |
US6381317B1 (en) | Subscriber-initiated automated third party billing feature | |
US20020022472A1 (en) | Multiple virtual wallets in wireless device | |
JPH0323751A (en) | Method and device for constaining credit-card communication issuance | |
US20060177029A1 (en) | Virtual multi-line telephone service | |
US20050013423A1 (en) | Telecommunication method and apparatus with provisions to exceed usage limit | |
US6487402B1 (en) | System and method for providing access to a wireless communication service to a group of subscribers who share a set of modems | |
CN1658686A (en) | System and method for SMS message filtering | |
US6088584A (en) | Methods for cellular pay phone/debit phone support on analog channels | |
US6771757B1 (en) | Method for producing a service profile based on user's choice for an extension in a telecommunications network | |
US6430279B2 (en) | Method for the acceptance of calling charges for individual calls as well as telephone network and terminal unit | |
US5812650A (en) | Method and apparatus for intercepting potentially fraudulent | |
WO1997004602A2 (en) | Method for using personal identification numbers with telecommunications calls | |
US6393300B1 (en) | Device for connecting a telephone switch to a fixed telephone network via a radio telephone network | |
US20080130851A1 (en) | Casual usage alternate billing | |
US20010027528A1 (en) | Enhanced pin-based security method and apparatus | |
US20010002364A1 (en) | Procedure and system for setting up a telecommunication connection | |
EP1299997B1 (en) | Arranging of billing in a telecommunication system | |
US8200276B2 (en) | Communication method | |
WO2001022757A1 (en) | Method of processing charging information | |
JP2928109B2 (en) | A method to reduce outgoing call processing load on network side due to repeated outgoing calls by unauthorized users in simplified mobile phone system | |
KR100194768B1 (en) | Call processing method of special number phone service that gives special call function to incoming call phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): BR CA CN KR MX |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
AK | Designated states |
Kind code of ref document: A3 Designated state(s): BR CA CN KR MX |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: CA |