Browse Prior Art Database

ANTI-THEFT MECHANISM FOR CELLULAR SYSTEMS

IP.com Disclosure Number: IPCOM000008142D
Original Publication Date: 1997-Jun-01
Included in the Prior Art Database: 2002-May-21
Document File: 2 page(s) / 101K

Publishing Venue

Motorola

Related People

Tim Dickinson: AUTHOR [+3]

Abstract

The cellular industry is plagued by the high tech thievery of cellular services and resources. Lost rev- enue totaling in the millions of dollars occurs each year. Current anti-theft systems have had at best marginal results because of complex security schemes are often broken by insiders. Time and money to combat the issue is also a huge cost to system operators. A new method of authentication is needed. One which can not be by passed. Not even by its own developers.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 50% of the total text.

Page 1 of 2

MOTOROLA Technical Developments

@

ANTI-THEFT MECHANISM FOR CELLULAR SYSTEMS

by Tim Dickinson, Yakov Simkin and Tony Belkin

PROBLEM TO SE SOLVED BY THE INVENTION

  The cellular industry is plagued by the high tech thievery of cellular services and resources. Lost rev- enue totaling in the millions of dollars occurs each year. Current anti-theft systems have had at best marginal results because of complex security schemes are often broken by insiders. Time and money to combat the issue is also a huge cost to system operators. A new method of authentication is needed. One which can not be by passed. Not even by its own developers.

  Current cellular authentication systems use methods which transmit key subscriber information over the ether. In most cases the information con- tains the general identity of the subscriber. The thief can intercept the information and pose as that same subscriber to the system. In other types of authenti- cation systems mathematical encryption techniques are used. These systems have short lived success as critical information about the encryption process inevitably falls into the wrong hands.

DESCRIPTION OF THE INVENTION

  The invention provides a new method of authentication based on geographical information of past usage.

  The cellular subscriber will maintain a history log pertaining to the last several location updates and/or calls it has placed. The information will include the BR ID or other unique information about that cell. The FNE will also maintain the same list. When the subscriber attempts to make a call the FNE will request a random element from the Su's list. If a proper match is made the call may proceed,

AUTHENTICATION PROCESS SCENARIO (Ref. Figure 1)

1. Subscriber powers up and logs onto the system using conventional method.

2. Subscriber/FNE perform a location update in cell 1. Subscriber and FNE start a history log which contains the cell ID number 1.

3. Subscriber moves to cell 2 were another location update occurs. Subscriber and FNE add cell 2 to their history logs.

4. Additional location...