throbber
US005812955A
`
`
`
`5,812,955
`(114) Patent Number:
`United States Patent 55
`
`
`
`
`
`
`
`
`
`
`
`
`Dentet al.
`[45] Date of Patent:
`*Sep. 22, 1998
`
`
`
`
`
`
`
`
`
`
`
`[54] BASE STATION WHICH RELAYS
`CELLULAR VERIFICATION SIGNALS VIA A
`
`
`
`
`TELEPHONE WIRE NETWORK TO VERIFY
`
`
`
`
`
`
`
`A CELLULAR RADIO TELEPHONE
`
`
`[75]
`
`
`
`
`
`
`
`Inventors: Paul Wilkinson Dent, Stehag; Jacobus
`
`
`
`
`Cornelius Haartsen, Staffanstorp, both
`of Sweden
`
`
`
`.
`.
`
`
`
`
`
`
`[73] Assignee: Ericsson Inc., Research Triangle Park,
`Nc.
`
`
`
`
`
`
`
`0 225 607
`
`
`0643 543 A2
`
`5-48526
`
`[*] Notice:
`
`
`
`
`The term of this patent shall not extend
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`beyond the expiration date of Pat. No.
`5,428,668.
`
`
`
`
`
`
`[21] Appl. No.: 205,705
`
`
`
`[22]
`Filed:
`Mar. 3, 1994
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5,535,259
`7/1996 Dentet al. eee eeeeereeeee 379/59
`
`
`
`
`
`5,581,597 12/1996 Dentetal.
`379/59
`
`
`
`
`
`4/1997 Nilssen occ eececeeeeeceeenee 379/56
`5,623,531
`FOREIGN PATENT DOCUMENTS
`
`
`
`
`
`
`6/1987 European Pat. Off..
`
`
`
`EuropeanPat. Off.
`3/1995
`.
`
`
`Japan .
`2/1993
`
`OTHER PUBLICATIONS
`
`
`
`
`
`
`Microcellular Structures and Their Performance, H. Pers-
`
`
`
`
`
`son, IEEE, 1992, pp. 413-418.
`
`
`
`
`
`
`NIT to Market Cordless Telephone for Office Buildings,
`
`
`
`
`
`
`Comline Telecommunications, p. 4, Jun. 29, 1988.
`
`
`
`
`
`SWBell Mobile Plans PCS, A. Lindstrom, Communications
`
`
`
`
`
`
`Week, No. 448, p. 6(1), Apr. 5, 1993.
`
`
`
`(List continued on next page.)
`
`
`
`
`Primary Examiner—William Cumming
`
`
`
`
`
`
`
`Ys
`y
`AS
`g
`y
`i
`Attorney, Agent, or Firm—Myers Bigel Sibley & Sajovec
`
`
`
`
`Related U.S. Application Data
`
`
`ABSTRACT
`[57]
`
`
`
`
`
`
`
`Asecure radio personal communication system and method
`[63] NOntinuationin-part of Ser. No. 148,828, Nov. 4, 1993,Pat.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`includes a base station which relays cellular verification
`” .
`‘
`
`
`
`
`
`
`
`
`[SL] Tint, Cd nnneeeesessesseeseeseeneeneeseeseessenseese H04Q 7/30 signals between a wide area cellular network and a cellular
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[52] US. Ch o.
`.. 455/561; 380/37
`terminal via the wire telephone network. Thus, cellular
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[58] Field of Search 0.0.0.0. ee 379/58, 59, 60,
`telephone calls which are routed to a cellular terminal via a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`379/61, 62, 63; 455/33.1, 33.2, 54.1, 11.1,
`base station, when the cellular terminal is within a local
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`14, 461, 414, 445, 436, 561; 380/21
`region covered by the base station, may be exchanged
`between the cellular network and cellular terminal over the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`wire telephone network. Calls from the wide area cellular
`
`
`
`
`
`
`
`
`
`
`network which are routed through the base station can thus
`
`
`
`
`
`
`
`
`
`employ the same security systems and methods which are
`
`
`
`
`
`
`
`
`employed by the wide area cellular network. Signals
`
`
`
`
`
`
`
`
`
`between the base station and the cellular terminal are
`
`
`
`
`
`
`preferably exchanged whenthe cellular terminal is parked in
`
`
`
`
`
`
`
`
`the base station. Verification and encryption signals may be
`exchanged. The same signals may be used for enhanced
`
`
`
`
`
`
`
`
`security when the basestation is relaying wire networkcalls
`
`
`
`
`
`
`
`
`to the cellular terminal when the cellular terminal is in the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`localregion. Alternatively, separate verification and encryp-
`
`
`
`
`‘tion protocols may be used.
`
`
`[56]
`
`
`
`
`
`
`
`References Cited
`US. PATENT DOCUMENTS
`
`
`4,953,198
`8/1990 Daly etal. .
`
`
`
`
`
`
`
`
`4,979,205
`12/1990 Haraguchi 0... eceecseneenenenes 379/61
`
`
`
`
`.
`1/1991 Gillig et al.
`4,989,230
`
`
`
`
`
`
`
`. 379/63 X&
`7/1991 Sasuta et al.
`5,034,993
`.
`
`
`
`
`
`2/1992 Dent sa ceececenceeeaeneaeseaneeeaseesaens 379/59 X
`5,091,942
`
`
`
`
`Secons yt003 egot a etal
`379/59
`
`
`
`
`
`5353352 101994 Dentet .
`7 eee 380/37
`
`
`
`
`
`
`4/1996 Mizikovskyetal.wees... 379/59
`5,513,245
`
`
`
`
`
`5/1996 Chavez, Jr .......
`.. 379/60
`5,521,962
`
`
`
`
`
`
`
`5/1996 Shraderetal.
`.. 379/60
`5,521,963
`
`
`
`
`
`
`
`
`
`
`
`
`
`6/1996 Dent et al. ccc 379/59
`5,526,402
`
`
`
`
`41 Claims, 12 Drawing Sheets
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page | of 29
`
`SAMSUNGEXHIBIT 1006
`
`SAMSUNG EXHIBIT 1006
`
`Page 1 of 29
`
`

`

`
`
`
`
`
`In Search OfA New Market, R. Schneiderman, Microwaves
`
`
`
`
`
`
`
`& RF, vol. 30, No. 8, p. 33(5), Aug. 1991.
`
`
`
`
`
`
`
`Motorola Blurs Lines Between Cellular and Paging, Deal-
`
`
`
`
`
`
`
`
`
`erscope Merchandising, vol. 35, No. 7, pp. 36, Jul. 1993.
`
`
`
`
`
`
`
`
`Mitsubishi Electric to Enter Radio Base Station Market for
`
`
`
`
`
`Digital Cellular Phones, Comline Telecommunications, p.
`
`
`
`9, Mar. 5, 1993.
`
`
`
`
`
`
`Expected to Show Reference Design at COMDEX: Motor
`
`
`
`
`
`
`
`Sampling PCS Chip Set, Electronic Engineering Times,p. 1,
`Oct. 26, 1992.
`
`
`
`Bell Atlantic and Motorola to Test Personal Communica-
`
`
`
`
`
`
`
`
`
`
`
`
`
`tions Service, Audio Week, Feb. 17, 1992.
`
`
`
`
`
`
`
`New Service Moves Toward National Information Infra-
`
`
`
`
`
`
`
`
`
`structure Via PCS, Common Carrier Week, Feb. 17, 1992.
`
`
`
`
`
`
`
`M. Brussol, et al., Telepoint in France, Matra Communica-
`
`
`
`
`
`
`tion, vol. 15, pp. 21-30, 1993.
`
`
`
`
`
`Walker, Security in Mobile and Cordless Telecommunica-
`
`
`
`
`
`tions, IEEE, pp. 493-496, 1992.
`
`
`
`
`
`
`
`
`
`
`5,812,955
`
`Page 2
`
`OTHER PUBLICATIONS
`
`
`Bell Atlantic and Motorola To Test Personal Communica-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tions Service, Warren Publishing, Inc., Audio Week,vol. 4,
`
`
`
`
`No. 7, Feb. 17, 1992.
`
`
`
`
`
`
`RHCS Stake Claim on Personal Communications Licenses,
`
`
`
`
`
`
`
`
`
`Capitol Publications, Inc., FCC Week, vol. 7, No. 42, Nov.
`
`
`5, 1990.
`
`
`
`
`
`
`Aermica’s First Personal Communications Service (PCS) Is
`
`
`
`
`
`Claimed, Audio Week, Apr. 5, 1993.
`
`
`
`
`
`
`Nation’s First Commercial PCS Introduced by SW Bell, E.
`
`
`
`
`
`
`
`
`
`Messner, Network World, vol. 10, Issue 14, p. 4(2), Apr. 5,
`1993.
`
`Mitsubishi Electric To Enter Radio Base Station Market For
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Digital Cellular Phones, Mitsubishi Weekly, vol. 9, No. 9,
`
`
`
`
`
`Mar. 5, 1993, Digitized Information, Inc.
`
`
`
`
`
`
`Wireless System Manufacturers Develop Microcell Equip-
`
`
`
`
`
`
`
`
`ment, Phillips Business Information, Inc., PCS News,vol.4,
`No. 6, Mar. 18, 1993.
`
`
`
`
`
`
`
`
`
`
`
`
`Cox Moves Ahead On Alternate Access, PCS, G. Kim,
`
`
`
`
`
`
`
`
`
`Multichannel News, vol. 12, No. 35, p. 33(1), Sep. 2, 1991.
`
`
`
`
`
`
`
`New Service Moves Toward National Information Infra-
`
`
`
`
`
`
`
`
`structure Via PCS, Common Carrier Week,vol. 8, No. 7, p.
`
`
`
`
`5(2), Feb. 17, 1992.
`
`Page 2 of 29
`
`Page 2 of 29
`
`

`

`U.S. Patent
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`
`Sheet 1 of 12
`
`
`
`5,812,955
`
`
`
`
`
`-—wr wr Ker EOer ~“
`
`NN
`
`~N
`
`124
`
`SN
`—-—_=- Ss >
`
`“N
`
`12
`
`a
`
`7
`
`a
`
`104,”
`\-
`?
`
`4
`
`,”
`
`7
`
`i
`I
`!
`I
`
`i;
`
`
`
`t
`
`‘
`
`N
`
`“
`
`‘s
`
`~ .
`
`108
`
`
`
`‘
`
`‘
`
`“
`
`NX
`
`X\
`
`N\
`
`Neem a
`
`?
`
`
`
`7
`
`7
`
`?
`
`7
`
`, 7
`
`,
`
`a?
`

`
`a
`
`a7
`
`Page 3 of 29
`
`
`
`BASE
`STATION
`110
`
`108
`
`,
`
`7
`
`a
`x “
`~S
`‘
`\
`!
`I
`=!
`My
`'
`a!
`i
`i
`i
`'
`i
`106
`yo
`
`
`j
`7
`I
`
`
`| RADIOWKw~7TT TTT ,
`
`NETWORK|“102
`
`STATION
`
`
`Page 3 of 29
`
`

`

`104
`
`
`
`7
`
`
`\ , , 7
`
`7
`
`
`2 TERMINAL
`120
`
`
`
`
`
`
`
`
`
`
`
`114
`
`ie >
`
`
`a
`,
`|
`i
`i
`I
`i
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`
`Sheet 2 of 12
`
`
`5,812,955
`
`
`
`
`HG. 1B
`
`co ee XN
`
`
`
`
`
`
`
`
`
`
`
`
`122
`
`
`
`7
`
`
`“
`
`
`NN
`
`
`‘
`
`
`‘
`
`
`
`
`
`
`
`
`‘ . .
`
`; “>
`
`
`
`“> ~
`S,
`7 7
`
`i!
`i
`1
`ry
`\
`V
`1
`!
`i
`3!
`i
`vi
`
`,
`i
`I
`
`,
`1
`i
`7 7
`‘
`I
`
`Sr rte
`RADIO
`I
`
`
`; NETWORK|“102 !
`
`
`STATION
`
`
`108
`
`
`
`N
`
`
`‘ .
`
`
`
`7
`
`
`
`
`
`
`
`
`
`
`
`
`
`I
`
`‘
`
`
`‘
`
`\.
`
`“ .
`
`
`
`
`
`
`‘
`
`
`‘
`
`
`N .
`
`
`N
`
`
`~
`
`
`NN Ce ee ee ee eee ’ 7
`
`
`
`a
`
`
`
`7
`
`
`/
`
`a
`
`
`7
`
`
`?
`
`
`
`
`, ?
`
`
`

`
`
`7
`
`/
`
`Page 4 of 29
`
`Page 4 of 29
`
`

`

`U.S. Patent
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`
`Sheet 3 of 12
`
`
`5,812,955
`
`
`
`
`FIG, 2
`
`
`
`
`
`
`
`Page 5 of 29
`
`Page 5 of 29
`
`

`

`U.S. Patent
`
`
`
`Sep. 22, 1998
`
`
`
`
`Sheet 4 of 12
`
`5,812,955
`
`
`
`Sot
`
`NSHM°
`
`
`
`Oct°
`
`
`
`
`
`Y3AISOSNVYL
`
`
`
`
`
`
`
`
`00'd
`
`JOXLNOS
`
`
`
`AV1dS!I0
`
`6[99900]HOSS
`fo}C=°—"]
`TWNIWHSLweHADYWHO
`sOvsuaIN,AUSLLVE
`
`=|Le
`
`
`€Dla
`|coxy|
`}ane.}ane.
`woioatsdLt
`Set
`
`ABONN
`
`Zot
`
`aeYAMOd
`
`LSL
`
`PEL
`
`
`
`
`
`Page 6 of 29
`
`Page 6 of 29
`
`
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`Sheet 5 of 12
`
`5,812,955
`
`
`
`il
`
`U.S. Patent Zz
`
`ILLZ60902
`|L0zy
`IJAROa
`
`voc|80220SSC«LK
`
`
`
`Page 7 of 29
`
`Page 7 of 29
`
`

`

`U.S. Patent
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`
`Sheet 6 of 12
`
`
`5,812,955
`
`
`
`
`
`
`
`251
`
`
`TRANSMIT
`CIRCUIT.
`
`255
`
`
`
`STORAGE
`MEANS
`
`
`
`
`||
`
`i
`,
`
`,
`
`!
`
`\,
`
`,
`;
`;
`;
`
`
`
`257
`
`
`
`261
`
`
`265
`
`
`
`KEYPAD
`
`
`
`SPEAKER
`
`
`
`SCANNER
`
`
`
`259
`
`
`
`263
`
`
`
`267
`
`DISPLAY
`
`
`
`MiC
`
`
`
`OTHER
`
`
`
`Page 8 of 29
`
`i| | | | \
`
`i
`
`\i
`
`|\ | | | \ | | | |
`
`|
`!
`
`{| \ | i i | \ | { |
`
`
`||
`\
`i
`
`||
`
`RECEIVE
`CIRCUIT
`
`TRANSCEIVER
`
`
`CONTROL
`
`
`
`
`
`PROCESSOR
`
`
`Page 8 of 29
`
`

`

`U.S. Patent
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`
`Sheet 7 of 12
`
`
`5,812,955
`
`
`
`
`
`
`
`
`DETECT
`
`INITIALIZE
`CONDITIONS
`
`
`
`
`INITIATE
`
`CALL
`
`
`NOTIFY
`
`OF LOCATION
`
`
`
`
`
`
`
`
`REQUEST
`
`CONTROL
`
`MESSAGE
`
`
`RECEIVE CONTROL
`
`MESSAGE
`
`
`
`STORE
`
`
`
`TRANSMIT
`
`
`
`STORE
`
`
`
`300
`
`
`
`302
`
`
`
`304
`
`
`
`306
`
`
`
`308
`
`
`
`
`310
`
`312
`
`
`
`314
`
`
`
`
`
`
`
`
`YES << NO
`
`Page 9 of 29
`
`Page 9 of 29
`
`

`

`U.S. Patent
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`
`Sheet 8 of 12
`
`
`5,812,955
`
`
`
`FIG. 7
`
`
`
`
`
`Page 10 of 29
`
`

`

`U.S. Patent
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`
`Sheet 9 of 12
`
`
`5,812,955
`
`
`
`
`
`
`
`100
`
`Page 11 of 29
`
`Page 11 of 29
`
`

`

`U.S. Patent
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`
`Sheet 10 of 12
`
`
`5,812,955
`
`
`
`
`FIG. 9
`
`352
`
`
`
`
`APPLY POWER TO
`
`
`TERMINAL 120
`
`
`
`
`
`
`
`
`
`SCAN BASE
`
`STATION FREQUENCY
`
`
`
`
`
`
`
`
`
`COMMUNICATE TO
`
`
`NETWORKSTATION 102
`
`
`
`
`SIGNAL
`
`
`
`LEVEL ABOVE
`
`
`THRESHOLD
`?
`
`
`
`
`
`
`
`
`
`
`
`
`COMMUNICATE TO
`
`
`
`BASE STATION 110
`
`Page 12 of 29
`
`Page 12 of 29
`
`

`

`
`U.S. Patent
`
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`
`Sheet 11 of 12
`
`5,812,955
`
`
`
`SECURITY
`
`
`
`
`
`peteaeeeeeen eee
`
`
`
`EXCHANGING
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`RELAYING
`Lannaeeeeeeeee arcanenog
`
`
`420
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TO FIG.
`
`
`
`1
`
`OB.
`
`
`
`
`FIG.
`
`
`
`LOA.
`
`Page 13 of 29
`
`Page 13 of 29
`
`
`

`

`
`U.S. Patent
`
`
`
`
`
`Sep. 22, 1998
`
`
`
`
`Sheet 12 of 12
`
`5,812,955
`
`
`
`
`FROM FIG.
`
`
`
`
`10A.
`
`
`
`
`432
`
`ewweaeeeteeeei
`
`YES
`
`REACTIVATING
`
`
`FIG.
`
`
`TQB.
`
`st
`
`xtN)
`
`436
`
`
`
`
`
`
`
`
`
`U--y+—f eeet
`
`
`
`Page 14 of 29
`
`Page 14 of 29
`
`
`
`
`

`

`5,812,955
`
`
`1
`BASE STATION WHICH RELAYS
`
`
`
`
`CELLULAR VERIFICATION SIGNALS VIA A
`
`
`
`
`TELEPHONE WIRE NETWORK TO VERIFY
`
`
`
`
`A CELLULAR RADIO TELEPHONE
`
`
`
`
`CROSS-REFERENCE TO RELATED
`
`APPLICATIONS
`
`
`
`
`
`
`
`
`This application is a Continuation-in-Part of application
`
`
`
`
`
`
`
`
`
`
`Ser. No. 08/148,828filed on Nov.4, 1993, now U.S. Pat. No.
`
`
`
`
`
`
`
`
`
`5,428,668, and assigned to the assignee of the present
`
`
`
`
`
`
`invention, the disclosure of which is incorporated herein by
`reference.
`
`
`10
`
`FIELD OF THE INVENTION
`
`
`
`
`
`
`
`
`
`This invention relates to communications systems and
`
`
`
`
`
`moreparticularly to radio personal communications systems
`for use within wide area cellular networks.
`
`
`
`
`
`
`
`
`
`
`
`15
`
`
`
`
`
`20
`
`BACKGROUND OF THE INVENTION
`
`
`
`
`
`
`
`
`Radio communications systems are increasingly being
`
`
`
`
`
`
`used for wireless mobile communications. An example of a
`
`
`
`
`
`
`radio communications system is a cellular phone network.
`
`
`
`
`
`
`
`
`Cellular radio communications systems are wide area com-
`25
`
`
`
`
`
`
`munications networks which utilize a frequency (channel)
`
`
`
`
`
`
`
`
`reuse pattern. The design and operation of an analog cellular
`
`
`
`
`
`
`
`phone system is described in an article entitled Advanced
`
`
`
`
`
`
`
`Mobile Phone Service by Blecher, IEEE Transactions on
`
`
`
`
`
`
`
`
`Vehicular Technology, Vol. VT29, No. 2, May, 1980, pp.
`
`
`
`
`
`
`
`
`238-244. The analog mobile cellular system is also referred
`
`
`
`
`
`to as the “AMPS” system.
`
`
`
`
`
`
`
`
`Recently, digital cellular phone systems have also been
`
`
`
`
`
`
`proposed and implemented using a Time-Division Multiple
`
`
`
`
`
`
`
`Access (TDMA)architecture. Standards have also been set
`
`
`
`
`
`
`
`
`by the Electronics Industries Association (EIA) and the
`
`
`
`
`
`
`Telecommunications Industries Association (TIA) for an
`
`
`
`
`
`
`American Digital Cellular (ADC) architecture which is a
`
`
`
`
`
`
`
`
`dual mode analog and digital system following EIA/TIA
`
`
`
`
`
`
`document IS-54B. Telephones which implementthe IS-54B
`
`
`
`
`
`
`
`
`dual mode architecture are presently being marketed by the
`
`
`
`
`
`
`
`
`assignee of the present invention. Different standards have
`
`
`
`
`
`
`
`been promulgated for digital cellular phone systems in
`
`
`
`
`
`
`
`
`Europe. The European digital cellular system, also referred
`
`
`
`
`
`
`to as GSM, also uses a TDMAarchitecture.
`
`
`
`
`
`
`
`
`Proposals have recently been made to expand the cellular
`
`
`
`
`
`
`
`phone network into a radio personal communications sys-
`
`
`
`
`
`
`
`tem. The radio personal communications system provides
`
`
`
`
`
`
`
`
`mobile radio voice, digital, video and/or multimedia com-
`50
`
`
`
`
`
`
`munications using radio personal communications termi-
`
`
`
`
`
`
`
`
`
`nals. Thus, any form of information may be sent and
`
`
`
`
`
`
`received. Radio personal communications terminals include
`
`
`
`
`
`
`
`
`a radio telephone, such as a cellular telephone, and may
`
`
`
`
`
`
`
`
`include other components for voice, digital, video and/or
`multimedia communications.
`
`
`
`
`
`
`
`
`Aradio personal communications system includesat least
`
`
`
`
`
`
`
`
`one telephonebasestation,also referred to herein as a “base
`
`
`
`
`
`
`station”. A base station is a low power transceiver which
`
`
`
`
`
`
`communicates with a radio personal communications termi-
`
`
`
`
`
`
`
`
`nal such as a cellular telephone over a limited distance, such
`
`
`
`
`
`
`
`
`as tens of meters, and is also electrically connected to the
`
`
`
`
`
`
`
`
`conventional public wire telephone network. The base sta-
`
`
`
`
`
`
`
`tion allows the owner of a radio personal communications
`
`
`
`
`
`
`
`
`terminal
`to directly access the wire telephone network
`
`
`
`
`
`
`
`
`without passing through the cellular phone network, whose
`
`
`
`
`
`
`
`
`
`access rates are typically more costly. When located outside
`
`
`
`
`
`
`
`
`the range of the base station, the personal communications
`
`30
`
`40
`
`45
`
`55
`
`60
`
`65
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 15 of 29
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`2
`
`
`
`
`
`terminal automatically communicates with the cellular
`
`
`
`
`
`
`phone network at the prevailing access rates.
`
`
`
`
`
`
`
`A major problem in implementing a radio personal com-
`
`
`
`
`
`
`munications system is security for communications between
`
`
`
`
`
`
`
`
`the base station and the personal communications terminal.
`
`
`
`
`
`
`
`Modern cellular telephone networks include security sys-
`
`
`
`
`
`
`
`tems and methods to prevent eavesdropping and telephone
`
`
`
`
`
`
`fraud. Eavesdropping may be prevented by using encryption
`
`
`
`
`
`
`
`of radio transmissions between a cellular phone and a
`
`
`
`
`
`
`cellular network. Fraud may be prevented by preventing
`
`
`
`
`
`
`
`radio telephone transmissions between the cellular phone
`and the cellular network unless identification information is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`successfully exchanged between the cellular phone and the
`
`
`
`
`
`
`
`
`cellular network. Existing cellular systems, such as the
`
`
`
`
`
`
`
`
`
`
`AMPSsystem, the ADC system, and the GSM system each
`
`
`
`
`
`
`
`
`include their own security systems and methods. Security
`
`
`
`
`
`should not be compromised by communications between the
`
`
`
`
`
`
`
`radio personal communications terminal and the base station
`
`
`
`
`
`of a radio personal communications system.
`SUMMARYOF THE INVENTION
`
`
`
`
`
`
`
`
`It is therefore an object of the present invention to provide
`
`
`
`
`
`
`an improved radio personal communications system includ-
`
`
`
`
`
`
`ing a base station and a radio personal communications
`
`
`
`
`
`
`
`terminal, and methods for using the same.
`
`
`
`
`
`
`
`
`It is another object of the present invention to provide
`
`
`
`
`
`
`radio personal communications systems which do not com-
`
`
`
`
`
`
`
`promise security of a wide area cellular system with which
`
`
`they interact.
`
`
`
`
`
`
`
`
`In the present invention, a base station connects a wire
`
`
`
`
`
`telephone network to a radio personal communications
`
`
`
`
`
`
`terminal, also referred to herein as a “cellular terminal” or
`
`
`
`
`
`
`
`simply a “terminal”, within a local region of a wide area
`
`
`
`
`
`
`
`
`cellular network. The base station includes a wire telephone
`
`
`
`
`
`
`
`
`
`network connector, for connecting the base station to the
`
`
`
`
`
`
`
`
`wire telephone network. The base station relays cellular
`
`
`
`
`
`
`
`
`verification signals between the wide area cellular network
`
`
`
`
`
`
`
`
`and a cellular terminal via the wire telephone network
`
`
`
`
`
`
`
`connector. Thus, wireless telephone calls which are routed to
`
`
`
`
`
`
`
`
`
`the cellular terminal via the base station, when the cellular
`
`
`
`
`
`
`
`
`
`terminal
`is within the local region covered by the base
`
`
`
`
`
`
`
`station, may be secured by exchange of data between the
`cellular network and cellular terminal over the wire tele-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`phone network via the wire telephone connector and the
`
`
`
`
`
`
`
`
`base station. Calls from the public switched telephone
`
`
`
`
`
`
`
`
`
`network including the wide area cellular network which are
`
`
`
`
`
`
`
`
`
`
`routed through the base station can thus employ the same
`
`
`
`
`
`
`
`
`security systems and methods which are employed by the
`wide area cellular network.
`
`
`
`
`
`
`
`
`
`
`In a preferred embodiment, the telephone base station
`
`
`
`
`
`
`includes a coupler whichis adapted for cooperatively mating
`
`
`
`
`
`
`
`with a cellular terminal which is parked in the basestation.
`
`
`
`
`
`
`The coupler couples the cellular security information
`between the cellular terminal and the base station. Cellular
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`security information can include encryption keys that are
`
`
`
`
`
`
`
`
`relayed from the wide area cellular network to the cellular
`
`
`
`
`
`
`
`
`terminal via the wire telephone connector for use in encrypt-
`
`
`
`
`
`
`ing communications with the base station.
`
`
`
`
`
`
`Enhanced security is provided by relaying the security
`information between the cellular terminal and the base
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`station when the cellular terminal is parked in the base
`
`
`
`
`
`
`
`station,
`to avoid their
`radio frequency transmission.
`
`
`
`
`
`
`
`Exchanged security information can also include authenti-
`
`
`
`
`
`
`
`
`
`cation signals that bilaterally verify both the identity of the
`
`
`
`
`
`
`
`
`cellular phone to the cellular network andthe identity of the
`
`
`
`
`
`
`
`network to the phone, as described in U.S. patent application
`
`Page 15 of 29
`
`

`

`5,812,955
`
`
`
`10
`
`15
`
`
`
`20
`
`
`
`3
`4
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the
`Ser. No. 08/043,758 and U.S. Pat. No. 5,091,942,
`it
`is overwritten by a
`tion between the two units until
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`subsequent exchange. If the transfer of the number to be
`disclosure of both of which are hereby incorporated herein
`
`
`
`
`
`
`
`
`called is part of the encrypted further communications, an
`by reference.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`unauthorized cellular terminal, that is unable to generate the
`As an alternative to physically mating the terminal with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`correct B-key because it does not have access to the A-key,
`the base however, signals may be relayed between the
`
`
`
`
`
`
`
`
`will notbe able to continue and set upacall, thus preventing
`
`
`
`
`
`
`
`
`
`cellular terminal and the cellular network, via the base
`useful unauthorized access.
`
`
`
`
`
`
`
`
`
`
`
`
`station and the wire network connector, by using radio
`
`
`
`
`
`
`
`
`
`
`
`
`
`frequency transmission over cellular frequencies, between
`The above description showsthat appropriate encryption
`the cellular terminal and the base station. This radio fre-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`may also inherently prevent fraud. An alternative technique
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`quency transmission may be necessary when verification
`of denying unauthorized access may also be used, called
`
`
`
`
`
`
`
`
`
`
`
`
`
`“authentication”.
`In authentication, a random number
`and encryption signals are exchanged uponreactivation of
`RANDis transmitted from the base station to the cellular
`
`
`
`
`
`
`
`
`the base station, when the cellular terminal moves outside
`
`
`
`
`
`
`
`
`
`terminal as described above. The RANDis in this case
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the local region and then returns to the local region. Tele-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`phone communication between the terminal and the public
`knownas an authentication challenge. The cellular terminal
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`switched networkvia the basestation is prevented unless the
`combines RAND with A-key to obtain a response RESP to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`relayed cellular verification signals indicate that the radio
`the challenge, and transmits RESPto the base station. The
`
`
`
`
`
`
`
`
`
`
`
`
`telephone communication is authorized.
`base station also locally computes RESP and checks the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`received version against its locally computed version. If they
`The base station and the cellular terminal may also
`
`
`
`
`
`
`
`
`
`
`
`
`do not match, access is denied.
`exchange local verification information, separate from the
`
`
`
`
`
`
`
`
`
`
`
`cellular verification information,
`for communications
`Authentication alone however does not guarantee that
`between the base station and terminal when the terminal is
`access will be denied to a fraudulent cellular terminal. For
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`within the local region and is receiving communications via
`example, one could construct a false base station that issues
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the wire telephone network connector from the wire tele-
`many random challenges to a genuinecellular terminal in its
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`phone network. Thus, the wide area cellular network need
`vicinity and records the corresponding responses,increasing
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`not be contacted in order to provide security for local
`the probability of having in its memory a challenge-response
`communications between the cellular terminal and the base
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`pair that the real base station will accept. Even worse, it can
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`station within local region forcalls originating from the wire
`initiate a call to the real base station, wait for the real base
`
`
`
`
`
`
`
`
`
`
`telephone network.
`station to issue a challenge, then temporarily shut off its
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`transmitter just as the genuine cellular terminal replies with
`It will be understood by those having skill in the art that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`RESP. Whenthe real base station indicates it has accepted
`the local authentication procedure preferably uses the same
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the call, the fraudulent base station starts up its transmitter
`protocol as the cellular telephone verification procedure.
`
`
`
`
`
`
`
`
`
`
`
`
`
`again at a sufficient power level to overpower the genuine
`The local authentication key is preferably exchanged when
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cellular terminal, and can then proceed to set up a call.
`the cellular terminal is parked in the base station, via the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`coupler, but may also be established by exchanging radio
`Encryption can be used to prevent
`these fraudulent
`
`
`
`
`
`
`
`frequency transmissions. Local encryption keys mayalso be
`
`
`
`
`
`
`
`
`practices, and can be used in combination with the authen-
`
`
`
`
`
`
`
`
`
`
`
`
`
`established along with local authentication keys. Telephone
`tication techniques described above. Encryption security
`
`
`
`
`
`
`
`
`
`
`
`
`
`communication between the terminal and the wire telephone
`depends on preventing access to the long-term secret A-key.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`network via the wire telephone network connector on a
`This can be done by providing a device, such as an inte-
`
`
`
`
`
`
`
`subsequent occasionis prevented unless the exchanged local
`
`
`
`
`
`
`
`
`grated circuit chip, that includes the A-key embedded in
`
`
`
`
`
`
`
`
`
`
`
`
`authentication signals are consistent with the previously
`electronic form, an authentication algorithm processor, an
`established authentication information.
`
`
`
`
`
`
`
`
`
`
`
`electrical input for RANDandanelectrical output for RESP
`
`
`
`
`
`
`
`
`
`The above described security systems serve two primary
`and/or B-key.
`
`
`
`
`
`
`
`
`
`
`
`
`
`purposes. First they prevent an unauthorized cellular termi-
`The chip preferably provides no access to read out the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`nal from making calls via a base station for which someone
`A-key, and performs only one operation, namely to respond
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`else will be billed. Second, they prevent eavesdropping,
`to a challenge with RAND by returning RESP and B-key.
`
`
`
`
`
`
`which is otherwise easy when communications are trans-
`
`
`
`
`
`
`
`
`The internal processor buss that must be able to access the
`ferred from the hardwired medium to the radio medium.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`internally stored A-key is not accessible external to the chip
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Eavesdropping may be prevented by the use of digital
`and can even be prevented from access under a microscope
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`voice transmission using digital encryption. Digital encryp-
`and microprobe system by covering the chip with a metallic
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tion typically requires the use of a secret quantity or “key”
`screening layer. Such a device is employed in the European
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`knownonlyto the cellular terminal and the basestation with
`GSMcellular system and is known as a “smart card”. In one
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`which it is communicating. One function of the security
`form it is supplied to subscribers by their service providers
`
`
`
`
`
`
`
`
`
`
`
`
`system is thus to establish this common key.
`in a thin, plug-in card like a credit-card.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`It is more secure to establish the key for encryption of
`The A-key of every subscriber for such a security system
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`conversations separately for each call, instead of using the
`is stored in a secure computer somewhere in the cellular
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`same key forever, although the exposure risk in using the
`system. Information on a particular subscriber is stored in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`same key for several calls is small. Such temporary keys can
`the network in his Home Location Register (HLR) which is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`be formed by combining a secret key with a random number
`part of a cellular exchange belongingto the service provider
`
`
`
`
`
`
`
`
`
`
`
`upon call set up.
`with whom hehas a subscription. When a subscriber uses his
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cellular terminal to access a visited network (VLR), the
`The secret key or A-key is preferably stored in both the
`cellular terminal and the base station or network in a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cellular terminal first transmits its telephone numberto the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`non-accessible manner. At call set up,
`the base station
`VLR. The VLR can identify that subscriber’s HLR from the
`transmits a random number RANDto the cellular terminal.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`telephone number and contacts the HLR via a telephone
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The cellular terminal combines RAND and A-keyto obtain
`trunk signalling system knownas signalling system no. 7 in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a temporary key “B-key”andthe base station does the same.
`Europe, or via a system called IS41 in the U.S. The VLR
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The B-key is then used for encrypting further communica-
`then requests security variables from the HLR that can be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`25
`
`
`
`30
`
`35
`
`
`
`
`
`45
`
`
`
`50
`
`
`
`55
`
`
`
`60
`
`
`
`65
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 16 of 29
`
`Page 16 of 29
`
`

`

`5,812,955
`
`
`5
`
`
`
`
`
`
`
`
`used to verify the mobile’s claimed identity and/or to
`
`
`
`
`
`
`encrypt the conversation, that is a RAND/RESPpair and a
`
`
`
`
`
`
`
`
`
`
`B-key. To reduce use of the trunk lines, several RAND/
`
`
`
`
`
`
`
`RESP/B-keytriplets can be sent by the HLR to the VLR in
`
`
`
`
`
`
`
`
`
`the sametransaction, sufficient perhaps for a day’s use at the
`visited location.
`
`
`
`
`
`
`
`
`
`
`
`Another threat to the security of such a system is the
`
`
`
`
`
`
`possibility of unauthorized access to signalling system no. 7
`
`
`
`
`
`
`
`
`IS41 lines, which connect all
`telephone exchanges
`or
`
`
`
`
`
`
`
`together, even those in different countries and continents. An
`
`
`
`
`
`
`unauthorized request to an HLR for security variables per-
`
`
`
`
`
`
`
`taining to particular telephone numbercan then be made. If
`
`
`
`
`
`
`
`the VLR were permitted to specify RAND, a previously
`
`
`
`
`
`
`
`
`
`used RAND could be specified and then the fraudulent VLR
`
`
`
`
`
`
`
`
`
`
`would receive a B-key that had the recorded call to be
`
`
`
`
`
`
`
`deciphered. Therefore, the VLR should not be allowed to
`
`
`
`
`
`
`
`specify the RAND, but rather it should be generated extem-
`
`
`
`
`
`
`
`
`poraneously by the HLR. However,
`the fraudulent VLR
`
`
`
`
`
`
`
`
`would still receive a valid security triplet. This may not be
`
`
`
`
`
`
`
`
`
`
`useful for making fraudulent calls, as the real VLR would
`
`
`
`
`
`
`
`
`
`again contact the HLR and would receive new triplets not
`
`
`
`
`
`
`
`possessed by the fraudulent VLR. Nevertheless, it is pref-
`
`
`
`
`
`
`
`
`erable to prevent a fraudulent VLR from receiving any
`
`
`
`
`
`
`
`security information pertaining to any subscriber. This can
`
`
`
`
`
`
`
`
`
`be prevented if the HLRfirst issues only the RAND to the
`
`
`
`
`
`
`
`
`VLR,
`the VLR transmits it
`to the cellular terminal,
`the
`
`
`
`
`
`
`
`
`cellular terminal replies with RESP and the VLR conveys
`
`
`
`
`
`
`
`
`
`RESPto the HLR. Only if the HLR confirmsthe identity of
`
`
`
`
`
`
`
`
`the cellular terminal would it then release a B-key and
`
`
`
`possibly further triplets.
`
`
`
`
`
`
`
`
`The above described technique maystill allow a false
`
`
`
`
`
`
`
`VLR to extract RAND/RESP pairs from genuine cellular
`
`
`
`
`
`
`
`terminals in the hope of collecting sufficientpairs to provide
`
`
`
`
`
`
`
`
`a high probability of being able to make a fraudulent access
`
`
`
`
`
`
`
`
`to the real system. This is prevented by introducing the
`
`
`
`
`
`
`bilateral authentication procedure described in the afore-
`
`
`
`
`
`
`
`
`mentioned patent application and U.S. patent
`that were
`
`
`
`
`
`
`above incorporated by reference. In a preferred implemen-
`
`
`
`
`
`
`
`
`tation of bilateral authentication, the cellular terminal first
`identifies itself to the VLR. The VLR determinesthe cellular
`
`
`
`
`
`
`
`
`
`terminal’s HLR from the ID and contacts the HLR for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`security variables. The HLR extemporaneously issues a
`
`
`
`
`
`
`
`random challenge RAND and computes the B-key and two
`
`
`
`
`
`
`
`responses, RESP1 and RESP2 by combining RAND with
`
`
`
`
`
`
`
`
`the identified subscriber’s A-key. The HLR releases the
`
`
`
`
`
`
`
`
`
`RANDandthe first response RESP1 only to the VLR. The
`VLR transmits RAND and RESP1 to the cellular terminal.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The cellular terminal combines RAND withits stored A-key
`
`
`
`
`
`
`
`
`and

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket