US20010053684A1 - Method and system for identifying an illegal terminal in a cellular radio system - Google Patents

Method and system for identifying an illegal terminal in a cellular radio system Download PDF

Info

Publication number
US20010053684A1
US20010053684A1 US09/167,460 US16746098A US2001053684A1 US 20010053684 A1 US20010053684 A1 US 20010053684A1 US 16746098 A US16746098 A US 16746098A US 2001053684 A1 US2001053684 A1 US 2001053684A1
Authority
US
United States
Prior art keywords
terminal
time
message
timer
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/167,460
Other versions
US6377791B2 (en
Inventor
Hannu Pirila
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Solutions and Networks Oy
Original Assignee
Nokia Mobile Phones Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Mobile Phones Ltd filed Critical Nokia Mobile Phones Ltd
Assigned to NOKIA MOBILE PHONES LTD. reassignment NOKIA MOBILE PHONES LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PIRILA, HANNU
Publication of US20010053684A1 publication Critical patent/US20010053684A1/en
Application granted granted Critical
Publication of US6377791B2 publication Critical patent/US6377791B2/en
Assigned to NOKIA SIEMENS NETWORKS OY reassignment NOKIA SIEMENS NETWORKS OY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA CORPORATION
Assigned to NOKIA SOLUTIONS AND NETWORKS OY reassignment NOKIA SOLUTIONS AND NETWORKS OY CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA SIEMENS NETWORKS OY
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity

Definitions

  • the object of the invention relates to how a cellular radio system is able to identify a terminal using a false identity.
  • IMEI International Mobile Equipment Identifier
  • IMSI International Mobile Subscriber Identifier
  • GSM Global System for Mobile telecommunications
  • a terminal in the GSM system is for short called MS (Mobile Station) and it comprises a SIM card (Subscriber Identity Module) intended to identify the user and the actual equipment, which is abbreviated ME (Mobile Equipment).
  • ME Mobile Equipment
  • Each ME has its own IMEI code which is permanently stored in the equipment and which is intended to act as an unambiguous identifier of the equipment.
  • the length of the IMEI code is 15 characters, and it comprises a Type Approval Code (TAC) of six characters, a Final Assembly Code (FAC) of two characters, the equipment serial number of six characters, and one spare character.
  • TAC Type Approval Code
  • FAC Final Assembly Code
  • the GSM system specifications GSM 02.16 and GSM 03.03 define how the IMEI code is used to identify the equipment part of the terminals.
  • the purpose is that both single cellular systems and certain registers common to different systems contain knowledge of which IMEI codes correspond to legally used equipment and which equipment must be denied service, either due to a illegal origin of the equipment or due to a fault typical to a specific equipment type.
  • the register containing operational information about the equipment is generally called EIR (Equipment Identity Register) and such registers can be located in a mutual hierarchy, so that an EIR register of a single cellular radio system is located on the lowest hierarchy level, and on a higher level there is an EIR register which the systems use in common.
  • GSM MoU GSM Memorandum of Understanding
  • CEIR Central EIR
  • a register of the EIR type contains three lists, which are the white list, the black list and the grey list.
  • the white list contains information about which IMEI codes correspond to equipment used legally, and the black list tells which IMEI codes correspond to “forbidden” equipment.
  • the grey list can be used as a transitional stage between the white list and the black list, if for instance a specific equipment type causes some interference in the network operation, but not so much that equipment of this type should be put directly on the black list.
  • the cellular radio system can check the IMEI code of terminals in radio connection with the base stations according to a certain routine defined in the system specifications.
  • the terminal responds by sending a so called RIL3-MM IDENTITY RESPONSE message, which contains the identifier requested by the system.
  • the system can transmit said message regularly, always at the beginning of an active operating period or RR session, but in practice this is made less frequently in order to reduce signalling requirements.
  • the IMEI code is generally not used to establish calls or to monitor user movements, because regarding the network operation and call charging it is more important to identify the user (or the subscription used by the user). For user identification it is possible to use the IMSI code given to the user, but in order to protect the user's privacy it is preferred to use the TMSI code (Temporary Mobile Subscriber Identifier), which is provided by a specific register in that part of the cellular radio system where the user is operating.
  • TMSI code Temporary Mobile Subscriber Identifier
  • a disadvantage of prior art methods is that they assume that at least one operator knows the IMEI code of an illegal user operating within the system. Due to the cloning method an illegal device can during operation use the IMEI code of a legal device. According to prior art it is impossible to identify the illegal terminals on the basis of the IMEI codes if the operator responsible for the system operation does not know which IMEI codes have been cloned from legal devices into illegal devices.
  • the object of the present invention is to present a method which is able to identify devices using a cloned IMEI code or a corresponding identifier.
  • An object of the invention is also to present a cellular radio system realising the method according to the invention.
  • the objects of the invention are attained by monitoring at how long intervals a terminal reports its IMEI code or corresponding identifier to a central of the cellular radio system. An exceptionally short report interval will reveal a cloned code.
  • the method according to the invention is characterised in that in this method a regularly transmitted message received from the terminal is attached to the code describing the terminal, and that the terminal is considered to be identified when the period between two successive messages of said kind attached to the describing code is shorter than a predetermined time-out.
  • An object of the invention is also a cellular radio system and a mobile telephone exchange which are characterised in that they are arranged to attach a regularly transmitted message, which is received from a terminal, to a code representing the terminal, and that they indicate such a terminal as an identified terminal, for which the period between two successive messages of said kind attached to the describing code is shorter than a predetermined time-out.
  • the terminals regularly report to the system their location in a certain location area.
  • the system is able to monitor how long time has passed since a specific terminal last time reported its location. If the location reports should arrive at regular intervals, and if a location report relating to an IMEI code or any other unambiguous identifier arrives earlier that expected, then said identifier is used by at least two devices.
  • the desired identification report is not automatically related to regular location reports, it is possible to add a feature according to which the system requests the terminal to present said identifier at least in connection with certain location reports.
  • the system can respond in many different ways when it has identified a specific terminal on the basis of a suspicious IMEI code or a corresponding identifier used by this terminal.
  • One possibility is to immediately bar said terminal from the service provided by the system, whereby a fraudulent user can get only a minimal profit with the illegal device. If the illegal terminal is able to receive text messages (SMS, Short Message Services), it is possible to send it a message, which tells the user why this device can not anymore be connected to the system.
  • SMS Short Message Services
  • Another alternative is to transmit information about a detected suspicious identifier to the terminal, and in this connection to request the device to be brought to an authorised service shop for control.
  • This message can include a time limit before which the control should be made so that the device would not be barred from services provided by the system.
  • a person skilled in the art can easily present more alternative actions.
  • the invention does not limit the manner in which the system should respond to the detection of a suspicious identifier.
  • FIG. 1 shows the regional division of a known cellular radio system
  • FIG. 2 shows the known databases of a cellular radio system
  • FIG. 3 shows a message exchange related to the invention
  • FIG. 4 shows another message exchange related to the invention
  • FIG. 5 shows a method according to the invention
  • FIG. 6 shows some parts of a mobile telephone exchange according to the invention.
  • FIG. 1 shows schematically the whole coverage area 100 of a specific public cellular radio system (PLMN, Public Land Mobile Network), which usually contains several Mobile services Switching Centres (MSC) 101 , 102 communicating with each other and Location Areas (LA) 103 , 104 , 105 and 106 arranged to belong to each MSC.
  • PLMN Public Land Mobile Network
  • MSC Mobile services Switching Centres
  • LA Location Areas
  • Each location area comprises one or more cells, where a cell means that geographical area in which a terminal can be in radio communication with a certain base station.
  • the cells and the base stations are not shown in FIG. 1.
  • a cellular radio system must know the location of a terminal at least in terms of location areas, so that it can direct the transmission of a paging message, corresponding to an incoming call, so that the terminal can receive it.
  • HLR Home Location Register
  • VLR Visitors Location Register
  • the HLR contains information about the subscriptions and information about in which region of the mobile telephone exchange each user stored in the HLR currently is operating or was last operating.
  • the users are identified by a subscriber identifier or IMSI, which on the terminal side is physically stored in the SIM card used by the user, and which thus is not related to the equipment part used by the user.
  • each mobile telephone exchange keeps a log on the location area of each user operating under the control of said mobile telephone exchange.
  • the user is identified by the TMSI or a temporary identifier, which comprises a Location Area Identifier (LAI) and a TIC code (TMSI code), which is unambiguous within the location area.
  • LAI Location Area Identifier
  • TMSI code TIC code
  • a message transmitted by the terminal which means that the user begins to operate in a certain location area, is called registration.
  • the registration and the location update utilise a similar message exchange between the terminal and the base station.
  • a location update occurs also if the system announces that, due any reason, a certain terminal is not known within that VLR under which it currently operates.
  • FIG. 2 shows also the EIR 203 , which the cellular radio system contains, and which, however, is not related to the mobility control of the terminal, but which relates to the monitoring of the equipment utilisation made on the basis on the IMEI codes as described above.
  • a terminal which is switched on will periodically transmit a message, in which it reports its location and which causes a location update at least in the VLR (in the HLR only if the terminal has moved into an area of a new mobile telephone exchange).
  • the time-out for a periodic location update, or the period between two messages relating to the location update is selectable by the operator within the limits of the specifications (minimum 6 minutes, maximum 24 hours).
  • the location data in the VLR (and also in the HLR) is updated in connection with a location report relating to a cell change causing a change of the location area (“cell reselection”), as well as always when the terminal transmits a so called IMSI ATTACH message.
  • the last mentioned message is transmitted for instance when the terminal registers into a certain cell when the terminal has been switched on.
  • each GSM terminal contains a timer called T3212, having a maximum value or a timing cycle (the period from reset to reaching the time-out value set in the timer), the length of which is determined by a message from the cellular system; the system instructs the scheduled period which must be used in the periodic location update.
  • the terminal initiates the periodic location update if and when the timer reaches its maximum value, i.e. when it reports to the terminal's control unit that the time has expired.
  • the timer activity is initiated always when the terminal is set in the so called idle state, whereby its location can be updated (“idle, updated”) or not updated (“idle, not updated”).
  • the timer is reset if any of the following conditions are met:
  • the terminal initiates any generically defined location update procedure or transmits an IMSI ATTACH message
  • the terminal receives a first MM message relating to a specific MM procedure (Mobility Management), or the ciphering mode setting is completed during MM connection establishment;
  • MM procedures mentioned in b) above are defined in specification GSM 04.08 paragraphs 4.3 (general MM procedures), 4.4 (specific MM procedures) and 4.5 (establishing and releasing an MM connection).
  • the invention relates to a perception, according to which also the cellular radio systems knows when each terminal has initiated its timer relating to the periodic location update or when it has reset its timer.
  • the idle state is always entered when an active transmission is terminated, or when the terminal is switched on and it has exchanged with a base station those messages which are required for registration.
  • the cellular radio system functions connected with the alternatives which represent timer reset and which were presented above are the following:
  • the base station receives from the terminal a message which represents the initiating of any generically defined location update function, or an IMSI ATTACH message;
  • the base station transmits to the terminal a first MM message relating to a specific MM procedure, or the ciphering mode setting is completed during establishment of the MM connection;
  • the base station has received from the terminal a response to a paging message and thereafter transmitted a message belonging to the protocol level 3, the message not being a RR message;
  • the base station receives a periodic location update transmitted by the terminal, whereby the update is triggered by the timer reaching its maximum value in the terminal (corresponds to a) above);
  • the system knows at which moment the timer relating to the periodic location update of each terminal was last reset and at which moment it should reach its maximum value.
  • the latter information is based on the fact that the system itself has instructed all terminals to use a certain timer maximum value.
  • the system can compare the moment of its arrival with the information about when the message from said terminal should have had arrived. If the message concerning the periodic location update arrives substantially earlier than it should, it is transmitted by another terminal using the same identifier code as the terminal which transmitted the previous message concerning the periodic location update.
  • the location update in itself will not always directly refer to the terminal's IMEI code, but below is description about how an IMEI code check can be combined with location updates.
  • FIG. 3 shows the timing of functions in a terminal 300 (here a GSM mobile phone) concerning the periodic location update.
  • a terminal 300 here a GSM mobile phone
  • the time proceeds from top to bottom, and the horizontal arrows represent radio messages between the terminal and the base stations as well as messages between the base stations and a certain register containing equipment data.
  • the base station is only a message intermediary between the radio interface and the other stationary parts of the system, and it does not actively participate in the message processing, so the figure has to be construed so that the base stations generally represent the stationary parts of a cellular radio system.
  • the register called EIR in the figure could also be any other information processing and storing device.
  • step 301 the mobile phone is switched on, whereby it registers in the location area represented by the base station 302 and enters then the idle state. Because the registration is accompanied by an IMSI ATTACH message causing the location update, the timer 303 in the mobile phone is reset and it starts to count the time to the transmit moment of the next message representing the periodic location update.
  • the circles represent periods when the timer 303 is active, and the black lines perpendicular to the line of circles represent moments when the timer 303 is reset. The figure is based on the assumption that the maximum value of the timer 303 corresponds to ten circles.
  • state 304 the user makes a call which causes a transition from the idle state into the active state, whereby the activity of the timer 303 is temporarily interrupted, but it is not reset.
  • the invention is as well applicable to such systems in which a call made by the user causes the timer to be reset.
  • the establishment and release of a call can include a plurality of messages, but for the sake of clarity the figure presents only the so called CC SETUP message transmitted by the mobile phone in relation to the call establishment and the so called CC RELEASE COMPLETE message originating in the mobile telephone exchange and transmitted via the base station in relation to the release of the call. Other signalling concerning the call is not relevant to the invention, and therefore it is not shown in FIG. 3.
  • state 305 the call is terminated, the mobile phone 300 enters again the idle state and the activity of the timer 303 is continued from where it was interrupted in state 304 .
  • state 306 the timer 303 reaches its maximum value, whereby the mobile phone 300 transmits a RIL3-MM LOCATION UPDATE REQUEST message concerning the periodic location update and the timer 303 is reset.
  • the next time can reach its maximum value there is in state 307 .
  • a cell reselection includes a plurality of messages, but for simplicity this is indicated only by one arrow in the figure.
  • the cell reselection includes a location information update, at least when the location area is simultaneously changed, whereby the timer 303 is reset.
  • the mobile phone 300 answers a paging message representing an incoming call, and immediately thereafter it receives a first message of level 3, which is not an RR message, so the timer is again reset before it can reach its maximum value.
  • the mobile phone is in the active state, i.e. the timer 303 is stopped.
  • the timer again resumes its activity and in state 311 it reaches its maximum value, whereby the mobile phone 300 again transmits the RIL3-MM LOCATION UPDATE REQUEST message concerning the periodic location update.
  • the same procedure is repeated in state 312 because between the states 311 - 312 there is no location update nor events requiring the timer 303 to be reset.
  • the cellular radio system's EIR register 313 or a corresponding register in the cellular radio system stores information about the reception moment of the RIL3-MM LOCATION UPDATE REQUEST relating to each periodic location update transmitted by the mobile phone 300 , and also information about whether other events have occurred since the previous RIL3-MM LOCATION UPDATE REQUEST message which would have caused the timer 303 to be reset.
  • the reception moments of the successive messages relating to the periodic location update differ by that amount of time which is instructed to be used in the system as the maximum value for the timer, which controls the periodic location update, then the timing is normal for the concerned terminal.
  • the right hand side of FIG. 3 shows messages which the base stations transmit to the EIR 313 or to the corresponding register in order to generate information about when a message relating to the next periodic location update can be expected from the terminal.
  • FIG. 3 shows that the periodic location update caused by the timer 303 reaching its maximum value will not occur regularly, because the timer can be stopped for a indeterminate time, or it can be reset before it reaches its maximum value.
  • the cellular radio system is able to calculate when the next periodic location update occurs which is caused by the timer reaching its maximum value, because the stopping of the timer and its restart, as well as a timer reset, are related (except for switching off the terminal) to events when the terminal communicates in a certain manner with a base station.
  • the figure shows circles also on the side of the vertical line representing the EIR, even though the EIR does not have a separate timer for each terminal, but the EIR only stores the arrival moments of the different messages and uses them to calculate the lengths of the periods.
  • the EIR 313 performs no checks in states 306 ′ and 311 ′, because in states 304 ′, 305 ′, 307 ′, 309 ′ and 310 ′ it received messages, according to which the terminal's 300 timer 303 was stopped or reset due to other reasons, but in state 312 ′ it checks whether the time elapsed between states 311 ′ and 312 ′ equals the time-out, which in the system was defined as the period between two successive periodic location updates.
  • FIG. 3 does not show a situation where the period between two successive messages representing periodic location updates would be longer than the time-out used in the system. However, such a situation could be the result when the terminal occasionally moves into a shadow region and its timer tries to trigger a periodic location update when there is no connection to a base station.
  • FIG. 4 shows a situation where two terminals 401 and 402 having the same IMEI code operate in the area of the same cellular radio system.
  • the terminals can operate anywhere within the region of the cellular radio system.
  • the periodic location update in the terminal 401 is controlled by the timer 403 and in the terminal 402 by the timer 404 .
  • the terminal 401 is switched on in state 405 , whereby it registers in the location area represented by the base station 420 , and the timer 403 is started.
  • the terminal 401 is engaged in a call, during which the timer 403 is stopped.
  • the timer 403 In the states 408 , 409 , 410 and 411 the timer 403 reaches its maximum value, whereby it is reset and the terminal 401 transmits the RIL3-MM LOCATION UPDATE REQUEST message representing a periodic location update.
  • the terminal 402 is switched on in state 412 , whereby it registers in the location area represented by the base station 421 , and the timer 404 is started. In states 413 , 414 , 417 and 418 the timer 404 reaches its maximum value, whereby it is reset and the terminal 402 transmits the RIL3-MM LOCATION UPDATE REQUEST representing a periodic location update. Between the states 415 and 416 the terminal 402 is engaged in a call, during which the timer 404 is stopped.
  • the first state in FIG. 4 where the EIR 422 can check the timing is state 408 ′, where it receives information about the RIL3-MM LOCATION UPDATE REQUEST message transmitted by the terminal 401 .
  • the EIR 422 does not yet know that there are two terminals with the same IMEI code operating in the cellular radio system, so it acts as if all messages shown in the figure would relate to the same terminal and thus to the same timer.
  • the total time which is obtained by summing the period between the states 412 ′ and 406 ′ and the period between the states 407 ′ and 408 ′ is substantially shorter than the time-out set as the maximum value for the timer.
  • the same observations can be made at all states where the EIR 422 checks the timing (states 413 ′, 409 ′, 414 ′, 410 ′, 417 ′, 411 ′ and 418 ′).
  • the time from the previous reset, reduced with any periods corresponding to the terminal's timer being stopped, is always shorter than the maximum time set in the timer.
  • Such check points are the states 413 ′, 414 ′, 417 ′, 411 ′ and 418 ′ in FIG. 4. At all these states we can see that the time which elapsed from the moment when the terminal's timer reached its maximum value to the moment when it triggered the periodic location update is shorter than the maximum time set for the timers of the terminals.
  • the EIR may receive several successive messages representing a timer stopping without any messages between them representing a timer starting.
  • the EIR can also react to messages not being in a mutual logical order, and generate an announcement, in which an identifier causing this reaction will be indicated as a suspicious identifier.
  • a cellular radio system does not necessarily require that the messages relating to the location update should refer to a specific IMEI code or more generally to that identifier which presently is the object of interest.
  • the location update defined in the specifications occurs only on the basis of the TMSI and IMSI codes describing the user (or in fact, the subscription available to the user).
  • the system operation requires some changes in order to be able to utilize the periodic location update in a manner according to the invention in order to detect cloned IMEI codes.
  • FIG. 5 shows schematically one alternative to arrange in a manner according to the invention the operation of the cellular radio system and the EIR or a corresponding register connected to the system.
  • the system reserves two memory locations for each monitored terminal, which can store time data, and which are called memory locations 0 and 1. Further it is assumed in the figure that the system will check the timing relating to a periodic location update only when two messages have arrived from the terminal relating to the periodic location update without any events between these messages that would have caused the timer to be stopped or premature reset of the timer.
  • state 501 a certain terminal is registered in the system, either because it is switched on or because it moves in from another part of the system or from a completely different system.
  • the timer controlling the periodic location update in the terminal is reset in connection with the registration, so as a response to the registration the system stores in its memory the registration time.
  • the time indication is stored in the memory location 0.
  • the variable M indicating the next memory location is given the value 1, so that next time the data will be stored in the memory location 1.
  • state 502 the system requests the terminal to disclose its equipment identifier; in the GSM system this is made by transmitting the RIL3-MM IDENTITY REQUEST message, in which a value representing the IMEI code is put into the Identity Type field representing the requested identifier.
  • the terminal has disclosed the required equipment identifier the system stores it in state 503 , so that it later can check when a terminal using a certain equipment identifier has registered.
  • the variable T is given the value “true”, which means that it is possible to carry out a check based on the stored time indications. Then the system proceeds to the idle state 504 regarding the monitoring of the equipment identifier and the location updates.
  • the system If the system according to the state 505 detects a call or an MM procedure concerning said terminal which is not a location update, then the system will give the value “false” to the variable T in state 506 , because the detected call or MM procedure means that the terminal's timer has been stopped and/or reset.
  • the state 506 is followed by a return to the idle state 504 .
  • the system When the system is in the idle state and detects according to state 507 that the terminal has transmitted a RIL3-MM LOCATION UPDATE REQUEST message, then it first will check, in state 508 , whether this is a message representing a periodic location update.
  • the Location Updating Type field included in the message this is shown by the Location Updating Type field included in the message; the value “01” formed by the bits 2 and 1 of the field's first octet represents a periodic location update. If the message concerns something else then the value of the variable T is set to “false” in state 506 , because the terminal's timer is reset, and then there is a return to state 504 . If the message concerns a periodic location update, then the system in state 509 transmits to the terminal a new request to disclose its equipment identifier and checks that the equipment identifier is the same as the system has stored earlier. If the equipment identifier is not the same, then there has occurred an error somewhere. State 510 represents an action known per se in an error situation.
  • the equipment identifier checked in the state 509 is the same, whereby in state 511 the system stores the time indication corresponding to the periodic location update in that memory location which is indicated by the value of the variable M.
  • the calculation formula also presented in the state 511 means only that if the value of the variable M until now has been 0, then it gets the value 1, and if it until now has been 1, then it gets the value 0.
  • the value of the variable T is checked. If its value is “true”, then there has been no stop or premature reset of the terminal's timer since the previous storing operation.
  • the system in state 513 checks whether the difference between the time indications stored in the memory locations 0 and 1 is possibly smaller than the time-out set for the periodic location update, and if so, then according to state 514 the concerned equipment identifier can be marked as suspicious. If the difference between the time indications was acceptably close to the set time-out, then the process returns to the state 504 .
  • a difference between the time indications which is as long as the set time-out can be considered acceptable considering the possibility of such timing errors between different devices, which are defined in the specification regarding acceptable timing errors in the system.
  • a loss of the communication link causes actions known per se, with which the system controls that its resources are not unnecessarily reserved for terminals which have moved away.
  • the method presented in FIG. 5 is of course only one example of how the inventive idea can be realised.
  • An easy change of the method presented in FIG. 5 is to replace the check in state 513 with a more general check, where it is studied whether the time difference of the time indications on the whole is different from the given time-out.
  • the method can be programmed as a program run in a computer, whereby it is most preferably run in the same equipment, which according to the prior art specifications generates and transmits the equipment identifier requests to the terminals and processes the equipment identifiers transmitted as responses from the terminals as well as the messages with which a terminal updates its location.
  • this equipment is the mobile telephone exchange, where the VLR operates as the memory location for the location information.
  • FIG. 6 shows schematically those parts of a mobile telephone exchange which are essential when the invention is applied in a typical digital cellular radio system.
  • the mobile telephone exchange 600 contains a transmission system interface unit 601 , which transmits telecommunication between the mobile telephone exchange 600 and the transmission system (the transmission system connects the mobile telephone exchange to the base stations via the base station controllers which control the base stations). Further the mobile telephone exchange 600 comprises a central processing unit 602 , which generates the contents of the transmitted messages and which decomposes the received messages.
  • the memory 603 contains the required memory locations, which store the equipment identifiers of registered terminals and the time indications relating to the registrations and periodic location updates. The instructions representing the execution of the method according to the invention are also stored in the memory 603 .
  • the central processing unit 602 performs the required calculations and comparisons on the basis of the stored time indications, and when required it supplies messages about an equipment suspicious identifiers via the line 604 , either to the EIR or some other device, through which an operator responsible for the system operation monitors the utilization of terminals in the system.
  • the invention can also be applied so that it detects terminals which operate in different systems and which use the same IMEI code or a corresponding identifier. Then the mobile telephone exchanges according to FIG. 6, or any other system equipment operating in the same manner, transmit as such to a central register the equipment identifiers, which they have stored, and the time indications relating to the messages representing the periodic location updates and which have arrived at correct intervals, whereby the central register accumulates data from several systems. Then the central register has a record for each stored IMEI code, whereby the time indications transmitted by the different systems are stored in these records. The central register can check whether a certain IMEI code has been used in two different systems simultaneously. Already this will indicate a cloned IMEI code.
  • the central register has information also about which time-out each system uses for the periodic location update, then it can calculate on the basis of each record and said time-outs whether the entries have been caused by one or more terminals.
  • the memory space required by the invention is rather small, because in the most preferred case only the equipment identifier, two time indications, and the value of two variables must be stored for each monitored terminal. Further, the required processing time is minimal.
  • the immense amount of source material requires substantial computer runs in an alternative method which stores the IMEI and IMSI codes appearing in pairs and which compares all stored pairs with each other in order to find such IMEI codes which are related to the occurrence of several IMSI codes. Further this alternative embodiment generates false indications, because it is quite legal, and indeed quite common, that several users use the same equipment part but each user has his own SIM card.
  • the IMEI code was preferred as the code that is used to detect fraudulent users.
  • the occurrence of IMSI codes in specific messages which the terminals should send with predetemined intervals could be used to detect forged subscriber identities.

Abstract

A cellular radio system comprises terminals (401, 402) arranged to transmit a specific message of a predetermined form at least two times (408, 409; 413, 414), so that there is a predetermined time-out between the two successive messages of said form. A message of said form, which is received from a terminal, is attached (503, 507, 509) to a code representing the terminal in order to identify an illegal terminal. Such a terminal is regarded as identified (513, 514) for which the time between the reception of the two successive messages of said form attached to the code representing the terminal is shorter than said time-out.

Description

    TECHNOLOGICAL FIELD
  • The object of the invention relates to how a cellular radio system is able to identify a terminal using a false identity. [0001]
  • BACKGROUND OF THE INVENTION
  • In cellular radio systems there are known different identifiers with which the system is able to identify a specific user or a specific terminal. This patent application treats as examples particularly the IMEI code (International Mobile Equipment Identifier) used to identify the equipment part of the terminal, the IMSI code (International Mobile Subscriber Identifier) and the GSM cellular radio system (Global System for Mobile telecommunications). A terminal in the GSM system is for short called MS (Mobile Station) and it comprises a SIM card (Subscriber Identity Module) intended to identify the user and the actual equipment, which is abbreviated ME (Mobile Equipment). Each ME has its own IMEI code which is permanently stored in the equipment and which is intended to act as an unambiguous identifier of the equipment. The length of the IMEI code is 15 characters, and it comprises a Type Approval Code (TAC) of six characters, a Final Assembly Code (FAC) of two characters, the equipment serial number of six characters, and one spare character. [0002]
  • The GSM system specifications GSM 02.16 and GSM 03.03 define how the IMEI code is used to identify the equipment part of the terminals. The purpose is that both single cellular systems and certain registers common to different systems contain knowledge of which IMEI codes correspond to legally used equipment and which equipment must be denied service, either due to a illegal origin of the equipment or due to a fault typical to a specific equipment type. The register containing operational information about the equipment is generally called EIR (Equipment Identity Register) and such registers can be located in a mutual hierarchy, so that an EIR register of a single cellular radio system is located on the lowest hierarchy level, and on a higher level there is an EIR register which the systems use in common. The co-operation body GSM MoU (GSM Memorandum of Understanding) founded by GSM operators has developed a central register known as CEIR (Central EIR). In order to group equipment into legal and illegal equipment a register of the EIR type contains three lists, which are the white list, the black list and the grey list. The white list contains information about which IMEI codes correspond to equipment used legally, and the black list tells which IMEI codes correspond to “forbidden” equipment. The grey list can be used as a transitional stage between the white list and the black list, if for instance a specific equipment type causes some interference in the network operation, but not so much that equipment of this type should be put directly on the black list. [0003]
  • However, the cloning of IMEI codes has become a problem. Even if the aim has been to make IMEI code falsification difficult, it has turned out that dishonest quarters can copy an IMEI code from one device to another. In a typical case the IMEI code of a legal device is copied or “cloned” into a device which is stolen or can otherwise be considered illegal, whereby the illegal device can be used so that its use can not be prevented by the system. A GSM mobile phone can also call certain emergency numbers without a SIM card, whereby a dishonest user by changing the IMEI code can ensure that it is not possible to prevent or trace malicious emergency calls which he makes. [0004]
  • The cellular radio system can check the IMEI code of terminals in radio connection with the base stations according to a certain routine defined in the system specifications. In the GSM system there is defined a so called RIL3-MM IDENTITY REQUEST message (RIL3=Radio Interface Layer 3; MM=Mobility Management), and by sending this message the system can request the terminal to present its IMEI code or another corresponding identifier. The terminal responds by sending a so called RIL3-MM IDENTITY RESPONSE message, which contains the identifier requested by the system. In principle the system can transmit said message regularly, always at the beginning of an active operating period or RR session, but in practice this is made less frequently in order to reduce signalling requirements. The IMEI code is generally not used to establish calls or to monitor user movements, because regarding the network operation and call charging it is more important to identify the user (or the subscription used by the user). For user identification it is possible to use the IMSI code given to the user, but in order to protect the user's privacy it is preferred to use the TMSI code (Temporary Mobile Subscriber Identifier), which is provided by a specific register in that part of the cellular radio system where the user is operating. [0005]
  • A disadvantage of prior art methods is that they assume that at least one operator knows the IMEI code of an illegal user operating within the system. Due to the cloning method an illegal device can during operation use the IMEI code of a legal device. According to prior art it is impossible to identify the illegal terminals on the basis of the IMEI codes if the operator responsible for the system operation does not know which IMEI codes have been cloned from legal devices into illegal devices. [0006]
  • SUMMARY OF THE INVENTION
  • The object of the present invention is to present a method which is able to identify devices using a cloned IMEI code or a corresponding identifier. An object of the invention is also to present a cellular radio system realising the method according to the invention. [0007]
  • The objects of the invention are attained by monitoring at how long intervals a terminal reports its IMEI code or corresponding identifier to a central of the cellular radio system. An exceptionally short report interval will reveal a cloned code. [0008]
  • The method according to the invention is characterised in that in this method a regularly transmitted message received from the terminal is attached to the code describing the terminal, and that the terminal is considered to be identified when the period between two successive messages of said kind attached to the describing code is shorter than a predetermined time-out. [0009]
  • An object of the invention is also a cellular radio system and a mobile telephone exchange which are characterised in that they are arranged to attach a regularly transmitted message, which is received from a terminal, to a code representing the terminal, and that they indicate such a terminal as an identified terminal, for which the period between two successive messages of said kind attached to the describing code is shorter than a predetermined time-out. [0010]
  • In cellular systems there is known a method where the terminals regularly report to the system their location in a certain location area. According to the invention the system is able to monitor how long time has passed since a specific terminal last time reported its location. If the location reports should arrive at regular intervals, and if a location report relating to an IMEI code or any other unambiguous identifier arrives earlier that expected, then said identifier is used by at least two devices. In systems where the desired identification report is not automatically related to regular location reports, it is possible to add a feature according to which the system requests the terminal to present said identifier at least in connection with certain location reports. [0011]
  • The system can respond in many different ways when it has identified a specific terminal on the basis of a suspicious IMEI code or a corresponding identifier used by this terminal. One possibility is to immediately bar said terminal from the service provided by the system, whereby a fraudulent user can get only a minimal profit with the illegal device. If the illegal terminal is able to receive text messages (SMS, Short Message Services), it is possible to send it a message, which tells the user why this device can not anymore be connected to the system. Another alternative is to transmit information about a detected suspicious identifier to the terminal, and in this connection to request the device to be brought to an authorised service shop for control. This message can include a time limit before which the control should be made so that the device would not be barred from services provided by the system. A person skilled in the art can easily present more alternative actions. The invention does not limit the manner in which the system should respond to the detection of a suspicious identifier.[0012]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Below the invention is described in more detail with reference to preferred embodiments presented as examples and to the enclosed figures, in which [0013]
  • FIG. 1 shows the regional division of a known cellular radio system; [0014]
  • FIG. 2 shows the known databases of a cellular radio system; [0015]
  • FIG. 3 shows a message exchange related to the invention; [0016]
  • FIG. 4 shows another message exchange related to the invention; [0017]
  • FIG. 5 shows a method according to the invention; and [0018]
  • FIG. 6 shows some parts of a mobile telephone exchange according to the invention. [0019]
  • DETAILED DESCRIPTION OF THE INVENTION
  • In order to facilitate the understanding of the invention we first describe the location update method known per se used in the GSM system, whereby the messages between a base station and the terminals related to the method are described in more detail in the specification GSM 04.08. FIG. 1 shows schematically the [0020] whole coverage area 100 of a specific public cellular radio system (PLMN, Public Land Mobile Network), which usually contains several Mobile services Switching Centres (MSC) 101, 102 communicating with each other and Location Areas (LA) 103, 104, 105 and 106 arranged to belong to each MSC. Each location area comprises one or more cells, where a cell means that geographical area in which a terminal can be in radio communication with a certain base station. For the sake of simplicity the cells and the base stations are not shown in FIG. 1.
  • A cellular radio system must know the location of a terminal at least in terms of location areas, so that it can direct the transmission of a paging message, corresponding to an incoming call, so that the terminal can receive it. In connection with each [0021] mobile telephone exchange 101, or available to the exchange, there are two databases, the Home Location Register (HLR) 201 and the Visitors Location Register (VLR) 202. Of these the HLR contains information about the subscriptions and information about in which region of the mobile telephone exchange each user stored in the HLR currently is operating or was last operating. In the HLR the users are identified by a subscriber identifier or IMSI, which on the terminal side is physically stored in the SIM card used by the user, and which thus is not related to the equipment part used by the user. With the aid of the VLR each mobile telephone exchange keeps a log on the location area of each user operating under the control of said mobile telephone exchange. In the location areas belonging to a VLR the user is identified by the TMSI or a temporary identifier, which comprises a Location Area Identifier (LAI) and a TIC code (TMSI code), which is unambiguous within the location area. The TMSI given as a temporary identifier to a certain user is changed always when the user changes location area.
  • A message transmitted by the terminal, which means that the user begins to operate in a certain location area, is called registration. A message, which is transmitted by a registered terminal and which indicates in which location area this terminal is located, is called Location Update. The registration and the location update utilise a similar message exchange between the terminal and the base station. A location update occurs also if the system announces that, due any reason, a certain terminal is not known within that VLR under which it currently operates. FIG. 2 shows also the [0022] EIR 203, which the cellular radio system contains, and which, however, is not related to the mobility control of the terminal, but which relates to the monitoring of the equipment utilisation made on the basis on the IMEI codes as described above.
  • Due to an equipment failure or a corresponding emergency situation the information in the HLR or VLR can be destroyed completely or partially. On the other hand, the user can switch off his terminal or move outside the system's coverage area, whereby old location data will be useless and only occupy space in the database. For these cases it is advisable to check from time to time whether the location data stored in the databases are correct. In the GSM system the check is performed in the form of a periodic location update in a manner defined in the system's technical specifications GSM 03.12, GSM 03.22, GSM 04.08 and GSM 05.08. A terminal which is switched on will periodically transmit a message, in which it reports its location and which causes a location update at least in the VLR (in the HLR only if the terminal has moved into an area of a new mobile telephone exchange). The time-out for a periodic location update, or the period between two messages relating to the location update, is selectable by the operator within the limits of the specifications (minimum 6 minutes, maximum 24 hours). In addition to the periodic location update the location data in the VLR (and also in the HLR) is updated in connection with a location report relating to a cell change causing a change of the location area (“cell reselection”), as well as always when the terminal transmits a so called IMSI ATTACH message. The last mentioned message is transmitted for instance when the terminal registers into a certain cell when the terminal has been switched on. [0023]
  • In order to schedule the periodic location update each GSM terminal, according to the specification GSM 04.08, paragraph 4.4.2, contains a timer called T3212, having a maximum value or a timing cycle (the period from reset to reaching the time-out value set in the timer), the length of which is determined by a message from the cellular system; the system instructs the scheduled period which must be used in the periodic location update. The terminal initiates the periodic location update if and when the timer reaches its maximum value, i.e. when it reports to the terminal's control unit that the time has expired. The timer activity is initiated always when the terminal is set in the so called idle state, whereby its location can be updated (“idle, updated”) or not updated (“idle, not updated”). The timer is reset if any of the following conditions are met: [0024]
  • a) the terminal initiates any generically defined location update procedure or transmits an IMSI ATTACH message; [0025]
  • b) the terminal receives a first MM message relating to a specific MM procedure (Mobility Management), or the ciphering mode setting is completed during MM connection establishment; [0026]
  • c) the terminal has responded to a paging message and thereafter correctly received a message belonging to the protocol level 3, the message not being a RR message (Radio Resource management); [0027]
  • d) the timer reaches its maximum value; or [0028]
  • e) the terminal is switched off, or its SIM card is removed. [0029]
  • The MM procedures mentioned in b) above are defined in specification GSM 04.08 paragraphs 4.3 (general MM procedures), 4.4 (specific MM procedures) and 4.5 (establishing and releasing an MM connection). [0030]
  • The invention relates to a perception, according to which also the cellular radio systems knows when each terminal has initiated its timer relating to the periodic location update or when it has reset its timer. The idle state is always entered when an active transmission is terminated, or when the terminal is switched on and it has exchanged with a base station those messages which are required for registration. The cellular radio system functions connected with the alternatives which represent timer reset and which were presented above are the following: [0031]
  • a) the base station receives from the terminal a message which represents the initiating of any generically defined location update function, or an IMSI ATTACH message; [0032]
  • b) the base station transmits to the terminal a first MM message relating to a specific MM procedure, or the ciphering mode setting is completed during establishment of the MM connection; [0033]
  • c) the base station has received from the terminal a response to a paging message and thereafter transmitted a message belonging to the protocol level 3, the message not being a RR message; [0034]
  • d) the base station receives a periodic location update transmitted by the terminal, whereby the update is triggered by the timer reaching its maximum value in the terminal (corresponds to a) above); [0035]
  • e) the connection to the terminal is lost. [0036]
  • Thus the system knows at which moment the timer relating to the periodic location update of each terminal was last reset and at which moment it should reach its maximum value. The latter information is based on the fact that the system itself has instructed all terminals to use a certain timer maximum value. When a message concerning the periodic location update is received from a terminal the system can compare the moment of its arrival with the information about when the message from said terminal should have had arrived. If the message concerning the periodic location update arrives substantially earlier than it should, it is transmitted by another terminal using the same identifier code as the terminal which transmitted the previous message concerning the periodic location update. The location update in itself will not always directly refer to the terminal's IMEI code, but below is description about how an IMEI code check can be combined with location updates. [0037]
  • FIG. 3 shows the timing of functions in a terminal [0038] 300 (here a GSM mobile phone) concerning the periodic location update. In the figure the time proceeds from top to bottom, and the horizontal arrows represent radio messages between the terminal and the base stations as well as messages between the base stations and a certain register containing equipment data. Regarding the most messages shown in the figure the base station is only a message intermediary between the radio interface and the other stationary parts of the system, and it does not actively participate in the message processing, so the figure has to be construed so that the base stations generally represent the stationary parts of a cellular radio system. The register called EIR in the figure could also be any other information processing and storing device.
  • In [0039] step 301 the mobile phone is switched on, whereby it registers in the location area represented by the base station 302 and enters then the idle state. Because the registration is accompanied by an IMSI ATTACH message causing the location update, the timer 303 in the mobile phone is reset and it starts to count the time to the transmit moment of the next message representing the periodic location update. In the left part of the figure the circles represent periods when the timer 303 is active, and the black lines perpendicular to the line of circles represent moments when the timer 303 is reset. The figure is based on the assumption that the maximum value of the timer 303 corresponds to ten circles. In state 304 the user makes a call which causes a transition from the idle state into the active state, whereby the activity of the timer 303 is temporarily interrupted, but it is not reset. The invention is as well applicable to such systems in which a call made by the user causes the timer to be reset. The establishment and release of a call can include a plurality of messages, but for the sake of clarity the figure presents only the so called CC SETUP message transmitted by the mobile phone in relation to the call establishment and the so called CC RELEASE COMPLETE message originating in the mobile telephone exchange and transmitted via the base station in relation to the release of the call. Other signalling concerning the call is not relevant to the invention, and therefore it is not shown in FIG. 3. In state 305 the call is terminated, the mobile phone 300 enters again the idle state and the activity of the timer 303 is continued from where it was interrupted in state 304.
  • In [0040] state 306 the timer 303 reaches its maximum value, whereby the mobile phone 300 transmits a RIL3-MM LOCATION UPDATE REQUEST message concerning the periodic location update and the timer 303 is reset. Before the timer 303 the next time can reach its maximum value there is in state 307 a cell reselection to the cell of the base station 308. A cell reselection includes a plurality of messages, but for simplicity this is indicated only by one arrow in the figure. The cell reselection includes a location information update, at least when the location area is simultaneously changed, whereby the timer 303 is reset. In state 309 the mobile phone 300 answers a paging message representing an incoming call, and immediately thereafter it receives a first message of level 3, which is not an RR message, so the timer is again reset before it can reach its maximum value. During a call initiated by the answer to a paging message the mobile phone is in the active state, i.e. the timer 303 is stopped. When the call is terminated in state 310 the timer again resumes its activity and in state 311 it reaches its maximum value, whereby the mobile phone 300 again transmits the RIL3-MM LOCATION UPDATE REQUEST message concerning the periodic location update. The same procedure is repeated in state 312 because between the states 311-312 there is no location update nor events requiring the timer 303 to be reset.
  • According to the invention it can be arranged so that the cellular radio system's EIR register [0041] 313 or a corresponding register in the cellular radio system stores information about the reception moment of the RIL3-MM LOCATION UPDATE REQUEST relating to each periodic location update transmitted by the mobile phone 300, and also information about whether other events have occurred since the previous RIL3-MM LOCATION UPDATE REQUEST message which would have caused the timer 303 to be reset. As long as the reception moments of the successive messages relating to the periodic location update differ by that amount of time which is instructed to be used in the system as the maximum value for the timer, which controls the periodic location update, then the timing is normal for the concerned terminal.
  • The right hand side of FIG. 3 shows messages which the base stations transmit to the [0042] EIR 313 or to the corresponding register in order to generate information about when a message relating to the next periodic location update can be expected from the terminal. The messages marked by the identifier “=0” indicate that the terminal 300 has performed an action which caused the timer 303 to be reset. If the identifier is “=0(T)”, then the message means that the timer 303 reset was caused as the timer reached its maximum value and triggered the periodic location update. The identifier “=STOP” means that the terminal 300 has made something that caused the timer 303 to be stopped, and the identifier “≠STOP” means that the timer 303 was restarted.
  • FIG. 3 shows that the periodic location update caused by the [0043] timer 303 reaching its maximum value will not occur regularly, because the timer can be stopped for a indeterminate time, or it can be reset before it reaches its maximum value. However, the cellular radio system is able to calculate when the next periodic location update occurs which is caused by the timer reaching its maximum value, because the stopping of the timer and its restart, as well as a timer reset, are related (except for switching off the terminal) to events when the terminal communicates in a certain manner with a base station.
  • For instance, in [0044] state 306′ the EIR 313 shown in the figure can check how long time has elapsed since it received the last “=0” message (state 301′) relating to the terminal 300, and how large part of the elapsed time belongs to the period between the messages “=STOP” and “≠STOP” (states 304′ and 305′) representing a stopped timer. In order to facilitate the comparison the figure shows circles also on the side of the vertical line representing the EIR, even though the EIR does not have a separate timer for each terminal, but the EIR only stores the arrival moments of the different messages and uses them to calculate the lengths of the periods. From these data the EIR 313 can calculate whether the timer 303 has triggered the periodic location update at the correct moment. Another possibility is that the EIR 313 processes only such situations where no other messages relating to the terminal 300 have arrived between two successive “=0(T)” messages. In FIG. 3 this means that the EIR 313 performs no checks in states 306′ and 311′, because in states 304′, 305′, 307′, 309′ and 310′ it received messages, according to which the terminal's 300 timer 303 was stopped or reset due to other reasons, but in state 312′ it checks whether the time elapsed between states 311′ and 312′ equals the time-out, which in the system was defined as the period between two successive periodic location updates.
  • The FIG. 3 does not show a situation where the period between two successive messages representing periodic location updates would be longer than the time-out used in the system. However, such a situation could be the result when the terminal occasionally moves into a shadow region and its timer tries to trigger a periodic location update when there is no connection to a base station. [0045]
  • FIG. 4 shows a situation where two [0046] terminals 401 and 402 having the same IMEI code operate in the area of the same cellular radio system. The terminals can operate anywhere within the region of the cellular radio system. The periodic location update in the terminal 401 is controlled by the timer 403 and in the terminal 402 by the timer 404. The terminal 401 is switched on in state 405, whereby it registers in the location area represented by the base station 420, and the timer 403 is started. Between the states 406 and 407 the terminal 401 is engaged in a call, during which the timer 403 is stopped. In the states 408, 409, 410 and 411 the timer 403 reaches its maximum value, whereby it is reset and the terminal 401 transmits the RIL3-MM LOCATION UPDATE REQUEST message representing a periodic location update.
  • The [0047] terminal 402 is switched on in state 412, whereby it registers in the location area represented by the base station 421, and the timer 404 is started. In states 413, 414, 417 and 418 the timer 404 reaches its maximum value, whereby it is reset and the terminal 402 transmits the RIL3-MM LOCATION UPDATE REQUEST representing a periodic location update. Between the states 415 and 416 the terminal 402 is engaged in a call, during which the timer 404 is stopped.
  • Let's first assume that the [0048] EIR 422 checks the timing relating to the periodic location update always when it receives a message of the “=0(T)” type, in other words always when the location update relates to the timer reaching its maximum value and triggering the periodic location update. The first state in FIG. 4 where the EIR 422 can check the timing is state 408′, where it receives information about the RIL3-MM LOCATION UPDATE REQUEST message transmitted by the terminal 401. The EIR 422 does not yet know that there are two terminals with the same IMEI code operating in the cellular radio system, so it acts as if all messages shown in the figure would relate to the same terminal and thus to the same timer. The previous time it received information about the timer reset in state 412′, and it knows that the timer is then stopped during a period corresponding to the interval between the states 406′ and 407′. The total time which is obtained by summing the period between the states 412′ and 406′ and the period between the states 407′ and 408′ is substantially shorter than the time-out set as the maximum value for the timer. The same observations can be made at all states where the EIR 422 checks the timing (states 413′, 409′, 414′, 410′, 417′, 411′ and 418′). The time from the previous reset, reduced with any periods corresponding to the terminal's timer being stopped, is always shorter than the maximum time set in the timer.
  • In an alternative embodiment the [0049] EIR 422 checks the timing only when it has received two successive messages of the “=0(T)” type between which there is no moment or period when the terminal's timer would have been reset due to another reason or when it would have been stopped. Such check points are the states 413′, 414′, 417′, 411′ and 418′ in FIG. 4. At all these states we can see that the time which elapsed from the moment when the terminal's timer reached its maximum value to the moment when it triggered the periodic location update is shorter than the maximum time set for the timers of the terminals.
  • In FIG. 4 it is assumed that the events relating to the [0050] terminals 401 and 402 and the starting, stopping an resetting of the timers occur in such a mutual order that, except for a too short timing cycle, they can occur in a single terminal. Thus the mutual order of the messages relating to the events is logical; for instance a message representing stopping of the timer is always followed by a message representing the starting of the timer, and so on.
  • Particularly in situations where one legal identifier is copied into several illegal terminals it may happen that the activities of the terminals are interleaved in such a way that the messages relating to starting, stopping and resetting the timer will not arrive in a logical order at the EIR. For instance, the EIR may receive several successive messages representing a timer stopping without any messages between them representing a timer starting. In addition to the reaction to a too short timer cycle presented above, or instead of it, the EIR can also react to messages not being in a mutual logical order, and generate an announcement, in which an identifier causing this reaction will be indicated as a suspicious identifier. [0051]
  • Above we have discussed only a timer related to the periodic location update and the messages between the terminal and the system relating to the timer's operation. A cellular radio system does not necessarily require that the messages relating to the location update should refer to a specific IMEI code or more generally to that identifier which presently is the object of interest. For instance, in the GSM system the location update defined in the specifications occurs only on the basis of the TMSI and IMSI codes describing the user (or in fact, the subscription available to the user). The system operation requires some changes in order to be able to utilize the periodic location update in a manner according to the invention in order to detect cloned IMEI codes. [0052]
  • FIG. 5 shows schematically one alternative to arrange in a manner according to the invention the operation of the cellular radio system and the EIR or a corresponding register connected to the system. In the figure it is assumed that the system reserves two memory locations for each monitored terminal, which can store time data, and which are called [0053] memory locations 0 and 1. Further it is assumed in the figure that the system will check the timing relating to a periodic location update only when two messages have arrived from the terminal relating to the periodic location update without any events between these messages that would have caused the timer to be stopped or premature reset of the timer.
  • In state [0054] 501 a certain terminal is registered in the system, either because it is switched on or because it moves in from another part of the system or from a completely different system. Above it was noted that the timer controlling the periodic location update in the terminal is reset in connection with the registration, so as a response to the registration the system stores in its memory the registration time. Here the time indication is stored in the memory location 0. The variable M indicating the next memory location is given the value 1, so that next time the data will be stored in the memory location 1.
  • In [0055] state 502 the system requests the terminal to disclose its equipment identifier; in the GSM system this is made by transmitting the RIL3-MM IDENTITY REQUEST message, in which a value representing the IMEI code is put into the Identity Type field representing the requested identifier. When the terminal has disclosed the required equipment identifier the system stores it in state 503, so that it later can check when a terminal using a certain equipment identifier has registered. The variable T is given the value “true”, which means that it is possible to carry out a check based on the stored time indications. Then the system proceeds to the idle state 504 regarding the monitoring of the equipment identifier and the location updates.
  • If the system according to the [0056] state 505 detects a call or an MM procedure concerning said terminal which is not a location update, then the system will give the value “false” to the variable T in state 506, because the detected call or MM procedure means that the terminal's timer has been stopped and/or reset. The state 506 is followed by a return to the idle state 504. When the system is in the idle state and detects according to state 507 that the terminal has transmitted a RIL3-MM LOCATION UPDATE REQUEST message, then it first will check, in state 508, whether this is a message representing a periodic location update. In the GSM system this is shown by the Location Updating Type field included in the message; the value “01” formed by the bits 2 and 1 of the field's first octet represents a periodic location update. If the message concerns something else then the value of the variable T is set to “false” in state 506, because the terminal's timer is reset, and then there is a return to state 504. If the message concerns a periodic location update, then the system in state 509 transmits to the terminal a new request to disclose its equipment identifier and checks that the equipment identifier is the same as the system has stored earlier. If the equipment identifier is not the same, then there has occurred an error somewhere. State 510 represents an action known per se in an error situation.
  • It is most probable that the equipment identifier checked in the [0057] state 509 is the same, whereby in state 511 the system stores the time indication corresponding to the periodic location update in that memory location which is indicated by the value of the variable M. The calculation formula also presented in the state 511 means only that if the value of the variable M until now has been 0, then it gets the value 1, and if it until now has been 1, then it gets the value 0. In state 512 the value of the variable T is checked. If its value is “true”, then there has been no stop or premature reset of the terminal's timer since the previous storing operation. Then the system in state 513 checks whether the difference between the time indications stored in the memory locations 0 and 1 is possibly smaller than the time-out set for the periodic location update, and if so, then according to state 514 the concerned equipment identifier can be marked as suspicious. If the difference between the time indications was acceptably close to the set time-out, then the process returns to the state 504. A difference between the time indications which is as long as the set time-out can be considered acceptable considering the possibility of such timing errors between different devices, which are defined in the specification regarding acceptable timing errors in the system.
  • It the value of the variable T in [0058] state 512 was found to be “false”, then there is no need to perform the check according to state 513, because it is not known how long the terminal's timer has been stopped or when it was prematurely reset. However, because the time indication stored in state 511 corresponds to the periodic location update the value of the variable T is then set to “true” in state 515, and the process returns to the state 504 to wait for the next message from the terminal concerning the periodic location update. The execution of the method according to FIG. 5 can be terminated in any state if the terminal moves outside the region of the system where the method is applied, or if the terminal is switched off: a loss of the communication link causes actions known per se, with which the system controls that its resources are not unnecessarily reserved for terminals which have moved away.
  • The method presented in FIG. 5 is of course only one example of how the inventive idea can be realised. An easy change of the method presented in FIG. 5 is to replace the check in [0059] state 513 with a more general check, where it is studied whether the time difference of the time indications on the whole is different from the given time-out. The method can be programmed as a program run in a computer, whereby it is most preferably run in the same equipment, which according to the prior art specifications generates and transmits the equipment identifier requests to the terminals and processes the equipment identifiers transmitted as responses from the terminals as well as the messages with which a terminal updates its location. In the GSM system this equipment is the mobile telephone exchange, where the VLR operates as the memory location for the location information.
  • FIG. 6 shows schematically those parts of a mobile telephone exchange which are essential when the invention is applied in a typical digital cellular radio system. The [0060] mobile telephone exchange 600 contains a transmission system interface unit 601, which transmits telecommunication between the mobile telephone exchange 600 and the transmission system (the transmission system connects the mobile telephone exchange to the base stations via the base station controllers which control the base stations). Further the mobile telephone exchange 600 comprises a central processing unit 602, which generates the contents of the transmitted messages and which decomposes the received messages. The memory 603 contains the required memory locations, which store the equipment identifiers of registered terminals and the time indications relating to the registrations and periodic location updates. The instructions representing the execution of the method according to the invention are also stored in the memory 603. The central processing unit 602 performs the required calculations and comparisons on the basis of the stored time indications, and when required it supplies messages about an equipment suspicious identifiers via the line 604, either to the EIR or some other device, through which an operator responsible for the system operation monitors the utilization of terminals in the system.
  • The invention can also be applied so that it detects terminals which operate in different systems and which use the same IMEI code or a corresponding identifier. Then the mobile telephone exchanges according to FIG. 6, or any other system equipment operating in the same manner, transmit as such to a central register the equipment identifiers, which they have stored, and the time indications relating to the messages representing the periodic location updates and which have arrived at correct intervals, whereby the central register accumulates data from several systems. Then the central register has a record for each stored IMEI code, whereby the time indications transmitted by the different systems are stored in these records. The central register can check whether a certain IMEI code has been used in two different systems simultaneously. Already this will indicate a cloned IMEI code. If the systems are located geographically so that they are wholly or partly overlapping, then a legal user could have moved from one system to another. However, if the central register has information also about which time-out each system uses for the periodic location update, then it can calculate on the basis of each record and said time-outs whether the entries have been caused by one or more terminals. [0061]
  • With the invention it is possible to detect cloned IMEI codes or corresponding equipment identifiers by mainly using means already available in known cellular radio systems. No changes have to be made in the known structure or operation of terminals, because they are already arranged to transmit messages related to a periodic location update, controlled by an internal timer, and to respond to a correctly formed request transmitted by the system by reporting their equipment identifier. The reprogramming of the functions of a mobile telephone exchange or corresponding equipment of a cellular radio system is a method known per se, so it can be reprogrammed also to realize the inventive idea presented in this application. [0062]
  • The memory space required by the invention is rather small, because in the most preferred case only the equipment identifier, two time indications, and the value of two variables must be stored for each monitored terminal. Further, the required processing time is minimal. For instance, the immense amount of source material requires substantial computer runs in an alternative method which stores the IMEI and IMSI codes appearing in pairs and which compares all stored pairs with each other in order to find such IMEI codes which are related to the occurrence of several IMSI codes. Further this alternative embodiment generates false indications, because it is quite legal, and indeed quite common, that several users use the same equipment part but each user has his own SIM card. In practice the inventive idea presented in this patent application can be realized by using different embodiments without departing from the scope defined be the claims presented below. [0063]
  • In the preceding text, the IMEI code was preferred as the code that is used to detect fraudulent users. In a variation of the invention the occurrence of IMSI codes in specific messages which the terminals should send with predetemined intervals could be used to detect forged subscriber identities. [0064]

Claims (10)

1. A method for identifying a terminal in a cellular radio system comprising terminals arranged to transmit a specific message of a predetermined form at least two times, so that there is a predetermined time-out between the two successive messages of said form, the method comprising the steps of
associating a first message of predetermined form, which is received from a terminal, with a code representing said terminal,
associating a second message of predetermined form, which is received from a terminal, with said code,
examining the time difference between the reception of said first and second messages and
regarding such a terminal as an identified terminal for which said time difference is shorter than said time-out.
2. A method according to
claim 1
, wherein the code representing said terminal is an IMEI code intended to identify the equipment part of a terminal.
3. A method according to
claim 1
, wherein said message of a predetermined form is a message representing a periodic location update.
4. A method for identifying a terminal in a cellular radio system comprising terminals, wherein each terminal contains a timer with a certain time-out which controls the periodic location update of the terminal, the method comprising the steps of
a) storing, in association with a code representing a terminal, a first time indication which represents a known reset moment of such a timer in said terminal which controls the periodic location update;
b) storing, in association with said code, a second time indication which corresponds to the reception of a message representing a periodic location update transmitted by the terminal;
c) calculating a first time difference between the stored first and second time indications;
d) comparing said first time difference is compared with said time-out; and
e) regarding the terminal represented by said code as an identified terminal if said first time difference is shorter than said time-out.
5. A method according to
claim 4
, further comprising
between steps a) and b) the steps of storing a third time indication, which represents the stopping of said timer in the terminal, and storing a fourth time indication, which represents the restarting of said timer in the terminal after the timer has been stopped, and
between steps c) and d) the step of subtracting the second time difference between said fourth and third time indications from said first time difference.
6. A method according to
claim 4
, wherein the steps b), c) and d) are executed only, if after said first stored time indication no facts have been observed which would cause the stopping of said timer or the resetting of said timer caused by other reasons than periodic location update.
7. A method for identifying a subscriber of a cellular radio system comprising terminals arranged to transmit a specific message of a predetermined form at least two times, so that there is a predetermined time-out between the two successive messages of said form, the method comprising the steps of
associating a first message of predetermined form, which is received from a terminal, with a code representing a subscriber,
associating a second message of predetermined form, which is received from a terminal, with said code,
examining the time difference between the reception of said first and second messages and
regarding such a subscriber as an identified subscriber for which said time difference is shorter than said time-out.
8. A method according to
claim 7
, wherein the code representing said subscriber is an IMSI code intended to identify the subscriber-specific part of a terminal.
9. A cellular radio system for offering telecommunications services to terminals arranged to transmit a specific message of a predetermined form at least two times so that there is a predetermined time-out between the two successive messages of said predetermined form, the cellular radio system comprising means for
associating successive messages of said predetermined form received from a terminal to a code representing the terminal,
examining the time difference between the reception of two successive messages of said predetermined form associated to the code representing the terminal and
indicating such a terminal as an identified terminal for which the time difference between the reception of the two successive messages of said predetermined form attached to the code representing the terminal is shorter than said time-out.
10. A mobile telephone exchange, which is arranged to receive from the terminals of a cellular radio system via base stations of the cellular radio system a specific message of a predetermined form at least two times, so that there is a predetermined time-out between two successive messages of said form, wherein the improvement lies in that it is arranged to attach a message of said form to a code representing the terminal, and that it is arranged to indicate such a terminal as identified for which the time between the reception of two successive messages of said form attached to the code representing the terminal is shorter than said time-out.
US09/167,460 1997-10-08 1998-10-06 Method and system for identifying an illegal terminal in a cellular radio system Expired - Lifetime US6377791B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI973909A FI111320B (en) 1997-10-08 1997-10-08 Method and system for identifying a false terminal equipment in a cellular radio system
FI973909 1997-10-08

Publications (2)

Publication Number Publication Date
US20010053684A1 true US20010053684A1 (en) 2001-12-20
US6377791B2 US6377791B2 (en) 2002-04-23

Family

ID=8549686

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/167,460 Expired - Lifetime US6377791B2 (en) 1997-10-08 1998-10-06 Method and system for identifying an illegal terminal in a cellular radio system

Country Status (7)

Country Link
US (1) US6377791B2 (en)
EP (1) EP0918444A3 (en)
JP (1) JP2001519633A (en)
CN (1) CN1281624A (en)
AU (1) AU9443598A (en)
FI (1) FI111320B (en)
WO (1) WO1999018738A2 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030083043A1 (en) * 1999-12-28 2003-05-01 Giorgio Grego Method for detecting access to controlled areas and related system
US20040005875A1 (en) * 2002-07-04 2004-01-08 Lg Electronics Inc. Method of furnishing illegal mobile equipment user information
US20050164683A1 (en) * 2004-01-09 2005-07-28 Gideon Roberts Apparatus and method for implementing notification of system information changes in universal mobile telecommunications systems
US20050170813A1 (en) * 2004-02-04 2005-08-04 Choi Won S. Apparatus and method for setting use restriction of mobile communication terminal
US20060019674A1 (en) * 2002-08-05 2006-01-26 Technocom Corporation System and method for calibration of a wireless network
US20070275718A1 (en) * 2006-05-22 2007-11-29 Hewlett-Packard Development Company, L.P. Detection of cloned identifiers in communication systems
US20080039193A1 (en) * 2004-06-18 2008-02-14 Muir Robert L Cashless reservation system
US20090036116A1 (en) * 2006-03-03 2009-02-05 Shin-Jae Kim Method and system for measuring quality of wireless network
US20110087782A1 (en) * 2008-06-13 2011-04-14 Philippe Bouckaert Improvements in or relating to communications
US20110271330A1 (en) * 2008-12-31 2011-11-03 Nokia (China) Investment Co. Ltd. Solutions for identifying legal user equipments in a communication network
US20120157093A1 (en) * 2009-08-25 2012-06-21 Zte Corporation Method for realizing user accessibility and multi-mode terminal
US20120172000A1 (en) * 2004-01-26 2012-07-05 At&T Intellectual Property I, L.P. Apparatus and Method of Securing Private Content Stored In a Memory
US8380165B1 (en) * 2010-10-22 2013-02-19 Sprint Communications Company L.P. Identifying a cloned mobile device in a communications network
WO2014053161A1 (en) * 2012-10-01 2014-04-10 Iiinnovation S.A. Method of authorizing a financial transaction
CN104933150A (en) * 2015-06-24 2015-09-23 长沙引擎信息科技有限公司 Method and system for determining accompanying numbers on basis of mobile phone identification numbers
US10034153B1 (en) * 2015-11-19 2018-07-24 Securus Technologies, Inc. Creation and use of mobile communications device identities
US11570610B2 (en) * 2020-04-03 2023-01-31 Telus Communications Inc. System and method for managing visitor location register (VLR) records by updating duplicate records

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI106508B (en) 1998-11-02 2001-02-15 Nokia Networks Oy A method and system for tracing a local loop
DE19910385C2 (en) * 1999-03-09 2003-07-17 Siemens Ag Method and radio communication network for securing a subscriber identity module arranged in a mobile station
GB2350971A (en) 1999-06-07 2000-12-13 Nokia Mobile Phones Ltd Security Architecture
GB2352586B (en) 1999-06-07 2004-03-10 Nec Corp Handover between mobile networks
US7155222B1 (en) * 2000-01-10 2006-12-26 Qualcomm, Inc. Method for performing RR-level registration in a wireless communication system
JP3545666B2 (en) * 2000-02-14 2004-07-21 株式会社東芝 Service providing system for mobile terminals
GB0011643D0 (en) * 2000-05-16 2000-07-05 Hewlett Packard Co Retrieval of location-related information
GB0012143D0 (en) * 2000-05-20 2000-07-12 Hewlett Packard Co Obtaining location updates about mobile entity for use in a location-sensitive application
GB0012445D0 (en) * 2000-05-24 2000-07-12 Hewlett Packard Co Location-based equipment control
GB0012749D0 (en) * 2000-05-26 2000-07-19 Hewlett Packard Co Finding locally-relevant information in a physical document
KR100468572B1 (en) * 2000-09-21 2005-01-31 엘지전자 주식회사 Method for controlling of subscriber's abnormal state in Wireless Local Loop
US8107937B2 (en) * 2001-07-31 2012-01-31 Nokia Corporation System and method for automatic provisioning detection and notification
US7296156B2 (en) * 2002-06-20 2007-11-13 International Business Machines Corporation System and method for SMS authentication
GB0218028D0 (en) * 2002-08-02 2002-09-11 Nokia Corp Location services for mobile communication system
US7756525B1 (en) * 2002-09-16 2010-07-13 Teradata Us, Inc. Continuous dynamic mobile querying
US7181252B2 (en) * 2002-12-10 2007-02-20 Nokia Corporation System and method for performing security functions of a mobile station
US7324801B2 (en) * 2003-03-06 2008-01-29 Motorola, Inc. Emergency call-back for a wireless communication device equipped with a user removable module
KR100576910B1 (en) * 2003-09-27 2006-05-03 엘지전자 주식회사 Interception Method For Simultaneous Communication Of Illegality Reproduction Terminal In The Mobile Communication System
US6999751B2 (en) * 2004-04-08 2006-02-14 Motorola, Inc. Detection of cloned communication units based on message contents
US7446655B2 (en) * 2004-06-18 2008-11-04 Qualcomm Incorporated Tracking lost and stolen mobile devices using location technologies and equipment identifiers
CN100356814C (en) * 2004-06-28 2007-12-19 华为技术有限公司 SIM card anti-cloning method
US7689214B2 (en) * 2005-10-11 2010-03-30 Telefonaktiebolaget Lm Ericsson (Publ) Efficient sharing of mobile equipment identifiers
US8248916B2 (en) * 2005-12-30 2012-08-21 Telefonaktiebolaget Lm Ericsson (Publ) Recovery methods for restoring service in a distributed radio access network
US8660575B2 (en) * 2007-01-04 2014-02-25 Lg Electronics Inc. Method for tracking area management of a mobile terminal using a discontinuous reception (DRX) mode
CN102469460B (en) * 2010-11-08 2014-10-01 中国移动通信集团广东有限公司 Method for identifying invalid international mobile equipment identity number and apparatus thereof
CN102769851B (en) * 2011-05-06 2015-07-01 中国移动通信集团广东有限公司 Method and system for monitoring service provider services
CN103188651B (en) * 2011-12-31 2016-01-27 中国移动通信集团云南有限公司 A kind of information correlation method and device

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI77550C (en) 1987-07-29 1989-03-10 Nokia Mobira Oy FOERFARANDE FOER SAMMANKOPPLING TILL ANVAENDARENS KORT VID EN MOBILRADIOTELEFON.
FI88842C (en) 1990-03-22 1993-07-12 Nokia Mobile Phones Ltd Checking the card connection
CA2078195C (en) 1991-11-27 1999-03-09 Jack Kozik Arrangement for detecting fraudulently identified mobile stations in a cellular mobile telecommunications network
US5483465A (en) * 1993-02-26 1996-01-09 Grube; Gary W. Method for reprogramming duplicated communication units
US5734977A (en) 1994-11-10 1998-03-31 Telefonaktiebolaget Lm Ericsson Fraud detection in radio communications network
US6370373B1 (en) * 1994-11-23 2002-04-09 Lucent Technologies Inc. System and method for detecting cloning fraud in cellular/PCS communications
US5845211A (en) * 1995-01-13 1998-12-01 Bell South Corporation Wireless digital network
US5600708A (en) 1995-08-04 1997-02-04 Nokia Mobile Phones Limited Over the air locking of user identity modules for mobile telephones
AU2104897A (en) 1996-03-27 1997-10-17 Philips Electronics N.V. Internal identification method for a mobile telephone terminal and system therefor
US5822691A (en) 1996-05-02 1998-10-13 Nokia Mobile Phones Limited Method and system for detection of fraudulent cellular telephone use
DE69728079T2 (en) * 1996-05-03 2005-01-20 Agilent Technologies, Inc. (n.d.Ges.d.Staates Delaware), Palo Alto Method and device for tracking the change of the identification code in a mobile communication system
US5970404A (en) * 1996-10-25 1999-10-19 Telefonaktiebolaget Lm Ericsson System and method of detecting and preventing fraudulent telephone calls in a radio telecommunications network
US5953652A (en) 1997-01-24 1999-09-14 At&T Wireless Services Inc. Detection of fraudulently registered mobile phones
US6067444A (en) * 1997-06-13 2000-05-23 Motorola, Inc. Method and apparatus for duplicate message processing in a selective call device

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030083043A1 (en) * 1999-12-28 2003-05-01 Giorgio Grego Method for detecting access to controlled areas and related system
US7046990B2 (en) * 1999-12-28 2006-05-16 Telecom Italia Lab S.P.A. Method for detecting access to controlled areas and related system
US7383035B2 (en) * 2002-07-04 2008-06-03 Lg Electronics Inc. Method of furnishing illegal mobile equipment user information
US20040005875A1 (en) * 2002-07-04 2004-01-08 Lg Electronics Inc. Method of furnishing illegal mobile equipment user information
US20060019674A1 (en) * 2002-08-05 2006-01-26 Technocom Corporation System and method for calibration of a wireless network
US7142873B2 (en) * 2002-08-05 2006-11-28 Technocom Corporation System and method for calibration of a wireless network
US20050164683A1 (en) * 2004-01-09 2005-07-28 Gideon Roberts Apparatus and method for implementing notification of system information changes in universal mobile telecommunications systems
US8391923B2 (en) * 2004-01-26 2013-03-05 At&T Intellectual Property I, L.P. Apparatus and method of securing private content stored in a memory
US8892166B2 (en) 2004-01-26 2014-11-18 At&T Intellectual Property I, L.P. Apparatus and method of securing private content stored in a memory
US8600440B2 (en) 2004-01-26 2013-12-03 At&T Intellectual Property I, L.P. Apparatus and method of securing private content stored in a memory
US20120172000A1 (en) * 2004-01-26 2012-07-05 At&T Intellectual Property I, L.P. Apparatus and Method of Securing Private Content Stored In a Memory
US20050170813A1 (en) * 2004-02-04 2005-08-04 Choi Won S. Apparatus and method for setting use restriction of mobile communication terminal
US7505758B2 (en) * 2004-02-04 2009-03-17 Lg Electronics Inc. Apparatus and method for setting use restriction of mobile communication terminal
US20080039193A1 (en) * 2004-06-18 2008-02-14 Muir Robert L Cashless reservation system
US20090036116A1 (en) * 2006-03-03 2009-02-05 Shin-Jae Kim Method and system for measuring quality of wireless network
US20070275718A1 (en) * 2006-05-22 2007-11-29 Hewlett-Packard Development Company, L.P. Detection of cloned identifiers in communication systems
US8010083B2 (en) * 2006-05-22 2011-08-30 Hewlett-Packard Development Company, L.P. Detection of cloned identifiers in communication systems
US20110087782A1 (en) * 2008-06-13 2011-04-14 Philippe Bouckaert Improvements in or relating to communications
US9161229B2 (en) * 2008-06-13 2015-10-13 Hewlett-Packard Development Company, L.P. Relating to communications
US20110271330A1 (en) * 2008-12-31 2011-11-03 Nokia (China) Investment Co. Ltd. Solutions for identifying legal user equipments in a communication network
US20120157093A1 (en) * 2009-08-25 2012-06-21 Zte Corporation Method for realizing user accessibility and multi-mode terminal
US8744437B2 (en) * 2009-08-25 2014-06-03 Zte Corporation Method for realizing user accessibility and multi-mode terminal
US8380165B1 (en) * 2010-10-22 2013-02-19 Sprint Communications Company L.P. Identifying a cloned mobile device in a communications network
WO2014053161A1 (en) * 2012-10-01 2014-04-10 Iiinnovation S.A. Method of authorizing a financial transaction
CN104933150A (en) * 2015-06-24 2015-09-23 长沙引擎信息科技有限公司 Method and system for determining accompanying numbers on basis of mobile phone identification numbers
US10034153B1 (en) * 2015-11-19 2018-07-24 Securus Technologies, Inc. Creation and use of mobile communications device identities
US11570610B2 (en) * 2020-04-03 2023-01-31 Telus Communications Inc. System and method for managing visitor location register (VLR) records by updating duplicate records

Also Published As

Publication number Publication date
US6377791B2 (en) 2002-04-23
AU9443598A (en) 1999-04-27
FI111320B (en) 2003-06-30
EP0918444A3 (en) 2000-03-29
WO1999018738A2 (en) 1999-04-15
EP0918444A2 (en) 1999-05-26
CN1281624A (en) 2001-01-24
JP2001519633A (en) 2001-10-23
WO1999018738A3 (en) 1999-06-24
FI973909A (en) 1999-04-09
FI973909A0 (en) 1997-10-08

Similar Documents

Publication Publication Date Title
US6377791B2 (en) Method and system for identifying an illegal terminal in a cellular radio system
US5467382A (en) Method and apparatus for clone detection in a communication system
US6400939B1 (en) Method for limiting use of terminal equipments
US8238901B2 (en) Provision of position information in telecommunications networks
US5610973A (en) Interactive roamer contact system for cellular mobile radiotelephone network
US5913165A (en) Method for changing subscriber service features in a radio telecommunications network
EP0993747B1 (en) Subscriber system with user station with removable data store
US5625671A (en) Method of checking the identity of a subscriber equipment
US7383035B2 (en) Method of furnishing illegal mobile equipment user information
CN101449609A (en) Method and device for the remote monitoring of nano-micro-radio base stations
CA2189770C (en) Connection release in a telecommunications system
US6223038B1 (en) Location registration method for mobile radio communication system
AU715948B2 (en) Method and arrangement for limiting paging load in a mobile communication system
KR20010034460A (en) Method and apparatus for reducing messaging traffic in a wireless communication system
WO2002003736A1 (en) System and method for testing a communication system
CA2389189C (en) Detecting a fraudulent mobile station in a mobile communication system using location information of mobile station
KR100466834B1 (en) Method for Accepting Sequential Location Registration to 2G System of Mobile Terminal Subscribed to 2.5G System
KR960015363B1 (en) Mobile radio communication exchanger
CA2335981A1 (en) Method in a radio telecommunications network of providing signal strength and mobile station information to a monitoring agency
KR20080009934A (en) Method for registration in mobile telecommunications system and therfor system
US20100105352A1 (en) Mobile communication system, management server device, base station device, and line reservation method
KR20000042295A (en) Method for constraining transmission of terminal
KR20010036112A (en) Short message service method for handoff subscriber

Legal Events

Date Code Title Description
AS Assignment

Owner name: NOKIA MOBILE PHONES LTD., FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PIRILA, HANNU;REEL/FRAME:009510/0174

Effective date: 19980904

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: NOKIA SIEMENS NETWORKS OY, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOKIA CORPORATION;REEL/FRAME:020837/0600

Effective date: 20070913

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: NOKIA SOLUTIONS AND NETWORKS OY, FINLAND

Free format text: CHANGE OF NAME;ASSIGNOR:NOKIA SIEMENS NETWORKS OY;REEL/FRAME:034294/0603

Effective date: 20130819