GB2459850A - Using a mobile phone for fraud prevention in credit card transactions - Google Patents
Using a mobile phone for fraud prevention in credit card transactions Download PDFInfo
- Publication number
- GB2459850A GB2459850A GB0808204A GB0808204A GB2459850A GB 2459850 A GB2459850 A GB 2459850A GB 0808204 A GB0808204 A GB 0808204A GB 0808204 A GB0808204 A GB 0808204A GB 2459850 A GB2459850 A GB 2459850A
- Authority
- GB
- United Kingdom
- Prior art keywords
- credit card
- mobile
- phone
- land line
- platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 230000002265 prevention Effects 0.000 title claims abstract description 6
- 230000006855 networking Effects 0.000 claims description 4
- 239000012089 stop solution Substances 0.000 claims 1
- 230000001360 synchronised effect Effects 0.000 abstract description 6
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A fraud prevention system utilizes a intelligent mobile phone and the mobile network to communicate with the credit card provider. It has the ability of down loading, via text, credit card transaction information and for the credit card user has the ability to switch on or off credit card transactions. The credit card user will also have the ability to set credit card transaction limits from a mobile or land line phone. The intelligent phone has software or possible chip and pin hardware and software that is synchronized and compatible with the credit card that is registered to the mobile or land line phone. After registration and network set up, the credit card user determines the maximum credit card transaction for that period in time. This is achieved by communicating to the credit card provider via the intelligent mobile phone and encrypted text messaging. The credit card user can bar or allow transactions via the mobile or land line phone.
Description
Objective To provide a fraud prevention system utilizing an intelligent mobile phone and the mobile network to communicate with the credit card provider. Thus being able to down load via text, credit card transaction information and the ability to switch on or off the authorized credit card holders account. Also the ability to set credit card transaction limits by the authorized credit card user. Goals
To be able to offer this facility to all credit card networks gwing them the ability to reduce credit card fraud. The intelligent phone will be able to interact with the credit card provider via the telecommunication and data infrastructure that already exists.
Solution The intelligent phone will have software or possible chip and pin software that is compatible with the credit card that is registered to the mobile phone. After registration and network set up, the credit card user determines the maximum credit card transaction for that period in time, this is achieved by communicating to the credit card provider via the intelligent mobile phone and encrypted text messaging. The credit card user can bar or allow transactions via the mobile phone.
Once this has been engaged the credit card user will be able to make or deny transactions. The transaction is delivered to the credit card provider in the normal way via the telecoms and data network. The user can choose to be text on all transactions or limit the information of the transactions keeping the authorized credit card holder aware of the credit card usage. In the event that the credit card holder's details have been fraudulently used, a number of events will happen.
Different transaction settings could be invoked by the authorized credit card holder. The list is not exhaustive but for instance, turn the account on or oft, set maximum transaction limits, set notification of all transactions, or set notification of any transaction over the maximum allowed.
1. If the authorized credit card holder has barred transactions they will receive a notification via the intelligent phone that their credit card has been used to make a transaction but has been refused. If the transaction was undertaken by the valid credit card holder they will have a time out period to validate the transaction. If this is not conducted within the time out period the card will be barred by the credit card provider. The authorized credit card holder will then have to inform the credit card company and a new card issued.
2. If the authorized credit card holder has set a transaction limit for their credit card and the credit card is used in excess of that limit, the transaction will be refused. The authorized credit card holder will be notified of the transaction via the intelligent mobile phone. A time out period could be engaged to prevent further fraudulent use.
3. In the event that the credit card has been used by a fraudulent user whilst the authorized credit card holder has authorized the credit card to make transactions, with all transaction notification set on the account. The transaction Credit card fraud prevention network.
notification will be text to the authorized credit card holder gMng them the ability to stop that transaction and further transaction from occurring. This would prevent fraud at the earliest opportunity.
4. The authorized credit card holder will have the ability to bar or allow transactions at any time on their account, thus stopping the credit card being used when a bar on the account is in place. Notifying the authorized credit card holder if transaction levels are exceeded or the credit card has been used. The combination of an intelligent mobile phone or land line utilizing dynamic networking linked to a credit card network providers platform would reduce credit card fraud dramatically.
5. The mobile phone could take a number of forms but the basic concept is the ability to text from a phone to alter features on a credit card account. This could be in the form of a chip within the phone or software similar to the phone or blackbeny. Networking synchronization with the mobile phone or land line will be established when communicating with the credit card provider. This could be achieved in a number of ways, one being via the chip and pin within the phone, which could change every 30 seconds via synchronized numbering schemes, thus limiting network tapping within that 30 second time period. Once network synchronization with the mobile phone or land line user has been established pre set registration details will come into force authorizing transaction information to pass between the mobile phone user and the credit card company, utilizing chip & pin type technology. The mobile phone data is encrypted before transmission and then synchronized with the credit card providers platform before transaction information is allowed to be communicated between the authorized credit card holder and the credit card provider. This allows better security between the credit card operator and authorized credit card holder.
6, The credit card point of sale could also be utilized for validation purposes of the chip and pin within the mobile phone and for transaction barring and unbarring.
7. If chip and pin technology is not utilized within the mobile phone or land line then simple text messaging communicating with the credit card platform could be used.
8. The use of synchronized data between the two platforms or end users would reduce fraud hacking to a minimum, a number of synchronizing product platforms could be intergraded between mobile network providers and the credit card providers data servers.
Ideal solution The ideal solution is a complete network package offering a mobile phone with a credit card facility that utilizes a single network provider. The network provider that combines these two products could be the fore runner of reducing credit card fraud globally The Ideal solution can be achieved.
S L Hall Consultants has researched over the last four years networking solutions and mobile products that could provide the ultimate credit card fraud prevention system, which would offer a complete credit card fraud management system.
Telecom network providers provide a number of networks one being the PSTN (Public Switched Telephone Network). This network is normally the first connection point of all services. The data path for the credit card transactions start on this network. Data calls travel along designated routes these being; PSTN dial up routes, leased line data routes, P data network routes which utilize the telecom providers intelligent networks.
This unique offering combines all of the existing network systems but synchronizes these networks to allow limited credit card data to transit the mobile network from a credit card providers data switch.
The transaction from the credit card is carried out in the normal way using chip and pin. The data is then sent to the credit card company across a number of networks and network providers interoonnect points in the normal way. Once the data is received by the credit card companies data switch, a flag is set on the credit card holder account notifying the data switch that parameters have been set. These parameters could be varied and proprietary. This data is then sent to another secure data switch which has the ability to send text or real time data information to the telecommunication providers network this could be PSTN or a mobile network.
An intelligent mobile phone or PSTN phone utilizing chip and pin technology could then be synchronized with the the data from the credit card company. Transaction information or transaction barring could then be relayed between the two points.
Real time data synchronization could be used. The mobile phone at the point of sale could be synchronized with the credit card being registered or the credit card companies security platform, a random number sequence changing every 30 seconds which would be unique to the data platform being used. Once authentication has occurred a number of actions could then be allowed which may be dependent on a number of factors, type of account and credit limits set, credit card holder defined limits invoked, the list could be endless.
If chip and pin were not used in the mobile phone, data sequencing could still be achieved utilizing calling line ID, mobile phone number verification, or simple pin number identification which had been sent in the post. All of these methods have differing degrees of network security and cost.
A mobile phone company offering an intelligent phone with credit card secure encryption linked up with a proprietary credit card data switch and network security, would be able to offer a unique global product.
Claims (7)
- CLAIM1. The Credit Card Fraud system is the first attempt at utilizing a number of data and telecommunication networking features to deliver a one stop solution to tackle credit card fraud.
- 2. The network design and the use of intelligent technology in a mobile or fixed land line phone communicating with the users credit card platform is unique.
- 3. The use of intelligent information being utilized in a mobile or land line phone to interact with a credit card platform is unique.
- 4. The ability to be able to turn on and off a credit card utilizing mobile or land line telephony via a secure and synchronization network is unique.
- 5. The use of credit card chip and pin hardware or intelligent software in a mobile or land line phone is unique.
- 6. Secure Data synchronization across a mobile telecommunication platform communicating with a credit card companies credit card platform for the purpose of allowing the credit card users to control credit card transactions is unique.
- 7. Providing a design concept to Iinl a credit card platform to a mobile telecommunication platform for credit card fraud prevention has not yet been achieved. Thus, being able to have the ability of down loading via text, credit card
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0808204A GB2459850A (en) | 2008-05-07 | 2008-05-07 | Using a mobile phone for fraud prevention in credit card transactions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0808204A GB2459850A (en) | 2008-05-07 | 2008-05-07 | Using a mobile phone for fraud prevention in credit card transactions |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0808204D0 GB0808204D0 (en) | 2008-06-11 |
GB2459850A true GB2459850A (en) | 2009-11-11 |
Family
ID=39537338
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0808204A Withdrawn GB2459850A (en) | 2008-05-07 | 2008-05-07 | Using a mobile phone for fraud prevention in credit card transactions |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2459850A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8534564B2 (en) | 2009-05-15 | 2013-09-17 | Ayman Hammad | Integration of verification tokens with mobile communication devices |
US9372971B2 (en) | 2009-05-15 | 2016-06-21 | Visa International Service Association | Integration of verification tokens with portable computing devices |
US9424413B2 (en) | 2010-02-24 | 2016-08-23 | Visa International Service Association | Integration of payment capability into secure elements of computers |
US9582801B2 (en) | 2009-05-15 | 2017-02-28 | Visa International Service Association | Secure communication of payment information to merchants using a verification token |
US9715681B2 (en) | 2009-04-28 | 2017-07-25 | Visa International Service Association | Verification of portable consumer devices |
US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US9792611B2 (en) | 2009-05-15 | 2017-10-17 | Visa International Service Association | Secure authentication system and method |
US9904919B2 (en) | 2009-05-15 | 2018-02-27 | Visa International Service Association | Verification of portable consumer devices |
US9972005B2 (en) | 2013-12-19 | 2018-05-15 | Visa International Service Association | Cloud-based transactions methods and systems |
US10187363B2 (en) | 2014-12-31 | 2019-01-22 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
US10255591B2 (en) | 2009-12-18 | 2019-04-09 | Visa International Service Association | Payment channel returning limited use proxy dynamic value |
US10282724B2 (en) | 2012-03-06 | 2019-05-07 | Visa International Service Association | Security system incorporating mobile device |
US10846683B2 (en) | 2009-05-15 | 2020-11-24 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US10846694B2 (en) | 2014-05-21 | 2020-11-24 | Visa International Service Association | Offline authentication |
US11017386B2 (en) | 2013-12-19 | 2021-05-25 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2378294A (en) * | 2001-08-03 | 2003-02-05 | Haltfern Ltd | Credit card security system |
WO2005015452A1 (en) * | 2003-08-08 | 2005-02-17 | Paycool, International, Ltd. | Methods for facilitating validation of financial transactions made through a wireless communication network |
WO2006024080A1 (en) * | 2004-08-31 | 2006-03-09 | Markets-Alert Pty Ltd | A security system |
US20070244813A1 (en) * | 2004-08-25 | 2007-10-18 | Xing Zhou | System That Realizes Fund Transfer by Mobile Telephone Short Message Confirming Mode and Method Thereof |
-
2008
- 2008-05-07 GB GB0808204A patent/GB2459850A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2378294A (en) * | 2001-08-03 | 2003-02-05 | Haltfern Ltd | Credit card security system |
WO2005015452A1 (en) * | 2003-08-08 | 2005-02-17 | Paycool, International, Ltd. | Methods for facilitating validation of financial transactions made through a wireless communication network |
US20070244813A1 (en) * | 2004-08-25 | 2007-10-18 | Xing Zhou | System That Realizes Fund Transfer by Mobile Telephone Short Message Confirming Mode and Method Thereof |
WO2006024080A1 (en) * | 2004-08-31 | 2006-03-09 | Markets-Alert Pty Ltd | A security system |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10572864B2 (en) | 2009-04-28 | 2020-02-25 | Visa International Service Association | Verification of portable consumer devices |
US10997573B2 (en) | 2009-04-28 | 2021-05-04 | Visa International Service Association | Verification of portable consumer devices |
US9715681B2 (en) | 2009-04-28 | 2017-07-25 | Visa International Service Association | Verification of portable consumer devices |
US9792611B2 (en) | 2009-05-15 | 2017-10-17 | Visa International Service Association | Secure authentication system and method |
US9317848B2 (en) | 2009-05-15 | 2016-04-19 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US10846683B2 (en) | 2009-05-15 | 2020-11-24 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US9372971B2 (en) | 2009-05-15 | 2016-06-21 | Visa International Service Association | Integration of verification tokens with portable computing devices |
US12086787B2 (en) | 2009-05-15 | 2024-09-10 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US10387871B2 (en) | 2009-05-15 | 2019-08-20 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US9904919B2 (en) | 2009-05-15 | 2018-02-27 | Visa International Service Association | Verification of portable consumer devices |
US9582801B2 (en) | 2009-05-15 | 2017-02-28 | Visa International Service Association | Secure communication of payment information to merchants using a verification token |
US10009177B2 (en) | 2009-05-15 | 2018-06-26 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US10043186B2 (en) | 2009-05-15 | 2018-08-07 | Visa International Service Association | Secure authentication system and method |
US10049360B2 (en) | 2009-05-15 | 2018-08-14 | Visa International Service Association | Secure communication of payment information to merchants using a verification token |
US11574312B2 (en) | 2009-05-15 | 2023-02-07 | Visa International Service Association | Secure authentication system and method |
US8534564B2 (en) | 2009-05-15 | 2013-09-17 | Ayman Hammad | Integration of verification tokens with mobile communication devices |
US10255591B2 (en) | 2009-12-18 | 2019-04-09 | Visa International Service Association | Payment channel returning limited use proxy dynamic value |
US9589268B2 (en) | 2010-02-24 | 2017-03-07 | Visa International Service Association | Integration of payment capability into secure elements of computers |
US9424413B2 (en) | 2010-02-24 | 2016-08-23 | Visa International Service Association | Integration of payment capability into secure elements of computers |
US10657528B2 (en) | 2010-02-24 | 2020-05-19 | Visa International Service Association | Integration of payment capability into secure elements of computers |
US10282724B2 (en) | 2012-03-06 | 2019-05-07 | Visa International Service Association | Security system incorporating mobile device |
US11995633B2 (en) | 2012-03-06 | 2024-05-28 | Visa International Service Association | Security system incorporating mobile device |
US10402814B2 (en) | 2013-12-19 | 2019-09-03 | Visa International Service Association | Cloud-based transactions methods and systems |
US11164176B2 (en) | 2013-12-19 | 2021-11-02 | Visa International Service Association | Limited-use keys and cryptograms |
US9972005B2 (en) | 2013-12-19 | 2018-05-15 | Visa International Service Association | Cloud-based transactions methods and systems |
US11875344B2 (en) | 2013-12-19 | 2024-01-16 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
US11017386B2 (en) | 2013-12-19 | 2021-05-25 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
US10664824B2 (en) | 2013-12-19 | 2020-05-26 | Visa International Service Association | Cloud-based transactions methods and systems |
US11842350B2 (en) | 2014-05-21 | 2023-12-12 | Visa International Service Association | Offline authentication |
US10846694B2 (en) | 2014-05-21 | 2020-11-24 | Visa International Service Association | Offline authentication |
US11783061B2 (en) | 2014-08-22 | 2023-10-10 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US11036873B2 (en) | 2014-08-22 | 2021-06-15 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US11240219B2 (en) | 2014-12-31 | 2022-02-01 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
US10187363B2 (en) | 2014-12-31 | 2019-01-22 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
US10511583B2 (en) | 2014-12-31 | 2019-12-17 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
Also Published As
Publication number | Publication date |
---|---|
GB0808204D0 (en) | 2008-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2459850A (en) | Using a mobile phone for fraud prevention in credit card transactions | |
CA2533030C (en) | Peer-to-peer telephone system | |
ES2319178T3 (en) | SYSTEM AND METHOD FOR DETECTION AND DETENTION OF FRAUDULENT SERVICES. | |
AU780943B2 (en) | Method of payment by means of an electronic communication device | |
NZ547322A (en) | Authentication method for wireless transactions | |
CN101351027A (en) | Method and system for processing service authentication | |
CN101764800A (en) | Method for dynamic password multi-terminal combined authentication | |
FR2668002A1 (en) | RADIOTELEPHONE INSTALLATION WITH SECURE PREPAYMENT SERVICE. | |
CN101795454A (en) | Method and system of double identity authentication based on mobile communication independent channel | |
CN102480486A (en) | Method, device and system for verifying communication session | |
CN1996839A (en) | A low-cost and easy-to-distribute identity verification method and device | |
CN1829143A (en) | Novel method for network account number identity affirmation without cipher and encryption | |
Li et al. | A mechanism to authenticate caller ID | |
CN101853545A (en) | Anti-theft method and anti-theft system for bank transaction terminal | |
Istrate | Cardless withdrawal system for mobile banking applications | |
US11762972B1 (en) | System and methods for a multi-factor remote user authentication | |
CN102013979A (en) | Anti-counterfeiting authentication system | |
EP1489826A1 (en) | Method for authentication in a terminal by the access to the content of a SIM card in a mobile telephone | |
US9319517B2 (en) | System and method for providing services in communication network | |
Collins | Telecommunications Crime—Part 3 | |
EP4254863A1 (en) | Method for network-centric call verification and scam protection | |
Gogo et al. | Text messaging to authenticate products through matching hidden codes | |
Smith | Stealing Telecommunications Services. | |
Falciasecca | Old and New Crimes in the Telecommunication World: The Case of Mobile Telephony | |
TWI252649B (en) | A convenient and secure wireless LAN authentication method and system based on SMS mechanism of GSM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |