Method for controlling the logon of cordless mobile parts at cordless base stations of universal mobile telecommunication systems, particularly of dect mobile parts at dect base stations of cap-specific telecommunication systems

ABSTRACT

In order to re-log cordless mobile parts on at cordless base stations of universal mobile telecommunication systems, particularly DECT mobile parts at DECT base stations of CAP-specific telecommunication systems, without great outlay the stored, logon-specific data resulting from a preceding logon is copied. The copied data is subsequently at least partly processed. The copied, at least partly processed data is stored as re-logon-specific data.

In message systems with a message transmission link between a messagesource and a message sink, transmission and reception devices areemployed for message processing and transmission, whereby the messageprocessing and message transmission can ensue in a privilegedtransmission direction (simplex mode) or in both transmission directions(duplex mode). The message processing is analog or digital. The messagetransmission over the long-distance transmission link is wire-bound orensues wirelessly on the basis of various message transmission methodsFDMA (Frequency Division Multiple Access), TDMA (Time Division MultipleAccess) and/or CDMA (Code Division Multiple Access)—for exampleaccording to radio standards such as DECT, GSM, WACS or PACS, IS-54,PHS, PDC, etc. see IEEE Communications Magazine, January 1995, pages 50through 57; D. D. Falconer et al., “Time Division Multiple AccessMethods for Wireless Personal Communication”.

“Message” is a higher-ranking term that stands both for the denotationalcontent (information) as well as for the physical representation(signal). Different signal forms can occur despite the same denotationalcontent of a message—i.e., the same information. Thus, for example, amessage relating to a subject matter can be transmitted in the followingforms.

(1) an image,

(2) spoken word,

(3) written word,

(4) encrypted word or image.

The type of transmission according to 1 . . . 3, is thereby normallycharacterized by continuous (analog) signals, whereas discontinuoussignals (for example, pulses, digital signals) generally arise in thetype of transmission according to form 4.

Proceeding from this general definition of a message system, the presentinvention is directed to a method for controlling the logon of cordlessmobile parts at cordless base stations of universal telecommunicationsystems, particularly DECT mobile parts at DECT base stations ofCAP-specific telecommunication systems.

International application WO 95/05040 shows and describes (FIGS. 3through 8 with the respectively appertaining description) a scenario fora “Universal Mobile Telecommunication System” (UMTS), which isessentially concerned with involving picocell-related cordlesstelecommunication systems for example (I): DECT systems; DigitalEnhanced Cordless Telecommunication, (see (1): NachrichtentechnikElektronik 42 (1992, January/February, No. 1, Berlin, D E, U. Pilger“Struktur des DECT-Standards”, pages 23 through 29 in combination withETSI Publication ETS 300175-1 . . . 9, October 1992; (2): Telcom Report16 (1993), No. 1, J. H. Koch, “Digitaler Komfort für schnurloseTelecommunication—DECT-Standard eröffnet neue Nutzungsgebiete”, pages 26and 27; (3): tec February 1993—Das technische Magazin von Ascom “Wegezur universellen mobilen Telecommunication”, pages 35 through 42; (4):Philips Telecommunication Review, VoL 49, No. 3, September 1991, R. J.Mulder, “DECT, a universal cordless access system”; (5): WO 93/21719(FIGS. 1 through 3 with appertaining description); and (II): DECT/GAPsystems; Generic Access Profiles (see ETSI Publication prETS 3000444,April 1995, Final Draft) in to a higher-ranking network infrastructurefor example ISDN, PSTN, GSM and/or satellite networks; IntegratedServices Digital Network, (see the publication “NachrichtentechnikElektronik, Berlin 41-43, Part: 1 through 10, P1: (1991) No. 3, pages 99through 102; P2: (1991) No. 4, pages 138 through 143; P3: (1991) No. 5,pages 179 through 182 and No. 6, pages 219 through 220; P4: (1991) No.6, pages 220 through 222 and (1992) No. 1, pages 19 through 20; P5:(1992) No. 2, pages 59 through 62 and (1992) No. 3, pages 99 through102; P6: (1992) No. 4, pages 150 through 153; P7: (1992) No. 6, pages238 through 241; P8: (1993) No. 1, pages 29 through 33; P9: (1993) No.2, pages 65 through 97 and (1993) No. 3, pages 129 through 135; P10:(1993) No. 4, pages 187 through 190;”) Public Switched TelecommunicationNetwork, Global System for Mobile Communication (see Informatik Spektrum14 (1991) June, No. 3, Berlin, D E, A. Mann, “Der GSM-Standard—Grundlagefür digitale europ{umlaut over (d)}ische Mobilfunknetze”, pages 137through 152 for accesses (see ETSI Publication “CTM Access Profile(CAP)” prETS 300XXX, September 1996) under CTM points of view (CordlessTerminal Mobility; see ETSI Publications (1): “IN Architecture andFunctionality for the support of CTM”, Draft Version 1.10, September1995; (2): “Cordless Terminal Mobility (CTM) —Phase 1, ServiceDescription”, Draft DE/NA-010039, Version 6, Oct. 2, 1995).

This can be achieved by a DECT base station fashioned as DECT repeater.In a universal mobile telecommunication system, DECT is mainlyunderstood as a “network access technology” for mobile communicationservices (see publication (presentation) of A. Elberse, M. Barry, G.Fleming on the topic, “DECT Data Services—DECT in Fixed and MobileNetworks”, Jun. 17/18, 1996, Hotel Sofitel, Paris, pages 1 through 12and Summary) and not as a network.

International application WO 94/10785 discloses a method for theinterconnection of transmission and reception devices of a cordlesscommunication system to form a communication-capable unit, wherebycordless mobile parts are logged on at cordless base stations by logonprocedures sequencing via air interfaces according to an airinterface-specific protocol, and whereby logon-specific data are storedin the cordless mobile parts during this logon (FIGS. 4 through 12 withthe respectively appertaining figure description).

In the framework of the CTM access profile (CAP) standardized by ETSI,it is intended that the fixed part (Fixed Part; for example the DECTbase station) can, as needed, modify access authorization-specificparameters for example, the IPUI identification (International PortableUser Identification; see ETSI Publication ETS 300175-6, October 1992,Ch. 6.2), the PARK identifier (Portable Access Rights Key; see ETSIPublication ETS 300175-6, October 1992, Ch. 6.1) and the PLI identifier(Park Length Indicator; see ETSI Publication ETS 300175-6, October 1992,Ch. 6.1) that are stored in a non-volatile memory (for example, EEPROM)in the mobile part (Portable Part PP; for example, the DECT mobile part)already logged on at the fixed part (see WO 94/10785). To that end, thefixed part initiates a re-logon procedure (re-subscription procedure)according to FIG. 1. According to the DECT standard (see ETSIPublication 300175-5, October 1992), the sub-procedures shown in FIG. 1,“authentification of the fixed part” (see ETSI Publication ETS 300175-5,October 1992, Ch. 13.3.3), “key allocation” (see ETSI Publication ETS300175-5, October 1992, Ch. 13.6) and “authentification of the mobilepart” (see ETSI Publication ETS 300175-5, October 1992, Ch. 13.3.1), arethereby implemented with the MM messages recited in ETS 300175-5,October 1992, Ch. 6.3.6 With the sub-procedure “authentification of thefixed part”, the fixed part FP must legitimize or, respectively,identify itself as fixed part that is authorized to initiate are-subscription procedure. What this is particularly intended to preventis that unauthorized persons (“hackers”) can initiate a re-subscriptionprocedure from an arbitrary fixed part. The access rights according toETS 300175-5, October 1992, Ch. 13.5.1 are assigned with thesub-procedures of “key allocation” and “authentification of the mobilepart”.

Up to now, it was standard that the data (for example, theafore-mentioned identifications) stored in the preceding logon were alldeleted—both in the fixed part FP as well as in the mobile part PP. Theresult thereof was that the logon procedure, i.e. all sub-proceduresshown in FIG. 1, had to be completely repeated.

European reference EP-0 336 079 A2 and Great Britain reference GB-2 289828 A respectively disclose a method for controlling the logon ofcordless mobile parts at cordless base stations of universaltelecommunication systems wherein a personal identifier (password, ID)stored in the cordless mobile part can be modified, in particular, ondemand by the cordless base station.

German reference DE-195 42 732 A1 discloses a method for recognizingmisuse of an access authorization, particularly in mobile radiotelephonesystems, whereby variable data transmitted for identification that aretransmitted before every interaction are at least partially overwrittenby new data in every interactive, new data is generated by an evaluationmeans and being transmitted to a storage medium and is required as newkey word for the identification by the evaluation/decision means in thenext interaction.

SUMMARY OF THE INVENTION

The object underlying the invention is comprised in re-subscribingcordless mobile parts at cordless base stations of universal mobiletelecommunication systems, particularly DECT mobile parts at DECT basestations of CAP-specific telecommunication systems, without greatoutlay.

In general terms the present invention is a method for controlling thelogon of cordless mobile parts at cordless base stations of universalmobile telecommunication systems, particularly of DECT mobile parts atDECT base stations of CAP-specific telecommunication systems. Thecordless mobile parts are logged on at the cordless base stations bylogon procedures sequencing over air interfaces according to an airinterface-specific protocol. Logon-specific data is stored given logonof the cordless mobile parts. The stored, logon-specific data is copied,given re-logon of the cordless mobile parts, such that thelogon-specific data is redundantly present. The copied data is at leastpartly processed during a re-logon procedure for modifyingaccess-specific parameters of the cordless mobile part that belong tothe data. The copied, at least partly processed, re-logon-specific datais stored as new logon-specific data.

In an advantageous development of the present invention the re-logon isinitiated by the cordless base stations.

The idea underlying the invention is comprised in re-subscribingcordless mobile parts at cordless base stations of universal mobiletelecommunication systems, particularly DECT mobile parts at DECT basestations of CAP-specific telecommunication systems, without great outlayin that the stored, logon-specific data resulting from a preceding logonare copied, the copied data are subsequently at least partly processed,and the copied, at least partly processed data are stored asre-subscription-specific data.

BRIEF DESCRIPTION OF THE DRAWINGS

The features of the present invention which are believed to be novel,are set forth with particularity in the appended claims. The invention,together with further objects and advantages, may best be understood byreference to the following description taken in conjunction with theaccompanying drawings, in the several Figures of which like referencenumerals identify like elements, and in which:

FIG. 1 depicts a logon procedure; and

FIG. 2 depicts an exemplary embodiment of the present invention.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Proceeding from FIG. 1, FIG. 2 shows how, following the sub-procedure“authentification of the fixed part and preceding the sub-procedure “keyallocation”, the mobile part PP copies the data from the preceding logonprocedure stored in the non-volatile memory (for example, the EEPROM)into a volatile logon memory for modifications by the fixed part FP.

In addition to the access authorization-specific parameters (PARK, IPUI,PLI, etc.) already mentioned with the description of FIG. 1, these dataalso include an AC word (authentification code; see ETSI Publication ETS300175-7, October 1992, Ch. 4.4.3.1., Point 3)) fashioned as PIN word tobe input by the user of the mobile part PP upon initial logon or,respectively, a UAK word (User Authentification Key; see ETSIPublication ETS 300175-7, October 1992, Ch. 4.4.3.1., Point 1) and FIG.1 in Ch. 4.5., 4.6. and 5.) calculated from the AC word. The startingsituation given an initial logon of the mobile part PP at the fixed partFP is that the AC word is stored in the fixed part FP as system-specificPIN word (relating to the mobile and fixed part) and is input and storedin the mobile part PP.

When the UAK word according to ETSI Publication ETS 300175-7, October1992, FIG. 1 in Ch. 4.5., 4.6. and 5 has been calculated in the fixedpart FP as well as in the mobile part PP in the preceding logon (forexample, the initial logon), for example after the input and storing ofthe AC word due to the message “KEY_ALLOCATE” [see ETSI Publication ETS300175-5, October 1992, Ch. 13.6] transmitted from the fixed part FP tothe mobile part PP, the stored AC word is replaced by the UAK word inthe fixed part FP and mobile part PP. When, by contrast, the UAK word isnot calculated—which is also alternatively possible—, then the AC wordremains stored unmodified in the fixed part FP and mobile part PP. When,following the initial logon (preceding logon), the fixed part FP startsa re-logon procedure (re-subscription procedure) according to FIG. 2 andwhen, differing from the comments about FIG. 1, the stored are neitherdeleted in the fixed part FP and mobile part PP nor, differing from FIG.2, are copied in the mobile part PP, then a partial modification by thefixed part FP of a datum non-volatilely stored in the mobile part PPretained in the volatile memory that is pursued, in particular, with there-subscription procedure leads, taking this modification in thenon-volatile memory of the mobile part PP into consideration, to theloss of all data previously stored in the non-volatile memory. In orderto prevent this, the dataset resulting from the preceding logon andstored in the non-volatile memory of the mobile part PP—as alreadymentioned above—is copied into the volatile memory for modificationsintended by the fixed part with the re-subscription procedure.

In that the data are redundantly present in the meantime, the fixed partFP can now designationally modify the initially indicated data(identifications) without having to repeat all sub-procedures—as giventhe procedure according to FIG. 1. When the data have beencorrespondingly modified by the fixed part FP after the re-logonprocedure, then the content of the logon memory (preferably a data mixfrom two successive logon procedures) is transferred into thenon-volatile memory (for example, the EEPROM).

The invention is not limited to the particular details of the methoddepicted and other modifications and applications are contemplated.Certain other changes may be made in the above described method withoutdeparting from the true spirit and scope of the invention hereininvolved. It is intended, therefore, that the subject matter in theabove depiction shall be interpreted as illustrative and not in alimiting sense.

What is claimed is:
 1. A method for controlling logon of cordless mobileparts at cordless base stations of universal mobile telecommunicationsystems, comprising the steps of: logging on a cordless mobile part at acordless base station by logon procedures sequencing over air interfacesaccording to an air interface-specific protocol; storing logon-specificdata in a non-volatile memory of the cordless mobile part, given logonof the cordless mobile part; copying the stored, logon-specific datainto a volatile memory of the cordless mobile part, given re-logon ofthe cordless mobile part, such that the logon-specific data isredundantly present in the cordless mobile part; at least partlyprocessing the copied data during a re-logon procedure for modifyingaccess-specific parameters of the cordless mobile part that areassociated with the data; and storing the copied, at least partlyprocessed, re-logon-specific data as new logon-specific data in thenon-volatile memory.
 2. The method according to claim 1, wherein there-logon is initiated by the cordless base stations.
 3. The methodaccording to claim 1, wherein the mobile parts and base stations areDECT mobile parts and DECT base stations, respectively, of CAP-specifictelecommunications systems.
 4. The method according to claim 1, whereinsaid logon-specific data comprises an authetification code or a userauthentification key.