摘要:
A system for the authorization of wireless telephone communications establishes two sets of authorized telephone numbers. A first set of authorized telephone numbers are supplied by the customer, and the second set of authorized numbers are derived from customer bills paid by the customer. The system analyzes transmission characteristics from an unauthenticated cellular telephone and attempts to verify its authenticity based on the transmission characteristic by analyzing the transmission characteristic with respect to stored reference waveforms for the authentic wireless telephone. However, the results of this signature analysis if negative may be overridden if the telephone number dialed by the unauthenticated cellular telephone matches a telephone number in either the first or second sets of authorized telephone numbers. The system also includes a technique for modifying the reference waveforms to compensate for changes in the transmission characteristic. The system will only consider the inclusion of transmission characteristics from the present communication if the dialed digits for the present communication match one of the telephone numbers in either the first or second sets of authorized telephone numbers.
摘要:
A system and method for the detection of fraudulent use of a wireless telephone system includes a fingerprint analyzer that identifies an unauthenticated wireless telephone as authorized or fraudulent based on a fingerprint of the unauthenticated wireless telephone. The system maintains a valid destination list specific for each authorized wireless telephone. Each valid destination list contains destinations considered to be valid for that particular authorized wireless telephone. When an unauthenticated wireless telephone transmits a call request containing a destination, the system classifies the call as valid when the destination is in the valid destination list for the authorized wireless telephone regardless of whether the fingerprint analyzer identifies the unauthenticated wireless telephone as fraudulent. The system may bypass or terminate the fingerprint analysis, or simply ignore the result of the fingerprint analysis by the fingerprint analyzer. The system also maintains an invalid destination list specific for each authorized wireless telephone with destinations considered to be invalid for that particular authorized wireless telephone. Calls to such destinations are blocked. The system further maintains a suspicious destination list containing destinations considered to be potentially fraudulent. When the destination contained in the call request is in the suspicious destination list, the fingerprint analysis is performed with a higher threshold to require a closer match between a fingerprint of the unauthenticated wireless telephone and a stored fingerprint of the corresponding authorized wireless telephone.
摘要:
A method and apparatus which provide the ability to disrupt normal completion of a specific call made through a wireless telephone system. The specified call can be forced to be immediately ended, re-routed immediately to a selectable destination, or linked to a local voice frequency interface. The disruption of the call can occur at any point in time over the duration of the call. The decision to disrupt the call, as well as which action to take against the call, can be selected manually by a human or automatically through a standard data interface provided. The call disruption apparatus can be interfaced to the wireless system through a circuit physically connected to the wireless telephone system equipment, or through a modulated radio frequency interface.
摘要:
A method and system for actively and rapidly collecting reference waveforms from a large number of cellular telephones is provided. The reference waveforms are used to generate fingerprints which are used to distinguish between authorized cellular telephones and unauthorized cellular telephones. Initially, the system selects a cellular telephone whose reference waveform is desired. The selected cellular telephone is then sent a polling message such as a page or registration request. The cellular telephone receives the polling message and transmits a radio frequency (RF) signal containing a reference waveform that contains certain transmission characteristics unique to the selected cellular telephone. From the received RF signal, the reference waveform is extracted and stored. Preferably, the selected cellular telephone is polled repeatedly in order to receive a sufficiently large number of reference waveforms to be able to generate an accurate fingerprint. One method of polling the cellular telephone is by calling the selected cellular telephone through a cellular telephone system. Another method of polling the cellular telephone is by transmitting a control message such as a page, registration, audit or maintenance message.
摘要:
A system and method for collecting reference waveforms from authorized wireless telephones in a wireless telephone network. The collected reference waveforms are used by a fingerprint analyzer to distinguish telephone calls made by the authorized wireless telephone from telephone calls made by an unauthorized wireless telephone. The system maintains a pool of specially designated unassigned telephone numbers and selects one telephone number from the pool at random which is provided to a valid subscriber of an authorized wireless telephone. The randomly selected telephone number is to be called by the valid subscriber using the authorized cellular telephone for the purpose of collecting reference waveforms by the system. A radio frequency (RF) receiver of the system monitors and receives transmission signals from a plurality of wireless telephones. Each transmission signal contains a destination telephone number and an identification of its wireless telephone such as MIN/ESN identifiers. The system selects for purposes of collecting reference waveforms the transmission signal whose destination and wireless telephone identification respectively correspond to the randomly selected destination and the identification of the authorized wireless telephone. This ensures that that particular transmission signal belongs to the authorized wireless telephone of the valid subscriber rather than an unauthorized wireless telephone belonging to a pirate since the pirate has no way of knowing the randomly selected telephone number provided to the valid subscriber. The processor then extracts the reference waveform that represents a transmission characteristic of the authorized wireless telephone and stores the extracted reference waveform in memory for use by the fingerprint analyzer.
摘要:
Herein we describe crustacean fishing traps having degradable cull ring panels, as well as methods for ensuring that such traps have reduced functionality after becoming derelict. Derelict crab and lobster traps have a negative economic and ecological impact, and thus it is advantageous to use degradable traps that will lose their ability to catch and retain fish over time. Incorporating degradable cull ring panels into such traps provides an effective, economical solution. Suitable degradable cull ring panels are described herein.
摘要:
Herein we describe crustacean fishing traps having degradable cull panels, as well as methods for ensuring that such traps have reduced functionality after becoming derelict. Derelict crab and lobster traps have a negative economic and ecological impact, and thus it is advantageous to use crustacean fishing traps that will lose their ability to catch and retain fish over time. Incorporating degradable cull panels into such traps provides an effective, economical solution. Suitable degradable cull panels are described herein.
摘要:
Herein we describe crustacean fishing traps having degradable cull ring panels, as well as methods for ensuring that such traps have reduced functionality after becoming derelict. Derelict crab and lobster traps have a negative economic and ecological impact, and thus it is advantageous to use degradable traps that will lose their ability to catch and retain fish over time. Incorporating degradable cull ring panels into such traps provides an effective, economical solution. Suitable degradable cull ring panels are described herein.
摘要:
Cellular telephone rental system and method wherein a point-of-purchase rental terminal capturing transaction data, obtains validation thereof, and communicates same to a collector which in turn instructs a switching system to enable the cellular phone to make and receive calls. The collector examines in real time automatic message accounting data in the switching system and calculates call charges in real time. The collector then transmits call data to the rental terminal which provides both the rental agency and the cellular phone user call data in real time, with the call data also being transmitted to an account administration system nightly. Also disclosed is an embodiment for entering credit card data at the rental phone to enable use on credit billing and remote programming of such rental phone all over the voice responsive communication of the cellular system.
摘要:
Method and apparatus for collecting call detail, monitoring customer account balance for excessive charges, and controlling the capabilities of cellular subscriber stations on the cellular telephone switch in substantially real time is disclosed. A communication system co-located at a cellular MTSO is used to capture detailed call information by examining the switch's Automated Message Accounting data in real-time. Call records are parsed, rated for toll and air charges and stored in a database. A software system monitors the billing activity on the customer account for excessive charges. When excessive charges take place, a connection between the communication system and the cellular telephone switch control port allows commands to be issued directly from the communication system to the cellular telephone switch providing operational control of selected cellular telephones.