throbber
PCT
`
`WORLD INTELLECTUAL PROPERTY ORGANIZATION
`International Bureau
`
`
`
`INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`(51) International Patent Classification © :
`(11) International Publication Number:
`WO 98/28929
`H04Q 7/20
`.
`«gs
`(43) International Publication Date:
`
`2 July 1998 (02.07.98)
`
`
`
`(22) International Filing Date:
`
`2 December 1997 (02.12.97)
`
`station finds that the response and a value earlier stored in memory are identical, a subscriber connection will be formed.
`
`(21) International Application Number: PCT/FI97/00746|(81) Designated States: AL, AM, AT, AU, AZ, BA, BB, BG, BR,
`BY, CA, CH, CN, CU, CZ, DE, DK, EE, ES, FI, GB, GE,
`GH, HU,ID, IL, IS, JP, KE, KG, KP, KR, KZ, LC, LK,
`LR, LS, LT, LU, LV, MD, MG, MK, MN, MW, Mx, NO,
`NZ, PL, PT, RO, RU, SD, SE, SG,SI, SK, SL, TJ, TM, TR,
`TT, UA, UG, US, UZ, VN, YU, ZW, ARIPO patent (GH,
`KE, LS, MW,SD, SZ, UG, ZW), Eurasian patent (AM, AZ,
`BY, KG, KZ, MD, RU, TJ, TM), European patent (AT, BE,
`CH, DE, DK, ES, FI, FR, GB, GR, IE, IT, LU, MC, NL,
`PT, SE), OAPI patent (BF, BJ, CF, CG, CI, CM, GA, GN,
`ML, MR, NE, SN, TD, TG).
`
`(30) Priority Data:
`964876
`
`5 December 1996 (05.12.96)
`
`FI
`
`(71) Applicant (for all designated States except US): NOKIA
`TELECOMMUNICATIONS OY [FIV/FI]; Keilalahdentie 4,
`FIN-02150 Espoo (FI).
`
`(72) Inventor; and
`(75) Inventor/Applicant (for US only): HOKKANEN,Petri [FI/FI];
`Koivumutka 21, FIN—40270 Palokka (FI).
`
`(74) Agent: PATENT AGENCY COMPATENT LTD.; Teollisu-
`uskatu 33, P.O. Box 156, FIN-00511 Helsinki (FI).
`
`Published
`With international search report.
`Before the expiration of the time limit for amending the
`claims and to be republished in the event of the receipt of
`amendments.
`In English translation(filed in Finnish).
`
`(54) Title: USE OF A MOBILE STATION AS A CORDLESS TELEPHONE
`
`MS
`\
`
`algorithm X
`algorithm Y
`
`SUBSCRIBER
`LINE
`
`STORING
`- SRES
`-Ke
`- IMSI/TMS!
`- RAND
`
`(57) Abstract
`
`Turning of a cellular network phone (MS) into a cordless phone begins by placing the phone in a charging device located in a home
`base station (HBS) and containing special communication pins through which the phone andthe base station may exchange authentication
`information while the phone is in the charger. When there is a wireline connection between the home base station and the phone, any
`party may generate the authentication and ciphering information provided that the information is agreed upon in advance. According to a
`preferable embodiment, the parameters (RAND, SRES, Kc) used for authentication are generated by the mobile station and the parameters
`are transmitted through a fixed connection to the home base station which stores them. When the phone is removed from the home base
`station and a call is formed, the base station sends an inquiry (RAND)to which the mobile station gives a response (SRES)andif the home
`
`Page | of 24
`
`SAMSUNG EXHIBIT 1005
`
`SAMSUNG EXHIBIT 1005
`
`Page 1 of 24
`
`

`

`Zimbabwe
`
`Albania
`Armenia
`Austria
`Australia
`Azerbaijan
`Bosnia and Herzegovina
`Barbados
`Belgium
`Burkina Faso
`Bulgaria
`Benin
`Brazil
`Belarus
`Canada
`Central African Republic
`Congo
`Switzerland
`Céte d'Ivoire
`Cameroon
`China
`Cuba
`Czech Republic
`Germany
`Denmark
`Estonia
`
`SI
`SK
`SN
`SZ
`TD
`TG
`TJ
`
`™T
`
`R
`TT
`UA
`UG
`US
`UZ
`VN
`YU
`Zw
`
`FOR THE PURPOSES OF INFORMATION ONLY
`
`Codes used to identify States party to the PCT on the front pages of pamphlets publishing international applications under the PCT.
`
`Slovenia
`Slovakia
`Senegal
`Swaziland
`Chad
`Togo
`Tajikistan
`Turkmenistan
`Turkey
`Trinidad and Tobago
`Ukraine
`Uganda
`United States of America
`Uzbekistan
`Viet Nam
`Yugoslavia
`
`ES
`FI
`FR
`GA
`GB
`GE
`GH
`GN
`GR
`HU
`TE
`IL
`IS
`IT
`JP
`KE
`KG
`KP
`
`KR
`KZ
`LC
`LI
`LK
`LR
`
`Spain
`Finland
`France
`Gabon
`United Kingdom
`Georgia
`Ghana
`Guinea
`Greece
`Hungary
`Treland
`Tsrael
`Iceland
`Italy
`Japan
`Kenya
`Kyrgyzstan
`Democratic People’s
`Republic of Korea
`Republic of Korea
`Kazakstan
`Saint Lucia
`Liechtenstein
`Sri Lanka
`Liberia
`
`LS
`LT
`LU
`LV
`MC
`MD
`MG
`MK
`
`ML
`MN
`MR
`MW
`MX
`NE
`NL
`NO
`NZ
`PL
`PT
`RO
`RU
`SD
`SE
`SG
`
`Lesotho
`Lithuania
`Luxembourg
`Latvia
`Monaco
`Republic of Moldova
`Madagascar
`The former Yugoslav
`Republic of Macedonia
`Mali
`Mongolia
`Mauritania
`Malawi
`Mexico
`Niger
`Netherlands
`Norway
`New Zealand
`Poland
`Portugal
`Romania
`Russian Federation
`Sudan
`Sweden
`Singapore
`
`Page 2 of 24
`
`Page 2 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`USE OF A MOBILE STATION AS A CORDLESS
`
`TELEPHONE
`
`Field of the invention
`This invention concernsa cellular system comprising base stations
`and mobile stations with an interface in between whichis a radio interface.
`
`Backgroundof the invention
`In a fixed wireline network the calling subscriber knows the
`groundsfor charging of the call even whendialling the numberof subscriber
`B, because debiting will depend on whetherthe call
`is a local call, a long
`distance call, a mobile call or a call to a foreign country. The terminal equip-
`ment used by subscriber A also affects debiting, since mobile originated calls
`are more expensive thancalls originated from a fixed network, irrespectively
`of the target terminal equipment. This can be seen as the price which the
`subscriberwill have to pay for his great freedom of movement.
`The ordinary home user has long been offered cordless phones
`providing a limited mobility. The arrangement comprises a basestation at the
`subscriber line end which converts the audio signal arriving from the fixed
`networkinto a radio signal and transmits it further to the cordless phone. The
`most usual modulation used so far is FM modulation. The major drawback of
`this kind of modulation is thattraffic in the radio path belistenedto illegally
`by any FM receiver tuned to a suitable frequency. An essential improvement
`on this is to use digital modulation and transfer of speech ciphered over the
`radio path. A suitable and already standardized digital system is the DECT
`system (Digital European Cordless Telecommunications), and cordless
`phones complying with the specification of this system and intended for
`homeusersarein fact already available.
`A great disadvantage of the cordless phoneis the limitation of the
`allowed mobility to a radius of 50-100 m from the base station , but an ad-
`vantage is the cheaperprices of the fixed network compared with e.g. the
`mobile network. Another great disadvantage is low security especially when
`using the traditional analog system.
`The grounds for charging of the call used in a fixed network may
`not be used as such in mobile networks allowing great mobility due to the
`network structure and mannerof operation. In the following the structure and
`operation of the mobile network will be explained using the known GSM
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 3 of 24
`
`Page 3 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`mobile network shown in Figure 1 as an example. Communication between
`the MS (Mobile Station) in a cell and the network takes place through the
`radio via the base station BTS (Base Transceiver Station). Base stations
`BTS are connected to the BSC (Base Station Controller), with e.g. radio
`channel management and channel exchange functions as its duties. Several
`base station controllers are connected to one MSC (Mobile Switching Cen-
`ter) performing the major switching functions of the mobile network and con-
`necting the mobile network with other mobile switching centers and with
`external networks.
`
`The mobile network also comprises various databases, such as an
`HLR (Home Location Register), where subscriber information is stored per-
`manently. The subscriber's MSISDN number, the IMSI (International Mobile
`Subscriber Identity) used within the network and subscriber service informa-
`tion are stored in the home location register as well as routing information to
`the VLR (Visitor Location Register). The AuC (Authentication Center) is also
`located in connection with the home location register. Subscriber information
`received from HLRis stored in VLRfor the time it takes for the visitor to stay
`in the VLR area.
`
`When doing location updating for the first time, the network will
`check whether the user has right to access to the network. The purposeof
`the security functions of the GSM system is to prevent unauthorized access
`to the network, thus preventing anyone from using the network for somebody
`else's account and to protect the user's privacy. Unauthorized access is
`prevented through authentication, where the useris identified to make sure
`that the subscriberis entitled to use the network. In fact, the MS is formed of
`two parts: the ME (Mobile Equipment) and the SiMcard (Subscriber Identity
`Module), so an operating mobile station MS is formed only by pushing the
`SIM card into the mobile equipment ME. Theidentification by having the user
`push his SIM card into his mobile station MS is intended to prevent unau-
`thorized use of e.g. stolen equipment and to make sure that only those sub-
`scribers use the network whopaytheir bills. From the operator's point of
`view,
`identification is especially important particularly in connection with
`international roaming, since the network does not know the visitor's sub-
`scriber information and is thus unawareof any insolvency.
`Firstly, the user identifier or PIN code (Personal Identity Number)
`given by the user himself and stored on the SIM card is usedin identification.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 4 of 24
`
`Page 4 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`In the first stage, when electric poweris turned on to the phone, the phone
`will ask the user to push a code of 4-8 digits and will compare the entered
`code with a code stored in the memory.If the code is incorrect after three
`attempts, the card will go into a locked state and it can not be opened with-
`out special measures. This identification is done entirely locally by the SIM
`card, so no PIN codeis transmitted by radio and the code can thus not be
`captured.
`
`Secondly, after the correct PIN code has been entered, the mobile
`station will transmit its IMSI number to the network or,
`if possible, a TMS!
`(Temporary Mobile Subscriber Identity), whereupon authentication between
`network and card will take place, which will be explained by referring to Fig-
`ures 1 and 2.
`The principle is such that the network will put a question to the
`mobile station to which only the right SIM card will know the answer. In the
`fixed part of
`the network,
`identification
`is performed by the AuC
`(Authentication Center) located in connection with the home location register
`HLR while the SIM card performs identification in the terminal equipment.
`Identification is based on identification algorithm A3 and on subscriber-based
`identification key K,. The IMSI (International Mobile Subscriber Identity), the
`subscriber-specific key K; and the identification algorithm A3 mentioned
`above are stored both in the network and in the SIM card.
`Figures 1 and 2 are referred to in the following. In the early part of
`identification, the authentication center AuC will send a question to the mo-
`bile station, which is a random number RAND having a length of 128 bits.
`Thus,its value is in a range of 2'-1, so there is a very small chancethat the
`same random number could be used twice. This stage is represented in
`Figure 1 by circled figure one and in Figure 2 by an arrow passing through
`the radio interface. The mobile station receives RAND, transfersit to the SIM
`card, which performs the A3 algorithm with its aid and with the aid of the
`subscriber-specific key K; located in the card. The resulting answeris a 32-bit
`SRES (Signed Response) which the mobile station sends to the network.
`Authentication center AuC receivesit, the circled figure two in Figure 1, and
`compares the SRES value with the value whichit has calculated itself using
`the same A3 algorithm as well as RAND and key K,.
`If the SRESs are the
`same, the identification is accepted, otherwise the subscriber will not be
`permitted access to the network (the yes/no stage in Figure 2).
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 5 of 24
`
`Page 5 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`Figure 3 illustrates how the mobile station uses received RAND
`and K, values also for the A8 algorithm, which produces a connection-
`specific ciphering key Kc, which is used further as a key for a third algorithm
`AS, whichis used for ciphering speech and data on radiotraffic channels. In
`the network the AuC performs the samealgorithm with the same values and
`thus obtains the sameciphering key as result. Both store the key in memory.
`Since the identification information is always calculated in the
`home network, operators may use different A3 and A8 algorithms and they
`will not know whatalgorithms the other uses. On the other hand, the speech
`ciphering algorithm A5 must be the samein all networks.
`Thus,of all the information contained in the SIM card, the IMSI, K;
`and algorithms A3 and A8 are importantto identification. Algorithms A3 and
`A8 are performed in the SIM card so that key K, need never be transmitted
`betweenthe card and the mobile equipment ME proper.
`As wassaid above, calculation of the identification data always
`takes place in the AuC of the subscriber's home network. This being the
`case, when the subscriber is in another network identification would immod-
`erately load the signal network between VLR and AuC. To avoid this, AuC
`generally sends readytriplets to the visitor location register VLR while the
`visitor is registering into this. The triplet contains the RAND, SRES and Kc.
`Hereby, the visitor location register will check whether the mobile station has
`calculated correct values, so that signalling to the AuC may be reduced.
`It is realized from the above presentation that in terms of security
`the digital cellular system is very advanced as regards unauthorized use and
`speech ciphering. Since all cells are of equal value for the mobile network,
`no other groundsfor calculation of the price of calls can be offered than e.g.
`flexing based on the hours of the day and night and cheaper than normal
`prices between mobile station and home phone. No special charging
`grounds can beoffered for a call originated from or terminated in a certain
`cell. These factors reduce the use of the mobile phone as a home phone.
`It has been suggested in the field to arrange at homeor in any
`other place desired by the subscriber a special HBS (Home Base Station)
`which can be connected to an ordinary telephone connection and which is as
`simple a device as possible serving only oneorjust a few users registered
`with the base station, who use a normal phonein a cellular network. As re-
`gardsits functions the home base station would thus correspond to present
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 6 of 24
`
`Page 6 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`it performs a conversion between
`base stations for cordless phones, that is,
`the wireline network and the radio interface. Even if the base station would
`be in the nature of a "stripped" base station in a cellular network, it would be
`necessary in one way or another to authenticate a cellular network phone
`desiring access to the network through the base station. The phone doesin
`fact always work in the same mannerin authentication and expects to re-
`ceive a RANDinquiry from the network. At least two ways have beenpro-
`posed.
`
`Firstly, a modem connection could be arranged from the home
`base station to the authentication center AuC of the cellular network,
`whereby parameters to be exchanged in authentication are transferred
`through this connection and authentication proper would take place in a
`normal manner as shown in Figure 2. Since signalling would pass through
`another network than the network of the cellular network operator, an
`agreement on the matter must be made with the operatorin question.
`Secondly, a card reader could be located in the home basestation
`and a special card could be used containing data relating to this base station
`and user. Hereby authentication would be performed between card and base
`station, so the user would activate the base station with his card.
`Drawbacks of these proposed proceduresare difficult modem sig-
`nalling over a fixed network (e.g. PSTN) and acquisition of extra cards and
`readers as well as the making of related software.
`The present invention thus aims at bringing about a cordlesstele-
`phone system whichis based on a cellular network and which does not have
`the presented drawbacks and wherein standard terminal equipment of the
`cellular network may be used at home as cordless phones without any spe-
`cial steps required of the user, which thus allows cheapercalls.
`The objectives are achieved with the attributes presented in the in-
`dependentclaims.
`
`Brief summary ofthe invention
`The proposed homebasestation which is connected to an ordi-
`nary telephone connection contains in the manner of a base station for
`knowncordless phones a charging device where the phone can be charged.
`Besides the pins supplying the charging current,
`it has special communi-
`cation pins through which the phone and the base station can exchange
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 7 of 24
`
`Page 7 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`authentication information while the phoneis in the charger. The turning of
`the cellular network phoneinto a cordless phone thus begins by placing the
`phonein the charger.
`In authentication all information transfer takes place only between
`base station and phone while the authentication center AuC of the cellular
`network is entirely outside. Hereby, since there is a wireline connection be-
`tween the homebasestation and the phone,it does not matter whichparty's
`authentication meanswill generate the authentication and ciphering data as
`long as these are agreed upon in advance. Even the algorithms need not be
`such which are usedin the cellular system. It is enough to agree in advance
`that when one party sendsa certain inquiry, the other party will respond with
`a certain answer, whereupon both will use an agreed ciphering key in the
`radio traffic. The authentication is invisible to the user.
`According to an advantageous embodiment, the parameters used
`in authentication are generated by first means located in the mobile station
`and the parameters are transferred through a fixed connection to second
`meanswhichare located in the homebasestation and whichwill store them.
`This makes the basestation simpler.
`In addition,
`it is advantageous to use
`the sameinquiries, responses, algorithms and ciphering keys as in the cel-
`lular system with which the phone in question complies. Hereby any software
`changesto be madein the phonewill be minor changes.
`According to another embodiment, the parameters used in authen-
`tication are generated by second meansin the base station and the pa-
`rameters are transferred through a fixed connection to such first means in
`the mobile station which will store them.
`It is advantageous whenplacing the phonein the charger that de-
`registration of the phone from the cellular network will start at the sametime.
`Hereby anytransfer of a call to the home phonewill work normally, should
`the mobile station not answer. Information from the cellular network time may
`be left in the phone memory, wherebyit may be put into use when the phone
`moves over to the cellular network. Such putting into use may take place
`automatically, when the phone moves outside the range of the home base
`station.
`
`When the mobile station has turned into a cordless phone,
`authentication is performed in the beginning of the call formation using pa-
`rameters which have been calculated in advance and stored in the memory.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 8 of 24
`
`Page 8 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`List of figures
`The invention will be explained in greater detail referring to the ap-
`pended schematic figures, wherein
`
`showsthe principle of a cellular system;
`Figure 1
`Figure 2 showsauthentication in a knowncellular system;
`Figure 3 showsformation of a ciphering key in a known system;
`Figure 4 showsthe principle of a system according to the invention;
`Figure 5
`illustrates registration in a system according to the invention:
`Figure 6 illustrates authentication in a system according to the invention;
`Figure 7 depicts another embodiment; and
`Figure 8 showsauthentication in the other embodiment.
`
`Detailed description of the invention
`Figure 4 shows basic elements of the system. A subscriberline 1
`comesto the subscriber's home, office or any other such place from the local
`exchange of a fixed PSTN or ISDN network 3. Subscriberline 1 is connected
`to a HBS (HomeBaseStation), which will convert speech and data arriving
`from the subscriber line into the format of the air interface of the cellular
`system and will send it further to radio communication and will correspond-
`ingly convert speech and data arriving in cellular system form from radio
`communication into the form used in the fixed network,
`in the case of a
`PSTN networkinto an audio signal and in the case of an ISDN networkinto a
`PCM signal. The transmission power is low to minimize the interference
`caused by frequencies used in the home basestation, so the cell radius is of
`the same magnitude as with cordless phones, a few hundred meters in free
`
`space.
`
`On the other hand, basic elements comprise a mobile station MS
`whichis a device in accordance with some digital cellular system. The known
`GSM system is used as example.
`When moving within the area of the cellular system, the mobile
`station is in connection with the base station providing the best connection at
`each time and it will traffic in a normal manner in the cellular network. When
`the user movesin the cellular network from place A to his home in place B,
`which move is shown by an arrow, the mobile station MS will still remain
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 9 of 24
`
`Page 9 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`registered with the cellular network. Only when the user connects his phone
`with a wireline connection directly to the home base station, arrow A -> C,
`will deregistration of the phone from the cellular network take place. The
`charging station for phone batteries in the home basestation, represented by
`a depression in home base station HBS, may contain, besides charging
`current pins, one or more contact pins, whereby whenthe phoneis placed in
`the charging station the contact pin will be brought into contact with a corre-
`sponding pin in the phone, which will start both deregistration of the phone
`from the cellular network and registration with the homebasestation.
`According to a first embodiment, all calculation relating to authenti-
`cation is performed in mobile station MS. This embodimentwill be explained
`referring to Figure 5.
`Registration with the home basestation takes place so that the
`subscriber equipment ME generates a random number RAND, whichit feeds
`to the SIM card. The SIM card calculates an algorithm X using the random
`number and key K, obtaining SRES as result. Using the same values but
`algorithm Y the SIM card performs algorithm Y obtaining a connection-
`specific ciphering key Ke as result. These algorithms may be the same as
`those used in the cellular system, that is,
`in case of a GSM system algo-
`rithms A3 and A8, but they may as well be any algorithms. The SIM card will
`also give the IMSI (International Mobile Subscriber Identity) or the TMSI
`(Temporary Mobile Subscriber Identity), which may be any accepted value.
`In its main features the function correspondsto the left side of Figures 2 and
`3, except that ME instead of the authentication center AuC will generate the
`random number RAND.
`
`The SIM card will feed the response SRESwhichit has generated,
`the key Ke and the IMSI/TMSI value to subscriber equipment ME, whichwill
`transmit them along a fixed connection through contacts pins 51, which con-
`nect the mobile station and the home base station HBS, to home basesta-
`tion HBS, which will store the data it received. Registration has now taken
`place and the home base station knows the authentication and ciphering
`parameters which are used. The mobile station MS has turned into a cord-
`less phone, it may be removed from the homebasestation HBS and it may
`start or receive a fixed networkcail. Its phone numberis the number given by
`the fixed network operatorto this subscriber connection.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 10 of 24
`
`Page 10 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`the first step to perform is
`When starting or receiving a call,
`authentication, which is explained referring to Figure 6. First,
`the mobile
`station MS sends to the home basestation HBS byradioits identifier TMSI,
`which the home basestation uses to search from its memory such values
`received earlier from the mobile station which relate to the identifier. There-
`after the home basestation will authenticate the mobile station by sending to
`it the RAND numberwhichit has retrieved from the memory. Upon receiving
`the RAND,the SIM card will perform algorithm X, obtaining the SRES value
`as result, which the mobile station MS will send to the home basestation.
`The value ought to be the same as the one it has generated earlier in con-
`nection with the registration, so the home basestation will perform validation
`by comparing the received SRES value with the one in its memory.If they
`are identical, the call may be started. For ciphering the information it has
`sent to the mobile station the base station uses ciphering key Ke whichit has
`stored, and the mobile station uses the same key, which it has also stored
`earlier, or then it may recalculate the key using algorithm Y, as shownin the
`figure.
`
`It should be noticed that both the RAND and the SRESvalues may
`be sent even several times over the radio interface, whereby a third party
`may capture them. This is possible also in case of a GSM system. However,
`this is not a problem, because the ciphering key is not transmitted at all by
`radio, but only through the fixed connection when the mobile station is at-
`tached to the home basestation.
`
`Figure 7 shows another embodiment, where the home basestation
`is the active party in authentication.
`Registration with the home base station takes place so that the
`mobile station MS transmits its IMSI (International Mobile SubscriberIdentity)
`or its TMSI (Temporary Mobile Subscriber Identity) to the home base station
`HBS.
`In response to this, the home base station will generate a random
`number RAND andcalculate algorithm X using the random number and key
`K, obtaining the answer SRESasresult. Using the sameinitial values but
`algorithm Y it also performs algorithm Y obtaining a connection-specific ci-
`phering key Kc asresult. These algorithms may be the same as those used
`in the cellular system. All values are stored in the memory.
`Hereafter the home base station feeds its generated inquiry
`RAND, its calculated answer SRES and the key Ke through contact pins 51
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 11 of 24
`
`Page 11 of 24
`
`

`

`WO 98/28929
`
`PCT/F197/00746
`
`to subscriber equipment ME, which will store the information it receives.
`Registration has now taken place and the authentication and ciphering pa-
`rameters to be used are now knownto the mobile station. The mobile station
`MS hasturned into a cordless phone,
`it may be removed from home base
`station HBS andit mayoriginate or receive a fixed network call.
`Whenoriginating or receiving a call, authentication is first per-
`formed andthis is explained referring to Figure 8. The mobile station MSfirst
`sendsbyradio to home basestation HBSits identifier TMSI, which the home
`base station usesforfinding from its memory any values whichrelate to the
`identifier and which have earlier been received from the mobile station.
`Thereafter the home base station authenticates the mobile station by send-
`ing to it the RAND numberwhichit has searched from the memory. Having
`received the RAND,the SIM card will perform algorithm X obtaining as result
`the SRES value, which the mobile station MS will send to the home base
`station. The value ought to be the same as the one whichit generated earlier
`in connection with the registration, so the home basestation performs vali-
`dation by comparing the SRESvalue whichit has received and the onein its
`memory.
`If these are the same, the call may be started. For ciphering the
`information it has sent to the mobile station, the base station uses the ci-
`phering key Ke which it has stored, and the mobile station uses the same
`key, whichit too has stored earlier, or then it may recalculate the key using
`algorithm Y.
`is also possible to act in such a way that the mobile station
`It
`authenticates the base station. Hereby it sends to the base station both the
`IMSI and the RAND, in responseto which the basestation returns the SRES
`number. The mobile station checks to make sure that the number corre-
`spondswith the already stored or recalculated SRESvalue.
`Arranging functions according to the invention in present cellular
`network phoneswill require minor software additions and new algorithms, if
`required,
`in addition to the existing ones, such as A3A8 algorithms. Any
`additions to be made in the homebasestation are minor ones, if the first
`embodiment is implemented. The great advantage is that any cellular net-
`_ work phoneregistered with the home basestation will work as a cordless
`phone.
`In practice, the phone is a dual-mode phone, whereby the same
`phone will work at home as a cordless phoneat cheapercall tariffs and out-
`side the home as a normalcellular network phone.If registration with the
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 12 of 24
`
`Page 12 of 24
`
`

`

`WO 98/28929
`
`PCT/FI97/00746
`
`11
`
`base station takes place automatically, as proposed above, and if registra-
`tion with the cellular network takes place automatically using earlier pa-
`rameters stored in the phone memory, the user to change the mode need
`only connect the phone for a momentto the home base station when coming
`home, to the office or any other such place.
`Whenthe phone registers with the home basestation, one must of
`course makesure that its transmission powerwill fall considerably below the
`minimum transmission power determined for the mobile station in the cellular
`network system so that the range will be reduced to a few hundred metersin
`free space. This must be done because whenoperating as a cordiess phone
`the mobile station will not cause interference in such connections of the
`cellular system which use the samefrequency.
`It could even be possible to program the phonesothat it would be
`able when registered with the homebase station to receive calls both from
`the fixed network side and from the cellular network side, but outgoing calls
`would be directed to the fixed network.
`The proposed arrangement can be implemented in practice in
`many different ways keeping within the scope of the claims. Programs and
`algorithms can be freely chosen as well as the party whowill generate the
`authentication and ciphering information. Registration may preferably be
`started by pushing the phoneinto the charging station, but the base station
`may alternatively have some other place where the phoneis placed while
`registration takes place. Several phones may be registered with the home
`base station. In-house calls between these phones may be implemented by
`suitable softwarein the basestation.
`
`10
`
`15
`
`20
`
`25
`
`Page 13 of 24
`
`Page 13 of 24
`
`

`

`WO98/28929
`
`PCT/FI97/00746
`
`12
`
`Claims
`
`1. Telephone system comprising terminal equipment and a home
`base station connected with a subscriber line to a telephone exchange,
`whereby a part of the subscriber connection is formed by a radio link be-
`tween the terminal equipment and the base station,
`characterized inthat
`
`the terminal equipment is a mobile station of a cellular mobile tele-
`phone system also containing first means for implementing an authentication
`procedure betweenitself and the home basestation (HBS),
`implementing an
`the base station contains second means for
`authentication procedure betweenitself and the mobile station,
`generation and exchange of authentication parameters between
`the mobile station and the home basestation begin at once when the mobile
`station is put into the home base station so that a wireline connection is
`brought about between them, whereby after transmission of authentication
`parameters the mobile station has turned into a cordless phone registered
`with the home basestation.
`
`15
`
`2. System as defined in claim 1,
`characterized in that
`
`the first means compriseafirst algorithm (algorithm X), an identifi-
`20
`cation key (K,) and a random number (RAND) generator,
`the second means comprise a memory,
`after putting the mobile station in the home base station the first
`meanswill generate a random number (RAND), in response to whichthefirst
`algorithm (algorithm X) produces an answer (SRES) using identification key
`(K;) and the mobile station transmits the random number (RAND), the re-
`sponse (SRES)andits identifier (IMSI/TMSI) to the home base station (

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket