Browse Prior Art Database

A Method for Protection Against Misuse and Over-charging by Policy Rule Based Stoppers and Releasers

IP.com Disclosure Number: IPCOM000028691D
Original Publication Date: 2004-Jun-25
Included in the Prior Art Database: 2004-Jun-25
Document File: 2 page(s) / 29K

Publishing Venue

Siemens

Related People

Juergen Carstens: CONTACT

Abstract

In the daily life of a mobile user (meaning a user of mobile communication/data equipment), there are many cases which involve possible misuse and over-charging of his account, regardless whether it is a pre-paid or a post-paid account. Related problems can appear in many forms. Two forms should be mentioned exemplarily. One form is the misuse in the case of loss or theft of mobile phones. For example, the mobile phone of a user is stolen. Before the user realizes it and is able to pick up his legitimacy information (e.g. PIN Personal Identification Number / PUK Pin Unlocking Key which are possibly stored at home) and to inform his operator to block further use of the SIM (Subscriber Identity Module) card or the mobile phone, the thief could have already made a lot of expensive calls. This misuse case usually uses up the whole rest money of a pre-paid account or results in an expensive bill for a post-paid account. Another form is to prevent an account from intended or unintended over-charging. An example is the control of mobile phone budgets of kids by their parents. Until now it is merely possible to take precautionary measures in some cases by forms of limited credit balance.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

S

A Method for Protection Against Misuse and Over-charging by Policy Rule Based Stoppers and Releasers

Idea: Dr. Changpeng Fan, DE-Berlin

In the daily life of a mobile user (meaning a user of mobile communication/data equipment), there are many cases which involve possible misuse and over-charging of his account, regardless whether it is a pre-paid or a post-paid account. Related problems can appear in many forms. Two forms should be mentioned exemplarily.

One form is the misuse in the case of loss or theft of mobile phones. For example, the mobile phone of a user is stolen. Before the user realizes it and is able to pick up his legitimacy information (e.g. PIN Personal Identification Number / PUK Pin Unlocking Key which are possibly stored at home) and to inform his operator to block further use of the SIM (Subscriber Identity Module) card or the mobile phone, the thief could have already made a lot of expensive calls. This misuse case usually uses up the whole rest money of a pre-paid account or results in an expensive bill for a post-paid account. Another form is to prevent an account from intended or unintended over-charging. An example is the control of mobile phone budgets of kids by their parents. Until now it is merely possible to take precautionary measures in some cases by forms of limited credit balance.

A new idea proposes a method to solve the problems systematically and automatically. Now policy rules can be used to protect against misuse and over-charging. These rules reflect the user's "normal" behavior, and thereby the expected behavior in any further usage. There are stopper rules and releaser rules, which can work automatically. Stopper rules regulate the conditions under which further operation and charging should be stopped. Releaser rules regulate the conditions under which the operations and the related charging processes are allowed to continue.

A user may define his own rules according to his "normal" behavior. Ope...