Security in a mobile communications system

Telecommunications – Radiotelephone system – Programming control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C455S410000

Reexamination Certificate

active

07933591

ABSTRACT:
When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network (30) determines whether the mobile terminal has an executable program (14) configured to interact with the basic identity module for emulating an identity module according to the second security standard. If it is concluded that the mobile terminal has such an executable program, a security algorithm is executed at the home network (30) to provide security data according to the second security standard. At least part of these security data are then transferred, transparently to a visited network (20), to the mobile terminal (10). On the mobile terminal side, the executable program (14) is executed for emulating an identity module according to the second security standard using at least part of the transferred security data as input. Preferably, the first security standard corresponds to a 2G standard, basically the GSM standard and the second security standard at least in part corresponds to a 3G standard such as the UMTS standard, and/or the IP Multimedia Sub-system (IMS) standard.

REFERENCES:
patent: 6788676 (2004-09-01), Partanen et al.
patent: 7443839 (2008-10-01), Bouthemy et al.
patent: 2005/0120198 (2005-06-01), Bajko et al.
patent: 2007/0021138 (2007-01-01), Allen et al.
patent: 2007/0054686 (2007-03-01), Allen et al.
patent: 2008/0064369 (2008-03-01), Xie et al.
patent: 2010/0177769 (2010-07-01), Barriga et al.
patent: WO 2004/032557 (2004-04-01), None
“Universal Mobile Telecommunications System (UMTS): SIM/USIM internal and external interworking aspects (3GPP TR 31.900 version 5.4.0 Release 5); ETSI TR 131 900” ETSI Standards, European Telecommunications Standards Institute, Sophia-Antipo, FR, vol. 3-T3, No. V540, Dec. 2003, XP014015780 ISSN: 0000-0001.
International Search Report from European Patent Office, issued Aug. 29, 2005 for PCT/SE2005/00716.
Barkan, Biriam, and Keller, “Instant ciphertext-only cryptanalysis of GSM encrypted communication”, in proceedings of Crypto 2003, Lecture notes in computer science. Springer-Verlag.
“Enhancements to GSM/UMTS AKA”, 3GPP contribution S3-030542, 3GPP TSG SA WG3 Security, Oct. 2003.
“Special Rand” 3GPP contribution S3-030588, 3GPP TSG SA WG3 Security. Oct. 2003.
3GPP TR 31.900 V3 2.0 (Mar. 2002) Technical Report, Technical Specification Group Terminals, “SIM/USIM Internal and External Interworking Aspects” (Release 1999).
3GPP TS 35.206 V4.0.0 (Apr. 2001) Technical Specification Group Services and System Aspects.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security in a mobile communications system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security in a mobile communications system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security in a mobile communications system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2646318

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.