Process of access restriction to a telecommunications...

Communications: electrical – Selective – Intelligence comparison for controlling

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C340S005200, C380S227000, C380S229000, C713S152000, C709S229000

Reexamination Certificate

active

06310538

ABSTRACT:

BACKGROUND OF THE INVENTION
The invention relates to a process of restricting access to a telecommunications network of a first unit of a telecommunications system, said access being managed by a second unit of said telecommunications system, and said telecommunications system including an authentication procedure of said first unit by said second unit.
The invention likewise relates to a telecommunications system comprising at least a first and a second unit, said second unit notably including means for managing the access of said first unit to a telecommunications network, and authentication means of said first unit.
The invention finally relates to a central unit of a telecommunications system comprising at least one other unit said central unit having managing means for managing the access of said other unit to a telecommunications network, and authentication means for authenticating said other unit.
The invention has highly significant applications in the field of telecommunications, notably within the scope of the DECT standard for professional or private PABX applications.
The abstract of Japanese Patent Application JP-A-05 014 489 describes a circuit which permits of restricting the access for incoming or outgoing calls as a function of the respective time range.
OBJECTS AND SUMMARY OF THE INVENTION
It is an object of the present invention to propose a simple procedure permitting the restriction of the access as a function of a large variety of criterions without the necessity of the use of specific means. By way of example, the invention permits of restricting the access to a telecommunications network as a function of time, destination of the call; its duration . . . .
Therefore, a process according to the invention of restricting access to a telecommunications network and as defined in the opening paragraph is characterized in that it comprises the implementation of said authentication procedure.
The invention is thus particularly advantageous in notably all the mobile telecommunications systems in which user authentication procedures are defined.
For restricting said access as a function of at least one predefined criterion, in a particularly advantageous embodiment the process according to the invention notably-comprises assigning a code called access code to each of these criterions and it uses said access code as a key which, applied to said authentication procedure, permits of determining the rights of said first unit in relation to said criterion.
By way of example, a process according to the invention notably comprises:
transmitting an authentication request from said second unit to said first unit,
calculating a first and a second authentication result at the level of said respective first and second units, by utilizing said access code as a key, said access code previously being entered by a user at the level of said first unit,
transmitting said first result from said first unit to said second unit,
comparing said first and second results at the level of said second unit to determine whether said first unit has right of access in relation to said criterion.
The process according to the invention is applied notably in an advantageous manner to the DECT standard defined by ETSI (European Telecommunications Standard Institute). In this case, it advantageously implements the procedure called “user authentication” defined in the part GAP (Generic Access Profile; ETSI 300444) of this standard.
A standardized use of such a process within the scope of a mobile telephony standard offers the additional advantage of permitting an interoperability between mobile units and base units from different manufacturers.
These and other aspects of the invention will be apparent from and elucidated with reference to the embodiments described hereinafter.


REFERENCES:
patent: 5661807 (1997-08-01), Guski et al.
patent: 5668876 (1997-09-01), Falk et al.
patent: 5761309 (1998-06-01), Ohashi et al.
patent: 5764890 (1998-06-01), Glasser et al.
patent: 514489A (1993-01-01), None
patent: WO9600485 (1996-01-01), None
“The complete solution for cordless access”, published in Philips Telecommunication Review, vol. 52, No. 3, Jan. 1995.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Process of access restriction to a telecommunications... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Process of access restriction to a telecommunications..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Process of access restriction to a telecommunications... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2606344

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.