WO1997004602A2 - Method for using personal identification numbers with telecommunications calls - Google Patents

Method for using personal identification numbers with telecommunications calls Download PDF

Info

Publication number
WO1997004602A2
WO1997004602A2 PCT/US1996/012072 US9612072W WO9704602A2 WO 1997004602 A2 WO1997004602 A2 WO 1997004602A2 US 9612072 W US9612072 W US 9612072W WO 9704602 A2 WO9704602 A2 WO 9704602A2
Authority
WO
WIPO (PCT)
Prior art keywords
pin
cell phone
called
numbers
list
Prior art date
Application number
PCT/US1996/012072
Other languages
French (fr)
Other versions
WO1997004602A3 (en
Inventor
Michael L. Rowell
Roger D. Pirkey
Luz M. Camacho
Original Assignee
Lockheed Martin Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lockheed Martin Corporation filed Critical Lockheed Martin Corporation
Publication of WO1997004602A2 publication Critical patent/WO1997004602A2/en
Publication of WO1997004602A3 publication Critical patent/WO1997004602A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13095PIN / Access code, authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13096Digital apparatus individually associated with a subscriber line, digital line circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13097Numbering, addressing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13098Mobile subscriber
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13139Fraud detection/prevention
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/1322PBX
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention generally relates to a method for using personal identification numbers, PINs, with telecommunications calls such as cellular telephones and other mobile communications devices for the purpose of reducing fraudulent use, and particularly, to such methods which minimize such PIN usage.
  • Telecommunications systems which use account subscriptions for income purposes are subject to fraudulent use and increased costs therefrom.
  • Cellular telephone companies are currently losing a great deal of money on the fraudulent cloning of cellular telephones, or cell phones.
  • the fraudulent process involves intercepting a registered user's identification numbers off of a live transmission and then programming a different cell phone to use those numbers.
  • the numbers required are the MIN, mobile identification number of the cell phone account, and the ESN, the electronic serial number of the specific cell phone.
  • the cell phone user inputs a number to be called and presses the Send button in the usual manner.
  • a responding cellular base station then proceeds through a call setup routine where it determines that the calling phone account is in good standing and has not been previously cloned along with a routing path for the specific call.
  • the call setup routine then transmits a voice channel assignment over the forward control channel and requests the cell phone or subscriber PIN over the assigned voice channels.
  • the cell phone user then enters the PIN and the base station connects the call to the appropriate land line or cell phone facility after verifying the PIN.
  • PIN use is disadvantageous because of added cost, inconvenience and the remaining danger of PIN interception. It is inconvenient for a user to input a PIN. Also, if the call does not go through or is disconnected after the PIN has been inputted, the auto redial function will usually not work because the PIN was the last number dialed. This inconvenience can also be a safety factor if the user is simultaneously engaged in another activity such as driving. Further, the transmission of PINs over voice channels requires increased system traffic load and ultimate consumer cost. Lastly, PINs can still be intercepted and combined with the MINs and ESNs for fraudulent use.
  • PIN use with telecommunications calls such as cellular phones such as cellular phones.
  • the present invention provides a method for the use of personal identification numbers, PINs, with cellular telephones, cell phones, comprising the steps of maintaining a separate calling list of telephone numbers called by each respective cell phone or each respective cell phone subscriber, determining whether each call placed from a cell phone or a cell phone subscriber is one of the numbers on its respective calling list, requiring the inputting of a PIN for each cell phone call where the number called does not appear on the respective calling list, and allowing cell phone calls to numbers on the respective calling list to be connected without requiring the inputting of a PIN.
  • the present invention provides a method for the use of personal identification numbers, PINs, with telecommunications calls, comprising the steps of maintaining a separate contact list of entities called by each respective telecommunications device or each respective telecommunications subscriber, determining whether each call placed by a telecommunications device or subscriber is one of the entities on its respective contact list, requiring the inputting of a PIN for each call where the entity called does not appear on the respective contact list, and allowing telecommunications calls to entities Iisted on the respective contact list to be connected without requiring the inputting of a PIN.
