Method and radio communication network for protecting user's identifying module installed on mobile station
A technology of user identification module and mobile user, which is applied in wireless communication, radio/inductive link selection arrangement, security device, etc., can solve the problem of not being authorized, and achieve the effect of protection against abuse
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] A mobile user utilizes a mobile station MS known to communicate with other users on the radio communication network or with network devices. Via the radio interface of an advantageously cellular-structured radio communication network, information is exchanged in both transmission directions (downlink, uplink) via the radio link between the mobile station MS and the network device. The radio communication network can be, for example, the current GSM network, but also the future UMTS network (Universal Mobile Telecommunications System) or another network. To send and receive radio signals, which may include speech and data, the mobile station MS has send-receive means. Usually at least one control device and one memory device are connected to the transmitter-receiver device. Each mobile station MS has an input-output-interface at the input end, this input-output-interface in the example of the present invention especially receives the user's input of the user, this user ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 