throbber
PCT
`
`WORLD INTELLECTUAL PROPERTY ORGANIZATION
`International Bureau
`
`
`
`INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`(51) International Patent Classification 6 =
`
`(11) International Publication Number:
`
`WO 98/28929
`
`H04Q 7/20
`
`.
`.
`.
`(43) International Publication Date:
`
`2 July 1998 (02.07.98)
`
`(21) International Application Number:
`
`PCT/FI97/00746
`
`(22) International Filing Date:
`
`2 December 1997 (02.12.97)
`
`(30) Priority Data:
`964876
`
`5 December 1996 (05.12.96)
`
`FI
`
`(71) Applicant (for all designated States except US): NOKIA
`TELECOMMUNICATIONS OY [Fl/F1]; Keilalahdentie 4,
`FIN—02150 Espoo (F1).
`
`(72) Inventor; and
`(75) Inventor/Applicant (for US only): HOKKANEN, Petri [FI/FI];
`Koivumutka 21, FIN—40270 Palokka (Fl).
`
`(74) Agent: PATENT AGENCY COMPATENT LTD.; Teollisu-
`uskatu 33, PO. Box 156, FIN—00511 Helsinki (Fl).
`
`(81) Designated States: AL, AM, AT, AU, AZ, BA, BB, BG, BR,
`BY, CA, CH, CN, CU, CZ, DE, DK, EE, ES, FI, GB, GE,
`GH, HU, ID, IL, IS, JP, KE, KG, KP, KR, KZ, LC, LK,
`LR, LS, LT, LU, LV, MD, MG, MK, MN, MW, MX, NO,
`NZ, PL, PT, RO, RU, SD, SE, SG, SI, SK, SL, TJ, TM, TR,
`TI‘, UA, UG, US, UZ, VN, YU, ZW, ARIPO patent (GH,
`KE, LS, MW, SD, SZ, UG, ZW), Eurasian patent (AM, AZ,
`BY, KG, KZ, MD, RU, TJ, TM), European patent (AT, BE,
`CH, DE, DK, ES, FI, FR, GB, GR, IE, IT, LU, MC, NL,
`PT, SE), OAPI patent (BF, BJ, CF, CG, CI, CM, GA, GN,
`ML, MR, NE, SN, TD, TG).
`
`Published
`With international search report.
`Before the expiration of the time limit for amending the
`claims and to be republished in the event of the receipt of
`amendments.
`In English translation (filed in Finnish).
`
`
`
`(54) Title: USE OF A MOBILE STATION AS A CORDLESS TELEPHONE
`
`MS
`
`\
`
`SUBSCRIBER
`LINE
`
`(57) Abstract
`
`Turning of a cellular network phone (MS) into a cordless phone begins by placing the phone in a charging device located in a home
`base station (HBS) and containing special communication pins through which the phone and the base station may exchange authentication
`information while the phone is in the charger. When there is a wireline connection between the home base station and the phone, any
`party may generate the authentication and ciphering information provided that the information is agreed upon in advance. According to a
`preferable embodiment, the parameters (RAND, SRES, Kc) used for authentication are generated by the mobile station and the parameters
`are transmitted through a fixed connection to the home base station which stores them. When the phone is removed from the home base
`station and a call is formed, the base station sends an inquiry (RAND) to which the mobile station gives a response (SRES) and if the home
`station finds that the response and a value earlier stored in memory are identical, a subscriber connection will be formed.
`
`Page 1 Of 24
`
`'
`
`SAMSUNG EXHIBIT 1005
`
`SAMSUNG EXHIBIT 1005
`
`Page 1 of 24
`
`

`

`FOR THE PURPOSES OF INFORMATION ONLY
`
`Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT.
`
`Zimbabwe
`
`Albania
`Armenia
`Austria
`Australia
`Azerbaijan
`Bosnia and Herzegovina
`Barbados
`Belgium
`Burkina Faso
`Bulgaria
`Benin
`Brazil
`Belarus
`Canada
`Central African Republic
`Congo
`Switzerland
`COte d’Ivoire
`Cameroon
`China
`Cuba
`Czech Republic
`Germany
`Denmark
`Estonia
`
`ES
`FI
`FR
`GA
`GB
`GE
`GH
`GN
`GR
`HU
`IE
`IL
`IS
`IT
`JP
`KE
`KG
`KP
`
`KR
`KZ
`LC
`LI
`LK
`LR
`
`Spain
`Finland
`France
`Gabon
`United Kingdom
`Georgia
`Ghana
`Guinea
`Greece
`Hungary
`Ireland
`Israel
`Iceland
`Italy
`Japan
`Kenya
`Kyrgyzstan
`Democratic People’s
`Republic of Korea
`Republic of Korea
`Kazakstan
`Saint Lucia
`Liechtenstein
`Sri Lanka
`Liberia
`
`LS
`LT
`LU
`LV
`MC
`MD
`MG
`MK
`
`ML
`MN
`MR
`MW
`MX
`NE
`NL
`NO
`NZ
`PL
`PT
`R0
`RU
`SD
`SE
`SG
`
`Lesotho
`Lithuania
`Luxembourg
`Latvia
`Monaco
`Republic of Moldova
`Madagascar
`The former Yugoslav
`Republic of Macedonia
`Mali
`Mongolia
`Mauritania
`Malawi
`7
`Mexico
`Niger
`Netherlands
`Norway
`New Zealand
`Poland
`Portugal
`Romania
`Russian Federation
`Sudan
`Sweden
`Singapore
`
`SI
`SK
`SN
`SZ
`TD
`TG
`TJ
`TM
`TR
`TT
`UA
`UG
`US
`UZ
`VN
`YU
`ZW
`
`Slovenia
`Slovakia
`Senegal
`Swaziland
`Chad
`Togo
`Tajikistan
`Turkmenistan
`Turkey
`Trinidad and Tobago
`Ukraine
`Uganda
`United States of America
`Uzbekistan
`Viet Nam
`Yugoslavia
`
`Page 2 of 24
`
`Page 2 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`USE OF A MOBILE STATION AS A CORDLESS
`
`TELEPHONE
`
`Field of the invention
`
`This invention concerns a cellular system comprising base stations
`and mobile stations with an interface in between which is a radio interface.
`
`Background of the invention
`
`In a fixed wireline network the calling subscriber knows the
`
`grounds for charging of the call even when dialling the number of subscriber
`
`is a local call, a long
`B, because debiting will depend on whether the call
`distance call, a mobile call or a call to a foreign country. The terminal equip-
`ment used by subscriber A also affects debiting, since mobile originated calls
`
`are more expensive than calls originated from a fixed network, irrespectively
`of the target terminal equipment. This can be seen as the price which the
`subscriber will have to pay for his great freedom of movement.
`
`The ordinary home user has long been offered cordless phones
`
`providing a limited mobility. The arrangement comprises a base station at the
`
`subscriber line end which converts the audio signal arriving from the fixed
`
`network into a radio signal and transmits it further to the cordless phone. The
`
`most usual modulation used so far is FM modulation. The major drawback of
`this kind of modulation is that traffic in the radio path be listened to illegally
`by any FM receiver tuned to a suitable frequency. An essential improvement
`on this is to use digital modulation and transfer of speech ciphered over the
`
`radio path. A suitable and already standardized digital system is the DECT
`
`system (Digital European Cordless Telecommunications), and cordless
`
`phones complying with the specification of this system and intended for
`
`home users are in fact already available.
`
`A great disadvantage of the cordless phone is the limitation of the
`
`allowed mobility to a radius of 50-100 m from the base station , but an ad-
`
`vantage is the cheaper prices of the fixed network compared with eg. the
`mobile network. Another great disadvantage is low security especially when
`using the traditional analog system.
`
`The grounds for charging of the call used in a fixed network may
`not be used as such in mobile networks allowing great mobility due to the
`network structure and manner of operation. in the following the structure and
`
`operation of the mobile network will be explained using the known GSM
`
`1O
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 3 of 24
`
`Page 3 of 24
`
`

`

`WO 98/28929
`
`PCT/F197/00746
`
`mobile network shown in Figure 1 as an example. Communication between
`
`the MS (Mobile Station) in a cell and the network takes place through the
`
`radio via the base station BTS (Base Transceiver Station). Base stations
`
`BTS are connected to the BSC (Base Station Controller), with e.g. radio
`
`channel management and channel exchange functions as its duties. Several
`
`base station controllers are connected to one MSC (Mobile Switching Cen-
`
`ter) performing the major switching functions of the mobile network and con-
`
`necting the mobile network with other mobile switching centers and with
`external networks.
`
`The mobile network also comprises various databases, such as an
`
`HLR (Home Location Register), where subscriber information is stored per-
`
`manently. The subscriber's MSISDN number, the IMSI (International Mobile
`
`Subscriber Identity) used within the network and subscriber service informa-
`
`tion are stored in the home location register as well as routing information to
`
`the VLR (Visitor Location Register). The AuC (Authentication Center) is also
`
`located in connection with the home location register. Subscriber information
`
`received from HLR is stored in VLR for the time it takes for the visitor to stay
`in the VLR area.
`
`When doing location updating for the first time, the network will
`
`check whether the user has right to access to the network. The purpose of
`
`the security functions of the GSM system is to prevent unauthorized access
`
`to the network, thus preventing anyone from using the network for somebody
`
`else's account and to protect the user's privacy. Unauthorized access is
`
`prevented through authentication, where the user is identified to make sure
`
`1O
`
`15
`
`20
`
`25
`
`that the subscriber is entitled to use the network. In fact, the MS is formed of
`
`two parts: the ME (Mobile Equipment) and the SlMcard (Subscriber Identity
`
`Module), so an operating mobile station MS is formed only by pushing the
`
`SIM card into the mobile equipment ME. The identification by having the user
`
`push his SIM card into his mobile station MS is intended to prevent unau-
`
`thorized use of e.g. stolen equipment and to make sure that only those sub-
`scribers use the network who pay their bills. From the operator's point of
`
`view,
`
`identification is especially important particularly in connection with
`
`international roaming, since the network does not know the visitor's sub-
`
`scriber information and is thus unaware of any insolvency.
`
`Firstly, the user identifier or PIN code (Personal Identity Number)
`
`given by the user himself and stored on the SIM card is used in identification.
`
`30
`
`35
`
`Page 4 of 24
`
`Page 4 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`In the first stage, when electric power is turned on to the phone, the phone
`will ask the user to push a code of 4-8 digits and will compare the entered
`code with a code stored in the memory.
`If the code is incorrect after three
`
`attempts, the card will go into a locked state and it can not be opened with-
`out special measures. This identification is done entirely locally by the SIM
`card, so no PIN code is transmitted by radio and the code can thus not be
`
`captured.
`
`1O
`
`15
`
`20
`
`Secondly, after the correct PIN code has been entered, the mobile
`
`station will transmit its IMSI number to the network or,
`
`if possible, a TMSI
`
`(Temporary Mobile Subscriber Identity), whereupon authentication between
`
`network and card will take place, which will be explained by referring to Fig-
`ures 1 and 2.
`
`The principle is such that the network will put a question to the
`
`mobile station to which only the right SIM card will know the answer. In the
`
`fixed part of
`
`the network,
`
`identification
`
`is performed by the AuC
`
`(Authentication Center) located in connection with the home location register
`
`HLR while the SIM card performs identification in the terminal equipment.
`
`Identification is based on identification algorithm A3 and on subscriber-based
`
`identification key K. The IMSI (International Mobile Subscriber Identity), the
`
`subscriber-specific key Ki and the identification algorithm A3 mentioned
`
`above are stored both in the network and in the SIM card.
`
`Figures 1 and 2 are referred to in the following. In the early part of
`
`identification, the authentication center AuC will send a question to the mo-
`
`bile station, which is a random number RAND having a length of 128 bits.
`
`25
`
`Thus, its value is in a range of 2128-1, so there is a very small chance that the
`
`same random number could be used twice. This stage is represented in
`
`Figure 1 by circled figure one and in Figure 2 by an arrow passing through
`
`the radio interface. The mobile station receives RAND, transfers it to the SIM
`
`card, which performs the A3 algorithm with its aid and with the aid of the
`
`subscriber-specific key Ki located in the card. The resulting answer is a 32-bit
`SRES (Signed Response) which the mobile station sends to the network.
`
`Authentication center AuC receives it, the circled figure two in Figure 1, and
`
`compares the SRES value with the value which it has calculated itself using
`
`the same A3 algorithm as well as RAND and key K,.
`
`If the SRESs are the
`
`same, the identification is accepted, othenlvise the subscriber will not be
`
`30
`
`35
`
`permitted access to the network (the yes/no stage in Figure 2).
`
`Page 5 of 24
`
`Page 5 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`Figure 3 illustrates how the mobile station uses received RAND
`
`and Ki values also for the A8 algorithm, which produces a connection—
`specific ciphering key Kc, which is used further as a key for a third algorithm
`A5, which is used for ciphering speech and data on radio traffic channels. In
`
`the network the AuC performs the same algorithm with the same values and
`
`thus obtains the same ciphering key as result. Both store the key in memory.
`Since the identification information is always calculated in the
`
`home network, operators may use different A3 and A8 algorithms and they
`will not know what algorithms the other uses. On the other hand, the speech
`ciphering algorithm A5 must be the same in all networks.
`
`Thus, of all the information contained in the SIM card, the IMSI, Ki
`and algorithms A3 and A8 are important to identification. Algorithms A3 and
`A8 are performed in the SIM card so that key Ki need never be transmitted
`
`between the card and the mobile equipment ME proper.
`
`As was said above, calculation of the identification data always
`takes place in the AuC of the subscriber's home network. This being the
`case, when the subscriber is in another network identification would immod-
`
`erately load the signal network between VLR and AuC. To avoid this, AuC
`
`generally sends ready triplets to the visitor location register VLR while the
`
`visitor is registering into this. The triplet contains the RAND, SRES and Kc.
`
`Hereby, the visitor location register will check whether the mobile station has
`
`calculated correct values, so that signalling to the AuC may be reduced.
`
`It is realized from the above presentation that in terms of security
`the digital cellular system is very advanced as regards unauthorized use and
`
`speech ciphering. Since all cells are of equal value for the mobile network,
`
`no other grounds for calculation of the price of calls can be offered than e.g.
`flexing based on the hours of the day and night and cheaper than normal
`
`prices between mobile station and home phone. No special charging
`grounds can be offered for a call originated from or terminated in a certain
`
`cell. These factors reduce the use of the mobile phone as a home phone.
`
`It has been suggested in the field to arrange at home or in any
`
`other place desired by the subscriber a special HBS (Home Base Station)
`which can be connected to an ordinary telephone connection and which is as
`
`10
`
`15
`
`20
`
`25
`
`30
`
`simple a device as possible serving only one or just a few users registered
`with the base station, who use a normal phone in a cellular network. As re-
`
`35
`
`gards its functions the home base station would thus correspond to present
`
`Page 6 of 24
`
`Page 6 of 24
`
`

`

`WO 98/28929
`
`PCT/F197/00746
`
`base stations for cordless phones, that is,
`
`it performs a conversion between
`
`the wireline network and the radio interface. Even if the base station would
`
`be in the nature of a "stripped" base station in a cellular network, it would be
`
`necessary in one way or another to authenticate a cellular network phone
`
`desiring access to the network through the base station. The phone does in
`
`fact always work in the same manner in authentication and expects to re-
`ceive a RAND inquiry from the network. At least two ways have been pro—
`posed.
`
`Firstly, a modem connection could be arranged from the home
`
`base station to the authentication center AuC of the cellular network,
`
`whereby parameters to be exchanged in authentication are transferred
`
`through this connection and authentication proper would take place in a
`
`normal manner as shown in Figure 2. Since signalling would pass through
`
`another network than the network of the cellular network operator, an
`
`agreement on the matter must be made with the operator in question.
`
`Secondly, a card reader could be located in the home base station
`
`and a special card could be used containing data relating to this base station
`
`and user. Hereby authentication would be performed between card and base
`
`station, so the user would activate the base station with his card.
`
`Drawbacks of these proposed procedures are difficult modem sig-
`
`nalling over a fixed network (e.g. PSTN) and acquisition of extra cards and
`
`readers as well as the making of related software.
`
`The present invention thus aims at bringing about a cordless tele-
`
`phone system which is based on a cellular network and which does not have
`
`the presented drawbacks and wherein standard terminal equipment of the
`
`cellular network may be used at home as cordless phones without any spe—
`
`cial steps required of the user, which thus allows cheaper calls.
`
`The objectives are achieved with the attributes presented in the in-
`
`dependent claims.
`
`Brief summary of the invention
`
`The proposed home base station which is connected to an ordi-
`
`nary telephone connection contains in the manner of a base station for
`
`known cordless phones a charging device where the phone can be charged.
`
`Besides the pins supplying the charging current,
`
`it has special communi-
`
`cation pins through which the phone and the base station can exchange
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`35
`
`Page 7 of 24
`
`Page 7 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`authentication information while the phone is in the charger. The turning of
`the cellular network phone into a cordless phone thus begins by placing the
`phone in the charger.
`
`In authentication all information transfer takes place only between
`base station and phone while the authentication center AuC of the cellular
`
`network is entirely outside. Hereby, since there is a wireline connection be—
`
`tween the home base station and the phone, it does not matter which party's
`authentication means will generate the authentication and ciphering data as
`
`long as these are agreed upon in advance. Even the algorithms need not be
`
`such which are used in the cellular system. It is enough to agree in advance
`
`that when one party sends a certain inquiry, the other party will respond with
`
`a certain answer, whereupon both will use an agreed ciphering key in the
`
`radio traffic. The authentication is invisible to the user.
`
`According to an advantageous embodiment, the parameters used
`
`in authentication are generated by first means located in the mobile station
`
`and the parameters are transferred through a fixed connection to second
`
`means which are located in the home base station and which will store them.
`
`1O
`
`15
`
`This makes the base station simpler.
`
`In addition,
`
`it is advantageous to use
`
`the same inquiries, responses, algorithms and ciphering keys as in the cel-
`
`20
`
`lular system with which the phone in question complies. Hereby any software
`
`changes to be made in the phone will be minor changes.
`
`According to another embodiment, the parameters used in authen-
`
`tication are generated by second means in the base station and the pa-
`
`rameters are transferred through a fixed connection to such first means in
`
`25
`
`the mobile station which will store them.
`
`It is advantageous when placing the phone in the charger that de-
`
`registration of the phone from the cellular network will start at the same time.
`
`Hereby any transfer of a call to the home phone will work normally, should
`
`the mobile station not answer. information from the cellular network time may
`be left in the phone memory, whereby it may be put into use when the phone
`moves over to the cellular network. Such putting into use may take place
`
`automatically, when the phone moves outside the range of the home base
`station.
`
`When the mobile station has turned into a cordless phone,
`
`authentication is performed in the beginning of the call formation using pa-
`
`rameters which have been calculated in advance and stored in the memory.
`
`30
`
`35
`
`Page 8 of 24
`
`Page 8 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`List of figures
`
`The invention will be explained in greater detail referring to the ap-
`
`pended schematic figures, wherein
`
`Figure 1
`
`shows the principle of a cellular system;
`
`Figure 2 shows authentication in a known cellular system;
`
`Figure 3 shows formation of a ciphering key in a known system;
`
`Figure 4 shows the principle of a system according to the invention;
`
`Figure 5
`
`illustrates registration in a system according to the invention;
`
`Figure 6 illustrates authentication in a system according to the invention;
`
`Figure 7 depicts another embodiment; and
`
`Figure 8 shows authentication in the other embodiment.
`
`Detailed description of the invention
`
`10
`
`15
`
`Figure 4 shows basic elements of the system. A subscriber line 1
`
`comes to the subscriber's home, office or any other such place from the local
`
`exchange of a fixed PSTN or lSDN network 3. Subscriber line 1 is connected
`
`to a HBS (Home Base Station), which will convert speech and data arriving
`
`20
`
`from the subscriber line into the format of the air interface of the cellular
`
`system and will send it further to radio communication and will correspond-
`
`ingly convert speech and data arriving in cellular system form from radio
`
`communication into the form used in the fixed network,
`
`in the case of a
`
`PSTN network into an audio signal and in the case of an ISDN network into a
`
`25
`
`PCM signal. The transmission power is low to minimize the interference
`
`caused by frequencies used in the home base station, so the cell radius is of
`
`the same magnitude as with cordless phones, a few hundred meters in free
`
`space.
`
`3O
`
`35
`
`On the other hand, basic elements comprise a mobile station MS
`
`which is a device in accordance with some digital cellular system. The known
`GSM system is used as example.
`
`When moving within the area of the cellular system, the mobile
`
`station is in connection with the base station providing the best connection at
`
`each time and it will traffic in a normal manner in the cellular network. When
`
`the user moves in the cellular network from place A to his home in place B,
`
`which move is shown by an arrow, the mobile station MS will still remain
`
`Page 9 of 24
`
`Page 9 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`registered with the cellular network. Only when the user connects his phone
`
`with a wireline connection directly to the home base station, arrow A -> C,
`
`will deregistration of the phone from the cellular network take place. The
`
`charging station for phone batteries in the home base station, represented by
`
`a depression in home base station HBS, may contain, besides charging
`
`current pins, one or more contact pins, whereby when the phone is placed in
`
`the charging station the contact pin will be brought into contact with a corre-
`
`sponding pin in the phone, which will start both deregistration of the phone
`from the cellular network and registration with the home base station.
`
`According to a first embodiment, all calculation relating to authenti—
`
`cation is performed in mobile station MS. This embodiment will be explained
`
`referring to Figure 5.
`
`Registration with the home base station takes place so that the
`
`subscriber equipment ME generates a random number RAND, which it feeds
`
`to the SIM card. The SIM card calculates an algorithm X using the random
`
`number and key Ki obtaining SRES as result. Using the same values but
`
`algorithm Y the SIM card performs algorithm Y obtaining a connection-
`
`specific ciphering key Kc as result. These algorithms may be the same as
`
`10
`
`15
`
`those used in the cellular system, that is,
`
`in case of a GSM system algo-
`
`20
`
`rithms A3 and A8, but they may as well be any algorithms. The SIM card will
`
`also give the IMSI (International Mobile Subscriber Identity) or the TMSI
`
`(Temporary Mobile Subscriber Identity), which may be any accepted value.
`
`In its main features the function corresponds to the left side of Figures 2 and
`
`3, except that ME instead of the authentication center AuC will generate the
`random number RAND.
`
`25
`
`The SIM card will feed the response SRES which it has generated,
`
`the key Kc and the IMSI/TMSI value to subscriber equipment ME, which will
`
`transmit them along a fixed connection through contacts pins 51, which con-
`
`nect the mobile station and the home base station HBS, to home base sta—
`
`30
`
`tion HBS, which will store the data it received. Registration has now taken
`
`place and the home base station knows the authentication and ciphering
`
`parameters which are used. The mobile station MS has turned into a cord—
`
`less phone, it may be removed from the home base station HBS and it may
`
`start or receive a fixed network call. Its phone number is the number given by
`
`35
`
`the fixed network operator to this subscriber connection.
`
`Page 10 of 24
`
`Page 10 of 24
`
`

`

`WO 98/28929
`
`PCT/F197/00746
`
`the first step to perform is
`When starting or receiving a call,
`authentication, which is explained referring to Figure 6. First,
`the mobile
`
`station MS sends to the home base station HBS by radio its identifier TMSI,
`
`which the home base station uses to search from its memory such values
`
`received earlier from the mobile station which relate to the identifier. There-
`
`after the home base station will authenticate the mobile station by sending to
`it the RAND number which it has retrieved from the memory. Upon receiving
`
`the RAND, the SIM card will perform algorithm X, obtaining the SRES value
`
`as result, which the mobile station MS will send to the home base station.
`
`The value ought to be the same as the one it has generated earlier in con-
`
`nection with the registration, so the home base station will perform validation
`
`by comparing the received SRES value with the one in its memory.
`
`If they
`
`are identical, the call may be started. For ciphering the information it has
`
`sent to the mobile station the base station uses ciphering key Kc which it has
`
`stored, and the mobile station uses the same key, which it has also stored
`
`earlier, or then it may recalculate the key using algorithm Y, as shown in the
`
`figure.
`
`It should be noticed that both the RAND and the SRES values may
`
`be sent even several times over the radio interface, whereby a third party
`
`may capture them. This is possible also in case of a GSM system. However,
`
`this is not a problem, because the ciphering key is not transmitted at all by
`
`radio, but only through the fixed connection when the mobile station is at-
`
`tached to the home base station.
`
`Figure 7 shows another embodiment, where the home base station
`
`1O
`
`15
`
`20
`
`25
`
`is the active party in authentication.
`
`Registration with the home base station takes place so that the
`
`mobile station MS transmits its IMSI (International Mobile Subscriber Identity)
`
`or its TMSI (Temporary Mobile Subscriber Identity) to the home base station
`
`HBS.
`
`In response to this, the home base station will generate a random
`
`number RAND and calculate algorithm X using the random number and key
`
`Ki, obtaining the answer SRES as result. Using the same initial values but
`
`algorithm Y it also performs algorithm Y obtaining a connection-specific ci-
`
`phering key Kc as result. These algorithms may be the same as those used
`
`in the cellular system. All values are stored in the memory.
`
`Hereafter the home base station feeds its generated inquiry
`
`RAND, its calculated answer SRES and the key Kc through contact pins 51
`
`30
`
`35
`
`Page 11 of 24
`
`Page 11 of 24
`
`

`

`W0 98/28929
`
`PCT/FI97/00746
`
`10
`
`to subscriber equipment ME, which will store the information it receives.
`
`Registration has now taken place and the authentication and ciphering pa-
`rameters to be used are now known to the mobile station. The mobile station
`
`MS has turned into a cordless phone,
`
`it may be removed from home base
`
`station HBS and it may originate or receive a fixed network call.
`
`When originating or receiving a call, authentication is first per-
`formed and this is explained referring to Figure 8. The mobile station MS first
`
`sends by radio to home base station HBS its identifier TMSl, which the home
`
`base station uses for finding from its memory any values which relate to the
`
`identifier and which have earlier been received from the mobile station.
`
`Thereafter the home base station authenticates the mobile station by send-
`ing to it the RAND number which it has searched from the memory. Having
`received the RAND, the SIM card will perform algorithm X obtaining as result
`the SRES value, which the mobile station MS will send to the home base
`
`station. The value ought to be the same as the one which it generated earlier
`
`in connection with the registration, so the home base station performs vali-
`
`dation by comparing the SRES value which it has received and the one in its
`
`If these are the same, the call may be started. For ciphering the
`memory.
`information it has sent to the mobile station, the base station uses the ci-
`
`phering key Kc which it has stored, and the mobile station uses the same
`
`key, which it too has stored earlier, or then it may recalculate the key using
`algorithm Y.
`
`It
`
`is also possible to act in such a way that the mobile station
`
`authenticates the base station. Hereby it sends to the base station both the
`
`lMSl and the RAND, in response to which the base station returns the SRES
`
`number. The mobile station checks to make sure that the number corre-
`
`sponds with the already stored or recalculated SRES value.
`
`Arranging functions according to the invention in present cellular
`
`network phones will require minor software additions and new algorithms,
`
`if
`
`in addition to the existing ones, such as A3A8 algorithms. Any
`required,
`additions to be made in the home base station are minor ones,
`if the first
`
`embodiment is implemented. The great advantage is that any cellular net-
`
`, work phone registered with the home base station will work as a cordless
`
`phone.
`
`In practice, the phone is a dual-mode phone, whereby the same
`
`phone will work at home as a cordless phone at cheaper call tariffs and out-
`
`side the home as a normal cellular network phone.
`
`If registration with the
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 12 of 24
`
`Page 12 of 24
`
`

`

`WO 98128929
`
`PCT/F197/00746
`
`11
`
`base station takes place automatically, as proposed above, and if registra-
`tion with the cellular network takes place automatically using earlier pa-
`rameters stored in the phone memory, the user to change the mode need
`
`only connect the phone for a moment to the home base station when coming
`home, to the office or any other such place.
`
`When the phone registers with the home base station, one must of
`
`course make sure that its transmission power will fall considerably below the
`
`minimum transmission power determined for the mobile station in the cellular
`
`network system so that the range will be reduced to a few hundred meters in
`
`free space. This must be done because when operating as a cordless phone
`
`the mobile station will not cause interference in such connections of the
`
`cellular system which use the same frequency.
`
`It could even be possible to program the phone so that it would be
`
`able when registered with the home base station to receive calls both from
`
`the fixed network side and from the cellular network side, but outgoing calls
`would be directed to the fixed network.
`
`The proposed arrangement can be implemented in practice in
`
`many different ways keeping within the scope of the claims. Programs and
`
`algorithms can be freely chosen as well as the party who will generate the
`authentication and ciphering information. Registration may preferably be
`started by pushing the phone into the charging station, but the base station
`
`may alternatively have some other place where the phone is placed while
`
`registration takes place. Several phones may be registered with the home
`
`1O
`
`15
`
`20
`
`base station. ln-house calls between these phones may be implemented by
`suitable software in the base station.
`
`25
`
`Page 13 of 24
`
`Page 13 of 24
`
`

`

`WO 98/28929
`
`PCT/F197/00746
`
`12
`
`Claims
`
`1. Telephone system comprising terminal equipment and a home
`
`base station connected with a subscriber line to a telephone exchange,
`
`whereby a part of the subscriber connection is formed by a radio link be-
`
`tween the terminal equipment and the base station,
`
`characterized inthat
`
`the terminal equipment is a mobile station of a cellular mobile tele-
`
`phone system also containing first means for implementing an authentication
`
`procedure between itself and the home base station (HBS),
`
`the base station contains second means for
`
`implementing an
`
`authentication procedure between itself and the mobile station,
`
`generation and exchange of authentication parameters between
`
`the mobile station and the home base station begin at once when the mobile
`
`station is put into the home base station so that a wireline connection is
`
`brought about between them, whereby after transmission of authentication
`
`parameters the mobile station has turned into a cordless phone registered
`with the home base station.
`
`2. System as defined in claim 1,
`
`characterized inthat
`
`the first means comprise a first algorithm (algorit

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket