Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and radio communication network for protecting user's identifying module installed on mobile station

A technology of user identification module and mobile user, which is applied in wireless communication, radio/inductive link selection arrangement, security device, etc., can solve the problem of not being authorized, and achieve the effect of protection against abuse

Inactive Publication Date: 2003-08-06
SIEMENS AG
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the case of a "problem" with the Subscriber Identity Module, a third party may have an unauthorized "cloning" (cloning the SIM card), which would result in an unauthorized language and data connection using a counterfeit card that could exploit the card owner cost of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and radio communication network for protecting user's identifying module installed on mobile station
  • Method and radio communication network for protecting user's identifying module installed on mobile station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] A mobile user utilizes a mobile station MS known to communicate with other users on the radio communication network or with network devices. Via the radio interface of an advantageously cellular-structured radio communication network, information is exchanged in both transmission directions (downlink, uplink) via the radio link between the mobile station MS and the network device. The radio communication network can be, for example, the current GSM network, but also the future UMTS network (Universal Mobile Telecommunications System) or another network. To send and receive radio signals, which may include speech and data, the mobile station MS has send-receive means. Usually at least one control device and one memory device are connected to the transmitter-receiver device. Each mobile station MS has an input-output-interface at the input end, this input-output-interface in the example of the present invention especially receives the user's input of the user, this user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The protection method responds to use of a mobile subscriber device in a new radio cell location (NEWC) for paging the subscriber within the previous radio location (OLDC) for indicating fraudulent use of the same subscriber identity module when the subscriber responds to the paging signal. The location of the mobile subscriber and the subscriber identification may be provided in response to the received paging signal, evaluated for indicating fraud, or for updating the actual subscriber location.

Description

technical field [0001] The invention relates to a method of protecting a subscriber identity module installed on a mobile station, by means of which a mobile subscriber is identifiable to a radio communication network, and to a corresponding radio communication network. Background technique [0002] Many types of protection functions are known in radio communication networks, eg according to the GSM standard. EP-0822727A2 describes a method and a system in which a mobile subscriber is identifiable to a network by means of a subscriber identity module, which can also be called a SIM card (Subscriber Identity Module) or a chip card. Typically the Subscriber Identity Module is located on the mobile station used by the subscriber. [0003] It is also known that when a mobile subscriber changes a mobile station from one active service area to another active service area, an update maintained by the subscriber (location update) and a deletion on the network side, e.g. in the visi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/32H04W88/02
CPCH04W88/02H04W12/12H04W12/126
Inventor H·维尔斯特雷特
Owner SIEMENS AG