The way to test the suitability of the communication line

 

(57) Abstract:

The proposed method is used to check the suitability of the communication line in the communication system. In particular, this method confirms the right to use lines of communication between the wireless base station equipment and the submission of permits and routing calls through authentication wireless base station for communication with equipment authorization and authentication equipment for granting permission to communicate with the wireless base station, which is the technical result. In a preferred embodiment, the step of authenticating the wireless base station based on the first random number generated in the equipment grant permissions, and step authentication apparatus of the grant of permission is based on the second random number generated in the wireless base station. The line of communication between the wireless base station and equipment grant permissions granted in the case, if authenticated, and a wireless base station and equipment grant permissions. 3 c. and 5 C.p. f-crystals, 21 ill.

This invention in General locayta and equipment grant permissions in particular.

Wireless telephone system usually consists of a portable wireless handset and wireless base station associated with the telephone company the telephone cable lines. Wireless base station has an assigned room cable telephone system, which allows the user to place and receive calls using a portable wireless micro-telephone headset, in a limited range wireless base station, for example within the home. However, due to the limited range of the wireless portable handset provides the user with respect to the local radio link.

Voice communications are outside the range of the wireless telephone system may also be provided to the user through the cellular telephone system. Cellular telephone system typically includes a mobile subscriber unit (mobile or portable) and a cellular base station associated with a cable telephony system via one or more cellular communication schemes. Each mobile subscriber unit is assigned cellular telephone number, allowing the user to place and use the mobile phone service is much higher than the cost of wireless phone service.

The figure shows a wireless communication system that includes a portable cellular wireless phone (RCA), RCA made with the ability to communicate with a conventional cellular radiotelephone system that contains many cellular base stations, microcellular base station or the wireless base station, which provides for user RCC communications private telephone line with the telephone network. Wireless communication system uses equipment authorization and call routing to transmit information about the routing of the call to the telephone switching system. Thus, the switching system automatically routes calls between cellular, micro-cellular and wireless systems. Equipment authorization and call routing also provides permission wireless base station 115 on the channels. However, there are problems as operator of the telephone network, and a user for RCC. In particular, the operator of the telephone network must be sure that the user RCC does not unauthorized access to the service system, access to which is not allowed. Similarly, the user RCC visitors (i.e. system, created by the operator, illegally using spectrum).

Thus, there is a need in the way of testing the suitability of the communication link between the wireless base station and the equipment authorization and call routing to ensure that this RCC is allowed to work in the communication system, and equipment authorization and call routing is allowed to allocate spectrum of this system of communication.

Fig. 1 depicts a block diagram of a working configuration for a portable radio telephone, in which access to multiple systems, including cellular and wireless system may be implemented in the same portable radiotelephone;

Fig. 2 is a block diagram of the equipment authorization and call routing (ACRE);

Fig. 3 is a schematic map depicting the typical location of the areas of wireless, cellular and microcellular systems;

Fig. 4 is a block diagram of a wireless base station, which can be realized this invention;

Fig. 5 is a block diagram of the portable phone, which can be implemented in the invention;

Fig. 6 is a timing diagram of the scanning system, which m is sledovatelnot registration messages;

Fig. 8 - sequence of operations that can be used by the wireless base station shown in Fig. 4, to determine which channel to use for communication with the apparatus depicted in Fig. 5;

Fig. 9 is a sequence of operations that can perform wireless base station shown in Fig. 4, in combination with the sequence of operations shown in Fig. 10, to determine which of the channels has met the minimum criteria of the channel;

Fig. 10 is a sequence of operations that can perform wireless base station shown in Fig. 4, in combination with the sequence of operations shown in Fig. 9, to determine which of the channels has met the minimum criteria of the channel;

Fig. 11 is a sequence of operations that can perform wireless base station shown in Fig. 4, to determine which channel has the best quality;

Fig. 12 is a simplified graph of cellular spectrum;

Fig. 13 is a sequence of operations that can perform wireless base station shown in Fig. 4, after initialization;

Fig. 14 is a sequence of operations that can perform wireless base station is one base station and ACRE;

Fig. 16 - the sequence of operations of the authentication process, the wireless base station;

Fig. 17 sequence of operations of the production process of the authentication of the wireless base station shown in steps 626 and 631 in Fig. 16;

Fig. 18 - the sequence of operations of the authentication process ACRE;

Fig. 19 - the sequence of operations of the production process of the authentication ACRE, shown by steps 666 and 667 of Fig. 18;

Fig. 20 - the sequence of operations of the process of updating the key pair cable system (WIKEY);

Fig. 21 Protocol for transmitting signals between a wireless base station and ACRE.

The proposed method is used to confirm the rights to use lines of communication in the communication system. In particular, this method confirms the right to use lines of communication between the wireless base station and the equipment authorization and call routing through authentication wireless base station for communication with equipment authorization and authentication equipment grant permissions to communicate with the wireless base station. In a preferred embodiment, the phase out grant permissions, and step authentication equipment grant permissions based on the second random number generated in the wireless base station. The line of communication between the wireless base station equipment and the provision of permits allocated in if authenticated and the wireless base station and equipment grant permissions.

A generalized block diagram of application of the present invention is shown in Fig 1. Portable cellular wireless phone (RCC) 101 configured to establish a connection with traditional cellular radiotelephone system 103 that contains many cellular base stations 105, 107, located in different geographical areas, but providing the coverage area of the phone in a vast geographic region. Cellular base stations are connected with the control station 109, which provides coordination of many cellular base stations, including transfer between a subscriber's cellular mobile and portable equipment, and provides switching of calls and communication with telephone network (PSTN) (hereinafter referred to as TELCO) 111.

The PCC 101 also has the ability to communicate with microcellular base station 113, CI, but providing public radiotelephone service to particular areas, such as shopping malls, airports, etc., Microcellular base station 13 is connected to the cable telephony system TELCO 111, so that calls can be accommodated in TELCO.

The PCC 101 also has the ability to communicate and to place voice calls over a wireless base station 115, which provides a private telephone line connection with the TELCO 111 for user RCC 101. Wireless communication system uses equipment authorization and call routing (ACRE) 117 to transmit information about the routing of the call to the telephone switching system. Thus, the switching system automatically routes calls between cellular, micro-cellular and wireless systems. ACRE 117 also grants permission wireless base station 115 on the channels. ACRE 117 may be part of the TELCO 111 or may be a standalone device. As already mentioned, the wireless base station 115 together with the PCC 101 provide the service in a limited range, known as wireless telephone service. This service is widespread, and its abichou frequency).

Consider radiotelephone service is intended to provide the user of the radiotelephone communications anywhere in the USA at the lowest price. It is also expected that the radiotelephone service must be provided by the portable device, if possible, compact and inexpensive. The PCC 101 has a special configuration that meets these requirements. In addition, the wireless base station 115 is configured to provide telephone communication with home telephone line of the subscriber, when the PCC 101 user is within radio range of the wireless base station 115.

In Fig. 2 depicts a block diagram of the ACRE 117. ACRE 117 is connected to the TELCO 111 through the interface unit 202. Interface unit 202 controls and formats of messages between the TELCO 111 and the processor 204. The processor 204 in conjunction with driving the programmable memory 206 is a brain ACRE 117 and performs the functions of authorization and authentication, and provides information on call routing. Subscriber database 208 contains the data needed by the processor 204 to perform the tasks listed above. ACRE 117 may be separate from the TELCO 111, as shown in Fig. 2, or may be part of the TELCO 111, normally part of coenia 202. In addition, the functions of the ACRE can perform available for TELCO equipment. And finally, according to some aspects of the present invention ACRE may only perform the functions of authentication and can be considered as an authentication device. Although in the following description uses the term ACRE, it should be understood that it may also mean equipment grant of permission depending on the method implementation.

In Fig. 3 shows the typical location of the areas of wireless, micro-cellular and cellular systems. The range of a wireless system is the smallest and is inside the microcellular system. Microcellular system has an intermediate area and is located in the cellular system. The area of each system may depend on the number of base stations in each system, but is not limited to them, to the antenna height of each base station and the power level used by each system. The user of the portable phone can move between different areas of action. Portable phone may switch from one system to another depending on its location, the availability of the system and the user's selection, and other aspects.

The range is from my other or may overlap one or more other zones of action.

Wireless base station 115, essentially, is a small cell system, providing a single channel of signal transmission, which transmits outgoing data blocks like a regular cell transmission channel output signals and receives service requests from a remote device, such as the PCC 101. Proper service requests allocated channel tone frequency (via the control channel) on the same or a second radio frequency to which the PCC 101 received a command to tune to his phone call.

In Fig. 4 shows the basic way to use the wireless base station. A typical transmitter 301 and the conventional receiver 303, intended for use in the frequency band 869-894 MHz 824-849 MHz, respectively, used for normal cellular maintenance, connected to a conventional antenna 305 through the antenna switch 307. The output power of the transmitter 301 is limited to approximately 6 mW, so that interference to other services and other wireless stations is minimized. The choice of frequency is a frequency synthesizer 309, controllable logical device 311. In the logical device 311 includes a microprocessor 313, for example, the model S, Etam 315, in which to store the operating program of the microprocessor, the identification database (BID), and information about the consumer, as well as other characteristics. The received and transmitted data is encoded/decoded, and transmitted between a receiver 303, a transmitter 301 and the microprocessor 313 hardware means for coupling the transmission signal 317. The command of the microprocessor are transmitted and are managing a hardware item 319. Pair with homemade cable telephone line of the subscriber is usually done through the interface unit 321 TELCO. Power comes from an ordinary AC power and has a battery backup (collectively shown as feeding 323).

The PCC 101 is a portable radiotelephone transceiver the block diagram of which is shown in Fig. 5. Portable radio 401 capable of receiving frequencies in the band 869-894 MHz, and a portable transmitter 403, able to transmit at low power (approximately 6 mW in the preferred embodiment) on the frequency 824-849 MHz, connected to the antenna 405 RCC 101 through the antenna switch 407. The microprocessor 409 determines which specific radio frequency channel can be used by the transmitter 403 and the receiver 401, and transmits this infodroid and transferred to the microprocessor 409 scheme mates 413, and data signals to be transferred by the transmitter 403, produced by the microprocessor 409 and formed by the device pairing 413 before it is transmitted by the transmitter 403. The operating mode of the transmitter 403 and the receiver 401 is turned on or off a device 413. The device also controls the light emitting diodes 415 and 417, which are used to inform the user what the system takes currently the PCC 101. The volume control of the subscriber, output and microphone input speaker controls the sound processing circuitry 419.

In a preferred embodiment, the microprocessor 409 is a microprocessor model NS manufactured by Motorola, and it performs the necessary processing functions under control of programs stored in a ROM 421. Distinctive features of the PCC 101 is stored in EEPROM 423 (and can be stored in the microprocessor, on-Board EEPROM) and are assigned a number (NAM), required for normal cell system, and identification database (BID), is required to work with a personal wireless base station of the subscriber.

The transmitter 403 RCC 101 has the ability to transmit the full range of output power, which Trebujeni output power, from the high output power of approximately 6000 mW to a low level the output power of 6 mW. These six units of output power are included, when the PCC 101 is operating in mode cellular system.

According to a preferred variant implementation of the invention is the same PCC 101 is compatible with both wireless and cellular telephone system 103. This is achieved by providing opportunities RCC 101 to operate in wireless and cellular telephone system 103 using only frequency cellular telephone.

The design of this phone has the advantages that meet the needs of the subscriber. The PCC 101 in conjunction with the wireless base station 115 can automatically guide you through the ACRE 117 incoming call, the phone system that hosts this RCC 101 without causing inconvenience to the user. TELCO 14 in conjunction ACRE c 117 may automatically forward the incoming call to the PCC 101 without causing inconvenience to the user.

The priority given to the PCC 101 is that the wireless base station 115 is first desirable route for a call to the subscriber's mobile phone, and normal cell (or microcellular system in the ANO, as a receiver 401 RCC accepts the channels of transmission of outgoing signals or a group of channels of the transmission signals transmitted from the cellular system, a wireless system and microcellular system in the time scale. This scheme helps to understand the distinctive characteristic of this invention lies in the priority scan.

The receiver 401 RCC can control (431) stream of outgoing messages sent from the signaling channel of the cellular system (which was selected from a variety of channels of cellular signaling in the traditional way). At the appropriate time, the receiver 401 RCC receives a command from its microprocessor 409 tune frequency or one frequency used by the wireless base station 115 as the signaling channel. The receiver 401 RCC scans (433) channel or channels of transmission of outgoing signals from the wireless base station during time t2. If the quality of the received stream signal data is not satisfactory, the receiver 401 RCC returns to previously selected channel signaling cell system 103. He remains configured on the signaling channel 435 during the time t1 until you take another try scanning transmission channel signals one the phone call or transferred to another requirement), duplicate traditionally with pauses 5 seconds, not to be missed, as the receiver 401 RCC has scanned an alternative system during both periods of the transmission cell message retrieval call. The time t1 should be greater than the amount of pause between the two search calls and a typical transfer time of two prospecting calls. Time t2 must be less than the time between two search challenges. If the duration of a pause of 5 seconds, and the typical transfer time search call 185,2 msec, t1 must be greater than 5,3704 sec, a t2 should be less than 5 sec. After the control channel signaling cell system during time t1, the receiver 401 RCC may receive a command to tune to a channel or sequentially on the transmission channels of signals microcellular system, as shown by the position 437. If a suitable transmission channel signals in a microcellular system not detected during the scanning of the channels of the transmission signals at a given frequency, the receiver 401 RCC adjusts to the signaling channel of the cellular system, as shown by the position 439.

If the scan channel signaling (441) of the wireless base station 115 leads to the detection of the flow of data signals that meet the definition of Trebon. The receiver 401 RCC remains on this signaling channel wireless base station without re-scanning the other system up until the PCC 101 is not able to take the signal from the wireless base station continuously for 5 sec.

The effect of this process priority is to give priority wireless base station 115 to the PCC 101. After detection of the signaling channel wireless base station 115 RCC 101 remains tuned to this channel. Thus, when the PCC 101 is initially configured in a cellular system, it will automatically switch to a wireless base station, when it will be available. As soon as the receiver 401 RCC will find the transmission channel of the base station signals, it remains tuned to this channel. When you first set up the transceiver RCC his first scanning transmission channels of signals is the restoration of the channel or channels of the wireless base station 115. Of course the user can block the automatic hierarchy priority scan by entering the lock code in the PCC 101. Thus, the user can cause the scan channels transmitting signals only cellular system, the et to initiate a call with a single traversal of the system of your choice.

When controlled by a specific transmission channel signals of any system, the user transceiver RCC provides a visual indication. In a preferred embodiment, the indicator is set svetoizluchayuschih diodes (LED) 415, 417, one of which is lit in a special way, showing how the system is configured with a transceiver RCC. Can use other alternative indicators for transmission of the same information. For example, the system identifier may appear on the digital display RCC 101, or can be used pulsating character (with different speed pulses). However, this display allows the user to determine which system it is, and to decide whether he wants to finish the radiotelephony call in the system.

To link the PCC 101 to the wireless base station 115, you must obtain permission to use a particular channel. The resolution is necessary because the Federal communications Commission (hereinafter FCC) requires that firms distributing cell spectra, monitored their transmitters. Wireless base station 115 is programmed to periodically update their permissions. Since e is ininii 501 (see Fig. 7), containing the first random number that will be used in the authentication process. Wireless base station 115 responds with a message authentication 504. Message authentication 504 contains the identification of the wireless base station, the first authentication result calculated using this first random number and second random number. ACRE 117 responds with a message about granting permissions and authentication 506 containing second authentication result calculated using the second random number, and information describing which channels wireless base station 115 can communicate with the PCC 101. Wireless base station 115 responds with a registration message 507, containing a mobile identification number of the PCC 101. The registration message 507 is transmitted only in the case when the PCC 101 is in the range of a wireless base station 115. The registration message 507 informs ACRE 117 that calls to the PCC 101 is directed to a wireless base station 115. ACRE 117 responds by sending a confirmation message register 508 to the wireless base station 115, in which the wireless base station 115 informasinya 509, evidence of successful completion of a sequence of messages of the permit.

In Fig. 8 wireless base station 115 determines which of the enabled channels to use to communicate with the PCC 101. In block 510 a message granting permission 506 adopted wireless base station 115. Then, the wireless base station 115 selects a group of authorized channels of information contained in the message granting permission 506, as indicated by block 512. After that, the wireless base station 115 communicates only on those channels that are allowed to use and which meet the criteria of the channel, as shown by block 514. The process of determining whether the channel quality criteria described with reference to Fig. 9-11.

Testing the quality of a channel indicated by block 514, can be done in several ways. For example, can be set to the minimum criteria of the channel and the channel that meet these minimum criteria will be used for communication. This kind of implementation is illustrated in more detail in Fig. 9 and 10. Another way of determining the quality of the channel is in communication only on the ways of implementing the process of identifying, does the channel with the minimum criteria of the channel. The process begins with block 520. In block 522, the measured interference power. This power of the interference signal is compared with a threshold value or maximum signal strength in block 524. If the signal power exceeds the maximum, then the timer associated with the given channel is started or set in the initial state (block 526) and selects the next channel in block 528. If the maximum signal strength is not exceeded in block 524, in block 528 selects the next channel. In block 522 begins processing for the next channel. Using this process you can determine how much time has passed since then, as has been exceeded the maximum level of interference for each channel.

According to the method illustrated in Fig. 10, this information is used to determine which channels meet the quality criteria of the channels, as required by block 514 in Fig. 8. The algorithm starts at block 530. Then determine exceed whether the timer channel time block or equivalent (block 532). In case of positive answer, this meets the criteria of the quality of the channel in block 534 and is available for communication between the wireless base station 115 and the PCC 101. By the howl station 115 and the PCC 101. The process begins for the next channel in block 538.

For specialists in this field it is evident that you can make many changes in this way, without going beyond the scope of the invention. Such modifications may include the measurement of the error rate in bits (BER) for the channel in block 522 in Fig. 9, and determination, not if it exceeds the maximum acceptable BER. It is possible to measure other parameters, such as received signal level, or a combination of both. You can also set to zero, the time block in block 532 of Fig. 10 that the channel only to promptly meet the test of block 524 in Fig. 9.

In Fig. 11 shows the algorithm for selecting the best available channel, starting with block 540. Then in block 542 is measured by the quality of the channel and stored for all channels. This measure can be the level of interference, the BER or the power of the received signal, or some combination thereof. In block 544 selects the channel with the best quality. The selected channel is the best channel and the channel on which the wireless base station 115 to communicate with the PCC 101. The process then repeats starting at block 542.

Wireless base station 115 can choose between algorithm minimum criteria to the Sri information, contained in the message granting permission and authentication 506. In one embodiment, the implementation of the preferred algorithm of the minimum criteria for the quality of the channel, when authorized channels used by other services, except wireless, while the algorithm for selecting the best channel is preferred, when authorized channels are used only for wireless service.

One of the essential features of a wireless base station 115 is that it is made with the ability to work on three channels that are not used in conjunction with a cellular communication system. This is reflected in Fig. 12, which shows the band 560 or cell range, which is the FCC service, dedicated videoconferencing for cellular systems. The FCC also defines channels 562 (cellular channels) in the range in which can occur cellular communication. This group of channels leave some part of the frequency range 560 is not assigned to any channel. Wireless base station 115 uses that are not assigned frequency 564 to determine the three non-shared channels, two on the lower end of the spectrum and one on the upper end of the spectrum, in which the wireless base station 115 may the mouth of the C channels does not meet the minimum criteria of the channel, as shown in Fig. 9 and 10. These channels can also be used if none of the channels was not granted, as in Fig. 8.

The problem may occur after the initial power up of the wireless base station 115, using the algorithm of the minimum criteria of the channel in which the channel must meet the criteria within a set period of time before allowing it to use. The problem occurs after the initial power-up or any initialization, when a group of authorized channels suddenly changes. In this case, it is impossible to establish exceeded if the channel is minimum criteria channel or how long he exceeded the minimum criteria of the channel. Therefore, when the power must be assumed that either all channels meet the criteria required in block 514 of Fig. 8, or none of the channels does not meet the criteria required in block 514, within the prescribed period of time. These two assumptions is shown in Fig. 13 and 14. In Fig. 13 power occurs in block 570. Then the timers of all channels are set to the initial position in block 572. After that accepted the message of the permit in block 574, the channels does not exceed the time block in block 532 of Fig. 10 during at least a period equal to the time unit. Thus, in Fig. 13 it is assumed that none of the channels does not meet the criteria of the channel after power-up.

In Fig. 14 shows the initial power up of the wireless base station 115 in block 576. Initial power-up can be replaced by any initialization, as described earlier with reference to Fig. 13. Then the base station 115 receives a message granting permission in block 578. After that the time of all channels are set at the time of block in block 580. Therefore, it is assumed that the channels after power wireless base stations meet the criteria of the channel within the required time, as shown in block 532 of Fig. 10.

In Fig. 15 depicts the authentication process, the wireless base station 115 and 117 ACRE. The authentication process begins with operation 602. According to the proposed method, ACRE authenticates a wireless base station for operation in the communication system at step 603 after the call is initiated, and the wireless base station separately authenticates ACRE for operation in the communication system at step 604. At the first stage 605 starts the wireless authentication process ends at step 606. If the wireless base station is authenticated at step 606, at step 610 starts the authentication process ACRE. If ACRE is not authenticated at step 612, the authentication process ends at step 614. However, if ACRE is authenticated, the communication line is switched on at step 614. At step 615 may be optional updated key mates with cable line (WIKEY), which is used in the authentication process as a wireless base station, and ACRE. Use WIKEY in the authentication process for the wireless base station and ACRE will be described in more detail with reference to Fig. 16-20.

Although the authentication process of Fig. 15 shows that during the authentication process, the wireless base station should process the authentication ACRE, it should be understood that these processes can occur in the reverse order or simultaneously. For example, as shown in Fig. 7, the authentication process occur simultaneously, and the message authentication 504 in Fig. 7 may include the authentication result of the wireless base station received at step 606, and the authentication request ACRE at step 610.

In Fig. 16 shows the authentication process Wi th base station. The request for authentication of the wireless base station can be included in the message about the connection 502 total transfer Protocol signals shown in Fig. 7. Wireless base station receives the request for authentication at step 624. At step 626, the wireless base station generates the authentication result of the wireless base station. At step 628 wireless base station transmits the answer authentication information containing the wireless base station at ACRE. The response of authentication, shall be taken at ACRE at step 630. The answer authentication information may be included in the message authentication 504 (shown in Fig. 7) and preferably contains information about the wireless base station, such as the identification of the wireless base station in a special way associated with this base station. However, for the person skilled in the art it is evident that the identification of the wireless base station may be provided in ACRE or may be transmitted as a single message at a different time. At step 631 ACRE independently produces results identify a wireless base station. The production process of the authentication of the wireless base station on att authentication developed wireless base station, the authentication of the wireless base station, developed ACRE. If the authentication results are equal, at step 634 confirms that the wireless base station has the right to use communication lines. However, if the authentication results are not equal, in step 636 is determined that the wireless base station does not have the right to use communication lines. The authentication process, the wireless base station ends at step 638.

In Fig. 17 shows in detail the preferred process for generating the authentication of the wireless base station (shown in the General case, steps 626 and 631 in Fig. 16). For the generation of the authentication required input 640, which includes RANDACRE 642 (random number generated ACRE), identification of the wireless base station (CBSID) 644, phone number 646 ACRE and the key mates with cable line (WIKEY) 648. Preferably in the procedure signature resolution 650 was used input data 640 to produce the 652 authentication wireless base station. For this procedure signature permissions can be used by various algorithms, if only the ACRE and 646 and the authentication of the wireless base station 652. This is possible because WIKEY, preferably having a length of 64 bits, has a significantly larger number of possible combinations than the result of authentication of the wireless base station, which preferably has a length of 18 bits. In other words, there are a large number of values WIKEY which will give the same result of authentication of the wireless base station on the basis of a set of values RANDACRE, CBSID and phone numbers ACRE.

The above description of the procedure signature resolution is relevant, because the specialist informed WIKEY 648, CBSID 644 associated with this WIKEY, according to the procedure signature resolution 650, can create an unauthorized device. Since the signature resolution 650 may be disclosed to unauthorized and inconvenient to change the algorithm in wireless base stations that have already been distributed, WIKEY 648 is the primary means of protection. Therefore, the confidentiality of this number should be protected by the algorithm.

In Fig. 18 shows the authentication process ACRE. At step 662, the wireless base station transmits an authentication request ACRE for ACRE. An authentication request ACRE can Blee message. An authentication request is accepted ACRE on the ethane 664. At step 666, the wireless base station and at step 667 ACRE independently produce the authentication ACRE. The generation of the authentication ACRE will be described in detail with reference to Fig. 19. At step 668 ACRE forwards the response to authentication, containing the authentication result ACRE developed ACRE. The response from the authentication may be included in a message granting permission and authentication 596 shown in Fig. 8. The response from the authentication is accepted wireless base station at step 669. At step 670, the wireless base station determines whether developed ACRE the authentication result ACRE the authentication result ACRE developed wireless base station. If the authentication results are equal, at step 672 confirmed eligibility ACRE. However, if the authentication results ACRE do not match, at step 674 is determined that ACRE has no right to use communication line. The authentication process ACRE terminates at step 676.

In Fig. 19 shows, as in the procedure signature resolution 692 uses input data 680 to generate the authentication result ACRE 694. These input data include similar procedure signature resolution 650, is depicted in Fig. 17, and has the same features.

In the process for establishing WIKEY 708, shown in Fig. 20, are input 696 for a new WIKEY 710. The input to this algorithm include an arbitrary number RADWlKEY 698, reserve 702, CBSID 704 and WIKEY 706. The process for establishing WIKEY 708 is similar to the procedure signature resolution 650 (shown in Fig. 17) and has the same characteristics for a new WIKEY. Although it is necessary that these algorithms have the same characteristics with the procedure signature resolution 650, they do not necessarily coincide.

The process for establishing WIKEY 708 unique because it uses an initial value WIKEY 706 in combination with an arbitrary number RANDWIKEY 698 to generate a new value WIKEY 710. If a person receives the value WIKEY, ACRE will be able to develop new WIKEY next phone call. Because that person will not be able to brush up on RANDWIKEY 698 during this call, will be extremely difficult to determine the new value WIKEY based on the initial values WIKEY. This gives a great advantage, making useless the initial value WIKEY for the purpose of establishing unauthorized wireless the wireless remote control base station and ACRE. For simplicity, the signals will be described with reference to the message shown in the General Protocol signaling is shown in Fig. 7. However, before describing some of the specific messages to be transmitted, will be described in the General Protocol direct transmission of signals from ACRE to a wireless base station and the Protocol of reverse transfer of signals from the wireless base station to the ACRE. In particular, in Fig. 21-1 shows the format of the direct transmission of signals. The signal from ACRE to a wireless base station includes a warning (barker) field 720, a field type direct messages 722, after the message length 724, a data field 726 and field cyclic redundancy code (CRC) 728. Because field 720, 722, 724 and 728 are included in all the signals transmitted from ACRE to the base station, only after data 726 will be described in reference to a specific message transmitted from ACRE to a wireless base station. In Fig. 21-2 shown in the General format of the reverse signaling. In particular, the signals transmitted from the wireless base station in ACRE, include field-type-back 780, field length message 732, box 784 data and CRC field 736. Since all messages sent from a wireless base station in ACRE, include field 730, 732 and 736, only the data field 734 bbseva format signal transmission in forward and reverse direction will be described field-specific data signals. In Fig. 21-3 shows the data field preferred message about the connection 502 transmitted from ACRE to a wireless base station. Preferred message about the connection field contains the Protocol version 738, which specifies the version of the Protocol specifications mates with cable line, which is supported on this ACRE and which will be used by the wireless base station to determine the level of support provided by ACRE. The message about the connection preferably includes a message field on the location 740, which determines whether the wireless base station to indicate its location by passing the optional parameter containing the optional parameter is the telephone number of the wireless base station in the message authentication information to the wireless base station (described below with reference to Fig. 21-6 and 21-7). The message about the connection also includes a backing field 742 for future bits of signal transmission. And finally, a message about the connection 744 contains RANDACRE, representing a 33-bit random number generated ACRE (described above with reference to Fig. 17) used to generate the authentication wireless base station described. the particular message authentication field contains the identification of the wireless base station 746, which in a special way identifies a wireless base station connected to the communication system. Message authentication also has a back box 748 for future bits of signal transmission. Box 750 contains an arbitrary signal to the wireless base station (RANDCBS) developed the wireless base station. Field RANDCBS used to generate the authentication result ACRE, as described above for Fig. 19. Box 752 includes the authentication of the wireless base station generated at step 652, shown in Fig. 17. Field 754 is a field account permissions. Account permissions preferably contains a counter module 64 that is used to count the number of consecutive permissions. And finally, box 756 is designed for the optional parameters. One of the examples of the optional parameters shown in Fig. 21-5, which includes a field 758 for the parameter type box 764 length parameter and field 762 to send the phone number of the wireless base station.

In Fig. 21-6 shows the field data for message authentication and granting permission (depicted rezultata authentication ACRE 764, produced at step 694, shown in Fig. 19. This authentication result ACRE compared with the authentication result ACRE developed wireless base station, for determining sanctioned whether this ACRE in the communication system. There is also a field permission to use indicating whether the wireless base station to use a range of, for example, the selected cell range. There is also a field spectrum 768, showing whether spectrum in the field of distribution channels 778, the cellular system. If this range is used by the cellular system, a wireless base station does not use the channel in case of detection of activity on it. If this range is not used by the cellular system, a wireless base station can use the channel that gives the minimum noise level.

In message granting permission and authentication also has a field to initiate resolution 772. Field initiation of granting permission indicates when to initiate the provision of the following resolution. In a message granting permission and authentication is enabled and a backup box 77 is the anal 10 kHz for the grid distribution channels. The grid distribution channels 778 shows channels with a frequency of 10 kHz, which is allowed to use. Every bit of this grid corresponds to a channel number with a frequency of 10 kHz. The left bit of the grid preferably corresponds to a channel with a frequency of 10 kHz, a certain number of the initial channel. Right bit of the grid corresponds to a channel with a frequency of 10 kHz, located on the 63 channels above channel with a frequency of 10 kHz, specified in the number field of the initial channel 776.

Message granting permission and authentication also contains a number of data fields relating to the signal levels. In particular, the maximum level of the received wireless base station signal 780 indicates the maximum level of the received signal which can be used on the channel. If the signal level on the channel exceeds the specified value, this channel is not used by the wireless base station. Similarly, the maximum level of the received signal PCC 782 shows the maximum signal power to the received PCC frequencies. Time field block 784 shows a continuous time during which the signal level of the channel must be less than or equal besprovodnoy base station 786 shows the maximum power level, where can transmit this wireless base station. Similarly, box 778 shows the maximum power level PCC allowed in the system. And finally, in the data field for the message about granting permissions and authentication enabled optional parameter 790.

In Fig. 21-7 presents the first example of the optional messages. The data field includes a field type parameter 792, field length parameter 794 and phone number 796 ACRE. In Fig. 21-8 shows the second optional parameter, which can be transferred. Field data for this optional parameter contains the field type parameter 798, field length parameter 800 and field RANDWIKEY 802. RANDWIKEY used to generate new WIKEY, as shown in Fig. 20.

In Fig. 21-9 shows the registration message (message 507 in Fig. 7). The registration message includes a type field register 804, the mobile identification number (MIN) 806, the electronic number (ESN) 808 and optional parameters 810. In Fig. 21-10 shows an example of an optional parameter that can be used to route multiple calls to telephone numbers. In particular, this optional field will include the parameter field 812, the length field parametre in Fig. 7, can be transmitted from ACRE to a wireless base station in the format of direct transmission of signals shown in Fig. 21-1, without field data. And finally, in Fig. 21-11 shows the message about the separation 509 (Fig. 7). Preferably, the message about the separation included the reason for the separation 822.

Despite the fact that in Fig. 21 shows some preferred signals that can be transmitted between ACRE and a wireless base station, and some preferred fields that can be included in these signals, Fig. 21 does not exhaust the list of signals that can be transmitted, or fields that you can use. Also can change the length in bits of different fields depending on the choice of the system operator.

The proposed method satisfies the need to confirm the right to use lines of communication between the wireless base station and the equipment authorization and call routing to ensure that this PCC allowed to work in the communication system (i.e., to ensure that the user of this PCC does not unauthorized access to the system service) and that ACRE is allowed to allocate spectrum of this system of communication (i.e., that ACRE is not sozdanya right to use lines of communication between the wireless base station and the equipment authorization and call routing through authentication of the wireless base station to establish a connection with the equipment authorization and authentication equipment view permissions for communication with the wireless base station. Preferably, the step of authenticating the wireless base station based on the first random number generated in the equipment grant permissions, and step authentication apparatus of the grant of permission is based on the second random number generated in the wireless base station. The line of communication between the wireless base station and equipment grant permissions granted in the case, if you have authenticated and the wireless base station and equipment grant permissions.

1. The way to test the suitability of the communication link between the wireless base station equipment and view permissions, in which a wireless base station connected to the telephone network by establishing a connection with the radio communication device, characterized in that it includes the stages authentication wireless base station for communication with equipment grant permissions, and step authentication wireless base station based on the first random number generated in the instrument granting permissions, authentication equipment grant permissions to communicate with the wireless Babolna, produced in a wireless base station, and providing a communication link between the wireless base station and the equipment grant permission provided that authentifizierung wireless base station and equipment grant permissions.

2. The method according to p. 1, wherein the step of authenticating the wireless base station includes a transmit messages about the connection from equipment grant permissions to a wireless base station, and a message about the connection contains the first random number generated by the equipment grant permissions.

3. The method according to p. 2, characterized in that the step of authentication of the wireless base station further includes transmitting the authentication of the wireless base station from the wireless base station equipment grant permissions.

4. The method according to p. 1, characterized in that the step authentication equipment grant permissions involves the transfer of a message authentication equipment grant permissions from the wireless base station equipment grant permissions, and message authentication equipment grant allowed is 4, characterized in that the step authentication equipment grant permissions further includes transmitting the authentication equipment grant permissions from equipment grant permissions to a wireless base station.

6. The authentication method of the wireless base station, the action of the current in the communication system having equipment grant permissions, and wireless base station has associated with it an identifying code, characterized in that it comprises the steps of transmitting the authentication request from the equipment grant permissions to a wireless base station, and an authentication request includes a random number generated by the equipment grant permissions, generate the first authentication result based on the random number and the first identification number, transmitting the first authentication result for the equipment grant permission, transmitting the identifying code associated with the wireless base station equipment grant permissions, generate the second authentication result on the equipment grant permission on the basis of the emission with the second authentication result to the authentication of the wireless base station.

7. The authentication method equipment grant permissions, operating in the communication system containing a wireless base station connected to the telephone network, and the wireless base station has associated with it an identifying code, characterized in that it comprises the steps of transmitting the authentication request from the wireless base station equipment grant permissions, and authentication request contains a random number generated at the wireless base station and the first identifying number, generate the first authentication result to the wireless base station based on the random number and the first identifierbag number, receiving at the wireless base station of the second authentication result, produced on equipment grant permissions based on this random number and identification code of the wireless base station, and comparing the first and second results of the authentication to authenticate and test equipment.

8. The method according to p. 7, wherein receiving the second authentication result on the equipment grant permission on the basis of this product is up to the wireless base station for comparison with the first authentication result to the authentication test equipment.

 

Same patents:

The invention relates to communication systems and can be used to provide voice and data services for the population of terminals

The invention relates to a base station controller (ASC) system, multiple access, code-division multiplexing (MDCRC) and, more specifically, to a method of state management and dual information of the distributor of clock pulses for use in the base station controller

The invention relates to a method for allocating frequencies between base stations of a mobile communication system using the input information, which contains at least the number of frequencies required for each base station, frequency, permitted for use in a mobile radio system, as well as information about possible mutual interference between base stations in the same or adjacent frequencies

The invention relates to telecommunication systems, in particular to a method and apparatus for locating a subscriber unit in a communication system with multiple access, code-division multiplexing (mdcr)

The invention relates to selection of a communication channel in a cellular communication system

The invention relates to the field of radio, namely transmitting technique

The invention relates to the field of radio and may find application in devices analysis jamming environment for systems of protection against interference

The invention relates to a method of forming a measure SQ quality vector signal signal packet received by the receiver, for systems in the mobile digital radio

The invention relates to electrical engineering and can be used in control systems of health multichannel receivers, local oscillators are tunable synthesizers frequency (MF), check the basic parametrov lo - inaccuracies of tuning frequency and level of spurious components in the spectrum of the lo signal

FIELD: radio communications.

SUBSTANCE: pulse noise is detected upon conversion of signal received into intermediate frequency, noise active time is determined, information signal is disconnected from amplifier incorporated in superheterodyne receiver, noise-affected part of information signal is recovered by eliminating simulator signals during extrapolation, and superheterodyne receiver is checked for serviceability at intermediate frequency.

EFFECT: enhanced precision of superheterodyne receiver serviceability check.

1 cl, 1 dwg

Up!