Method to challenge cell phone user for fraudulent use

ABSTRACT

A method and system for monitoring calls being made from a cellular phone and preventing calls being made to unauthorized numbers, as defined by the owner of the cellular phone. A security challenge is issued to a cell phone user when a suspicious, previously unknown telephone number is attempted to be called. Approved/safe numbers and/or area codes are stored within the phone and/or in a subscriber&#39;s account accessible and updated via the Internet. If the user is unable to provide the correct security code in response to the challenge, the user is prevented from making the call to the particular number.

BACKGROUND OF THE INVENTION

1. Technical Field

The present invention relates generally to wireless communication and inparticular to wireless communication devices. Still more particularly,the present invention relates to a method, system, and device forreducing unauthorized use of a wireless communication device.

2. Description of the Related Art

Wireless communication has experienced very rapid growth in recent yearsand that growth continues to increase as demand for wireless serviceexpands. In some developed countries, telephone communication viahandheld wireless devices (e.g., cellular phones or cell phones) iscatching up to and may eventually surpass conventional communication vialandline (public switched telephone networked (PSTN)) phones. Theportability of these handheld phones along with the expansion ofservices/features provided by the phones are among the driving forcesbehind this increase proliferation and utilization of cellular phones.

While portability of the cell phones makes them more attractive as apersonal/business communication device, their portability, along withother factors, makes cellular phones easy targets for thieves. Thus, asimproving technology results in smaller phones with more expansivefeatures and thus higher cost, cellular phone theft is also increasing.When theft of the cell phone occurs, the owner (who typically subscribesto a particular calling plan with a service provider) would like to beable to protect himself/herself from having the thief make unauthorizedcalls on the device that may ultimately result in very high costs to thesubscriber. For example, these unauthorized calls may include calls tointernational numbers or calls outside a local calling zone that arecharged at a premium to the subscriber.

It is not uncommon for unscrupulous people to “borrow” and/or “use”another person's cellular phone without the owner'spermission/authorization. The owner may feel comfortable leaving thecell phone out in an area that is accessible by the other people (familyor co-workers) and later find out that a call was made to a numberoutside of his local calling zone, resulting in an unexpected charge tothe owner. For those persons with geographic calling zones, for example,a call outside of the geographic zone is billed per minute to the user.While the user elects to not make such calls from his cell phone, a“borrower” may not be aware of the restriction or may not care enough torefrain from utilizing the cell phone to call outside the calling zone.International calls also fall into this category of (outside the callingzone) calls for users with nationwide calling plans. Thesubscriber/owner of the cell phone would like to prevent both thievesand “borrowers” alike from being able to place such calls using thesubscriber's cellular phone.

Conventional methods of securing a cellular phone from fraudulent orunauthorized use typically involves some sort of internal lockingmechanism that requires a user password to unlock the cell phone foruse. Thus, many cell phones today have a locking mechanism that willlock down the outbound dialing capabilities of the phone as well assecure personal items on the phone, such as phone list, etc. How thelocking feature is implemented varies across models; however, the basicoperations tend to include a user choice of (1) manually lockingimmediately, (2) locking the phone only at power on, and (3) locking thephone when idle. To unlock the phone, the user has to enter apre-established secret code.

To accommodate this locking function, the cellular telephone provides adial lock function for disabling key input except for entry of apersonal identification number (terminal identification number). Thisprevents unauthorized use by others when the phone is stolen or lost orborrowed. This feature also prevents/avoids erroneous key input when thephone is carried in a pocket or stored in a bag.

In such cell phones, the dial lock function becomes active by depressinga set combination of keys or by selecting the dial lock function fromamong an operation menu or by setting the menu to instantly disable keyinput except for entry of the identification number. When the user laterinputs the identification number while the key input is disabled, theentry of the identification number releases the dial lock function toenable key input.

While the dial lock feature provides some security, most subscribers donot utilize this feature because it is cumbersome to unlock the phoneall the time and the user may not remember to lock the phone after eachuse. Even when an automatic lock function is programmed on the phone,many cell phones are stolen and calls are made before the automatic lockenables on the cell phone.

Other security features have been suggested by variouspublications/patents. Among these are the following, which are presentedalong with their primary limitation as relevant to the latterdescription of the current invention.

PCT application, PCT/CA98/00572, describes a system and method forchallenging a cell phone user to enter a security code when a number isentered on the phone that does not match one of a list of potentialterminating numbers that are stored as entries in a database that islocated on a switch or network connected to the switch. Looked at fromanother perspective, Patent PCT/CA98/00572 describes a databasecontaining ranges of numbers that are either set by the user in advance,or added to the database individually upon authorization when the userattempts to place an outgoing call.

U.S. Patent Application No. 2002/0165012 describes a system and methodfor allowing or restricting wireless communication based on a predefinedset of area codes and geographic position locations. Depending on whicharea codes are stored, calls made to the restricted area codes are notconnected and/or calls made to the permitted area codes are connected.

U.S. Pat. No. 6,035,217 provides a single button wireless communicationdevice that allows a user to place calls by speaking the destinationnumber or associated word. The user verbalizes a name to connect to thephone number associated with the spoken name. The user may have toverbalize a security code or PIN before the name/phone number before thecommunication is allowed.

Despite these methods for providing security against unauthorized use,the present invention recognizes that limitations exist with eachmethod, and the invention provides a different security method that issuperior to each of the above described methods.

SUMMARY OF THE INVENTION

Disclosed is a communication device that supports implementation of amethod and system for selectively challenging users of the device forentry of a security code in order to prevent calls being made tounauthorized numbers. A security challenge is issued to a cell phoneuser when the user attempts to initiate a call to a number that is notamong a list of authorized numbers preset by the owner of the cellphone. If the user is unable to provide the correct security code inresponse to the challenge, the user is prevented from using the cellphone to make the call to that particular number.

In one embodiment, failure of the user to be able to authenticate thephone (by providing the security code when prompted) locks the entireoutgoing functions of the phone. In a related embodiment, the phone isautomatically locked to all dialing/calling following a predeterminednumber of consecutive failures to authenticate numbers being called.

The cell phone is programmed/designed to keep a list of previous numbersdialed in addition to the owner's/subscriber's personal telephonedirectory. The owner/subscriber is made to establish a security codeduring initial set up of the phone, and the security code remains inpersistent storage within the phone. The owner is also prompted toselect a security setting from among:

-   (1) challenge the user when a number is being dialed that is not in    the list of previously dialed numbers;-   (2) challenge the user when an area code is being called that is not    been previously authorized;-   (3) challenge the user when a number that isn't in the user's    dialing directory is being called;-   (4) challenge the user when a number is being dialed that hasn't    previously shown up in the caller ID; and-   (5) challenge the user when a number being dialed in on a list of    blocked numbers.

These selections may be provided by a dialed number-based security(DNBS) utility which displays the list of available/selectable optionsvia the display of the cell phone. The user selections are stored anduser input of all numbers is monitored by the DNBS utility. In oneembodiment, multiple of the above selections are simultaneouslyactivated so that challenges are issued when any one of the multipleactivated/monitored conditions is encountered. In one embodiment, ratherthan challenge the user on every unknown number, an additional settingof the DNBS utility only challenges the user if the entered area code isnot in the approved list or if the cellular phone has been idle for auser-selected amount of time.

While most of the users' general phone directory is entered directly onthe cellular device, one feature of the invention enables the user toconfigure particular numbers/area code that may be dialed without DNDSprompting the user to enter the security code. The user completes theentry of these specific “safe” or “approved” numbers through thetelephone's LCD/keypad interface or through a secure web portalaccessible through a standard web browser. With the latter method, theuser must enter a unique combination of user identification (ID) andpassword to access his/her subscriber account. Also, the user mayrequire any changes to the setting to only occur through the secure webportal, as an additional security feature.

The above as well as additional objectives, features, and advantages ofthe present invention will become apparent in the following detailedwritten description.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention itself, as well as a preferred mode of use, furtherobjects, and advantages thereof, will best be understood by reference tothe following detailed description of an illustrative embodiment whenread in conjunction with the accompanying drawings, wherein:

FIG. 1A is an exemplary cellular phone within which the various featuresof the invention may advantageously be implemented;

FIGS. 1B and 1C illustrate two representations of an LCD display of acell phone with prompts generated by a security utility responding toentry of an unauthorized user-entered number, according to twoembodiments of the present invention;

FIG. 2A is a block diagram representation of the internal components ofthe cellular phone according to one embodiment of the invention;

FIG. 2B is a block diagram representation of the softwareutility/modules and database within the storage medium of the cellularphone, according to one exemplary embodiment of the invention;

FIG. 3 illustrates an exemplary network access to a subscriber accountaccording to one embodiment of the invention;

FIGS. 4A and 4B are flow charts illustrating the general process ofrequiring entry of a security password for an entered number not on theapproved/safe list according to two alternate embodiments of theinvention;

FIG. 5 is a flow chart of the process of prompting a user to enter adialed number into an approved/safe list and updating that listaccording to one embodiment of the invention; and

FIG. 6 is a flow chart of the process of searching through all fourlists to determine when an entered number requires a security codebefore the call is completed according to one embodiment of theinvention.

DETAILED DESCRIPTION OF AN ILLUSTRATIVE EMBODIMENT

The present invention provides a communication device and a methodimplemented therein for selectively challenging users of the device forentry of a security code in order to prevent acommunication/transmission being made to a unauthorized destinationidentification (ID). In the illustrative embodiments, the communicationdevice is a cell phone and the communication is a phone call being madeto a terminating phone number entered on the cell phone. A securitychallenge is issued to a cell phone user when the user attempts toinitiate a call to a number that is not among a list of authorizednumbers preset by the owner of the cell phone. If the user is unable toprovide the correct security code in response to the challenge, the useris prevented from using the cell phone to make the call to thatparticular number.

While specifically described from the context of a cell phone, it isunderstood that the features of the invention are applicable to anycommunication device that requires entry of a destination ID to completea communication. The use of a cell phone embodiment is therefore notmeant to be limiting on the invention.

Turning now to the figures and in particular to FIG. 1, whichillustrates an exemplary cell telephone within which the features of theinvention may advantageously be implemented. Cell phone 100(interchangeably referred to as a mobile device, cell phone, mobileterminal, or wireless device) includes display 105 (LCD screen, forexample), a control panel with menu key 102, control/scroll/select keys104 and power button 106, numeric keypad 110, speaker 112, microphone114, and antenna 108. Notably, other buttons or keys are possible inalternate embodiments of the cellular phone, and the specificconfiguration/design of cell phone 100 is provided for illustrativepurposes only and not intended to imply any structural or otherlimitations on the invention. For example, cell phone 100 may be of a“flip” design and include a top and bottom portions connected via ahinge mechanism.

Display 105, which is implemented by an LCD (liquid crystal display) forexample, displays necessary information (functional status, the presenceor absence of incoming calls, etc.) to the user. As illustrated, auser-entered number 107 is displayed on display 105, and other visualoutputs are illustrated by FIGS. 1B and 1C, which are described below.The control panel receives control instructions (operation inputs) fromthe user via the various control buttons. Those skilled in the art arefamiliar with the basic operational qualities of the above describedbuttons and hardware components.

FIG. 2A is a block diagram illustrating an exemplary view of theinternal connective circuit of key components of cell phone 100. Severalof the components are represented in the external view of cellular phone100 and have thus been described with respect to FIG. 1 and sharesimilar number patterns with FIG. 1 (e.g., display 105, antenna 108,microphone 112, speaker 114). In addition to these externally-viewablecomponents, cell phone 200 comprises internal components, includingsignal processor 217 and radio transceiver 218, controller (ormicroprocessor) 212, memory 213, and storage medium 218.

Antenna 108 transmits and receives radio waves (wireless signals) andthe radio transceiver 217 performs processes relating to transmittingand receiving radio communication. Signal processor 217 convertsreceived radio signals into audio signals outputted by the speaker 114and coverts received audio signals from the microphone 112 into radiosignals that are transmitted by the radio transceiver 216 and antenna108 combination. Key pad 210 includes internal electrical sensors behindeach key (110) visible from the exterior of cellular phone. Thesesensors trigger a particular response when the key is depressed by auser.

Controller 212 is a microprocessor that is the brain of cell phone 200.Controller 212 controls all processes occurring within/on cell phone200, including responding to user-inputs and executing program modulesto generate menu items, prompts, etc. that are outputted on the display105. As described below, controller 212 executes a dialed number-basedsecurity (DNBS) software utility 222 that locks the radio transceiverfrom connecting a call to a particular number dialed when the numberdoes not meet certain pre-established (user-defined/selected) criteria.Controller 212 also enables all other menu functions when the userdepresses the menu button and other select buttons on cellular phone.

Memory 213 stores contents of various setting of the cellular phone,including the terminal identification number 215, dial lock release code217, and DNBS release code 219. In one embodiment, a singleuser-established code is utilized as dial lock release code 217 and DNBSrelease code 219. Dial lock release code 217 enables a user to unlock aphone that is locked (i.e., disabled numeric keypad from recognizinginput for dialing out), as described in the background section. DNBSutility 222 provides code executed by controller 212 to perform thevarious security functions of the invention, such as preventingcompletion of a call to an unauthorized number unless the user entersthe security code.

Storage medium 218 stores computer executable program as individualutilities/modules and maintains a database of user-entered (ordynamically created/stored) data. FIG. 2B illustrates in greater detailthe utilities/modules and database stored within storage medium 218. Keyutilities illustrated are menu utility 220 and security utility 222(which may be DNBS utility 222, or a combination of DNBS utility andother security features, depending on implementation). Menu utility 220provides all the features of a cell phone menu, displayed on display 205when menu button and scroll/select buttons are depressed. Securityutility 222 has been introduced above and the functions provided bysecurity utility 222 are further described below. Controller 212executes respective ones of the program modules/utilities to provide theoperational features of the cellular phone 200.

Also illustrated within storage medium 218 is user database 224, whichin the illustrative embodiment includes a numbers dialed list 226,barred numbers list 227, a personal phone directory 228, and an approvedarea code/numbers list 230. When a number is dialed, DNBS/Securityutility 222 accesses particular ones of these lists of numbers todetermine when a call to an entered phone number should be allowedwithout first requiring the user enter the DNBS release code 219.

Phone directory 228 is a standard directory maintained by mostconventional cell phones. The user specifically enters the number andcorresponding identifying information into the phone directory 228. Onedistinction between a personal phone directory 228 and an approved areacode/numbers list 230 is that the approve list maintains only numberswhile the phone directory 228 maintains additional identifying dataassociated with the saved number, such as name and type of number(mobile, home, work). Thus entry of a number within the approved list230 may require the user select “Yes” in response to a prompt to savethe number to the approved list 230.

Numbers dialed list 226 maintains a list of numbers dialed that are notin the personal phone directory 228. In one implementation, numbers arestored within this list only after the user first enters the DNBSrelease code 219 to enable an initial call to that number. Thus, numbersthat are in the approved list 230 or the phone directory 228 are notstored within the numbers dialed list 226. Also, in another embodiment,numbers of received calls are stored within the numbers dialed list 226or in a separate list for received call numbers. However, in oneimplementation that supports storage of numbers for incoming/receivedcalls, the user has to first connect (answer) the call and then select“Yes” on termination of the incoming call when asked if to save thenumber to one of the lists. Specifically, the user may be first promptedto save the incoming (or dialed) number to the phone's personal phonedirectory 228. If the user selects not to, then the user may then beprompted to save the number in one of the other lists that allow directdialing of the number without entry of the DNBS code (e.g., a receivednumbers list).

In another embodiment, a list of barred numbers 227 is maintained, whichcomprises numbers entered by the user that can not be called from theuser's cell phone without entry of the DNBS code. The embodiment appliesto specific numbers that the user does not want called by a thief orauthorized borrow of the phone, such as 900 numbers, and specificlocal/international numbers (or area codes).

One embodiment of the present invention enables the user to configureparticular numbers/area code that may be dialed without DNDS promptingthe user to enter the security code. The user completes the entry ofmost numbers to the various lists directly through the telephone'sLCD/keypad interface. In an alternative embodiment, the approved list(s)of safe numbers (or barred numbers) is entered by the user through asecure web portal accessible through a standard web browser connected toa networked server of the cellular service provider. As an additionalsecurity feature with this latter method, the user may require anychanges to the setting (of approved/safe numbers) to only occur throughthe secure web portal.

FIG. 3 illustrates an exemplary network configuration including apersonal computer 302 connected to a service provider server 308 via anetwork 306, such as the Internet. Within server 308 is a subscriberaccount 310 that maintains specific subscriber information. Access tothe subscriber account 310 is secure and requires the user enter aunique combination of userID and password 304 via personal computer 302.According to one embodiment of the invention, subscriber informationincludes a list of approved numbers and/or area codes to which thesubscriber's cellular telephone/mobile device is allowed to call withoutrequiring entry of a DNBS code. In one implementation, one or more ofthe above described lists are maintained within the subscriber accountand updated via the Internet.

FIG. 5 illustrates the process of updating the list of approved/safenumbers following an outgoing call. The process begins at block 502 atwhich the user terminates a call to a phone number. DNBS utilitydetermines at block 504 whether the DNBS code was required to completethe call, and if not, then the process ends. If the DNBS code wasrequired, however, DNBS utility prompts the user to add the number tothe phone directory or to the approved list, as shown at block 508. DNBSutility checks at block 510 whether the use selects the option of addingthe number to the approve list. FIG. 1C illustrates display 122 of thecellular phone with an exemplary prompt 123 whether entered number 107is to be saved to the approved list. If the user selects that option,the number is added to the approved list as indicated at block 512, andall future calls to that number are connected without requiring entry ofthe DNBS code. This selection may be required only when the user electsnot to save the number to the phone directory.

Notably, in an alternate embodiment, all dialed numbers that areapproved with a DNBS code are automatically placed in the dialed listand those numbers do not have to be added to the approved list to belater connected. The user has the option of disabling the ability toautomatically dial without requiring the DNBS code so that a one timeuser-approval of a single call does not lead to later abuse (multiplecalls to the same number) by a borrower of the cellular phone. Onemethod provided by the invention to prevent such later abuse involvestime-limiting the dialed number list so that a number placed on the listonly remains on the list for a preset amount of time (e.g. 3 days).Alternatively, the list may be maintained as a FIFO buffer that is Nnumbers long, so that a number scrolls off the list after N calls placedto different numbers are made.

As described above, the cell phone is programmed/designed to maintain alist of previous numbers dialed in addition to the owner's/subscriber'spersonal telephone directory. During initial set up of the phone, theset up procedure requires (or prompts) the owner/subscriber to establisha security code, and the security code remains in persistent storagewithin the phone. The owner is also prompted to select a securitysetting that includes when to challenge a user for entry of the DNBScode, and the owner selects from among:

-   (1) challenge the user when a number is being dialed that is not in    the list of previously dialed numbers;-   (2) challenge the user when an area code is being called that is not    been previously authorized;-   (3) challenge the user when a number that isn't in the user's    dialing directory is being called;-   (4) challenge the user when a number is being dialed that hasn't    previously shown up in the caller ID The user will enter his/her    secret code, and the cell phone will log this number into the list    of previously dialed numbers; and-   (5) challenge the user when a number is being dialed that is on a    list of barred numbers.

The above five selections are provided by the dialed number-basedsecurity (DNBS) utility, which displays the list of available selectionoptions via the display of the cell phone. The user selections arestored and user input of all numbers is monitored by the DNBS utility.In one embodiment, rather than challenge the user on every unknownnumber, an additional setting of the DNBS utility only challenges theuser if the entered area code is not in the previous list or if thecellular phone has been idle for a user-selected amount of time.

In one embodiment, multiple of the above selections are simultaneouslyactivated so that challenges are issued when any one of the multipleactivated/monitored conditions is encountered. FIG. 6 illustrates aprocess flow that incorporates all of the above checks. The processbegins at block 602 when a user enters a number to place an outboundcall. DNBS utility checks at block 604 whether the entered numbers onthe list of previously dialed numbers. If the entered number is not onthat list, DNBS utility next checks at block 606 whether the area codeof the entered number matches an area code on the approved list of areacodes. If the entered number is not on the area code list, DNBS utilitythen checks at block 608 whether the number is in the user's personalphone directory. If the entered number is not in the user's personalphone directory, DNBS utility finally checks whether the entered numbermatches a previously received incoming number (that was answered by theuser). When any one of these checks provides a positive result, DNBSutility allows the call to proceed without entry of a DNBS code, asstated at block 612. However, if all checks yield a negative result,then DNBS utility prompts the user for the DNBS code, as shown at block614, and the call is only allowed to complete when the correct DNBS codeis entered.

With reference now to FIG. 4A, there is illustrated a flow chart of theprocess by which DNBS utility operates to prevent calls being made tounapproved numbers without entry of a pre-established DNBS code. Theprocess begins at block 402 at which the user establishes the DNBS codeand enters numbers in the approved list. The phone is set to standardoperational mode and allows a user to enter a number to be dialed, asshown at block 404. Once a number is entered and the talk/dial button ispressed/selected, DNBS utility compares the entered number against thevarious lists of safe/approved numbers, as stated within block 406.Then, DNBS determines, at block 408, whether the entered number is anapproved/safe number. If the entered number is on the approved/safelist, the call is connected, as shown at block 410. However, if theentered number is not on the approved/safe list, DNBS utility promptsthe user to enter a DNBS code to complete the call, as indicated atblock 412. FIG. 1B illustrates an exemplary prompt 121 for DNBS code andentered number 107 on the display 105 of the cellular phone.

At block 414, DNBS utility determines whether the correct code wasentered, and the call is connected only if the correct DNBS code isentered. In one embodiment, failure of the user to be able toauthenticate the phone (by providing the DNBS code when prompted) locksthe entire outgoing functions of the phone. In a related embodiment, apredetermined number of consecutive failures must be recorded before thephone is locked. DNBS utility may display a failure notice to the userindicating that the entered number is not approved for calling form thephone (or the area code is not approved). DNBS utility may also provideadditional prompts and/notices as required to provide the user withinformation and request information from the user.

FIG. 4B illustrates an alternate embodiment, in which DNBS utility onlychecks for the area code, and determines at block 409 if the area codeof the entered number matches one of the approved/safe area codes. Theprocess then flows to block 410 or 412 depending on the outcome of thedetermination. This embodiment is particularly useful when thesubscriber has a calling area restricted plan (e.g., calls only toadjacent states identified by specific area codes), where all othercalls are charged at a premium.

In addition to the above described embodiments, severaldifferent/alternate embodiments of the invention are provided, eachsupporting one or more of the following features: (1) the user would beable to modify access preferences either on the phone itself, through asoftware program that manages the phone's local database, or through asecure web portal that would affect preferences stored on a switch ornetwork. (2) The user could specify that access preferences could onlybe set through one medium, for example the web portal or local softwareprogram. (3) The access database could be stored both locally and on aswitch or network, and modifications could be pushed to the localdatabase from the server and vice versa. (4) Modifying user preferenceswould also require an access code. (5) Access preferences could includeboth to and from points, i.e., allow a particular set of outgoingnumbers when calling from specified geographic locations. (6) The usercould store preference settings in a profile, and could revert topreviously saved security profiles. (7) The user could specify differentprofiles to use based on current geographic settings, different hours ofthe day, different days of the week, or different ranges of dates. Forexample, (a) more permissive security settings might regularly bedesired when connecting through a cell tower near the user's home orduring hours or days when the user is normally at work and (b) morestringent security settings may be desired when connecting through aforeign cell tower, or on dates when the user is traveling.

The invention thus provides many differences from the conventionalapplications that attempt to address a similar problem. Among thefeatures that are different from these conventional methods or proposedmethod are: (1) The database being located locally on the wirelessdevice, for example on a CIM card; (2) The ability for a user to includeincoming call numbers in the access database; (3) The ability for theuser to set security preferences and profiles. Also, the inventiondiffers from other proposed methods in that the invention is not simplylimited to allowing or refusing to connect calls to allowed andunauthorized area codes, respectively. As described herein, theauthorized/unauthorized list of the present invention may contain entirenumbers rather than just area codes. The invention provides the abilityto authorize calls in real time and change security settings by enteringa security code. Finally, the invention implements a PIN/passwordauthentication based on specific phone numbers or locations rather thanauthentication of the user prior to destination entry.

As a final matter, it is important that while an illustrative embodimentof the present invention has been, and will continue to be, described inthe context of a fully functional computer system with installedmanagement software, those skilled in the art will appreciate that thesoftware aspects of an illustrative embodiment of the present inventionare capable of being distributed as a program product in a variety offorms, and that an illustrative embodiment of the present inventionapplies equally regardless of the particular type of signal bearingmedia used to actually carry out the distribution. Examples of signalbearing media include recordable type media such as floppy disks, harddisk drives, CD ROMs, and transmission type media such as digital andanalogue communication links.

While the invention has been particularly shown and described withreference to a preferred embodiment, it will be understood by thoseskilled in the art that various changes in form and detail may be madetherein without departing from the spirit and scope of the invention.

1. In a communication device, a method comprising: receiving adestination identifier (ID) to which a communication is desired;comparing the destination ID to one or more lists of approveddestination IDs; when said destination ID matches one of the approveddestination IDs, enabling the communication to the destination ID fromthe communication device; when the destination ID does not match one ofthe approved destination IDs, enabling completion of each communicationfrom the communication device to each un-approved destination ID onlywhen a pre-established user code that authorizes completion toun-approved destination IDs is received in real time at the timeproximate to when a request to initiate the communication is receivedand prior to enabling completion of the communication, wherein saidcommunication is prevented from completing when the pre-established usercode is not received.
 2. The method of claim 1, wherein enablingcompletion of the communication further comprises: initially preventingcompletion of the communication from the communication device to thatdestination ID; prompting for entry of the pre-established user code;and enabling communication from the communication device to the entereddestination ID when a code, received in real time, at the time justprior to when the particular communication is initiated to theun-approved destination ID, matches the pre-established user code. 3.The method of claim 2, further comprising: enabling entry of a securitycode during set up of the communication device; storing the securitycode as a pre-established user code in persistent storage; andretrieving the pre-established user code and comparing thepre-established user code to a subsequent code entered by the user,wherein said means for enabling includes means for comparing thesubsequent code to the pre-established user code.
 4. The method of claim1, further comprising: enabling transmission of wireless communicationfrom the communication device to a terminating device associated withthe entered destination ID, wherein the communication is a wirelesscommunication and the destination ID is one of a number to a phonedevice or an address of a network device, accessible from thecommunication device.
 5. The method of claim 1, further comprising:generating a user directory within which a user enters destination IDs;providing an approved list of approved destination IDs; recordingdestination IDs to which previous communications are received ortransmitted, said destination IDs being recorded within a list ofrecently utilized destination IDs; and establishing a list ofun-approved destination IDs corresponding to destinations for whichentry of the pre-established user code is required.
 6. The method ofclaim 1, further comprising: prompting a user to store a destination IDand received call ID for a recently completed communication to a list ofrecently communicated IDs, which list provides recently approveddestination IDs that do not require a code for a subsequentcommunication to destination IDs on the list; and responsive to the userselecting an option to store the destination ID or received call ID,updating the list of recently communicated IDs to include thedestination ID or received call ID, wherein subsequent calls to thatdestination ID and calls to the received call ID are completed withoutrequiring user entry of the code; wherein a real-time override passwordis required to be entered each time a particular outgoing communicationis initiated to an un-approved communication ID not within the list. 7.The method of claim 1, further comprising: limiting a requirement forentry of the pre-established user code by geographical parameters,wherein a first set of destination IDs are automatically restricted frombeing available for termination of a communication from thecommunication device when the communication device is in a firstgeographical location, such that the pre-established code is required tocomplete a call from the first geographical location, whilecommunication to the first set of destination IDs is automaticallyallowed when in another pre-defined geographical location.
 8. The methodof claim 1, further comprising: limiting a requirement for entry of thepre-established user code by time-of-day and date-specific parameters,wherein a specific destination ID is automatically restricted from beingavailable for termination of a communication from the communicationdevice when the present time of day or date is one of a preset time ordate in which the communication device is restricted from completing acall to that specific destination ID, such that the pre-established codeis required to complete a call during the present time of data or date,while communication to the specific destination IDs is automaticallyallowed during another time or date.