  • One embodiment of the present invention is applicable to cellular telephones and maintains a separate calling list or subscriber profile of telephone numbers called by each respective cell phone or each respective cell phone subscriber. While the cell phone account is checked for validity upon placing a call, this calling list is referenced for the respective cell phone account. This procedure compares the telephone number being called with the calling list data to determine if the number being called is on the list. If the number being called appears on the respective calling list, the call setup routine bypasses the PIN request and connects the call. If the number being called does not appear on the respective calling list, the user is requested to input a PIN and the call is only connected after a proper PIN is received and verified by the cell phone service provider.
  • the calling list typically includes the telephone numbers that are regularly called by that cell phone or subscriber.
  • the separate calling Iists may be supplemented by telephone numbers belonging to various public institutions, which numbers may be considered to be on all Iists so long as they are not likely to be called on cloned phones. Such numbers may include 911 and other emergency numbers, governmental offices and agencies, schools, hospitals, etc..
  • the size of the calling list could also be economized by including all numbers in any private branch exchange, PBX, once a caller makes one call to that exchange. This could appear in the list as the exchange prefix with wild card identifiers for the last series of digits, depending upon the size of the exchange.
  • the calling list can be updated each time that a number not appearing on the list is called and the user inputs a proper PIN.
  • the called number would be added to the calling list, at least on a temporary basis. Updating may also occur on a monthly or other periodic basis using billing information from the service provider. Such billing information can include usage as well as calling frequency to every number called and thus provide the basis for determining which numbers are best retained on a calling list.
  • the preference for numbers to be retained on each calling list is any number which is called regularly. Whereas, a new number may be added when it is called the first time, it could be deleted if it is not called again in the succeeding month or two. Thus, if a situation required the calling of one number numerous times within a short period, that number could still be deleted if it did not show up in several succeeding months of billing information.
  • Such monthly updates of calling Iists may also be effected using billing information from a cell phone subscriber's land line account. This could include either or both of a subscriber' business and personal accounts and could depend upon the subscriber's preference.
  • the present embodiment may further include the step of checking the number being called against a list of telephone numbers which are called by cloned cell phones.
  • Other embodiments of the present invention are equally applicable to the types of telecommunications calls which derive income from account subscriptions. Such systems may have different ways of identifying the entities being called besides just telephone numbers. It may be possible to place calls to specific people, specific organizations, specific locations or specific communications devices. Such calls may not be bi-directional communications but only one-way contacts. The present invention is equally applicable to such systems with specifics which may vary depending upon those systems.
  • the most significant advantages of the present invention are reductions in the cost and inconvenience to consumers and a greatly reduced likelihood that the PIN transmission will be intercepted. Whenever a number from the calling list is called, the caller does not suffer the delay or distraction of inputting additional numbers. Further the use time of the assigned voice channel is reduced thus improving system capacity and reducing the ultimate cost paid by the subscriber. The safety of phone usage is also improved because phone users engaged in other activity do not have to alternate between holding the phone next to their ear and looking at the key pad to enter their PIN. The present invention provides a significant reduction in fraudulent use because the
  • PINs are transmitted over the air at a greatly reduced incidence, thus making their interception much less likely. This reduced incidence also allows early detection of fraudulent use whenever increased PIN usage occurs.

Abstract

Personal identification numbers, PINs, are used with cellular telephones to reduce fraudulent cellular usage of stolen and cloned cell phones. Wireless transmission of PINs can result in interception thereof by the same means that are used to intercept cell phone account numbers and serial numbers to produce cloned cell phones. Wireless transmission of PINs is reduced by only requiring the use of a PIN when a telephone number being called by a cell phone or subscriber does not match a list of numbers previously called by that particular cell phone or subscriber. The invention is useful wherever PINs are used to reduce cell phone fraud.

Description

METHOD FOR USING PERSONAL IDENTIFICATION NUMBERS WITH TELECOMMUNICATIONS CALLS
Background of the Invention Field of the Invention
The present invention generally relates to a method for using personal identification numbers, PINs, with telecommunications calls such as cellular telephones and other mobile communications devices for the purpose of reducing fraudulent use, and particularly, to such methods which minimize such PIN usage. Statement of the Prior Art
Telecommunications systems which use account subscriptions for income purposes are subject to fraudulent use and increased costs therefrom. Cellular telephone companies are currently losing a great deal of money on the fraudulent cloning of cellular telephones, or cell phones. The fraudulent process involves intercepting a registered user's identification numbers off of a live transmission and then programming a different cell phone to use those numbers. The numbers required are the MIN, mobile identification number of the cell phone account, and the ESN, the electronic serial number of the specific cell phone.
To combat this practice, some cell phone service providers have required the use of PINs, personal identification numbers, by their subscribers. In such a system, the cell phone user inputs a number to be called and presses the Send button in the usual manner. A responding cellular base station then proceeds through a call setup routine where it determines that the calling phone account is in good standing and has not been previously cloned along with a routing path for the specific call. The call setup routine then transmits a voice channel assignment over the forward control channel and requests the cell phone or subscriber PIN over the assigned voice channels. The cell phone user then enters the PIN and the base station connects the call to the appropriate land line or cell phone facility after verifying the PIN.
Unfortunately, PIN use is disadvantageous because of added cost, inconvenience and the remaining danger of PIN interception. It is inconvenient for a user to input a PIN. Also, if the call does not go through or is disconnected after the PIN has been inputted, the auto redial function will usually not work because the PIN was the last number dialed. This inconvenience can also be a safety factor if the user is simultaneously engaged in another activity such as driving. Further, the transmission of PINs over voice channels requires increased system traffic load and ultimate consumer cost. Lastly, PINs can still be intercepted and combined with the MINs and ESNs for fraudulent use.
SUMMARY OF THE INVENTION Accordingly, it is a object of the present invention to provide a method for reducing
PIN use with telecommunications calls such as cellular phones.
It is a further object of the present invention to provide such a method which retains the advantages of PIN use for reducing fraudulent usage.
It is a still further object of the present invention to provide such a method which enhances upon the use of PINs by making them less likely to be intercepted.
In one form, the present invention provides a method for the use of personal identification numbers, PINs, with cellular telephones, cell phones, comprising the steps of maintaining a separate calling list of telephone numbers called by each respective cell phone or each respective cell phone subscriber, determining whether each call placed from a cell phone or a cell phone subscriber is one of the numbers on its respective calling list, requiring the inputting of a PIN for each cell phone call where the number called does not appear on the respective calling list, and allowing cell phone calls to numbers on the respective calling list to be connected without requiring the inputting of a PIN.
In another form, the present invention provides a method for the use of personal identification numbers, PINs, with telecommunications calls, comprising the steps of maintaining a separate contact list of entities called by each respective telecommunications device or each respective telecommunications subscriber, determining whether each call placed by a telecommunications device or subscriber is one of the entities on its respective contact list, requiring the inputting of a PIN for each call where the entity called does not appear on the respective contact list, and allowing telecommunications calls to entities Iisted on the respective contact list to be connected without requiring the inputting of a PIN. DETAILED DESCRIPTION OF THE EMBODIMENTS One embodiment of the present invention is applicable to cellular telephones and maintains a separate calling list or subscriber profile of telephone numbers called by each respective cell phone or each respective cell phone subscriber. While the cell phone account is checked for validity upon placing a call, this calling list is referenced for the respective cell phone account. This procedure compares the telephone number being called with the calling list data to determine if the number being called is on the list. If the number being called appears on the respective calling list, the call setup routine bypasses the PIN request and connects the call. If the number being called does not appear on the respective calling list, the user is requested to input a PIN and the call is only connected after a proper PIN is received and verified by the cell phone service provider.
The calling list typically includes the telephone numbers that are regularly called by that cell phone or subscriber. The separate calling Iists may be supplemented by telephone numbers belonging to various public institutions, which numbers may be considered to be on all Iists so long as they are not likely to be called on cloned phones. Such numbers may include 911 and other emergency numbers, governmental offices and agencies, schools, hospitals, etc.. The size of the calling list could also be economized by including all numbers in any private branch exchange, PBX, once a caller makes one call to that exchange. This could appear in the list as the exchange prefix with wild card identifiers for the last series of digits, depending upon the size of the exchange.
The calling list can be updated each time that a number not appearing on the list is called and the user inputs a proper PIN. The called number would be added to the calling list, at least on a temporary basis. Updating may also occur on a monthly or other periodic basis using billing information from the service provider. Such billing information can include usage as well as calling frequency to every number called and thus provide the basis for determining which numbers are best retained on a calling list. The preference for numbers to be retained on each calling list is any number which is called regularly. Whereas, a new number may be added when it is called the first time, it could be deleted if it is not called again in the succeeding month or two. Thus, if a situation required the calling of one number numerous times within a short period, that number could still be deleted if it did not show up in several succeeding months of billing information.
Such monthly updates of calling Iists may also be effected using billing information from a cell phone subscriber's land line account. This could include either or both of a subscriber' business and personal accounts and could depend upon the subscriber's preference.
The operation of the present embodiment as described thus far, results in greatly reduced usage of PINs. This feature enables a further function which is the detection of newly cloned cell phones. Cloning will result in an unusually high rate or number of calls to telephone numbers not previously called by a given cell phone. These calls will result in an unusually high or increased rate of required PIN usage, which is readily detectable with the present invention. This potential fraud may then be readily verified by communication with the subscriber. Any practical standard may be set for detecting unusually high PIN usage. The simplest standard would be required PIN usage on more than a predetermined percentage of the calls placed from any particular cell phone. Thus, the present embodiment allows the early identification of possibly cloned phones even when the cloner has intercepted the PIN. The present embodiment may further include the step of checking the number being called against a list of telephone numbers which are called by cloned cell phones. Other embodiments of the present invention are equally applicable to the types of telecommunications calls which derive income from account subscriptions. Such systems may have different ways of identifying the entities being called besides just telephone numbers. It may be possible to place calls to specific people, specific organizations, specific locations or specific communications devices. Such calls may not be bi-directional communications but only one-way contacts. The present invention is equally applicable to such systems with specifics which may vary depending upon those systems.
The most significant advantages of the present invention are reductions in the cost and inconvenience to consumers and a greatly reduced likelihood that the PIN transmission will be intercepted. Whenever a number from the calling list is called, the caller does not suffer the delay or distraction of inputting additional numbers. Further the use time of the assigned voice channel is reduced thus improving system capacity and reducing the ultimate cost paid by the subscriber. The safety of phone usage is also improved because phone users engaged in other activity do not have to alternate between holding the phone next to their ear and looking at the key pad to enter their PIN. The present invention provides a significant reduction in fraudulent use because the
PINs are transmitted over the air at a greatly reduced incidence, thus making their interception much less likely. This reduced incidence also allows early detection of fraudulent use whenever increased PIN usage occurs.
The embodiments described above are intended to be taken in an illustrative and not a limiting sense. Various modifications and changes may be made to the above embodiments by persons skilled in the art without departing from the scope of the present invention as defined in the appended claims.

Claims

WHAT IS CLAIMED IS:
1. A method for the use of personal identification numbers, PINs, with cellular telephones, cell phones, comprising the steps of: maintaining a separate calling list of telephone numbers called by each respective cell phone or each respective cell phone subscriber; determining whether each call placed from a cell phone or a cell phone subscriber is one of the numbers on its respective calling list; requiring the inputting of a PIN for each cell phone call where the number called does not appear on the respective calling list; and allowing cell phone calls to numbers on the respective calling list to be connected without requiring the inputting of a PIN.
2. The method of claim 1 , further comprising the step of placing on the respective calling list each telephone number called which requires the inputting of a PIN, if a proper PIN is received.
3. The method of claim 2, further comprising the step of updating the calling Iists on a periodic basis using cell phone account billing information including the removal of telephone numbers which are not regularly called.
4. The method of claim 3, wherein the step of updating is performed using billing information from a corresponding subscriber land line account.
5. The method of claim 1 , further comprising the step of monitoring for unusually high PIN usage and checking such unusual usage to identify newly cloned cell phones.
6. A method for the use of personal identification numbers, PINs, with telecommunications calls, comprising the steps of: maintaining a separate contact list of entities called by each respective telecommunications device or each respective telecommunications subscriber; determining whether each call placed by a telecommunications device or subscriber is one of the entities on its respective contact list; requiring the inputting of a PIN for each call where the entity called does not appear on the respective contact list; and allowing telecommunications calls to entities Iisted on the respective contact list to be connected without requiring the inputting of a PIN.
7. The method of claim 6, further comprising the step of placing on the respective contact list each entity call which requires the inputting of a PIN, if a proper PIN is received.
8. The method of claim 7, further comprising the step of updating the contact
Iists on a periodic basis using telecommunications account billing information including the removal of entities which are not regularly called.
9. The method of claim 6, further comprising the step of monitoring for unusually high PIN usage and checking such unusual usage to identify fraudulent PIN usage.
PCT/US1996/012072 1995-07-19 1996-07-19 Method for using personal identification numbers with telecommunications calls WO1997004602A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US50427195A 1995-07-19 1995-07-19
US08/504,271 1995-07-19

Publications (2)

Publication Number Publication Date
WO1997004602A2 true WO1997004602A2 (en) 1997-02-06
WO1997004602A3 WO1997004602A3 (en) 1997-04-17

Family

ID=24005562

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1996/012072 WO1997004602A2 (en) 1995-07-19 1996-07-19 Method for using personal identification numbers with telecommunications calls

Country Status (1)

Country Link
WO (1) WO1997004602A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0896486A2 (en) * 1997-08-06 1999-02-10 Lucent Technologies Inc. A wireless terminal and wireless telecommunications system adapted to prevent the theft of wireless service
WO1999030521A1 (en) * 1997-12-05 1999-06-17 Telefonaktiebolaget Lm Ericsson (Publ) Mobile terminal having conditional blocking of outgoing call requests
US6600902B1 (en) 1999-10-22 2003-07-29 Koninklijke Philips Electronics N.V. Multiple link data object conveying method for conveying data objects to wireless stations

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5200995A (en) * 1990-12-24 1993-04-06 Gaukel John J Universal outgoing call restriction circuit
US5325418A (en) * 1991-09-27 1994-06-28 Telemac Cellular Corporation Cellular phone accounting system
US5335278A (en) * 1991-12-31 1994-08-02 Wireless Security, Inc. Fraud prevention system and process for cellular mobile telephone networks
US5345595A (en) * 1992-11-12 1994-09-06 Coral Systems, Inc. Apparatus and method for detecting fraudulent telecommunication activity
US5509052A (en) * 1994-05-25 1996-04-16 Motorola, Inc. Base storage of handset's base registrations
US5517555A (en) * 1991-12-12 1996-05-14 Cellular Technical Services Company, Inc. Real time information system for cellular telephones
US5555551A (en) * 1993-06-29 1996-09-10 Airtouch Communications, Inc. Method and apparatus for fraud control in cellular telephone systems

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5200995A (en) * 1990-12-24 1993-04-06 Gaukel John J Universal outgoing call restriction circuit
US5325418A (en) * 1991-09-27 1994-06-28 Telemac Cellular Corporation Cellular phone accounting system
US5517555A (en) * 1991-12-12 1996-05-14 Cellular Technical Services Company, Inc. Real time information system for cellular telephones
US5335278A (en) * 1991-12-31 1994-08-02 Wireless Security, Inc. Fraud prevention system and process for cellular mobile telephone networks
US5345595A (en) * 1992-11-12 1994-09-06 Coral Systems, Inc. Apparatus and method for detecting fraudulent telecommunication activity
US5555551A (en) * 1993-06-29 1996-09-10 Airtouch Communications, Inc. Method and apparatus for fraud control in cellular telephone systems
US5509052A (en) * 1994-05-25 1996-04-16 Motorola, Inc. Base storage of handset's base registrations

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0896486A2 (en) * 1997-08-06 1999-02-10 Lucent Technologies Inc. A wireless terminal and wireless telecommunications system adapted to prevent the theft of wireless service
EP0896486A3 (en) * 1997-08-06 2000-03-22 Lucent Technologies Inc. A wireless terminal and wireless telecommunications system adapted to prevent the theft of wireless service
WO1999030521A1 (en) * 1997-12-05 1999-06-17 Telefonaktiebolaget Lm Ericsson (Publ) Mobile terminal having conditional blocking of outgoing call requests
US6463276B1 (en) 1997-12-05 2002-10-08 Telefonaktiebolaget L M Ericsson (Publ) Mobile terminal having conditional blocking of outgoing call requests
US6600902B1 (en) 1999-10-22 2003-07-29 Koninklijke Philips Electronics N.V. Multiple link data object conveying method for conveying data objects to wireless stations

Also Published As

Publication number Publication date
WO1997004602A3 (en) 1997-04-17

Similar Documents

Publication Publication Date Title
US5579376A (en) Phantom mobile-identification number method and apparatus
US4162377A (en) Data base auto bill calling using CCIS direct signaling
US7349697B2 (en) Mobile communication system, mobile terminal, subscriber information management apparatus, mobile network system, location area information registration method and call control method
US6381317B1 (en) Subscriber-initiated automated third party billing feature
US5809125A (en) Method and apparatus for intercepting potentially fraudulent telephone calls
US20060177029A1 (en) Virtual multi-line telephone service
US20020022472A1 (en) Multiple virtual wallets in wireless device
JPH0323751A (en) Method and device for constaining credit-card communication issuance
CN1658686A (en) System and method for SMS message filtering
US20050013423A1 (en) Telecommunication method and apparatus with provisions to exceed usage limit
US6487402B1 (en) System and method for providing access to a wireless communication service to a group of subscribers who share a set of modems
US6088584A (en) Methods for cellular pay phone/debit phone support on analog channels
US6771757B1 (en) Method for producing a service profile based on user's choice for an extension in a telecommunications network
US6430279B2 (en) Method for the acceptance of calling charges for individual calls as well as telephone network and terminal unit
US5812650A (en) Method and apparatus for intercepting potentially fraudulent
WO1997004602A2 (en) Method for using personal identification numbers with telecommunications calls
CN1859589B (en) Call processing method and device
US6393300B1 (en) Device for connecting a telephone switch to a fixed telephone network via a radio telephone network
US20020128022A1 (en) Alternate directory number on outbound calls
US8200276B2 (en) Communication method
US20080130851A1 (en) Casual usage alternate billing
US20010027528A1 (en) Enhanced pin-based security method and apparatus
US20010002364A1 (en) Procedure and system for setting up a telecommunication connection
EP1299997B1 (en) Arranging of billing in a telecommunication system
KR20010011973A (en) Billing Method for each users in mobile communication system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): BR CA CN KR MX

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

AK Designated states

Kind code of ref document: A3

Designated state(s): BR CA CN KR MX

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA