Claims
- 1. A method for establishing the authenticity of a network and a mobile station in a mobile radio system, the method comprising the steps of:
- forming in each of the network and the mobile station a first signal and a second signal;
- transmitting the first signal formed in the network to the mobile station;
- establishing the authenticity of the network by comparing in the mobile station the first signal formed in the mobile station with the first signal received from the network;
- transmitting the second signal formed in the mobile station to the network; and
- establishing the authenticity of the mobile station by comparing in the network the second signal formed in the network with the second response signal received from the mobile station.
- 2. A method according to claim 1 wherein the first and second signals depend on other data in addition to the pseudo-random number.
- 3. A method according to claim 2 wherein the other data includes a personal identification number of the mobile station.
- 4. A method according to claim 2 wherein the other data includes an electronic serial number of the mobile station.
- 5. A method according to claim 2 wherein the other data includes a number dialled from the mobile station.
- 6. A method according to claim 1 wherein the second signal formed in the mobile station is transmitted to the network only if the first signal formed in the mobile station is identical to the first signal received from the network.
- 7. A method according to claim 1 further including the step of establishing voice communication between the network and the mobile station if the second signal formed in the network is identical to the second signal received from the mobile station.
- 8. A method according to claim 1 further including the step of terminating voice communication between the network and the mobile station if the second signal formed in the network is not identical to the second signal received from the mobile station.
Priority Claims (1)
Number |
Date |
Country |
Kind |
9000856 |
Mar 1990 |
SEX |
|
Parent Case Info
This application is a continuation of application Ser. No. 07/655,771, filed Feb. 15, 1991, now abandoned in favor of file wrapper continuing application Ser. No. 08/068,234, filed May 27, 1993, now U.S. Pat. No. 5,282,250 issued Jan. 25, 1994.
US Referenced Citations (6)
Foreign Referenced Citations (2)
Number |
Date |
Country |
3405381 |
Aug 1985 |
DEX |
3420460 |
Dec 1985 |
DEX |
Non-Patent Literature Citations (2)
Entry |
"EIA Project Number 2215", pp. 2-72 to 2-73, published in Dec. 1989 by Electronic Industries Association Engineering Department. |
H. Beker and F. Piper, Cipher Systems-The Protection of Communications, pp. 305-311, 320-322, published in Great Britain (1982). |
Continuations (2)
|
Number |
Date |
Country |
Parent |
655771 |
Feb 1991 |
|
Parent |
68234 |
May 1993 |
|