throbber
United States Patent (19)
`Daurio et al.
`
`54 SYSTEM FOR DETECTING A FRAUDULENT
`REMOTE UNIT WHICH UPON DETECTION
`PLACES ACALL TO THE CELLULAR
`INFRASTRUCTURE USING
`IDENTIFICATION IN FORMATION OF THE
`FRAUDULENT REMOTE UNIT
`
`(75) Inventors: Suzanne Daurio, McHenry; Michael
`Duda, Naperville; Tom Joyner,
`Chicago; Eric Drury, Lake Zurich, all
`of I11.
`
`73 Assignee: Motorola, Inc., Schaumburg, Ill.
`
`56)
`
`21 Appl. No.:716,590
`22 Filed:
`Sep. 18, 1996
`6
`51
`Int. Cl. ................................ H04Q 7/00; H04Q 9/00
`52) U.S. Cl. ............................................. 455/410; 455/411
`58 Field of Search ..................................... 455/410, 411,
`455/425, 67.1; 380/23, 25; 324/76.12; 379/189
`References Cited
`U.S. PATENT DOCUMENTS
`4,955,049 9/1990 Ghisler ...................................... 379/58
`5,005,210 4/1991 Ferrell.
`... 455/115
`5,329,591
`7/1994 Magrill ...................................... 38
`5,345,595 9/1994 Johnson et al...
`... 455/33.1
`5,420,910 5/1995 Rudokas et al. .
`... 379/59
`5,555,551 9/1996 Rudokas et al. .......................... 379/50
`FOREIGN PATENT DOCUMENTS
`3441724 5/1986 Germany.
`
`
`
`USOO580.9412A
`Patent Number:
`11
`(45) Date of Patent:
`
`5,809,412
`Sep. 15, 1998
`
`OTHER PUBLICATIONS
`
`“EMX 2500 Features and Enhancements' section
`#68P09222A54-O, Motorolas Clone ClearTM, Technical
`Education and Documentation, Aug. 14, 1994.
`“PhonePrintTM, Cellular Fraud Control System Descrip
`tion', Corsair Communications.
`
`Primary Examiner Tommy P. Chin
`ASSistant Examiner David R. Vincent
`Attorney, Agent, or Firm Kenneth A. Haas
`
`ABSTRACT
`57
`Detection of a fraudulent remote unit (113) in a communi
`cation system (100) occurs by external fraud detection
`equipment (103) located external to, and in proximity to a
`base site (101). External fraud detection equipment (103)
`communicates with base site (101) via an uplink COU
`nication signal (105) and utilizes fraud detection methods
`not utilized bw internal fraud detection equipment (111) to
`identify the Rao. unit (113) as being E. SE
`remote unit (113) is identified by the external fraud detection
`equipment (103) as being fraudulent, the external fraud
`detection equipment (103) places an origination order to the
`base site (101) and supplies identification information on the
`pp
`fad
`it (113). Inf
`109
`raudulent remote unit (113). Infrastructure equipment (109)
`utilizes information Supplied to it by the external fraud
`detection equipment (103) and disconnects the fraudulent
`remote unit (113).
`
`13 Claims, 3 Drawing Sheets
`
`109
`
`
`
`FRAUD
`DETECTION
`EQUIPMENT
`
`ERICSSON v. UNILOC
`Ex. 1018 / Page 1 of 8
`
`

`

`U.S. Patent
`
`Sep. 15, 1998
`
`Sheet 1 of 3
`
`5,809,412
`
`109
`
`FRAUD
`DETECTION
`EQUIPMENT
`
`Af7G 7
`
`
`
`ERICSSON v. UNILOC
`Ex. 1018 / Page 2 of 8
`
`

`

`U.S. Patent
`
`Sep. 15, 1998
`
`Sheet 2 of 3
`
`5,809,412
`
`
`
`FRAUDULENT REMOTE UNIT
`ACCESSES COMMUNICATION SYSTEM
`
`301
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`REMOTE UNIT
`DETERMINED FRAUDULENT
`BY EXTERNAL FRAUD
`DETECTION, EQUPMEN
`
`INITIATE CALL BY EXTERNAL
`FRAUD DETECTION EQUIPMENT
`UTILIZING FRAUDULENT ID
`
`307
`
`
`
`DISCONNECT FIRST REMOTE UNIT
`
`309
`
`Af7G 4
`
`401
`
`REMOTE UNIT
`DETERMINED FRAUDULENT
`BY EXTERNAL FRAUD
`DETECTION EQUPMENT
`p
`
`INITIATE CALL BY EXTERNAL FRAUD
`DETECTION E OUIPMENT UTILIZING
`FRAUDULENT ID + UNIQUE CALLED
`PARTY NUMBER
`
`407
`
`ERICSSON v. UNILOC
`Ex. 1018 / Page 3 of 8
`
`

`

`U.S. Patent
`
`Sep. 15, 1998
`
`Sheet 3 of 3
`
`5,809,412
`
`501
`
`REMOTE UNIT ACCESSES SYSTEM
`
`
`
`
`
`SIMULTANEOUS
`CALLS BEING PLACED BY
`SAME ID
`p
`
`503
`
`511
`
`
`
`
`
`DENY ACCESS
`TO 2nd CALL
`
`
`
`
`
`Af7G. A
`
`UNIQUE
`CALLED PARTY NUMBER
`PROVIDED
`p
`
`DISCONNECT 1St CALL
`
`602
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`REMOTE UNIT
`DETERMINED FRAUDULENT BY
`EXTERNAL FRAUD DETECTION
`EQUIPMENT
`
`INITIATE CALL BY EXTERNAL
`FRAUD DETECTION EQUIPMENT
`TO INFRASTRUCTURE EQUIPMENT
`
`606
`
`PROVIDE INFRASTRUCTURE EQUIPMENT
`WITH ID OF FRAUDULENT REMOTE UNIT
`
`DISCONNECT FRAUDULENT REMOTE UNIT
`
`610
`
`612
`
`608
`
`Af7G 6
`
`ERICSSON v. UNILOC
`Ex. 1018 / Page 4 of 8
`
`

`

`5,809,412
`
`1
`SYSTEM FOR DETECTING A FRAUDULENT
`REMOTE UNIT WHICH UPON DETECTION
`PLACES A CALL TO THE CELLULAR
`INFRASTRUCTURE USING
`IDENTIFICATION IN FORMATION OF THE
`FRAUDULENT REMOTE UNIT
`
`2
`remote unit's identification information and reprogramming
`a fraudulent remote unit with the obtained identification
`information. The reprogrammed, or cloned remote unit
`Simply places a call using the identification information of
`the legitimate remote unit, causing associated fees to be
`charged to the legitimate remote unit.
`There exists many methods in which communication
`Systems can detect the placement of fraudulent calls. Typi
`cally each fraud detection method requires Specific Software
`and hardware existing within the System's infrastructure
`equipment, and can be very costly to implement. This can
`prevent System operators from outfitting existing infrastruc
`ture equipment with new fraud detection equipment. Thus a
`need exists for a method and apparatus for detection of
`fraudulent users in a communication System that is leSS
`costly and does not require outfitting existing infrastructure
`equipment with additional fraud detection equipment when
`new fraud detection methods are devised.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 illustrates a communication System in accordance
`with the preferred embodiment of the present invention.
`FIG. 2 is a block diagram of the external fraud detection
`equipment of FIG. 1 in accordance with the preferred
`embodiment of the present invention.
`FIG. 3 is a flow chart illustrating operation of the external
`fraud detection equipment of FIG. 1 in accordance with a
`preferred embodiment of the present invention.
`FIG. 4 is a flow chart illustrating operation of the internal
`fraud detection equipment of FIG. 1 in accordance with an
`alternate embodiment of the present invention.
`FIG. 5 is a flow chart illustrating operation of the external
`and internal fraud detection equipment of FIG. 1 in accor
`dance with a Second alternate embodiment of the present
`invention.
`FIG. 6 is a flow chart illustrating operation of the external
`and internal fraud detection equipment of FIG. 1 in accor
`dance with a Second alternate embodiment of the present
`invention.
`
`DETAILED DESCRIPTION OF THE DRAWINGS
`Stated generally, detection of a fraudulent remote unit in
`a communication System occurs by external fraud detection
`equipment located external to, and in proximity to a base
`Site. The external fraud detection equipment communicates
`with the base site via an uplink communication signal and
`utilizes fraud detection methods not utilized by internal
`fraud detection equipment to identify the remote unit as
`being fraudulent. Once the remote unit is identified by the
`external fraud detection equipment as being fraudulent, the
`external fraud detection equipment places an origination
`order to the base site and Supplies identification information
`on the fraudulent remote unit. The infrastructure equipment
`utilizes information Supplied to it by the external fraud
`detection equipment and disconnects the fraudulent remote
`unit.
`The present invention encompasses a method of detecting
`a fraudulent remote unit in a communication System by
`receiving at a point external to cellular infrastructure
`equipment, a first uplink communication Signal transmitted
`by a remote unit and determining at the point external to the
`cellular infrastructure equipment, if the first uplink commu
`nication signal is transmitted by the fraudulent remote unit.
`Next, information regarding the fraudulent remote unit is
`transmitted from the point external to the cellular infrastruc
`ture equipment to the cellular infrastructure equipment.
`
`FIELD OF THE INVENTION
`The present invention relates generally to cellular com
`munication Systems and, in particular, to detection of fraudu
`lent users in cellular communication Systems.
`BACKGROUND OF THE INVENTION
`Communication Systems are known to comprise a plural
`ity of base sites that provide communication Services to
`remote units located in corresponding Service coverage areas
`of the base sites. A remote unit (e.g., a mobile or stationary
`remote unit) that desires to communicate, sends a channel
`request Signal and identification information to a base site
`Serving the coverage area in which the remote unit resides.
`Identification information includes, but is not limited to, a
`mobile identification number (MIN) and an electronic serial
`number (ESN). Upon receiving the remote unit's identifi
`cation information and channel request Signal, the Serving
`base site allocates a communication resource for the remote
`unit. The communication resource comprises a coordinated
`pair of frequencies (i.e., an uplink frequency and a downlink
`frequency Sometimes referred to as voice or traffic
`channels). In a communication System employing a Time
`Division Multiple Access (TDMA) protocol, the communi
`cation resource comprises a coordinated pair of time slots
`and frequencies (i.e., a first time slot at an uplink frequency
`and a second time slot at a downlink frequency). The uplink
`frequency Supports transmissions from the remote unit to the
`Serving base Site, whereas the downlink frequency Supports
`transmissions from the Serving base site to the remote unit.
`Upon allocating the communication resource, the base
`Site Sends a channel designation signal containing the uplink
`and downlink frequency, to the remote unit via a control
`channel, and upon receiving the channel designation Signal,
`the remote unit tunes its transmitter and receiver to the
`designated frequencies and begins communicating with a
`telephone network Subscriber or another remote unit via the
`Serving base site. The Serving base site then trackS billing
`information with respect to the call, and utilizing the remote
`unit's identification information, charges the appropriate
`fees to the corresponding caller.
`There are many ways in which users can place fraudulent
`calls, resulting in fees associated with the call being charged
`to individuals who did not place the call. For example, as
`described in U.S. application Ser. No. 08/651,230 “Method
`and Apparatus for Detection of Fraudulent Users in a
`Communication System Using Signaling-Channel Phase
`Shift” by W. Willey, a fraudulent remote unit (i.e., a fraudu
`lent user operating a remote unit) may hijack a channel by
`transmitting on a corresponding uplink frequency at a high
`enough power level, causing the legitimate remote unit to be
`abandoned in favor of the fraudulent remote unit. Once
`communication has been established between the fraudulent
`remote unit and the communication System, the fraudulent
`remote unit may then utilize three-party calling features of
`the communication System to place other calls utilizing the
`legitimate remote unit's identification information, causing
`asSociated fees to be charged to the legitimate remote unit.
`Another way in which users can place fraudulent calls is
`by cellular cloning. Cellular cloning involves procuring a
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`ERICSSON v. UNILOC
`Ex. 1018 / Page 5 of 8
`
`

