1. Technical Field
The invention relates to telecommunications. More particularly, the invention relates to a method and apparatus for secure, immediate, wireless access in a telecommunications network.
2. Description of the Prior Art
Many useful voice and data wireless applications are not cost-effective for carriers to support because the cost of provisioning the network and devices can be greater than the revenue generated from the service. Implementing instant wireless activation and provisioning eliminates the need for call center agents to provide basic device provisioning and activation services, increasing provisioning speed and accuracy. In addition, the technology infrastructure used for instant activation and provisioning inherently supports Wireless Sessions in which network resources are used only on demand.
This allows carriers to support more customers with the same network resources. The cost-savings resulting from instant wireless activation, provisioning and Wireless Sessions can enable carriers to increase operating margins across all markets, and profitably serve lower ARPU and intermittent-use applications such as prepaid wireless phones. This capability is critical to overall carrier competitive success because of the fast market growth and high overall revenue potential for these applications.
In today's markets, wireless operators are facing three key issues: falling ARPU, the need to reduce acquisition costs and the need to reduce the cost of operating and maintaining customers. Operators are spending millions of dollars in device activation and provisioning costs today, a cost believed to be constant and unchangeable.
Furthermore, the potential of wireless applications is expanding to include a wide variety of high-volume, intermittent wire-less use scenarios such as wireless modems, telemetry transmitters, emergency-only devices and wireless handset rentals for business and vacation travelers. While the overall revenue potential for serving this market is enormous, many of these applications could cost more to provision than the carriers would realize in profits. This is true because wireless carriers commonly come from a landline background, and use the call center-based methodology for service provisioning that is traditional for that market.
The call center-based provisioning process requires the customer to use a landline telephone to access an agent in the carrier's call center. The agent collects information such as the customer's location, credit information, equipment description, and services requested. This information is entered manually into a proprietary system, which relays it to the many internal systems required to provision the wireless network for device activation. The agent may also provide verbal device provisioning instructions to the user, who then activates the device manually.
Some of the information provided to the agent during the provisioning process, such as the customer's address, requires basic data entry on the part of the operator. Other elements require action by the agent, such as checking credit history and ensuring that the device the customer wants to activate is certified and has been purchased through appropriate channels.
When customers sign up for extended service contracts with a set monthly fee, the call center-based approach to provisioning, while expensive, is financially viable. Today, a new class of wireless users is emerging that does not ensure fixed monthly revenue. These users want to take advantage of applications in which wireless use may be pre-paid, infrequent, for emergency only, or machine-to-machine.
While the overall revenue potential for serving this emerging high volume, intermittent-use market is enormous, many of these applications cost more to provision than the carriers would realize in profits under the traditional call center-based provisioning scenario. Even though network costs per user are reduced as more customers are added to the network, there is no corresponding economy of scale on the provisioning side. For these users, the traditional approach to provisioning is not necessarily financially viable for carriers.
The preferred embodiment of the invention comprises a wireless device and messaging system that provides Secure Immediate Wireless Access (SIWA) to wireless device onto existing wireless networks, such as GSM, CDMA, TDMA, and analog (AMPS). The SIWA protocol uses existing wireless network messaging to exchange information between wireless devices and a network server, referred to herein as an Intelligent Service Manager (ISM). The ISM acts as a gateway between wireless devices and wireless service providers, and provides the wireless devices with an immediate limited or unlimited access to the wireless network. The ISM can also deny access to the wireless network from unauthorized wireless devices.
The preferred embodiment of the invention comprises a wireless telephone and messaging system that provides Secure Immediate Wireless Access (SIWA) to wireless telephones onto existing wireless networks, such as GSM, CDMA, TDMA, and analog (AMPS). The SIWA protocol uses existing wireless network messaging to exchange information between wireless devices (MS) and a network server, referred to herein as an Intelligent Service Manager (ISM). The ISM acts as a gateway between wireless devices and wireless service providers, and provides the wireless devices with an immediate limited or unlimited access to the wireless network. The ISM can also deny access to the wireless network from unauthorized wireless devices.
One benefit to wireless service providers is lower operational costs increasing marginal returns associated with subscriber acquisition.
Another benefit to wireless service providers is the market opportunity increases the user base by offering wireless communications for new purposes (e.g. telemetry, telematics) as well as new distribution channels (e.g. convenience stores).
A benefit to wireless users is the easy access to services offered by wireless service provider with no preliminary obligations and instant gratification. Furthermore, wireless devices that are configured to work with multiple service providers allow the user to selectively choose between them.
To service providers, the ISM is a trusted gatekeeper that allows them to provide services with an automated subscriber management and network resource assignment.
In comparison to existing over-the-air activation solutions, the herein disclosed SIWA does not require the implementation of extensions to existing wireless network protocols, nor does it require changes to existing wireless network elements, such as BTS, BSC, MSC, VLR, HLR and/or AC. The invention makes an efficient use of Mobile Station ID (MSID, also known as IMSI in GSM, MIN in TDMA and Analog, and MIN or IMSI in CDMA) by allocating them on a session basis where session can be dynamically defined, e.g. time or capacity limits.
Business model logic can also include additional information needed to manage sessions. Such information might include rules on account/session expiration, phone number recycling, phone number multiplexing requirements, and interaction with other network-based applications. For example, a conventional prepaid subscription can be defined as a session that starts when a user purchase its initial airtime and end after no airtime is being purchased for a pre-determined time. A telemetry wireless device (a transmitter) example might define a session that start every time the device registers on the network and end when its transmitted message is sent to destination.
An important benefit of the invention is the efficient assignment of MSDN (also known as MSISDN in GSM or MDN in CDMA/TDMA/Analog) on a per need basis.
For purposes of the discussion herein, the wireless device is identified in the figures by the designation MS, the network elements are identified in the figures by the designation BS/MSCNLR, and the intelligent service manager is identified in the figures by the designation ISM.
The presently preferred embodiment of SIWA is composed of two major layers:
SIWA Abstraction Layer
This layer concerns Wireless Sessions, which provide a limited or unlimited proof to use a particular service. Such limit could be, for example, time based, usage based, content based, or single use. The Wireless Session is comprised of a <SiwaID, SiwaKey> pair, which uniquely identifies the Wireless Session and proves it is authentic, genuine, and valid. Note that the SiwaID is unique among Wireless Sessions and includes the services with which it is associated. The process of acquiring a Wireless Session is referred to herein as a bootstrap process.
In connection with the preferred embodiment of the invention, the abstraction layer primarily concerns the following Wireless Session Operations:
SessionPromote—an operation invoked by ISM to provide the user with an option to purchase a session for a service.
SessionPurchase—an operation invoked by user/device to purchase a session for a service.
SessionGranted—an operation invoked by ISM to provide the user with the <SiwaID, SiwaKey> of a valid session.
SessionDenied—an operation invoked by ISM to provide the user with the reason of the purchase failure.
SessionChallenge—an operation invoked by ISM to ask for the authenticity of a session.
SessionProof—an operation invoked by user/device to provide the ISM with a proof of the session authenticity.
SessionApproved—an operation invoked by ISM to approve the user/device use the session.
SessionExpired—an operation invoked by ISM to deny a session due to service expiration.
SessionDepleted—an operation invoked by ISM to deny session due to service to depletion.
SessionFraudulent—an operation invoked by ISM to deny session due to lack of authenticity.
SessionProvideInfo—an operation invoked by user/device to provide session information such as expiration or usage.
SessionInfo—an operation invoked by ISM to provide the user/device with session information, which could be unsolicited as well.
Adaptation Layer
This layer concerns the actual mapping of the logical operations described into the existing wireless network.
Bootstrap Process
The following is a discussion of a typical bootstrap process according to the invention:
Once the device has been powered on and before the first network access attempt, either registration or call origination, the MS checks for the Wireless Session status. If a non-active Wireless Session status is detected, the MS then changes its state to “Bootstrap Process Initiated”. The MS selects a bootstrap network identity and remains in the bootstrap state until a SessionGranted is received. The SessionGranted provides the mobile network identity, that is the assigned Mobile Station ID or MSID. It could also include a new SiwaKey or a derived key, such as an A-Key (e.g. in CDMA/TDMA/Analog). As an enhancement, the SessionGranted returns the bootstrap network identity back to the MS for a limited use, such as one time use or limited time use. This would enable occasional and bursty-data transmitters use the bootstrap network identifier for the duration of the data transmission, therefore conserve network identifiers.
Once provided by the ISM, the newly assigned network identity is programmed into the MS and the MS is required to re-initiate its network access using its new identity. In addition, the ISM can decide to invalidate the provided Wireless Session as a result of an expiration or usage depletion. The MS preferably always checks the Wireless Session status before re-initiating its network access.
The MS selects an MSID for use during the bootstrap process. This MSID is allocated from a plurality of bootstrap MSIDs known to the network. Different bootstrap MSID selection algorithm could apply using different allocation schemes, for example using carrier or national or global specific pools, location sensitive pools, etc. In the case of an MSID collision between two bootstrapping devices, either one of the colliding devices can be rejected from the network, i.e. an authentication failure. Once detected, the MS is required to initiate a new bootstrap process.
Optionally, the MS, once powered on and after scanning the available networks, interacts with the user to select the desired service provider. The MS then selects a bootstrap MSID known by the selected network.
Optionally, the bootstrap process can include a session purchase phase, where the user is acknowledged with a session promotion that could be purchased from the MS itself after certain user information is collected. In this case, the ISM sends a SessionPromote message to the MS. The MS returns a SessionPurchase message with the user information included, and a SessionGranted acknowledges the purchase in case of a successful purchase or a SessionDenied indicates a failure. The purchase phase can use any circuit and non-circuit data transport layer (e.g. SMS, USSD, GPRS, UMTS, CDMA, cdmaOne and cdma2000) for message exchange between ISM and the MS. It can also be encapsulated in higher Likewise; in case the session was pre-purchased the bootstrap process can include a NULL session purchase phase, in which no SessionPromote or SessionPurchase messages are exchanged.
In
In
In
In
In
In
Although the invention is described herein with reference to the preferred embodiment, one skilled in the art will readily appreciate that other applications may be substituted for those set forth herein without departing from the spirit and scope of the present invention. Accordingly, the invention should only be limited by the Claims included below.
This application is a division of U.S. patent application Ser. No. 11/100,791, filed Apr. 6, 2005, now U.S. Pat. No. 7,565,142, which is a division of U.S. patent application Ser. No. 10/136,712, filed Apr. 30, 2002, now U.S. Pat. No. 7,197,301, which claims benefit of U.S. provisional patent application no. 60/361,816, filed Mar. 4, 2002.
Number | Name | Date | Kind |
---|---|---|---|
4706275 | Kamil | Nov 1987 | A |
4756020 | Fodale | Jul 1988 | A |
4776000 | Parienti | Oct 1988 | A |
4776003 | Harris | Oct 1988 | A |
4831647 | D'Avello et al. | May 1989 | A |
4845740 | Tokuyama et al. | Jul 1989 | A |
4845772 | Metroka et al. | Jul 1989 | A |
4852149 | Zwick et al. | Jul 1989 | A |
4860341 | D'Avello et al. | Aug 1989 | A |
4897873 | Beutler et al. | Jan 1990 | A |
4945557 | Kaneuchi et al. | Jul 1990 | A |
4951308 | Bishop et al. | Aug 1990 | A |
5042063 | Sakanishi et al. | Aug 1991 | A |
5046088 | Margulies | Sep 1991 | A |
5127040 | D'Avello et al. | Jun 1992 | A |
5138650 | Stahl et al. | Aug 1992 | A |
5144649 | Zicker et al. | Sep 1992 | A |
5185790 | Mischenko | Feb 1993 | A |
5202912 | Breeden et al. | Apr 1993 | A |
5233642 | Renton | Aug 1993 | A |
5247700 | Wohl et al. | Sep 1993 | A |
5265155 | Castro | Nov 1993 | A |
5274802 | Altine | Dec 1993 | A |
5291543 | Freese et al. | Mar 1994 | A |
5297189 | Chabernaud | Mar 1994 | A |
5301223 | Amadon et al. | Apr 1994 | A |
5301234 | Mazziotto et al. | Apr 1994 | A |
5309501 | Kozik et al. | May 1994 | A |
5321735 | Breeden et al. | Jun 1994 | A |
5327144 | Stilp et al. | Jul 1994 | A |
5341414 | Popke | Aug 1994 | A |
5353335 | D'Urso et al. | Oct 1994 | A |
5359182 | Schilling | Oct 1994 | A |
5359642 | Castro | Oct 1994 | A |
5386455 | Cooper | Jan 1995 | A |
5440621 | Castro | Aug 1995 | A |
5452340 | Engelbeck et al. | Sep 1995 | A |
5469497 | Pierce et al. | Nov 1995 | A |
5475791 | Schalk et al. | Dec 1995 | A |
5499288 | Hunt et al. | Mar 1996 | A |
5509056 | Ericsson et al. | Apr 1996 | A |
5517555 | Amadon et al. | May 1996 | A |
5517558 | Schalk | May 1996 | A |
5517559 | Hayashi et al. | May 1996 | A |
5574771 | Scalisi et al. | Nov 1996 | A |
5579376 | Kennedy, III et al. | Nov 1996 | A |
5592535 | Klotz | Jan 1997 | A |
5651056 | Eting et al. | Jul 1997 | A |
5659597 | Bareis et al. | Aug 1997 | A |
5706399 | Bareis | Jan 1998 | A |
5719926 | Hill | Feb 1998 | A |
5722067 | Fougnies et al. | Feb 1998 | A |
5732346 | Lazaridis et al. | Mar 1998 | A |
5737707 | Gaulke et al. | Apr 1998 | A |
5754645 | Metroka et al. | May 1998 | A |
5761618 | Lynch | Jun 1998 | A |
5778313 | Fougnies | Jul 1998 | A |
5790636 | Marshall | Aug 1998 | A |
5794195 | Hormann et al. | Aug 1998 | A |
5802470 | Gaulke et al. | Sep 1998 | A |
5809124 | Bayod | Sep 1998 | A |
5812945 | Hansen et al. | Sep 1998 | A |
5815807 | Osmani et al. | Sep 1998 | A |
5826185 | Wise et al. | Oct 1998 | A |
5845246 | Schalk | Dec 1998 | A |
5848360 | O'Connell et al. | Dec 1998 | A |
5854975 | Fougnies et al. | Dec 1998 | A |
5875394 | Daly et al. | Feb 1999 | A |
5881134 | Foster et al. | Mar 1999 | A |
5887253 | O'Neil et al. | Mar 1999 | A |
5909485 | Martin et al. | Jun 1999 | A |
5915226 | Martineau | Jun 1999 | A |
5940775 | Scott | Aug 1999 | A |
5963859 | Keating | Oct 1999 | A |
5965848 | Atschul et al. | Oct 1999 | A |
5966654 | Croughwell et al. | Oct 1999 | A |
5983091 | Rodriguez et al. | Nov 1999 | A |
6014561 | Molne | Jan 2000 | A |
6029062 | Hanson | Feb 2000 | A |
6049710 | Nilsson | Apr 2000 | A |
6058300 | Hanson | May 2000 | A |
6065120 | Laursen et al. | May 2000 | A |
6101378 | Barabash et al. | Aug 2000 | A |
6115601 | Ferreira | Sep 2000 | A |
6131024 | Boltz | Oct 2000 | A |
6144653 | Persson et al. | Nov 2000 | A |
6144849 | Nodoushani et al. | Nov 2000 | A |
6167251 | Segal et al. | Dec 2000 | A |
6195546 | Leung et al. | Feb 2001 | B1 |
6212372 | Julin | Apr 2001 | B1 |
6226364 | O'Neil | May 2001 | B1 |
6275693 | Lin et al. | Aug 2001 | B1 |
6381454 | Tiedemann et al. | Apr 2002 | B1 |
6418310 | Dent | Jul 2002 | B1 |
6453162 | Gentry | Sep 2002 | B1 |
6463276 | Jonsson | Oct 2002 | B1 |
6466779 | Moles | Oct 2002 | B1 |
6529729 | Nodoushani et al. | Mar 2003 | B1 |
6577857 | Rodriguez | Jun 2003 | B1 |
6591364 | Patel | Jul 2003 | B1 |
6615059 | Pehrsson et al. | Sep 2003 | B1 |
6628934 | Rosenberg et al. | Sep 2003 | B2 |
6647426 | Mohammed | Nov 2003 | B2 |
6654600 | Pollak et al. | Nov 2003 | B1 |
6671731 | Cain | Dec 2003 | B1 |
6690930 | Dupre | Feb 2004 | B1 |
6725056 | Moles et al. | Apr 2004 | B1 |
6778525 | Baum | Aug 2004 | B1 |
6782422 | Bahl et al. | Aug 2004 | B1 |
6829250 | Voit | Dec 2004 | B2 |
6836651 | Segal et al. | Dec 2004 | B2 |
6871193 | Campbell et al. | Mar 2005 | B1 |
6912256 | Noblet | Jun 2005 | B1 |
7194756 | Addington et al. | Mar 2007 | B2 |
7266371 | Amin et al. | Sep 2007 | B1 |
7305090 | Hayes et al. | Dec 2007 | B1 |
20020004935 | Huotari et al. | Jan 2002 | A1 |
20020094808 | Tiedemann et al. | Jul 2002 | A1 |
20020107729 | Katz | Aug 2002 | A1 |
20020147019 | Uhlike et al. | Oct 2002 | A1 |
20020160815 | Patel et al. | Oct 2002 | A1 |
20020169966 | Nyman et al. | Nov 2002 | A1 |
20020174073 | Nordman et al. | Nov 2002 | A1 |
20030013434 | Rosenberg et al. | Jan 2003 | A1 |
20030027581 | Jokinen et al. | Feb 2003 | A1 |
20030061503 | Katz et al. | Mar 2003 | A1 |
20030083068 | Wong | May 2003 | A1 |
20030101246 | Lahti | May 2003 | A1 |
20030114149 | Lehtonen et al. | Jun 2003 | A1 |
20030115261 | Mohammed | Jun 2003 | A1 |
20030119489 | Mohammed | Jun 2003 | A1 |
20030119490 | Mohammed | Jun 2003 | A1 |
20040110497 | Little | Jun 2004 | A1 |
20040133668 | Nicholas | Jul 2004 | A1 |
20040218045 | Bodnar et al. | Nov 2004 | A1 |
20040261114 | Addington et al. | Dec 2004 | A1 |
20040261126 | Addington et al. | Dec 2004 | A1 |
20050102529 | Buddhikot et al. | May 2005 | A1 |
20050108423 | Centemeri | May 2005 | A1 |
20050181793 | Netanel | Aug 2005 | A1 |
20050207395 | Mohammed | Sep 2005 | A1 |
20050266853 | Gallagher et al. | Dec 2005 | A1 |
20050271008 | Gallagher et al. | Dec 2005 | A1 |
20060025132 | Karaoguz et al. | Feb 2006 | A1 |
20060114897 | Suri et al. | Jun 2006 | A1 |
20060116507 | Oppermann et al. | Jun 2006 | A1 |
20060143438 | Wu et al. | Jun 2006 | A1 |
20060256813 | Brusca et al. | Nov 2006 | A1 |
20060291455 | Katz et al. | Dec 2006 | A1 |
20070060097 | Edge et al. | Mar 2007 | A1 |
20070074240 | Addington et al. | Mar 2007 | A1 |
20070124488 | Baum et al. | May 2007 | A1 |
Number | Date | Country |
---|---|---|
19528423 | Feb 1997 | DE |
262685 | Apr 1988 | EP |
1189473 | Mar 2002 | EP |
1587292 | Oct 2005 | EP |
1791315 | May 2007 | EP |
2696067 | Mar 1994 | FR |
WO 9603001 | Feb 1996 | WO |
WO 9740616 | Oct 1997 | WO |
WO0025454 | May 2000 | WO |
WO0163900 | Aug 2001 | WO |
WO0214980 | Feb 2002 | WO |
WO0215493 | Feb 2002 | WO |
WO0215494 | Feb 2002 | WO |
WO02073985 | Sep 2002 | WO |
WO02078365 | Oct 2002 | WO |
WO02093811 | Nov 2002 | WO |
WO02103546 | Dec 2002 | WO |
WO03007633 | Jan 2003 | WO |
WO03039103 | May 2003 | WO |
WO2004014089 | Feb 2004 | WO |
WO2004049678 | Jun 2004 | WO |
WO2004049680 | Jun 2004 | WO |
WO2005001640 | Jan 2005 | WO |
WO2005048034 | May 2005 | WO |
WO2005114918 | Dec 2005 | WO |
WO2006029297 | Mar 2006 | WO |
WO2006044667 | Apr 2006 | WO |
WO2006124505 | Nov 2006 | WO |
WO2007002034 | Jan 2007 | WO |
WO2007002604 | Jan 2007 | WO |
WO2007059169 | May 2007 | WO |
WO2007059183 | May 2007 | WO |
Number | Date | Country | |
---|---|---|---|
20070300294 A1 | Dec 2007 | US |
Number | Date | Country | |
---|---|---|---|
60361816 | Mar 2002 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11100791 | Apr 2005 | US |
Child | 11849839 | US | |
Parent | 10136712 | Apr 2002 | US |
Child | 11100791 | US |