$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Cellular telephone anti-fraud system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04B-007/00
출원번호 US-0074083 (1993-06-08)
발명자 / 주소
  • Frederick Max B. (Arnold CA)
출원인 / 주소
  • Corsair Communications, Inc. (Sunnyvale CA 02)
인용정보 피인용 횟수 : 68  인용 특허 : 0

초록

Authorized use of a wireless subscriber system, e.g. cellular telephone system, is distinguished from unauthorized use by electronically observing a plurality of external signal traits which represent alterations in the radio frequency signal due to physical characteristics identified with a particu

대표청구항

A transmitter identification system for identifying a transmitter which produces a transmitter signal in which information is encoded by manipulating a carrier, the transmitter signal including external signal traits resulting from said manipulation that are characteristic of said transmitter, compr

이 특허를 인용한 특허 (68)

  1. Hoogerwerf David N. ; Green Evan R. ; Stanhope David M. ; McKernan Randy, Active waveform collection for use in transmitter identification.
  2. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint a.
  3. Morton John W. ; Smith Thomas C., Apparatus and methods for providing wireless system fraud and visibility data.
  4. Baulier Gerald Donald ; Cahill Michael H. ; Ferrara Virginia Kay ; Lambert Diane, Automated and selective intervention in transaction-based networks.
  5. Baulier Gerald Donald ; Cahill Michael H. ; Ferrara Virginia Kay ; Lambert Diane, Automated fraud management in transaction-based networks.
  6. Hawkes Kelly Davidson, Bit characteristics measurement system for digitally modulated signals.
  7. Marth Charles ; Wruk Kenneth D. ; Lemke Kurt T. ; Shenzhong Zhu, Cellular fraud deterrent system.
  8. Frederick Max B., Cellular telephone anti-fraud system.
  9. Frederick Max B., Cellular telephone anti-fraud system.
  10. Hawkes Kelly Davidson ; McKinley Michael Shaw ; Talbot Kenneth Irwin, Cellular telephone fraud prevention system using RF signature analysis.
  11. Hoogerwerf David N. ; Stanhope David M. ; McKernan Randy, Detection and prevention of channel grabbing in a wireless communications system.
  12. Nakao,Toshiyuki; Hayama,Kazuhiro; Matsuo,Norihiko, Device management system, management client, controller server, method for managing usage context of device, and recording medium which records the method.
  13. Karlsson,Lars, Direction finding method and system using transmission signature differentiation.
  14. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  15. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  16. Lerner Daniel M. ; MacLagan Charles Wesley ; Geiselman John M. ; Bobola Robert E. ; Sucilla Gregory A., Encryption key management system and method.
  17. Koike, Motoyuki; Smyers, Scott, Generation of home network use recommendations based on collected metadata of prior connected items.
  18. Bannister Cecil H., Hybrid multizone call delivery system.
  19. Willey W. Daniel, Method and apparatus for detection of fraudulent users in a communication system using signaling-channel phase shift.
  20. Cadd Jimmy W., Method and apparatus for enhancing the detection of the presence of an FM signal using a coded pattern.
  21. Jacobs Pamela J., Method and apparatus for event data maintenance per MIN/ESN pair in a mobile telephone system.
  22. Kaminsky William J. ; Medina Robert C. ; Daniels David Leighton ; Parzych Matthew John, Method and apparatus for fraud control in a cellular telephone switch.
  23. Kaminsky William J. ; Sanpore Jeffrey G. ; Daniels David L. ; Kennedy Mary H., Method and apparatus for fraud control in cellular telephone systems.
  24. Kaminsky William J. ; Sanpore Jeffrey G. ; Daniels David L. ; Kennedy Mary H., Method and apparatus for fraud control in cellular telephone systems.
  25. Rudokas Ronald Steven ; Storch John Adam ; Daniels David Leighton, Method and apparatus for fraud control in cellular telephone systems.
  26. Geiselman, John Milton; Bobola, Robert E.; Lerner, Daniel M., Method and apparatus for securing communications.
  27. J. Milton Geiselman ; Robert E. Bobola ; Daniel M. Lerner, Method and apparatus for securing digital communications.
  28. LaDue Christoph K., Method and apparatus for transmitting subject status information over a wireless communications network.
  29. Leclercq, Agnes, Method and device for detecting attempts at intruding on a communication link between an aircraft and a ground station.
  30. Vitorino, Diana, Method and system for handling a faulty registration for a mobile communications device.
  31. Josenhans Charles A. ; Waliser Shawn M. ; Moore Joseph B., Method and system for preventing mobile roaming fraud.
  32. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  33. Pennypacker Frank ; Corrigan Richard J. ; Burke Timothy M., Method for detecting fraudulent use of a communication system.
  34. Mitchell John ; Houghton Matthew A., Method for terminating a wireless communication of a mobile communication unit.
  35. Sanmugam K. Raj,GBX, Method of detecting fraud in a radio communications network by analyzing activity, identification of RF channel data for.
  36. Li Yang ; Rao D. Ramesh K. ; Subbiah Subramanian, Method of using fingerprints to authenticate wireless communications.
  37. Kawakami, Takaaki, Mobile object search system and mobile object search method for mobile service.
  38. Alexander F M Edwards GB, Monitoring a communication network.
  39. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  40. Choi, Heesook; Dawson, Travis Edward, Preventing clone device registration in a wireless communication system.
  41. Jyrki Kortesalmi FI; Tapio Pelto FI, Preventing misuse of a copied subscriber identity in a mobile communication system.
  42. Marley,Neil; Debney,Charlie William, Provision of location dependent services without revealing the user identity via a mobile telecommunications network.
  43. Dauble Steven F. ; Hermo Joseph I. ; Lee Ming Ho ; Nelson Astley George, Public telephone clip-on fraud prevention system.
  44. Wigren, Torbjörn; Baldemair, Robert; Kazmi, Muhammad; Israelsson, Martin; Gerstenberger, Dirk, Radio fingerprint method in a positioning node for providing geographic region data.
  45. Weir Earline Madsen, Restricted access telephones for logical telephone networks.
  46. Rhoads Geoffrey B., Steganographic methods and media for photography.
  47. Patel Sarvar, Strengthening the authentication protocol.
  48. Hoogerwerf David N. ; Stanhope David M., System and method for collection of transmission characteristics.
  49. Kaplan Dmitry ; Sharma Chetan, System and method for detection of fraud in a wireless telephone system.
  50. Otterson Scott D. ; Kaplan Dmitry, System and method for detection of fraud in a wireless telephone system.
  51. Kaplan Dmitry ; Sharma Chetan ; McKernan Randy, System and method for detection of redial fraud in a cellular telephone system.
  52. Tseng Stone ; Basu Kalyan, System and method for faulty mobile unit isolation.
  53. Diener,Neil R.; Kloper,David S.; Floam,D. Andrew, System and method for monitoring and enforcing a restricted wireless zone.
  54. Chwieseni, Edward T.; White, Eric D., System and method for self propagating information in ad-hoc peer-to-peer networks.
  55. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., System and method for the verification of authentic telephone numbers in a wireless telephone system.
  56. Thomas C. Smith ; John W. Morton ; Jefferey T. Seymour ; Gregory S. Visser ; David L. Henseler, Systems and methods for monitoring data signals on a communications network.
  57. Smith,Thomas C.; Morton,John W.; Seymour,Jefferey T.; Visser,Gregory S.; Henseler,David L., Systems and methods for providing visibility to SS7 integrated on-line networks.
  58. Gailloux, Michael A.; King, Lauren Ricardo St. Aubyn, Telecommunication service provider customer account portal for strategic partners.
  59. Dunn James Michael ; Ganek Alan George ; Stern Edith Helen ; Willner Barry Edward, Telephony fraud detection using voice recognition techniques.
  60. Stoddard Robert Eugene ; McKinley Michael Shaw, Validation method and apparatus for preventing unauthorized use of cellular phones.
  61. Kaplan Dmitry ; Stanhope David M., Waveform collection for use in wireless telephone identification.
  62. LaDue Christoph K., Wireless cellular communicator system and apparatus.
  63. LaDue Christoph Karl, Wireless communications application specific enabling method and apparatus.
  64. LaDue Christoph Karl, Wireless gaming method.
  65. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  66. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  67. Rhoads, Geoffrey B., Wireless methods and devices employing steganography.
  68. Rhoads,Geoffrey B., Wireless methods and devices employing steganography.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로