`

`5,809,412
`
`15
`
`25
`
`3
`An alternate embodiment of the present invention encom
`passes a method for detection of a fraudulent remote unit in
`a communication System, by determining by external fraud
`detection equipment that the fraudulent remote unit has
`accessed the communication System and initiating a call by
`the external fraud detection equipment to cellular infrastruc
`ture equipment. The call is then disconnected by the cellular
`infrastructure equipment based on the call.
`A final embodiment of the present invention encompasses
`an apparatus for detection of fraudulent users in a commu
`nication System having a receiver existing external to cel
`lular infrastructure equipment, for receiving an uplink com
`munication Signal of a remote unit. The apparatus further
`includes an internal logic unit existing external to the
`cellular infrastructure equipment, for determining that the
`remote unit is a fraudulent remote unit, and a transmitter
`existing external to the cellular infrastructure equipment, for
`transmitting information regarding the fraudulent remote
`unit to the cellular infrastructure equipment.
`FIG. 1 illustrates communication system 100 in accor
`dance with the preferred embodiment of the present inven
`tion. Communication system 100 may, for example, be an
`analog or digital cellular communication System utilizing
`System protocols Such as, but not limited to, the Narrowband
`Advanced Mobile Phone Service (NAMPS) protocol, the
`Advanced Mobile Phone Service (AMPS) protocol, the
`Code Division Multiple Access (CDMA) protocol, the Per
`sonal Digital Cellular (PDC) protocol, or the United States
`Digital Cellular (USDC) protocol. Communication system
`100 includes base site 101 having respective service cover
`age area 107, remote unit 113, external fraud detection
`equipment 103, and infrastructure equipment 109. In the
`preferred embodiment of the present invention infrastructure
`equipment 109 includes a Mobile Switching Center (not
`shown) a Base site Controller (not shown), and internal
`fraud detection equipment 111.
`AS shown, remote unit 113 is communicating with base
`site 101 and external fraud detection equipment 103 via
`uplink communication signal 119 and base site 101 is
`communicating with remote unit 113 via downlink commu
`40
`nication signal 116. In the preferred embodiment of the
`present invention, external fraud detection equipment 103 is
`located external to, and in proximity to base site 101 and
`communicates with base site 101 via uplink communication
`signal 105. Although in the preferred embodiment of the
`present invention external fraud detection equipment 103
`communicates with base site 101 via uplink communication
`signal 105, in alternate embodiments external fraud detec
`tion equipment 103 communicates with base site 101 via
`landline signaling (Such as Signaling System 7). As shown,
`infrastructure equipment 109 includes internal fraud detec
`tion equipment 111 that is preferably a Clone ClearTM fraud
`detection System Supplied by Motorola, Inc. of Schaumburg,
`Ill., but in alternate embodiments of the present invention
`other internal fraud detection methods (Such as Systems to
`detect overlap billing or Systems to detect time and distance
`discrepancies) may be utilized by internal fraud detection
`equipment 111.
`In order to better illustrate operation of communication
`system 100, it will be beneficial to describe operation of
`Motorola's Clone ClearTM fraud detection system. As
`described in Motorola’s “EMX2500 Features and Enhance
`ments' section number 68P09222A54-O, Motorola's Clone
`ClearTM feature identifies situations in which two remote
`units having the same identification information are
`involved in Simultaneous calls. Once it has been determined
`that an individual remote unit's identification information is
`
`4
`being used for simultaneous calls, Clone ClearTM internal
`fraud detection equipment 111 allows a System operator a
`choice of options that will minimize a fraudulent remote
`unit's access to communication system 100.
`The first option that Clone ClearTM provides system
`operators is to force disconnect the first remote unit from
`communication system 100 once it has been determined that
`Single identification information is being used for Simulta
`neous calls. This option minimizes the overlapping of billing
`records when a radio frequency (RF) loss or interference on
`a base site channel occurs, and the legitimate remote unit
`reaccesses communication System 100. This option causes
`any valid Subscriber and fraudulent Subscriber to compete
`for air time; the thought being that the valid subscriber may
`report the problem to the System operator.
`The second option that Clone ClearTM provides system
`operators is to block origination of the Second remote unit
`once it has been determined that Single identification infor
`mation is being used for Simultaneous calls. In the preferred
`embodiment of the present invention, the Second remote unit
`is connected to a Service that notifies the remote unit of why
`the call origination was not completed. Like the first option,
`the Second option causes the valid Subscriber to compete for
`air time; the thought being that the valid Subscriber may
`report the problem to the System operator.
`The third option that Clone ClearTM provides system
`operators is to let both calls continue and monitor billing
`information once it has been determined that the same
`identification information is being used for Simultaneous
`calls. This option is chosen when a System operator does not
`wish to interfere with calls of legitimate subscribers, but
`they do wish to have a mechanism to help track potential
`fraudulent users, and take the appropriate action if the
`legitimate Subscriber notifies the System operator of billing
`discrepancies.
`FIG. 2 is a block diagram of external fraud detection
`equipment 103 of FIG. 1 in accordance with the preferred
`embodiment of the present invention. External fraud detec
`tion equipment 103 comprises receiver 201, logic unit 203,
`and transmitter 205. Operation of external fraud detection
`equipment 103 in accordance with the preferred embodi
`ment of the present invention occurs as follows:
`Remote unit 113, which for the purposes of this discussion
`is a fraudulent remote unit, begins communication with base
`site 101 and external fraud detection equipment 103 via
`uplink communication signal 119. External fraud detection
`equipment 103, utilizing receiver 201, receives communi
`cation signal 119. Communication signal 119 is then ana
`lyzed via logic unit 203 to determine if remote unit 113 is
`fraudulent. In the preferred embodiment of the present
`invention logic unit 203 utilizes fraud detection methods not
`utilized by internal fraud detection equipment 111. Also, in
`the preferred embodiment of the present invention, external
`fraud detection logic unit 203 utilizes an RF fingerprinting
`technique to identify fraudulent remote unit 113, but other
`fraud detection methods (for example, methods to detect
`overlap billing or time and distance discrepancies) can be
`utilized as well. RF fingerprinting is described in the Phone
`print TM System Description entitled “Cellular Fraud Con
`trol” published by Corsair Communications and is incorpo
`rated by reference herein. Corsair Communications can be
`reached at 207 Java Drive, Sunnyvale, Calif. 94089.
`Once logic unit 203 determines that remote unit 113 is
`fraudulent, external fraud detection equipment 103 utilizes
`transmitter 205 to initiate a call (sometimes referred to as an
`origination order) to infrastructure equipment 109 via uplink
`
`35
`
`45
`
`50
`
`55
`
`60
`
`65
`
`ERICSSON v. UNILOC
`Ex. 1018 / Page 6 of 8
`
`

`

`S
`communication signal 105. In the preferred embodiment of
`the present invention, the call is initiated utilizing the
`fraudulent remote units 113 identification information and
`with the appropriate System protocol.
`After call initiation by external fraud detection equipment
`103, internal fraud detection equipment 111 (Clone ClearTM)
`identifies that two remote units having the same identifica
`tion information are involved in Simultaneous calls. Once it
`has been determined that a Single remote unit's identification
`information is being used for Simultaneous calls, Clone
`ClearTM internal fraud detection equipment 111 allows the
`System operator a choice of options (discussed above) that
`will minimize the fraudulent remote units 113 access to
`communication system 100. In the preferred embodiment of
`the present invention, internal fraud detection equipment 111
`15
`will force disconnect the first remote unit to acceSS com
`munication system 100 (in this case, remote unit 113). By
`utilizing external fraud detection equipment 103, Specific
`fraud detection Software and hardware can exist external to
`the communication Systems infrastructure equipment. This
`provides for detection of fraudulent users in a communica
`tion System that is less costly and does not require outfitting
`existing infrastructure equipment with additional fraud
`detection equipment when new fraud detection methods are
`devised.
`FIG. 3 is a flow chart illustrating operation of communi
`cation system 100 in accordance with the preferred embodi
`ment of the present invention. The logic flow begins at Step
`301 where remote unit 113 accesses communication system
`100. At step 303 external fraud detection equipment 103
`determines if remote unit 113 is fraudulent. As discussed
`above, in the preferred embodiment of the present invention
`external fraud detection equipment 103 utilizes fraud detec
`tion methods not utilized by internal fraud detection equip
`ment 111 to determine if remote unit 113 is fraudulent. If at
`step 303, external fraud detection equipment 103 determines
`that remote unit 113 is not fraudulent, then at step 305 the
`logic flow ends. If at step 303, external fraud detection
`equipment 103 determines that remote unit 113 is
`fraudulent, then at step 307 external fraud detection equip
`ment 103 initiates a call via uplink communication Signal
`105. In the preferred embodiment of the present invention,
`external fraud detection equipment 103 utilizes fraudulent
`remote unit's 113 identification information when placing
`the call. Next, at step 309 internal fraud detection equipment
`111, utilizing Motorola's Clone ClearTM fraud detection
`feature, determines that two Simultaneous calls are being
`placed utilizing the same identification information, and
`disconnects fraudulent remote unit 113 and the logic flow
`ends at step 305.
`FIG. 4 is a flow chart illustrating operation of external
`fraud detection equipment 103 of FIG. 1 in accordance with
`an alternate embodiment of the present invention. In an
`alternate embodiment, external fraud detection equipment
`103 accesses communication system 100 (originates a call)
`and supplies infrastructure equipment 109 with notification
`that remote unit 113 is fraudulent. In the alternate
`embodiment, external fraud detection equipment 103 Sup
`plies infrastructure equipment 109 with a unique called party
`number instructing internal fraud detection equipment 111
`that the Second call was placed by external fraud detection
`equipment 103. For example, a System provider might
`instruct internal fraud detection equipment 111 to block
`origination of the Second remote unit to acceSS communi
`cation system 100 unless a particular called number is
`placed by the Second remote unit, identifying the Second
`remote unit as external fraud detection equipment 103. Once
`
`65
`
`45
`
`50
`
`55
`
`60
`
`5,809,412
`
`25
`
`35
`
`40
`
`6
`the Second remote unit has been identified as fraud detection
`equipment 103, fraud detection equipment 111 will force
`disconnect the first remote unit to access communication
`system 100.
`The logic flow begins at step 401 where remote unit 113
`accesses communication system 100. At step 403 external
`fraud detection equipment 103 determines if remote unit 113
`is fraudulent. In the alternate embodiment of the present
`invention external fraud detection equipment 103 utilizes
`fraud detection methods not utilized by internal fraud detec
`tion equipment 111 to determine if remote unit 113 is
`fraudulent. If at step 403, external fraud detection equipment
`103 determines that remote unit 113 is not fraudulent, then
`at step 405 the logic flow ends. If at step 403, external fraud
`detection equipment 103 determines that remote unit 113 is
`fraudulent, then at step 407 external fraud detection equip
`ment 103 initiates a call via uplink communication Signal
`105. The initiated call utilizes fraudulent remote units 113
`identification information and has a unique called party
`number that identifies the Second call as being originated
`from external fraud detection equipment 103. Next, the logic
`flow ends at step 405.
`FIG. 5 is a flow chart illustrating operation of the internal
`fraud detection equipment of FIG. 1 in accordance with an
`alternate embodiment of the present invention. The logic
`flow begins at step 501 where a remote unit accesses
`communication system 100. Next, at step 503 internal fraud
`detection equipment 111 determines if the remote units
`identification information is involved in two simultaneous
`calls, and if not, the logic flow ends at step 505. If fraud
`detection equipment 111 determines that the remote units
`identification information is involved in two simultaneous
`calls, then the logic flow continues to step 507 where fraud
`detection equipment 111 determines if a unique called party
`number has been provided by the remote unit, identifying it
`as external fraud detection equipment 103. If at step 507
`internal fraud detection equipment determines that a unique
`called party number was provided, then at step 509 the first
`call is disconnected, otherwise at Step 511 the Second call is
`disconnected. The logic flow then ends at step 505.
`FIG. 6 is a flow chart illustrating operation of external and
`internal fraud detection equipment of FIG. 1 in accordance
`with a Second alternate embodiment of the present inven
`tion. In this embodiment external fraud detection equipment
`103 detects fraudulent remote unit 113 and originates a call
`to base site 101 identifying remote unit 113 as being
`fraudulent. Unlike the previous embodiments of the present
`invention, external fraud detection equipment 103 does not
`originate a call utilizing the same identification information
`as remote unit 113, but utilizes unique identification infor
`mation that identifies itself to infrastructure equipment 109.
`Once external fraud detection equipment 103 has been
`identified to infrastructure equipment 109, external fraud
`detection equipment 103 notifies infrastructure equipment
`109 that fraudulent remote unit 113 has accessed commu
`nication system 100.
`The logic flow begins at step 602 where fraudulent remote
`unit 113 accesses communication system 100. At step 604
`external fraud detection equipment 103 determines if remote
`unit 113 is fraudulent, and if not, the logic flow ends at Step
`608. If at step 604 external fraud detection equipment 103
`determines that remote unit 113 is fraudulent then at step 606
`external fraud detection equipment 103 originates a call to
`infrastructure equipment 109 via base site 101. Next, at step
`610, external fraud detection equipment 103 provides infra
`structure equipment 109 with identification information on
`remote unit 113. At step 612, fraudulent remote unit 113 is
`
`ERICSSON v. UNILOC
`Ex. 1018 / Page 7 of 8
`
`

`

`5,809,412
`
`1O
`
`15
`
`25
`
`7
`disconnected from communication system 100 and the logic
`flow ends at step 608.
`By utilizing external fraud detection equipment 103,
`Specific fraud detection Software and hardware can exist
`external to the communication Systems infrastructure
`equipment. This provides for detection of fraudulent users in
`a communication System that is less costly and does not
`require outfitting existing infrastructure equipment with
`additional fraud detection equipment when new fraud detec
`tion methods are devised.
`The descriptions of the invention, the Specific details, and
`the drawings mentioned above, are not meant to limit the
`Scope of the present invention. It is the intent of the inventors
`that various modifications can be made to the present
`invention without varying from the Spirit and Scope of the
`invention, and it is intended that all Such modifications come
`within the Scope of the following claims.
`What is claimed is:
`1. A method of detecting a fraudulent remote unit in a
`communication System, the method comprising the Steps of:
`receiving at fraud detection equipment external to cellular
`infrastructure equipment, a first uplink communication
`Signal transmitted by a remote unit;
`determining at the fraud detection equipment, if the first
`uplink communication Signal is transmitted by the
`fraudulent remote unit; and
`originating a call by the fraud detection equipment uti
`lizing identification information of the fraudulent
`remote unit Such that fraud detection equipment inter
`nal to the cellular infrastructure equipment will per
`ceive that two remote units having the Same identifi
`cation information are involved in Simultaneous calls.
`2. The method of claim 1 wherein the step of determining
`comprises the Steps of:
`determining at the point external to the cellular infrastruc
`ture equipment, that the remote unit has accessed the
`communication System; and
`identifying at the point external to the cellular infrastruc
`ture equipment, identification information of the
`fraudulent remote unit.
`3. The method of claim 1 further comprising the steps of:
`receiving by the cellular infrastructure equipment, noti
`fication that the remote unit is fraudulent; and
`disconnecting the remote unit from the communication
`System based on the Step of receiving.
`4. The method of claim 3 wherein the step of disconnect
`ing the remote unit from the communication System com
`prises the Steps of
`50
`identifying that two simultaneous calls are being placed
`utilizing a same identification information; and
`disconnecting the remote unit based on the Step of iden
`tifying.
`5. The method of claim 3 wherein the step of disconnect
`ing comprises the Steps of
`receiving by the cellular infrastructure equipment, the
`notification;
`determining from the notification, an identification of the
`fraudulent remote unit; and
`disconnecting the fraudulent remote unit based on the
`identification of the fraudulent remote unit.
`6. A method for detection of a fraudulent remote unit in
`a communication System, the method comprising the Steps
`of:
`
`8
`determining by external fraud detection equipment that
`the fraudulent remote unit has accessed the communi
`cation System;
`initiating a call by the external fraud detection equipment
`to cellular infrastructure equipment Such that the Step of
`initiating will cause fraud detection equipment internal
`to the cellular infrastructure equipment to perceive that
`two remote units having the same identification infor
`mation are involved in Simultaneous calls, and
`disconnecting the fraudulent remote unit by the cellular
`infrastructure equipment based on the call.
`7. The method of claim 6 wherein the step of determining
`comprises the Steps of:
`determining by the external fraud detection equipment
`that the fraudulent remote unit has accessed the com
`munication System; and
`identifying by the external fraud detection equipment,
`identification information of the fraudulent remote unit.
`8. The method of claim 7 wherein the step of initiating the
`call by the external fraud detection equipment comprises the
`Step of initiating the call utilizing the identification infor
`mation of the fraudulent remote unit.
`9. The method of claim 6 wherein the step of disconnect
`ing comprises the Steps of
`identifying that two Simultaneous calls are being placed
`utilizing a same identification information; and
`disconnecting the fraudulent remote unit based on the Step
`of identifying.
`10. The method of claim 6 wherein the step of discon
`necting the call by the cellular infrastructure equipment
`comprises the Steps of:
`receiving by the cellular infrastructure equipment, a noti
`fication from the external fraud detection equipment;
`determining from the notification, an identification of the
`fraudulent remote unit; and
`disconnecting the fraudulent remote unit based on the
`identification of the fraudulent remote unit.
`11. An apparatus for detection of fraudulent users in a
`communication System, the apparatus comprising:
`a receiver existing external to cellular infrastructure
`equipment, for receiving an uplink communication
`Signal of a remote unit;
`an internal logic unit existing external to the cellular
`infrastructure equipment, for determining that the
`remote unit is a fraudulent remote unit; and
`a transmitter existing external to the cellular infrastructure
`equipment, for transmitting information regarding the
`fraudulent remote unit to the cellular infrastructure
`equipment, the information transmitted causing the
`cellular infrastructure equipment to perceive that two
`remote units having the same identification information
`are involved in Simultaneous calls.
`12. The apparatus of claim 11 wherein the internal logic
`unit utilizes a radio

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket