WO1998015154A2 - Verfahren zur zugriffssteuerung eines mobilen kommunikationsendgerätes - Google Patents
Verfahren zur zugriffssteuerung eines mobilen kommunikationsendgerätes Download PDFInfo
- Publication number
- WO1998015154A2 WO1998015154A2 PCT/DE1997/002089 DE9702089W WO9815154A2 WO 1998015154 A2 WO1998015154 A2 WO 1998015154A2 DE 9702089 W DE9702089 W DE 9702089W WO 9815154 A2 WO9815154 A2 WO 9815154A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identity
- access
- terminal
- mobile
- communication terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
Definitions
- the invention relates to a method for access control of a mobile communication terminal, which is registered for a subscriber using at least two identities stored in the terminal as the terminal of at least two mobile networks, the identity of the terminal being stored in a database in each mobile network the terminal is registered in this mobile network and, when the terminal attempts to access one of the mobile networks, a check is carried out to determine whether the corresponding identity is stored in the database of this mobile network as authorized to access.
- Such communication terminals include at http://www.ericsson.se/eripress/americas telecom / 6.htm in the article "Ericsson unveils new mobile phones that can switch between different standards and technologies".
- a terminal is described here that can be operated on a mobile network according to the GSM900 standard and on a mobile network according to the DCS1800 standard.
- a terminal is described which can be operated on corresponding mobile networks according to the GSM standard and according to the DECT standard.
- a device is mentioned which can be operated via AMPS satellite radio and PSM cellular radio.
- the user of such communication terminals is here with two communication networks, each with its own identity as well as a registered and accessible network address.
- the one mobile network is a mobile radio network according to the GSM standard
- the relevant identity which in this case is a so-called IMSI identifier
- SIM card which must be inserted into the terminal device as a contact-type chip card this is ready for use.
- SIM card can be easily removed from one terminal and inserted into another terminal. The participant's identity thus migrates from one terminal to the other terminal.
- the identity with which the terminal m is registered in a DECT network is the so-called IPUI-O identifier, which is in a permanently installed chip in the Device is stored.
- a communication terminal is registered on two or more mobile networks, each with its own identifier, it makes sense that the data base of each network that the respective mobility controller accesses to determine the location of the current accessibility of the terminal, as well as information about the current one Accessibility of the terminal in the other mobile network included.
- the simplest form of such information can be that the terminal could in principle be accessible via the other mobile network.
- the information can also be so precise that the mobility control of a mobile network can definitely determine at which location and at which address the terminal can currently be reached.
- current device-specific performance feature settings can also be communicated and stored in the database.
- the control unit for controlling the database of a mobile network transmits a corresponding message to a database controller of the other mobile network whenever the content of the database changes. If, in the example mentioned above, in which one mobile network is designed as a cordless communication network in accordance with the DECT standard and the other mobile network is in the form of a mobile radio network in accordance with the GSM standard, a call addressed to the terminal cannot be delivered in the cordless communication network and the mobility control of the cordless communication network network determines on the basis of its database entry that the terminal can be reached in the GSM network, the call coming into the cordless communication network could be forwarded to the GSM network in order to be delivered to the terminal in GSM mode.
- the object of the present invention is to provide a method for access control of a mobile communication terminal, which is registered with two or more identities in two or more mobile networks as authorized to access.
- the method is intended to prevent the problems described above from occurring.
- the invention achieves this object by a method having the features of claim 1.
- the attempt to access a mobile communication terminal that is registered for a subscriber using a first identity stored in a first storage device as the terminal device of a first mobile network of a first technology and using a second identity stored in a second storage device as the terminal device of a second mobile network of a second Technology is registered, the second mobile network provides in a method according to the invention that it is checked whether the second identity stored in the mobile communication terminal is stored in the database of the second mobile network as authorized to access and also whether the first identity is stored in the terminal is. If the second identity of the terminal device is not stored as authorized to access in the second mobile network, access to the second mobile network is denied in a known manner. If the first identity is not recognized as being present in the mobile communication terminal, access to the second mobile network is denied according to the invention at least for incoming calls.
- access to the second mobile network is denied for both incoming and outgoing calls in the absence of a first identity in the terminal.
- the aforementioned method ensures that no calls are delivered to the communication terminal that are intended for a subscriber using the subscriber's identification in another terminal.
- the variant of the procedure which denies access for incoming and outgoing calls, also ensures that an unauthorized person has no access to the features, for example, cannot switch call forwarding on and cannot access the recordings of a voicebox server.
- a cellular network according to the GSM standard can be provided, for example, as the mobile network for which the method according to the invention is effective, the assigned identity being an ISMI identifier.
- a microcellular network according to the cordless standard DECT can be provided as the mobile network, the assigned identity being an IPUI-O identifier which is stored in a memory permanently installed in the terminal.
- a satellite radio network according to the AMPS standard can also be provided as the mobile network.
- a cellular network according to the DCS1800 standard can be provided as the mobile radio network, in which the associated identity is an IMSI identifier.
- IMSI identifiers are preferably stored in a SIM card that can be removed from the terminal.
- the figure shows a schematic block diagram of a terminal PP, a public land-based cellular network PLMN according to the GSM standard and a cordless communication system PISN and below this block diagram, the blocks locally assigned a sequence program of an exemplary embodiment of a method according to the invention.
- the terminal PP sends a registration request message "Location Request" to the cordless communication. Then it is optionally checked whether the terminal device on this cordless communication system PISN for a registration process is justified. If so, the wireless communication system PISN sends a "Location Accept” message to the end device PP. A key can then optionally be specified and encryption started. The cordless communication system PISN sends an identity request message
- the end device then sends the ISMI identifier to the cordless communication system with a message "Identity Request Accept".
- the procedures for "Identity Request” and for transferring the ISMI ID with "Identity Request Accept” are defined in the DECT / GSM interworking profile in accordance with ETS300-370.
- the process described so far which informs the cordless communication system PISN of which identity ISMI is contained in the terminal, runs completely between the terminal PP and the cordless communication system PISN.
- the cordless communication system PISN asks the mobile network PLMN for the PLMN number MSISDN, which belongs to the identity IMSI communicated by the terminal PP.
- a message MSISDN Request (IMSI) is sent from the cordless communication system PISN to the cellular network PLMN.
- the cellular network PLMN answers this request with a message MSISDN Request ack (MSISDN), which communicates the PLMN number.
- MSISDN message MSISDN Request ack
- the cordless communication system checks whether the identifier IPUI-0 of the cordless network PISN assigned to the terminal PP and the received PLMN number MSISDN are associated with one another.
- the dependent access release or access refusal is not shown in the figure.
- the cordless communication system PISN was able to compare an IMSI number stored in a database and assigned to the terminal PP with the IMSI number transmitted by the terminal. A query to the PLMN mobile network would then not be necessary. If in the latter case the Comparison of the IMSI identifier communicated by the terminal with the IMSI identifier stored in the database and assigned to the terminal does not match, a further development of a method according to the invention can provide a request for the mobile radio network PLMN as to whether the subscriber of the terminal PP has the ISMI identifier currently transmitted by the terminal PP has been assigned.
- the mobile radio network PLMN can transmit a corresponding message to the cordless communication system PISN, whereupon the database entry in the cordless communication system PISN is updated and the Access of the communication terminal to the cordless communication system PISN is permitted.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP97909137A EP0929986A2 (de) | 1996-09-30 | 1997-09-17 | Verfahren zur zugriffssteuerung eines mobilen kommunikationsendgerätes |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19640232.8 | 1996-09-30 | ||
| DE19640232 | 1996-09-30 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO1998015154A2 true WO1998015154A2 (de) | 1998-04-09 |
| WO1998015154A3 WO1998015154A3 (de) | 1998-07-30 |
Family
ID=7807392
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/DE1997/002089 Ceased WO1998015154A2 (de) | 1996-09-30 | 1997-09-17 | Verfahren zur zugriffssteuerung eines mobilen kommunikationsendgerätes |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP0929986A2 (de) |
| CN (1) | CN1228235A (de) |
| WO (1) | WO1998015154A2 (de) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100361463C (zh) * | 2001-06-19 | 2008-01-09 | 神基科技股份有限公司 | 利用呼叫识别码来达到网络远端输入安全控管的方法及其装置 |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6985746B2 (en) * | 2001-04-30 | 2006-01-10 | Ipr Licensing, Inc. | Wireless communication system having mobility-based content delivery |
| CN100488314C (zh) * | 2007-01-24 | 2009-05-13 | 中兴通讯股份有限公司 | 一种3g网络中对用户端的接入进行限制的方法 |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2285555B (en) * | 1993-12-22 | 1998-07-29 | Nokia Mobile Phones Ltd | Multi-mode radio telephone |
| GB2293294B (en) * | 1994-09-02 | 1999-01-13 | Nokia Mobile Phones Ltd | Multi-mode radio telephone |
| SE508940C2 (sv) * | 1995-02-06 | 1998-11-16 | Telia Ab | Metod och anording för handover vid mobilt telekommunikationsnät |
-
1997
- 1997-09-17 WO PCT/DE1997/002089 patent/WO1998015154A2/de not_active Ceased
- 1997-09-17 CN CN97197286A patent/CN1228235A/zh active Pending
- 1997-09-17 EP EP97909137A patent/EP0929986A2/de not_active Withdrawn
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100361463C (zh) * | 2001-06-19 | 2008-01-09 | 神基科技股份有限公司 | 利用呼叫识别码来达到网络远端输入安全控管的方法及其装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP0929986A2 (de) | 1999-07-21 |
| WO1998015154A3 (de) | 1998-07-30 |
| CN1228235A (zh) | 1999-09-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE69310633T2 (de) | Telekommunikationssystem und teilnehmer-authentifizierungsverfahren | |
| DE69734322T2 (de) | Gebrauch von zwei sim-karten mit gleicher msisdn-nummer | |
| EP0700628B1 (de) | Verfahren zum betrieb eines mobilfunknetzes | |
| DE69637053T2 (de) | Personalisierung von Teilnehmeridentifikationsmodulen für Mobiltelefone über Funk | |
| EP2453633B1 (de) | Teilnehmeridentifikationseinrichtung, mobilfunksystem und verfahren zur teilnehmerauthentisierung | |
| DE69620599T2 (de) | Verfahren und system für verbesserte verbindungsherstellung in fernmeldemobilitätsanwendungen | |
| DE60015361T2 (de) | Mobiles Kommunikationsnetz | |
| DE4417779C1 (de) | Mobilfunksystem | |
| DE60118122T2 (de) | Standortsregistrationsverfahren mit Unterstützung für mehrere SIM Karten mit unterschiedlichen Funktionen | |
| EP0641137A2 (de) | Verfahren und Anordnung zum Beschränken des Zugriffs zu einem Mobilfunksystem | |
| WO1999063768A2 (de) | Übergabeverfahren (roaming) für mobile endeinrichtungen | |
| EP0929981B1 (de) | Verfahren zum anzeigen, dass in einem nachrichtenzentralmodul eines mobilfunknetzes eine textnachricht vorliegt | |
| DE69616349T2 (de) | Verfahren und vorrichtung zum zugreifen auf mehere netzwerke | |
| EP0934672B1 (de) | Verfahren zum ortsabhängigen anmelden eines mobilen endgerätes | |
| EP0932997B1 (de) | Verfahren zum zugreifen von mobilen kommunikationsendgeräten auf öffentliche, private bzw. heim-kommunikationsbereiche | |
| EP0929982B1 (de) | Verfahren zum verbinden eines in einer schnurloskommunikationseinrichtung ankommenden rufs an ein dualmodusendgerät | |
| WO1998015154A2 (de) | Verfahren zur zugriffssteuerung eines mobilen kommunikationsendgerätes | |
| EP1312233B1 (de) | Verfahren zum eingeben einer rufnummer in einen rufnummernspeicher eines telekommunikations-endgerätes | |
| WO1998015131A2 (de) | Verfahren zum wiederherstellen von teilnehmerbezogenen informationen in einem datenbanksystem eines kommunikationsnetzes | |
| EP1958472B1 (de) | Verfahren zum zugriff auf ein mobiles endgerät und mobiles endgerät zum einsatz in einem mehrzellen-funknetzwerk | |
| DE60319490T2 (de) | System und Verfahren zur Identifizierung von einem Benutzer in einem TETRA Netz | |
| EP1701573B1 (de) | System und Verfahren für die Lokalisierung des Aufenthaltsortes eines mobilen Endgerätes | |
| DE19539372A1 (de) | Verfahren und Anordnung zum Überprüfen von Teilnehmern | |
| DE69718454T2 (de) | Telekommunikationssystem | |
| DE19636256C1 (de) | Verfahren zum Subscripieren von Zugriffen von mobilen Kommunikationsendgeräten zu öffentlichen, privaten bzw. Heim-Bereichen |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 97197286.9 Country of ref document: CN |
|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): CN SG |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 1997909137 Country of ref document: EP |
|
| WWP | Wipo information: published in national office |
Ref document number: 1997909137 Country of ref document: EP |
|
| WWW | Wipo information: withdrawn in national office |
Ref document number: 1997909137 Country of ref document: EP |