throbber

`
`
`[19]
`5,812,955
`[11] Patent Number:
`United States Patent
`
`
`
`
`
`
`
`
`
`
`
`
`Dent et al.
`[45] Date of Patent:
`*Sep. 22, 1998
`
`
`
`
`
`US005812955A
`
`
`
`[54] BASE STATION WHICH RELAYS
`
`
`
`
`
`
`
`
`
`CELLULAR VERIFICATION SIGNALS VIAA
`TELEPHONE WIRE NETWORK TO VERIFY
`
`
`
`
`
`
`
`A CELLULAR RADIO TELEPHONE
`
`
`[75]
`
`
`
`
`
`
`
`Inventors: Paul Wilkinson Dent, Stehag; Jacobus
`
`
`
`
`Cornelius Haartsen, Staffanstorp, both
`of Sweden
`
`
`
`.
`~
`
`
`
`
`
`
`[73] Assignee: Ericsson Inc., Research Triangle Park,
`NC.
`
`
`
`
`
`[*] Notice:
`
`
`
`
`
`
`
`
`
`
`The term of this patent shall not extend
`
`
`
`
`
`
`
`beyond the expiration date of Pat. No.
`5,428,668.
`
`
`
`[63]
`
`
`
`
`
`[21] Appl. No.2 205,705
`
`
`
`
`[22]
`Filed:
`Mar. 3, 1994
`
`
`
`Related US. Application Data
`
`
`
`
`
`
`figntsiniizaétgigrégn—part 0f Ser. NO’ 148’828’ NOV' 4’ 1993’ Pat'
`
`
`6’
`.
`.
`’
`
`
`
`
`
`
`
`[51]
`Int. Cl-
`~~~~~~~ H04Q 7/30
`
`
`
`
`
`
`
`
`[52] US. Cl.
`.. 455/561; 380/37
`............
`[58] Field of Search .................................. 379/58, 59, 60,
`
`
`
`
`
`
`
`379/61, 62, 63; 455/331, 33.2, 54.1, 11.1,
`
`
`
`
`
`
`
`14, 461, 414, 445, 436, 561; 380/21
`
`
`
`
`
`
`
`
`
`
`
`
`[56]
`
`
`
`
`
`
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`
`4,953,198
`.
`8/1990 Daly et a1.
`
`
`
`
`4,979,205
`................................. 379/61
`12/1990 Haraguchi
`
`
`
`
`
`
`
`
`.
`1/1991 Gillig et a1.
`4,989,230
`
`
`
`
`
`
`
`- 379/63 X
`7/1991 Sasuta 6t a1~
`-
`570347993
`
`
`
`
`
`2/1992 Dent ...................................... 379/59 X
`5,091,942
`
`
`
`
`6/1992 Gflhg et al’ ‘
`5’127’042
`11/1993 Schellinger et a1.
`...................... 379/59
`5,260,988
`
`
`
`
`
`380/37
`5 353 352 10/1994 Dent et al
`
`
`
`
`
`
`4/1996 Mizikovsk'y‘éi'£12722IIIIIIIIIIIIIIIIII 379/59
`5,513,245
`
`
`
`
`
`5,521,962
`5/1996 Chavez, Jr.
`.......
`.. 379/60
`
`
`
`
`
`
`
`5/1996 Shrader et al.
`.. 379/60
`5,521,963
`
`
`
`
`
`
`
`6/1996 Dent et a1.
`................................ 379/59
`5,526,402
`
`
`
`
`
`
`
`
`
`
`
`
`0 225 607
`
`
`0643 543 A2
`
`5—48526
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5,535,259
`................................ 379/59
`7/1996 Dent et a1.
`
`
`
`
`
`
`
`
`
`
`
`5,581,597 12/1996 Dom 6t 211-
`379/59
`
`
`
`
`4/1997 Nilssen ...................................... 379/56
`5,623,531
`FOREIGN PATENT DOCUMENTS
`
`
`
`
`
`.
`6/1987 Eur0pean Pat. Off.
`
`
`
`3/1995 European Pat Off- ~
`
`
`2/1993
`Japan .
`OTHER PUBLICATIONS
`
`
`
`
`
`
`
`Microcellular Structures and Their Performance, H. Pers-
`son, IEEE, 1992, pp. 413—418.
`
`
`
`
`
`
`
`
`
`
`
`NTT [0 Market Cordless Telephone for Ofiice Buildings,
`
`
`
`
`
`
`Comline Telecommunications, p. 4, Jun. 29, 1988.
`
`
`
`
`
`SWBell Mobile Plans PCS, A. Lindstrom, Communications
`
`
`
`
`
`
`Week, No. 448, p. 6(1), Apr. 5, 1993.
`
`
`
`(List continued on next page.)
`
`
`
`
`Primary Examiner—William Cumming
`
`
`
`
`
`
`
`Attorney, Agent, or Firm—Myers Bigel Sibley & Sajovec
`
`
`ABSTRACT
`[57]
`A secure radio personal communication system and method
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`includes a base station which relays cellular verification
`
`
`
`
`
`
`
`
`signals between a wide area cellular network and a cellular
`
`
`
`
`
`
`
`
`terminal Via the wire telephone network. Thus, cellular
`
`
`
`
`
`
`
`
`telephone calls which are routed to a cellular terminal Via a
`base station, when the cellular terminal is within a local
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`region covered by the base station, may be exchanged
`between the cellular network and cellular terminal over the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`wire telephone network. Calls from the wide area cellular
`
`
`
`
`
`
`
`
`
`
`network which are routed through the base station can thus
`
`
`
`
`
`
`
`
`
`employ the same security systems and methods which are
`
`
`
`
`
`
`
`
`employed by the wide area cellular network. Signals
`between the base station and the cellular terminal are
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`preferably exchanged when the cellular terminal is parked in
`
`
`
`
`
`
`
`
`the base station. Verification and encryption signals may be
`
`
`
`
`
`
`
`
`exchanged. The same signals may be used for enhanced
`security when the base station is relaying wire network calls
`
`
`
`
`
`
`
`
`.
`.
`.
`.
`
`
`
`
`
`
`
`
`to the cellular terminal when the cellular terminal is in the
`
`
`
`
`
`
`
`local region AlternatiVely> separate Verification and encryp'
`
`
`
`
`tion protocols may be used
`
`
`
`
`41 Claims, 12 Drawing Sheets
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 1 0f 29
`
`SAMSUNG EXHIBIT 1006
`
`
`
`
`
`
`
`
`
`
`
`SAMSUNG EXHIBIT 1006
`
`Page 1 of 29
`
`

`

`In Search OfA New Market, R. Schneiderman, Microwaves
`
`
`
`
`
`
`
`
`
`
`
`
`& RF, vol. 30, No. 8, p. 33(5), Aug. 1991.
`
`
`
`
`
`
`
`Motorola Blurs Lines Between Cellular and Paging, Deal-
`
`
`
`
`
`
`
`
`
`erscope Merchandising, vol. 35, No. 7, pp. 36, Jul. 1993.
`Mitsubishi Electric to Enter Radio Base Station Market for
`
`
`
`
`
`
`
`
`
`
`
`
`
`Digital Cellular Phones, Comline Telecommunications, p.
`9, Mar. 5, 1993.
`
`
`
`
`
`
`
`
`
`Expected to Show Reference Design at COMDEX: Motor
`
`
`
`
`
`
`
`Sampling PCS Chip Set, Electronic Engineering Times, p. 1,
`Oct. 26, 1992.
`
`
`
`Bell Atlantic and Motorola to Test Personal Communica-
`
`
`
`
`
`
`tions Service, Audio Week, Feb. 17, 1992.
`
`
`
`
`
`
`
`New Service Moves Toward National Information Infra-
`
`
`
`
`
`
`
`structure Via PCS, Common Carrier Week, Feb. 17, 1992.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`M. Brussol, et al., Telepoint in France, Matra Communica-
`
`
`
`
`
`
`tion, vol. 15, pp. 21—30, 1993.
`
`
`
`
`
`Walker, Security in Mobile and Cordless Telecommunica-
`tions, IEEE, pp. 493—496, 1992.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5,812,955
`Page 2
`
`
`OTHER PUBLICATIONS
`
`
`Bell Atlantic and Motorola To Test Personal Communica-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tions Service, Warren Publishing, Inc., Audio Week, vol. 4,
`No. 7, Feb. 17, 1992.
`
`
`
`
`RHCS Stake Claim on Personal Communications Licenses,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Capitol Publications, Inc., FCC Week, vol. 7, No. 42, Nov.
`5, 1990.
`
`
`
`
`
`
`
`
`Aermica ’s First Personal Communications Service (PCS) Is
`
`
`
`
`
`Claimed, Audio Week, Apr. 5, 1993.
`Nation ’s First Commercial PCS Introduced by SW Bell, E.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Messner, Network World, vol. 10, Issue 14, p. 4(2), Apr. 5,
`1993.
`
`Mitsubishi Electric To Enter Radio Base Station Market For
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Digital Cellular Phones, Mitsubishi Weekly, vol. 9, No. 9,
`
`
`
`
`
`Mar. 5, 1993, Digitized Information, Inc.
`
`
`
`
`
`
`Wireless System Manufacturers Develop Microcell Equip-
`
`
`
`
`
`
`
`
`ment, Phillips Business Information, Inc., PCS News, vol. 4,
`No. 6, Mar. 18, 1993.
`
`
`
`
`Cox Moves Ahead 0n Alternate Access, PCS, G. Kim,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Multichannel News, vol. 12, No. 35, p. 33(1), Sep. 2, 1991.
`New Service Moves Toward National Information Infra-
`
`
`
`
`
`
`
`structure Via PCS, Common Carrier Week, vol. 8, No. 7, p.
`
`
`
`
`
`
`
`
`
`
`
`
`5(2), Feb. 17, 1992.
`
`Page 2 of 29
`
`Page 2 of 29
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep.22, 1998
`
`
`
`
`
`Sheet 1 0f 12
`
`5,812,955
`
`
`
`
`
`’- ——————————— \
`
`l
`
`l
`
`\
`
`\
`
`124
`
`\
`
`\ x
`_. .. _ \x \x
`
`112
`
`BASE
`STATION
`no
`
`, ’
`
`/
`
`104
`\x
`/
`
`/
`
`x’
`
`/
`
`I
`I
`I
`I
`
`I n
`
`I
`I
`I
`
`II
`
`I
`
`I
`
`\
`
`\
`
`\
`
`\
`
`\ \
`
`Page 3 of 29
`
`
`
`l/
`
`_____ /
`
`
`
`
`NEIWORK
`
`
`STATION
`
`102
`
`108
`
`
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\. ___________ J
`
`/
`
`/
`
`z
`
`x
`
`I /
`
`z
`
`I
`
`I
`
`I
`
`/
`
`\\\
`\ \
`‘5
`l
`'
`'
`:
`J
`
`108
`
`/
`
`’
`
`\
`I
`|
`I
`I
`'
`I
`I
`I
`I
`'
`:
`
`
`x
`
`Page 3 of 29
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep.22, 1998
`
`
`
`
`Sheet 2 0f 12
`
`5,812,955
`
`
`
`
`FIG. 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`\
`
`
`
`
`
`
`114
`\ x
`
`
`\/ _____ \x \\
`
`
`I /
`
`
`/
`
`
`
`
`’
`
`r
`'
`'
`'
`'
`'
`
`
`
`
`
`
`x \
`
`
`
`x
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`\ x _____ l
`
`NETWORK
`
`STATION
`
`
`
`102
`
`
`
` \
`
`
`\\
`
`\\\\
`\\
`
`I ‘
`I
`'
`I
`I
`I
`'
`I
`)
`
`
`II
`
`I
`I
`I
`I
`I
`II
`
`I
`
`I
`I ’
`
`
`/
`
`
`
`
`
`
`
`
`
`I/
`
`TERMINAL
`/
`120
`
`
`
`
`//
`
`
`l
`I
`I
`I
`I
`I
`l
`I
`
`:
`.
`.
`
`|\
`
`\
`
`
`\ .
`
`\
`
`
`\
`
`
`108
`
`
`
`\
`
`
`\
`
`
`\
`
`
`\
`
`
`\
`
`
`\
`
`
`\
`
`
`I
`
`I
`
`
`I
`
`
`I
`
`I
`
`
`I
`
`
`
`I
`
`
`/
`
`I
`
`
`I
`
`
`I
`
`
`\ ___________ J
`
`Page 4 of 29
`
`Page 4 of 29
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep.22, 1998
`
`
`
`
`Sheet 3 0f 12
`
`5,812,955
`
`
`
`
`FIG. 2
`
`
`
`
`
`135
`
`
`
`Page 5 of 29
`
`Page 5 of 29
`
`

`

`US. Patent
`
`
`
`Sep. 22, 1998
`
`
`
`
`Sheet 4 0f 12
`
`5,812,955
`
`
`
`m0<mmm._.2_
`
`omw4<Z=2mmlr
`
`mm?
`
`ZMIB
`
`Qwvzugi
`
`
`
`
`
`
`
`mfiqmujmo
`.
`mmom<zo
`ENFEm1&3
`mmzmml
`
`O 000
`
`
`
`
`
`mm>_m0m2<m.rI
`
`
`
`Imommmooml
`
`
`JOEZOO
`
`rul_E-.I|1.l.Iu_—IOk.
`
`
`
`I18I586
`
`Egon.v?
`
`
`
`$4$0..»m9
`
`
`
`
`
`02.
`
`Page 6 of 29
`
`3he‘-
`
`IoBmEo
`
`Imjm02<0
`
`N9
`
`—E
`
`Ignaw
`
`Page 6 of 29
`
`
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`Sheet 5 0f 12
`
`5,812,955
`
`
`
`
`
`8213.200«mum;amumEzEEN
`”@81269dzz<zo«mama
`
`
`
`
`
`52w
`
`
`
`_
`
`
`
`8m.IIE2‘?...<..5<a:88m8aBa8m8m5“_Bu_aaan?5%“
`5&3
`
`220
`
`mmmjmsz
`
`OWJOEZOO$2:
`
`
`
`«10¢
`
`
`
`
`
`_2m8aa:_lllllllllllllllllllllllllllllllllllllllllllll3%
`
`Page 7 of 29
`
`Page 7 of 29
`
`
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep.22, 1998
`
`
`
`
`Sheet 6 0f 12
`
`5,812,955
`
`
`
`I I I I I I I I I I I I I I I I I I I
`
`l
`
`:I I I I I I I I I I I I I I I I I
`
`
`
`TRANSCEIVER
`
`
`
`253
`
`
`
`RECEIVE
`CIRCUIT
`
`
`
`
`
`CONTROL
`
`PROCESSOR
`
`
`
`
`251
`
`
`TRANSMIT
`CIRCUIT
`
`.
`
`255
`
`
`
`STORAGE
`MEANS
`
`
`
`
`257
`
`
`
`
`261
`
`265
`
`
`
`KEYPAD
`
`
`
`SPEAKER
`
`
`
`SCANNER
`
`
`
`259
`
`
`
`263
`
`
`
`267
`
`DISPLAY
`
`
`
`MIC
`
`
`
`OTHER
`
`
`
`
`
`Page 8 Of 29
`
`Page 8 of 29
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep.22, 1998
`
`
`
`
`Sheet 7 0f 12
`
`5,812,955
`
`
`
`
`
`300
`
`
`
`
`
`DETECT
`
`
`
`INITIAUZE
`CONDITIONS
`
`
`
`
`INITIATE
`
`
`CALL
`
`
`NOTIFY
`
`OF LOCATION
`
`
`
`
`
`REQUEST
`CONTROL
`
`
`
`
`
`
`MESSAGE
`
`
`RECEIVE CONTROL
`
`MESSAGE
`
`
`
`STORE
`
`
`
`TRANSMIT
`
`
`
`STORE
`
`
`
`302
`
`
`
`304
`
`
`
`306
`
`
`
`308
`
`
`
`310
`
`
`312
`
`
`
`314
`
`
`
`6
`
`
`
`
`NOg
`
`YES
`
`
`
`Page 9 of 29
`
`Page 9 of 29
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep.22, 1998
`
`
`
`
`Sheet 8 0f 12
`
`5,812,955
`
`
`
`FIG. 7
`
`
`
`
`
`Page 10 of 29
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep.22, 1998
`
`
`
`
`Sheet 9 0f 12
`
`5,812,955
`
`
`
`100
`
`
`
`
`
`
`
`Page 11 of 29
`
`Page 11 of 29
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep.22, 1998
`
`
`
`
`Sheet 10 0f 12
`
`5,812,955
`
`
`
`
`FIG. 9
`
`352
`
`
`
`
`APPLY POWER TO
`
`
`TERMINAL 120
`
`
`
`
`
`354
`
`
`
`
`
`SCAN BASE
`
`STATION FREQUENCY
`
`
`
`
`
`
`
` 360
`NETWORK STATION 102
`
`
`SIGNAL
`
`
`LEVEL ABOVE
`
`THRESHOLD
`?
`
`
`
`358
`
`
`
`
`
`
`COMMUNICATE TO
`
`
`
`
`
`COMMUNICATE TO
`
`
`
`BASE STATION 110
`
`Page 12 of 29
`
`Page 12 of 29
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`
`Sheetll 0f12
`
`5,812,955
`
`
`
`SECURWY
`
`
`
`
`TERMHVAL
`
`
`
`
`COUPLED TO BASE
`
`STAWON?
`r________--_________ _—_—————————————————__—_________________ -~____J___-___-____
`
`
`EXCHANGNG
`
`412G
`
`NO
`
`
`
`
`
`
`
`
`
`
`
`_____-________4
`
`RELAWNG
`
`
`-_____--"_________.______________________ _____-_____________-___\
`420
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TO HG.
`
`
`
`1
`
`08.
`
`
`
`
`HG.
`
`
`
`10A.
`
`Page 13 of 29
`
`Page 13 of 29
`
`
`
`

`

`
`US. Patent
`
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`Sheet12 0f12
`
`5,812,955
`
`
`
`
`FROM HG.
`
`
`
`
`10A
`
`
`
`
`
`434 436
`
`
`
`
`
`
`
`Page 14 of 29
`
`
`
`lllllllllllllllllllllllllll
`
`lllllllllllllllllll
`
`YES
`
`REACUVAWNG
`
`
`FIG.
`
`
`108.
`
`Page 14 of 29
`
`
`

`

`5,812,955
`
`
`1
`BASE STATION WHICH RELAYS
`
`
`
`
`CELLULAR VERIFICATION SIGNALS VIAA
`
`
`
`
`TELEPHONE WIRE NETWORK TO VERIFY
`
`
`
`
`A CELLULAR RADIO TELEPHONE
`
`
`
`CROSS-REFERENCE TO RELATED
`
`APPLICATIONS
`
`
`
`
`
`
`
`
`This application is a Continuation-in-Part of application
`Ser. No. 08/148,828 filed on Nov. 4, 1993, now US. Pat. No.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5,428,668, and assigned to the assignee of the present
`
`
`
`
`
`
`invention, the disclosure of which is incorporated herein by
`reference.
`
`
`10
`
`
`
`
`15
`
`20
`
`FIELD OF THE INVENTION
`
`
`
`
`
`
`
`
`
`This invention relates to communications systems and
`
`
`
`
`
`more particularly to radio personal communications systems
`for use within wide area cellular networks.
`
`
`
`
`
`
`
`BACKGROUND OF THE INVENTION
`
`
`
`
`
`
`
`
`
`Radio communications systems are increasingly being
`
`
`
`
`
`
`used for wireless mobile communications. An example of a
`
`
`
`
`
`
`radio communications system is a cellular phone network.
`
`
`
`
`
`
`
`
`Cellular radio communications systems are wide area com-
`25
`
`
`
`
`
`
`munications networks which utilize a frequency (channel)
`
`
`
`
`
`
`
`
`reuse pattern. The design and operation of an analog cellular
`
`
`
`
`
`
`
`phone system is described in an article entitled Advanced
`Mobile Phone Service by Blecher, IEEE Transactions on
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Vehicular Technology, Vol. VT29, No. 2, May, 1980, pp.
`
`
`
`
`
`
`
`
`238—244. The analog mobile cellular system is also referred
`
`
`
`
`
`to as the “AMPS” system.
`
`
`
`
`
`
`
`
`Recently, digital cellular phone systems have also been
`
`
`
`
`
`
`proposed and implemented using a Time-Division Multiple
`
`
`
`
`
`
`
`Access (TDMA) architecture. Standards have also been set
`
`
`
`
`
`
`
`
`by the Electronics Industries Association (EIA) and the
`
`
`
`
`
`
`Telecommunications Industries Association (TIA) for an
`
`
`
`
`
`
`American Digital Cellular (ADC) architecture which is a
`
`
`
`
`
`
`
`
`dual mode analog and digital system following EIA/TIA
`
`
`
`
`
`
`document IS-54B. Telephones which implement the IS-54B
`
`
`
`
`
`
`
`
`dual mode architecture are presently being marketed by the
`
`
`
`
`
`
`
`
`assignee of the present invention. Different standards have
`
`
`
`
`
`
`
`been promulgated for digital cellular phone systems in
`
`
`
`
`
`
`
`
`Europe. The European digital cellular system, also referred
`to as GSM, also uses a TDMA architecture.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Proposals have recently been made to expand the cellular
`
`
`
`
`
`
`
`phone network into a radio personal communications sys-
`
`
`
`
`
`
`
`tem. The radio personal communications system provides
`mobile radio voice, digital, video and/or multimedia com-
`
`
`
`
`
`
`
`
`50
`
`
`
`
`
`
`munications using radio personal communications termi-
`nals. Thus, any form of information may be sent and
`
`
`
`
`
`
`
`
`
`received. Radio personal communications terminals include
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a radio telephone, such as a cellular telephone, and may
`
`
`
`
`
`
`
`
`include other components for voice, digital, video and/or
`multimedia communications.
`
`
`
`
`
`
`
`
`Aradio personal communications system includes at least
`one telephone base station, also referred to herein as a “base
`
`
`
`
`
`
`
`
`station”. A base station is a low power transceiver which
`
`
`
`
`
`
`communicates with a radio personal communications termi-
`
`
`
`
`
`
`nal such as a cellular telephone over a limited distance, such
`
`
`
`
`
`
`
`
`as tens of meters, and is also electrically connected to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`conventional public wire telephone network. The base sta-
`tion allows the owner of a radio personal communications
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`terminal
`to directly access the wire telephone network
`
`
`
`
`
`
`
`
`without passing through the cellular phone network, whose
`
`
`
`
`
`
`
`
`
`access rates are typically more costly. When located outside
`
`
`
`
`
`
`
`
`the range of the base station, the personal communications
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 15 of 29
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`2
`
`
`
`
`
`terminal automatically communicates with the cellular
`
`
`
`
`
`
`phone network at the prevailing access rates.
`
`
`
`
`
`
`
`A major problem in implementing a radio personal com-
`
`
`
`
`
`
`munications system is security for communications between
`
`
`
`
`
`
`
`
`the base station and the personal communications terminal.
`
`
`
`
`
`
`
`Modern cellular telephone networks include security sys-
`
`
`
`
`
`
`
`tems and methods to prevent eavesdropping and telephone
`
`
`
`
`
`
`fraud. Eavesdropping may be prevented by using encryption
`
`
`
`
`
`
`
`of radio transmissions between a cellular phone and a
`
`
`
`
`
`
`cellular network. Fraud may be prevented by preventing
`
`
`
`
`
`
`
`radio telephone transmissions between the cellular phone
`and the cellular network unless identification information is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`successfully exchanged between the cellular phone and the
`
`
`
`
`
`
`
`
`cellular network. Existing cellular systems, such as the
`
`
`
`
`
`
`
`
`
`
`AMPS system, the ADC system, and the GSM system each
`
`
`
`
`
`
`
`
`include their own security systems and methods. Security
`
`
`
`
`
`should not be compromised by communications between the
`
`
`
`
`
`
`
`radio personal communications terminal and the base station
`
`
`
`
`
`of a radio personal communications system.
`SUMMARY OF THE INVENTION
`
`
`
`
`
`
`
`
`It is therefore an object of the present invention to provide
`
`
`
`
`
`
`an improved radio personal communications system includ-
`
`
`
`
`
`
`ing a base station and a radio personal communications
`
`
`
`
`
`
`
`terminal, and methods for using the same.
`
`
`
`
`
`
`
`
`It is another object of the present invention to provide
`
`
`
`
`
`
`radio personal communications systems which do not com-
`
`
`
`
`
`
`
`promise security of a wide area cellular system with which
`
`
`they interact.
`
`
`
`
`
`
`
`
`In the present invention, a base station connects a wire
`
`
`
`
`
`telephone network to a radio personal communications
`terminal, also referred to herein as a “cellular terminal” or
`
`
`
`
`
`
`
`
`
`
`
`
`
`simply a “terminal”, within a local region of a wide area
`cellular network. The base station includes a wire telephone
`
`
`
`
`
`
`
`
`network connector, for connecting the base station to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`wire telephone network. The base station relays cellular
`verification signals between the wide area cellular network
`
`
`
`
`
`
`
`
`and a cellular terminal via the wire telephone network
`
`
`
`
`
`
`
`
`connector. Thus, wireless telephone calls which are routed to
`
`
`
`
`
`
`
`the cellular terminal via the base station, when the cellular
`
`
`
`
`
`
`
`
`
`terminal
`is within the local region covered by the base
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`station, may be secured by exchange of data between the
`cellular network and cellular terminal over the wire tele-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`phone network via the wire telephone connector and the
`
`
`
`
`
`
`
`
`base station. Calls from the public switched telephone
`network including the wide area cellular network which are
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`routed through the base station can thus employ the same
`
`
`
`
`
`
`
`
`security systems and methods which are employed by the
`wide area cellular network.
`
`
`
`
`
`
`
`
`
`
`In a preferred embodiment, the telephone base station
`
`
`
`
`
`
`includes a coupler which is adapted for cooperatively mating
`with a cellular terminal which is parked in the base station.
`
`
`
`
`
`
`
`
`
`
`
`
`
`The coupler couples the cellular security information
`between the cellular terminal and the base station. Cellular
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`security information can include encryption keys that are
`relayed from the wide area cellular network to the cellular
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`terminal via the wire telephone connector for use in encrypt-
`ing communications with the base station.
`
`
`
`
`
`
`
`
`
`
`
`
`Enhanced security is provided by relaying the security
`information between the cellular terminal and the base
`
`
`
`
`
`
`
`
`station when the cellular terminal is parked in the base
`
`
`
`
`
`
`
`
`station,
`to avoid their
`radio frequency transmission.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Exchanged security information can also include authenti-
`
`
`
`
`
`
`
`
`
`cation signals that bilaterally verify both the identity of the
`
`
`
`
`
`
`
`
`cellular phone to the cellular network and the identity of the
`
`
`
`
`
`
`
`network to the phone, as described in US. patent application
`
`Page 15 of 29
`
`

`

`
`
`5,812,955
`
`
`3
`the
`Ser. No. 08/043,758 and US. Pat. No. 5,091,942,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`disclosure of both of which are hereby incorporated herein
`
`
`by reference.
`
`
`
`
`
`
`
`
`As an alternative to physically mating the terminal with
`
`
`
`
`
`
`
`
`the base however, signals may be relayed between the
`cellular terminal and the cellular network, via the base
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`station and the wire network connector, by using radio
`
`
`
`
`
`
`frequency transmission over cellular frequencies, between
`the cellular terminal and the base station. This radio fre-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`quency transmission may be necessary when verification
`
`
`
`
`
`
`
`
`and encryption signals are exchanged upon reactivation of
`the base station, when the cellular terminal moves outside
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the local region and then returns to the local region. Tele-
`
`
`
`
`
`
`
`
`phone communication between the terminal and the public
`
`
`
`
`
`
`
`
`
`switched network via the base station is prevented unless the
`
`
`
`
`
`
`
`
`relayed cellular verification signals indicate that the radio
`
`
`
`telephone communication is authorized.
`The base station and the cellular terminal may also
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`exchange local verification information, separate from the
`cellular verification information,
`for communications
`
`
`
`
`
`between the base station and terminal when the terminal is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`within the local region and is receiving communications via
`
`
`
`
`
`
`
`
`
`the wire telephone network connector from the wire tele-
`
`
`
`
`
`
`
`
`
`phone network. Thus, the wide area cellular network need
`
`
`
`
`
`
`
`
`
`
`not be contacted in order to provide security for local
`communications between the cellular terminal and the base
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`station within local region for calls originating from the wire
`
`
`telephone network.
`
`
`
`
`
`
`
`
`
`It will be understood by those having skill in the art that
`
`
`
`
`
`
`
`
`the local authentication procedure preferably uses the same
`
`
`
`
`
`
`
`protocol as the cellular telephone verification procedure.
`
`
`
`
`
`
`
`The local authentication key is preferably exchanged when
`
`
`
`
`
`
`
`
`
`the cellular terminal is parked in the base station, via the
`
`
`
`
`
`
`
`coupler, but may also be established by exchanging radio
`
`
`
`
`
`
`
`frequency transmissions. Local encryption keys may also be
`
`
`
`
`
`
`
`established along with local authentication keys. Telephone
`communication between the terminal and the wire telephone
`
`
`
`
`
`
`network via the wire telephone network connector on a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`subsequent occasion is prevented unless the exchanged local
`
`
`
`
`
`
`
`authentication signals are consistent with the previously
`established authentication information.
`
`
`
`
`
`
`
`
`
`
`The above described security systems serve two primary
`
`
`
`
`
`
`purposes. First they prevent an unauthorized cellular termi-
`nal from making calls via a base station for which someone
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`else will be billed. Second, they prevent eavesdropping,
`which is otherwise easy when communications are trans-
`
`
`
`
`
`
`ferred from the hardwired medium to the radio medium.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Eavesdropping may be prevented by the use of digital
`
`
`
`
`
`
`
`voice transmission using digital encryption. Digital encryp-
`
`
`
`
`
`
`
`
`tion typically requires the use of a secret quantity or “key”
`known only to the cellular terminal and the base station with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`which it is communicating. One function of the security
`
`
`
`
`
`
`system is thus to establish this common key.
`
`
`
`
`
`
`
`
`
`
`It is more secure to establish the key for encryption of
`
`
`
`
`
`
`
`
`conversations separately for each call, instead of using the
`
`
`
`
`
`
`
`
`
`
`same key forever, although the exposure risk in using the
`
`
`
`
`
`
`
`
`
`
`same key for several calls is small. Such temporary keys can
`
`
`
`
`
`
`
`
`be formed by combining a secret key with a random number
`
`
`
`
`upon call set up.
`
`
`
`
`
`
`
`
`The secret key or A-key is preferably stored in both the
`cellular terminal and the base station or network in a
`
`
`
`
`
`
`
`
`non-accessible manner. At call set up,
`the base station
`
`
`
`
`
`
`
`
`
`transmits a random number RAND to the cellular terminal.
`
`
`
`
`
`
`
`The cellular terminal combines RAND and A-key to obtain
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a temporary key “B-key” and the base station does the same.
`
`
`
`
`
`
`
`
`The B-key is then used for encrypting further communica-
`
`
`
`
`
`
`
`10
`
`15
`
`
`
`20
`
`25
`
`
`
`30
`
`35
`
`
`
`40
`
`
`
`45
`
`
`
`50
`
`
`
`55
`
`
`
`60
`
`
`
`65
`
`
`
`Page 16 of 29
`
`
`4
`it
`is overwritten by a
`tion between the two units until
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`subsequent exchange. If the transfer of the number to be
`
`
`
`
`
`
`called is part of the encrypted further communications, an
`
`
`
`
`
`
`
`unauthorized cellular terminal, that is unable to generate the
`
`
`
`
`
`
`
`
`
`correct B-key because it does not have access to the A-key,
`
`
`
`
`
`
`
`
`will not be able to continue and set up a call, thus preventing
`useful unauthorized access.
`
`
`
`
`
`
`
`
`
`
`The above description shows that appropriate encryption
`
`
`
`
`
`
`
`may also inherently prevent fraud. An alternative technique
`
`
`
`
`
`
`
`
`of denying unauthorized access may also be used, called
`“authentication”.
`In authentication, a random number
`
`
`
`
`
`RAND is transmitted from the base station to the cellular
`
`
`
`
`
`
`
`
`
`terminal as described above. The RAND is in this case
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`known as an authentication challenge. The cellular terminal
`
`
`
`
`
`
`
`combines RAND with A-key to obtain a response RESP to
`
`
`
`
`
`
`
`
`
`the challenge, and transmits RESP to the base station. The
`
`
`
`
`
`
`
`
`
`base station also locally computes RESP and checks the
`
`
`
`
`
`
`
`received version against its locally computed version. If they
`do not match, access is denied.
`
`
`
`
`
`
`
`
`
`
`
`Authentication alone however does not guarantee that
`access will be denied to a fraudulent cellular terminal. For
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`example, one could construct a false base station that issues
`
`
`
`
`
`
`many random challenges to a genuine cellular terminal in its
`
`
`
`
`
`
`vicinity and records the corresponding responses, increasing
`
`
`
`
`
`the probability of having in its memory a challenge-response
`
`
`
`
`
`
`
`
`
`
`pair that the real base station will accept. Even worse, it can
`initiate a call to the real base station, wait for the real base
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`station to issue a challenge, then temporarily shut off its
`
`
`
`
`
`
`
`transmitter just as the genuine cellular terminal replies with
`
`
`
`
`
`
`
`RESP. When the real base station indicates it has accepted
`the call, the fraudulent base station starts up its transmitter
`
`
`
`
`
`
`
`
`
`
`
`
`
`again at a sufficient power level to overpower the genuine
`
`
`
`
`
`
`
`
`cellular terminal, and can then proceed to set up a call.
`
`
`
`
`
`
`
`
`Encryption can be used to prevent
`these fraudulent
`practices, and can be used in combination with the authen-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tication techniques described above. Encryption security
`
`
`
`
`
`
`
`depends on preventing access to the long-term secret A-key.
`
`
`
`
`
`
`
`This can be done by providing a device, such as an inte-
`
`
`
`
`
`
`
`
`grated circuit chip, that includes the A-key embedded in
`
`
`
`
`
`electronic form, an authentication algorithm processor, an
`electrical input for RAND and an electrical output for RESP
`
`
`
`
`
`
`
`
`
`
`and/or B-key.
`
`
`
`
`
`
`
`The chip preferably provides no access to read out the
`
`
`
`
`
`
`
`A-key, and performs only one operation, namely to respond
`
`
`
`
`
`
`
`to a challenge with RAND by returning RESP and B-key.
`The internal processor buss that must be able to access the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`internally stored A-key is not accessible external to the chip
`
`
`
`
`
`
`
`and can even be prevented from access under a microscope
`
`
`
`
`
`
`
`and microprobe system by covering the chip with a metallic
`
`
`
`
`
`
`screening layer. Such a device is employed in the European
`GSM cellular system and is known as a “smart card”. In one
`
`
`
`
`
`
`
`
`
`
`
`
`
`form it is supplied to subscribers by their service providers
`in a thin, plug-in card like a credit-card.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The A-key of every subscriber for such a security system
`is stored in a secure computer somewhere in the cellular
`
`
`
`
`
`
`
`
`
`
`
`
`system. Information on a particular subscriber is stored in
`
`
`
`
`
`
`
`
`the network in his Home Location Register (HLR) which is
`
`
`
`
`
`
`
`part of a cellular exchange belonging to the service provider
`with whom he has a subscription. When a subscriber uses his
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cellular terminal to access a visited network (VLR), the
`cellular terminal first transmits its telephone number to the
`
`
`
`
`
`
`
`
`VLR. The VLR can identify that subscriber’s HLR from the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`telephone number and contacts the HLR via a telephone
`
`
`
`
`
`
`
`trunk signalling system known as signalling system no. 7 in
`
`
`
`
`
`
`
`
`
`Europe, or via a system called IS41 in the US. The VLR
`
`
`
`
`
`
`
`
`then requests security variables from the HLR that can be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 16 of 29
`
`

`

`5,812,955
`
`5
`
`
`
`
`
`
`
`
`
`used to verify the mobile’s claimed identity and/or to
`
`
`
`
`
`
`encrypt the conversation, that is a RAND/RESP pair and a
`
`
`
`
`
`
`
`
`
`
`B-key. To reduce use of the trunk lines, several RAND/
`
`
`
`
`
`
`
`RESP/B-key triplets can be sent by the HLR to the VLR in
`
`
`
`
`
`
`
`
`
`the same transaction, sufficient perhaps for a day’s use at the
`visited location.
`
`
`
`
`
`
`
`
`
`
`
`Another threat to the security of such a system is the
`
`
`
`
`
`
`possibility of unauthorized access to signalling system no. 7
`
`
`
`
`
`
`
`
`IS41 lines, which connect all
`telephone exchanges
`or
`
`
`
`
`
`
`
`together, even those in different countries and continents. An
`
`
`
`
`
`
`unauthorized request to an HLR for security variables per-
`
`
`
`
`
`
`
`taining to particular telephone number can then be made. If
`
`
`
`
`
`
`
`the VLR were permitted to specify RAND, a previously
`
`
`
`
`
`
`
`
`
`used RAND could be specified and then the fraudulent VLR
`
`
`
`
`
`
`
`
`
`
`would receive a B-key that had the recorded call to be
`
`
`
`
`
`
`
`deciphered. Therefore, the VLR should not be allowed to
`
`
`
`
`
`
`
`specify the RAND, but rather it should be generated extem-
`
`
`
`
`
`
`
`
`poraneously by the HLR. However,
`the fraudulent VLR
`
`
`
`
`
`
`
`
`would still receive a valid security triplet. This may not be
`
`
`
`
`
`
`
`
`
`
`useful for making fraudulent calls, as the real VLR would
`
`
`
`
`
`
`
`
`
`again contact the HLR and would receive new triplets not
`
`
`
`
`
`
`
`possessed by the fraudulent VLR. Nevertheless, it is pref-
`
`
`
`
`
`
`
`
`erable to prevent a fraudulent VLR from receiving any
`
`
`
`
`
`
`
`security information pertaining to any subscriber. This can
`
`
`
`
`
`
`
`
`
`be prevented if the HLR first issues only the RAND to the
`the VLR transmits it
`to the cellular terminal,
`VLR,
`the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cellular terminal replies with RESP and the VLR conveys
`
`
`
`
`
`
`
`
`
`RESP to the HLR. Only if the HLR confirms the identity of
`
`
`
`
`
`
`
`
`the cellular terminal would it then release a B-key and
`
`
`
`possibly further triplets.
`
`
`
`
`
`
`
`
`The above described technique may still allow a false
`
`
`
`
`
`
`
`VLR to extract RAND/RESP pairs from genuine cellular
`
`
`
`
`
`
`
`terminals in the hope of collecting sufficient pairs to provide
`
`
`
`
`
`
`
`
`a high probability of being able to make a fraudulent access
`
`
`
`
`
`
`
`
`to the real system. This is prevented by introducing the
`bilateral authentication procedure described in the afore-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`mentioned patent application and US. patent
`that were
`
`
`
`
`
`
`above incorporated by reference. In a preferred implemen-
`tation of bilateral authentication, the cellular terminal first
`
`
`
`
`
`
`
`
`identifies itself to the VLR. The VLR determines the cellular
`
`
`
`
`
`
`
`
`
`terminal’s HLR from the ID and contacts the HLR for
`
`
`
`
`
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket