1. Field of the Invention
Embodiments of the present invention generally relate to wireless telecommunication systems and, more specifically, to systems and methods for locating a mobile subscriber terminal when roaming.
2. Description of the Related Art
It has become common practice for individual consumers to use telecommunications systems for conducting financial and other transactions. Specifically, wireless communication devices and/or the Internet are frequently used for point-of-sale (POS) and on-line transactions, such as banking, purchasing, and other financial transactions. Consequently, the development of robust security and authentication procedures for such transactions is becoming increasingly important, particularly when the individual making the transactions is traveling in a foreign country.
Further, with the modern ubiquity of foreign travel, the ability to remotely and reliably locate an individual, in either a commercial or personal context, is frequently desirable. Current techniques for determining the physical location of an individual who is traveling involve obtaining the location of a mobile subscriber terminal, e.g., a cell phone, smart phone, or other wireless telecommunication device, by issuing a request to the operational support system of the individual's wireless communication service provider. For example, the home location register (HLR) of a service provider can identify the mobile switching center (MSC) that is serving a particular mobile subscriber terminal and thereby determine an approximate geographical location of the mobile subscriber terminal. However, such an approach for locating a user assumes that the user of the mobile subscriber terminal is in-network and consequently the approach does not work when the user travels out-of-network, e.g., to a foreign country. Accordingly, there is also a need in the art for reliably and remotely locating a user of a mobile subscriber terminal when the user roams out of the home service network.
One or more embodiments of the invention provide techniques for locating a mobile subscriber when the mobile subscriber roams out of his or her home network. According to these techniques, a data structure mapping mobile switching centers (MSCs) to the physical location of the MSCs is accessed and this mapping is used to locate a mobile subscriber when the mobile subscriber roams out of his or her home network and registers with one of these MSCs. The location of the mobile subscriber may be used to authorize a transaction initiated by the mobile subscriber or to authenticate the mobile subscriber when signing into secure accounts.
A method of locating a user of a mobile device who has roamed out of network, according to an embodiment of the invention, comprises the steps of receiving an identifier of a mobile switching center (MSC ID) that is serving the user out of network and accessing a data structure that maps MSC IDs of a plurality of serving networks to physical locations of the MSCs to determine a location corresponding to the MSC ID as the location of the user.
A non-transitory computer readable storage medium, according to an embodiment of the invention, comprises computer-executable instructions and a data structure that maps identifiers of mobile switching centers (MSC IDs) of a plurality of serving networks to physical locations of the MSCs. When the instructions are carried out by a computer, the computer carries out the steps of receiving from a server of a home network that is managing a home location registry (HLR) database an identifier of an MSC that is outside the home network, determining a location of the MSC corresponding to the identifier of the MSC using the data structure, and transmitting location data indicating the location of the MSC to the server of the home network. The computer that is carrying out the above steps may be part of the home network or outside the home network and operated by a third party.
A method of authorizing a transaction, according to an embodiment of the invention, comprises the steps of receiving a request to authorize a transaction being conducted at a point-of-sale (POS), acquiring purchaser data from the request, transmitting a request to locate the purchaser and receiving location data indicating a location of the purchaser in response thereto, comparing a POS location with the purchaser location, and authorizing or denying the transaction based on the step of comparing.
A method of authenticating a user for access to a secure account, according to an embodiment of the invention, comprises the steps of receiving a request to access the secure account from an IP address associated with the user, transmitting a request to locate the user and receiving location data indicating a location of the user in response thereto, comparing a location associated with the IP address with the location of the user, and authorizing or denying the access based on the step of comparing.
So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
For clarity, identical reference numbers have been used, where applicable, to designate identical elements that are common between figures. It is contemplated that features of one embodiment may be incorporated in other embodiments without further recitation.
Home network 101 is a wireless communication system that includes at least one mobile switching center (MSC) 102, a home location register (HLR) 103, and a plurality of cell towers 161-165. MSC 102 connects the landline public switched telephone network system to home network 101. Home network 101 may be a small network and only include a single MSC 102. Alternatively, home network 101 may be a relatively large network, i.e., a network that services a large geographical area, and may include multiple MSCs 102. For clarity, only a single MSC 102 is depicted in
System 150 includes a location provider 106 and a location mapping database 108. Location provider 106 is a logical module, program, or algorithm that determines the location of mobile subscriber terminal 100 by querying location mapping database 108. Location mapping database 108 is a data structure that maps each MSC 102 in home network 101 to a specific geographical location. In some embodiments, location mapping database 108 also maps each of cell towers 161-165 to a specific geographical location. In some embodiments, system 150 may be an integral part of the operational support system (OSS) of the cellular service provider. Consequently, location provider 106 and location mapping database 108 may be constructed, maintained, and populated by the operator of home network 101. In other embodiments, system 150 may be a separate entity from home network 101 and therefore may be constructed, maintained, and populated by a third party.
Communication between home network 101 and system 150 is carried out via communication network 107. In some embodiments, communication network 101 may be the Internet, the Signaling System 7 (SS7) network, the public switched telephone network (PSTN) or a combination thereof. The SS7 network is used for communicating control, status, and signaling information between nodes in a telecommunication network.
In operation, when mobile subscriber terminal 100 physically enters the geographical region served by home network 101, mobile subscriber terminal 100 registers with home network 101 and MSC 102 captures the identity of the specific cell tower of cell towers 161-165 that is closest to mobile subscriber terminal 100. This registration process enables mobile subscriber terminal 100 to be alerted to an incoming phone-call or message. Calls are completed and messages delivered via this closest cell tower.
As mobile subscriber terminal 100 changes location in home network 101, the identity of the closest cell tower is maintained by MSC 102. Location provider 106 periodically queries HLR 103 via communication network 107 in order to track the current MSC and/or cell tower that is closest to mobile subscriber terminal 100. In some embodiments, the cell phone number associated with mobile subscriber terminal 100 is used to identify mobile subscriber terminal 100. In other embodiments, location provider 106 uses a serialized equipment number associated with mobile subscriber terminal 100 to identify mobile subscriber terminal 100. If the mobile registry is null, i.e., mobile subscriber terminal 100 is not currently registered in home network 101, then a “not-in-network” message is returned to location provider 106 by HLR 103.
After location provider 106 receives a reply from HLR 103 that identifies the closest MSC and/or cell tower to mobile subscriber terminal 100, location provider 106 queries location mapping database 108 via query 109. Query 109 includes the MSCID of said MSC and/or the appropriate cell tower number. Location mapping database 108 then returns the geographical location of MSC 102 to location provider 106 via reply 110. In some embodiments, the granularity of position of mobile subscription terminal 100 is enhanced by also providing cell tower location in reply 110. In other embodiments, inclusion of the geographical location of MSC 102 in reply 110 is sufficient. Thus, location provider 106 is continuously updated with the current geographical location of mobile subscriber terminal 100 and, presumably, the mobile subscriber, and consequently can provide such location information to any authorized party, e.g., employer, spouse, bank, on-line merchant, etc.
Roaming network 201 is substantially similar in organization and operation to home network 101, and includes one or more MSCs 202, each with its attendant cell towers 361-365. In addition to HLR 103, home network 101 includes a remote HLR, herein referred to as HLR-R 203. HLR-R 203 contains information regarding the MSC 202 in roaming network 201 in which mobile subscriber terminal 100 has registered.
Similar to HLR 103, HLR-R 203 contains geographical information regarding mobile subscriber terminal 100. In contrast to HLR 103, HLR-R 203 contains a data structure 205 that identifies the particular MSC 202 in roaming network 201 that is currently serving mobile subscriber terminal 100. Information contained in data structure 205 includes a mobile subscriber identification number, MSC identification number, mobile subscriber terminal serial number, etc. In some embodiments, data structure 205 may also include the cell tower number of the closest cell tower to mobile subscriber terminal 100.
System 350 is substantially similar in organization and operation to system 150 in
When mobile subscriber terminal 100 is outside home network 101, roaming network 201 accepts registry of mobile subscriber terminal 100, assuming there is a roaming agreement between the operator of home network 101 and the operator of roaming network 201. As part of normal operation of home network 101 and roaming network 201, the identity of mobile subscriber terminal 100 is communicated over a telephony signaling network 210 to home network 101, together with the appropriate MSC identification for MSC 202 for inclusion in data structure 205, where MSC 202 is the MSC currently serving mobile subscriber terminal 100. Such information that is communicated from roaming network 201 to home network 101 may be maintained in roaming network 201 in a database equivalent to data structure 105 in HLR 103 for mobile subscriber terminals from other networks, i.e., mobile subscriber terminals roaming in roaming network 201. This database containing information related to roaming subscriber units is called the Visitor Location Registry (VLR).
In operation, location provider 306 queries home network 101 regarding the location of mobile subscriber terminal 100. When HLR 103 is queried by location provider 306, mobile subscriber terminal 100 is discovered to be roaming. Location provider 306 then queries HLR-R 203, and receives the MSC ID of MSC 202, which is the MSC currently serving mobile subscriber terminal 100 in roaming network 201. The geographical location of mobile subscriber terminal 100 is then obtained from location mapping database 308 in the same way that system 150 obtains geographical location for mobile subscriber terminal 100 from location mapping database 108. Thus, location provider 306 is continuously updated with the current geographical location of mobile subscriber terminal 100, even when mobile subscriber terminal 100 is located in a foreign country or otherwise roaming outside home network 101. Consequently, location provider 306 can readily provide location information for mobile subscriber terminal 100 to any authorized party, e.g., employer, spouse, bank, on-line merchant, etc.
In some embodiments, location mapping database 308 maps mobile subscriber terminal 100 to the physical location of a serving MSC in roaming network 201, e.g., MSC 202. Granularity of the position of mobile subscriber terminal 100 may be increased when location mapping data base 308 includes serving cell tower ID 401 and/or latitude/longitude coordinate 402 in roaming network 201, thereby mapping to the closest cell-tower and/or latitude/longitude coordinate. Latitude/longitude coordinate 402 may correspond to a fixed cell tower or MSC location, or may be a triangulated position between cell towers 361-365 that is determined by roaming network 201, or may be a GPS (Global Positioning Satellite) coordinate received directly from mobile subscriber terminal 100. Time-stamp 403 serves to indicate when the location entries were made to mapping database 308, and error radius 404 serves to quantify the granularity of the location estimate for mobile subscriber terminal 100.
In the embodiment illustrated in
Prior to method 600, a purchaser, who is also the user of mobile subscriber terminal 100, initiates a transaction, such as a credit card purchase, at POS 501. POS 501 queries the authorization entity 504 by transmitting authorization request 502 to authorization entity 504 to confirm allowance of the transaction. Authorization request 502 will include an identification of the subscriber, e.g. the mobile subscriber name and/or phone number. The physical location of POS 501 is either communicated explicitly in request 502, indirectly by caller ID if authorization request 502 is communicated by modem over a telephone network, or indirectly by IP address if authorization request 502 is communicated over the Internet. In one embodiment, the request includes a time-stamp of authorization request 502.
The method begins in step 601, in which authorization entity 504 receives authorization request 502. As noted above, authorization request 502 includes the physical location of the transaction taking place. In the case of an on-line transaction, the physical location for the transaction corresponds to a physical location of the IP address associated with the purchaser.
In step 602, authorization entity 504 acquires purchaser data from authorization entity 504, such as purchaser identification data and physical location data for the transaction.
In step 603, authorization entity 504 transmits location request 508 to location provider 506.
In step 604, authorization entity 504 receives location response 509 from location provider 506. Location response 509 includes location data indicating the current physical location of the purchaser based on the location of mobile subscriber terminal 100.
In step 605, authorization entity 504 compares the physical location of the transaction as acquired in step 602 to the physical location of the purchaser reported by location provider 506 in step 604. In some cases, obtaining the physical location of the transaction may require an additional step. For example, if the transaction is being made with a merchant that has a chain of stores at different physical locations, techniques described in U.S. patent application Ser. No. 11/994,977, which is incorporated by reference herein in its entirety, may be used to obtain the physical location of the transaction.
In step 606, authorization entity 504 transmits an appropriate authorization response 503 to POS 501 based on the results of step 605. For example, the response from authorization entity 504 is “accepted” (or “authorized,” “allowed,” etc.) and the transaction can proceed if the two locations compared in step 605 are found to be within a predetermined minimum radius, e.g., 100 miles. This predetermined minimum radius is dependent on the geographical location being considered and the serving radius of an MSC. In sparsely populated areas, the serving radius of an MSC can be on the order of 100 miles and the predetermined minimum radius is adjusted accordingly. On the other hand, in densely populated areas, the serving radius of an MSC is much less than 100 miles, on the order of 5 miles or so, and the predetermined minimum radius is adjusted accordingly. The response from authorization entity 504 is “denied” if the two locations compared in step 605 are found to be separated by more than the predetermined minimum radius. In the latter case, the merchant may take the appropriate action such as notifying the authorities in the case of fraud. In an alternative embodiment, authorization entity 504 may over-ride the decision based on behavioral patterns of the purchaser and/or behavioral patterns of the merchant. For example, if the purchaser is a frequent traveler, authorization entity 504 may authorize the transaction even if the distance between the two locations compared in step 605 exceeds the predetermined minimum radius. In some embodiments, if authorization entity 504 has not been informed of the nature of the travel by the purchaser, authorization of the transaction may be withheld even if the distance between the two locations compared in step 605 is within the predetermined minimum radius.
In a first embodiment, a location provider, e.g., 106, 306 or 506, retrieves the MSC ID from home network 101 and then issues an information request 701. From an information response 702, the location of the MSC serving mobile subscriber terminal 100 is obtained from a location mapping database 108, 308. If the mobile subscriber/purchaser is in home network 101, then additional granularity in the form of cell-tower identifiers may be available. If the subscriber is roaming, then the response may only have the MSC ID of the MSC in roaming network 201 that is serving mobile subscriber terminal 100.
In a second embodiment, the mobile subscriber is roaming when initiating a transaction. The location provider, e.g., location provider 306 or 506, retrieves the MSC ID from home network 101 and thereby identifies the roaming network 201. The location of the mobile subscriber terminal 100 is obtained from roaming network 201 by issuing an information request 703 to the provider of roaming network 201. Information request 703 may be made over the Internet or over the SS7 network. An information response 704 will include additional granularity of geographical location of mobile subscriber terminal 100 in the form of serving cell tower numbers associated with the serving MSC in roaming network 201. Such geographical information can be written to the appropriate location mapping database, e.g., location mapping database 108 or 308.
In a third embodiment, mobile subscriber terminal 100 has an embedded application and GPS location capability. A location provider issues a location information request 705 directly to mobile subscriber terminal 100 using the Internet or the Short Message Service (SMS) capability of the cellular telephony network. The embedded application transmits an information response 706 with the current location (latitude/longitude) of the mobile.
The invention has several advantages over existing methods. The method of augmentation based on establishing the location of a mobile subscriber's mobile subscriber terminal provides an additional layer of security. This additional layer of security is of special importance when the financial transaction occurs in a geographical location different from the mobile subscriber's home area. The mobile subscriber terminal is therefore likely to be in a roaming mode and this is addressed by the invention. A credit card transaction is rejected when it is ascertained that the mobile subscriber terminal associated with the purchaser is not in the vicinity of the POS terminal. This is of special importance when the credit-card user is traveling, for example, in a foreign country. Embodiments of the invention enable all credit card company fraud alert mechanisms to flag the usage of a credit card as being used in a geographical location distant from the mobile subscriber's home address. The premise of the augmentation method is that the presence of a mobile subscriber's mobile subscriber terminal close to a POS terminal will increase the probability that the card is being used by the authorized user.
The exchange of messages between the various entities can be achieved advantageously by packet communication using encrypted payloads over a conventional Internet Protocol (IP) network. Other methods for such communication include using high-speed voice-band modems over the public switched telephone network. Traditional POS terminals deployed currently communicate with the authorization entity using modems (dial-up).
The invention can be used to augment security in the case of secure log-in, especially when the subscriber is attempting to access financial institutions from a location, such as an Internet café, that is distinct and separate from his/her normal (e.g., home or office) location. Such situations arise naturally when the subscriber is traveling. The IP address of the log-in point will have an indication as to the location of the server being used and this can be compared with the location of the subscriber's mobile that is obtained in a manner taught by this invention. Numerous other applications requiring confirmation that are location-oriented can benefit from embodiments of the invention.
Prior to method 800, the user of mobile subscriber terminal 100 initiates a request to access a secure account via the Internet, such as a private bank account. In other embodiments, the account being accessed is not a financial account, but may be any account for which it is desirable for the user to be authenticated prior to having access to the account. When the user attempts to access the secure account, an authentication request is transmitted to an authentication entity, which determines whether the user may access the secure account. The authentication request includes an identification of the user, e.g. user ID, and the IP address from which the user is accessing the secure account.
The method begins in step 801, in which the authentication entity receives the authentication request. In step 802, the authentication entity acquires user data, such as the phone number of the user's mobile subscriber terminal. In step 803, the authentication entity transmits a location request to a location provider, such as location provider 106, 306, 506 described above. The location request includes the phone number of the user's mobile subscriber terminal. In step 804, the authentication entity receives a location response from the location provider. The location response includes location data indicating the current physical location of the user based on the location of the user's mobile subscriber terminal. The location of the user's mobile subscriber terminal is obtained by the location provider using the phone number of the user's mobile subscriber terminal in the same manner as described above for location providers 106, 306, 506.
In step 805, the authentication entity compares the physical location of the IP address associated with the user, as determined from methods known in the art, to the physical location of the user reported by the location provider in step 804 in order to authenticate the user. In step 806, the authentication entity either permits or denies access to the secure account based on the results of the comparison conducted in step 805. The authentication entity permits access if the two locations compared in step 805 are found to be within a predetermined minimum radius and denies access if the two locations compared in step 805 are found to be separated by more than the predetermined minimum radius. This predetermined minimum radius is set in the same manner described above in conjunction with
While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.