WO2001017288A1 - System and method of communicating encrypted group broadcast messages - Google Patents

System and method of communicating encrypted group broadcast messages Download PDF

Info

Publication number
WO2001017288A1
WO2001017288A1 PCT/EP2000/007692 EP0007692W WO0117288A1 WO 2001017288 A1 WO2001017288 A1 WO 2001017288A1 EP 0007692 W EP0007692 W EP 0007692W WO 0117288 A1 WO0117288 A1 WO 0117288A1
Authority
WO
WIPO (PCT)
Prior art keywords
broadcast
message
portable terminal
decryption
identity
Prior art date
Application number
PCT/EP2000/007692
Other languages
French (fr)
Inventor
Brian J. Forde
Paul C. Weinmann
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to EP00960409A priority Critical patent/EP1131964A1/en
Priority to JP2001521100A priority patent/JP2003508984A/en
Priority to KR1020017005207A priority patent/KR20010080908A/en
Publication of WO2001017288A1 publication Critical patent/WO2001017288A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/24Radio transmission systems, i.e. using radiation field for communication between two or more posts
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/30Resource management for broadcast services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/10Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/20Aspects of automatic or semi-automatic exchanges related to features of supplementary services
    • H04M2203/205Broadcasting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/609Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2207/00Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
    • H04M2207/20Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place hybrid systems
    • H04M2207/206Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place hybrid systems composed of PSTN and wireless network

Definitions

  • the present invention relates to a system and method for communicating an encrypted broadcast message over a telecommunications system to a plurality of subscriber terminals and in particular to a system and method that allows the broadcasting of information to a plurality of wireless portable terminals.
  • the system is particularly but not essentially based on the Digital Enhanced Telecommunications (DECT) standard.
  • each slave set is provided with only a simple receiver section (radio part)
  • the receiver section may then be required to support not only reception of the broadcast but also support the exchange of normal telephone traffic with the master set. Problems can arise if a slave set is already being used for conducting a telephone conversation. Further problems may be experienced when attempting to transmit a broadcast to particular slave sets.
  • Another approach to providing an audio broadcast facility to a plurality of terminals in a telecommunications system is for a base station or some other type of control unit to set up a telecommunications link with each terminal of the plurality in a manner that is conventional for the system, that is, the type of link that is used to carry voice or data file traffic.
  • the audio message is then broadcast by sending it over each of the links simultaneously in the same manner that the voice signal of a normal telephone conversation would be carried. Since an individual point-to-point link needs to be established with each terminal simultaneously, this can place a heavy, if not impossible demand on the system which may only be provided with resources sufficient to establish calls to a limited number of terminals at a given time.
  • the problem may be alleviated to some extent by setting up calls to individual terminals of the plurality one by one, or to fractions of the total number of the terminals sequentially, although this will lead to a delay while a broadcast is made to each of the terminals (or fractions of the total number of terminals) for which the broadcast is intended. This may be unacceptable in certain situations and applications, especially if the welfare of personnel using the terminals is somewhat dependant on timely reception of the broadcasts. In telecommunications systems employing wireless links to portable terminals, attempting to provide a broadcast (such as an audio broadcast) by establishing such traffic calls to a large number of portable terminals simultaneously is even more difficult.
  • a broadcast such as an audio broadcast
  • DECT Digital Enhanced Cordless Telecommunications
  • ETS 300 175 ETS 300 175 of which there are several parts. The standard is published by the European Telecommunication Standards Institute and is incorporated herein by reference.
  • a broadcast system for communicating a broadcast message in a cordless telecommunications system, the telecommunications system having at least one fixed terminal for communication with one or more portable terminal over an air interface, said broadcast system including: first transmitter means for transmitting a first message from the fixed terminal, the message including information specifying a channel, selected for that fixed terminal, to convey the broadcast message; control means, responsive to the first message, for instructing the at least one portable terminal to receive on the selected channel; broadcast message encryption means for encrypting broadcast messages; and second transmitter means for transmitting from the fixed terminal on the selected channel a broadcast message in encrypted form for reception and decryption by the at least one portable terminal.
  • the broadcast messages are typically audio or data file type messages.
  • the first and second transmitter means may be incorporated in the fixed terminal. Indeed the first and second transmitter means may be the same entity. The first and second transmitter means may be the same system component.
  • the control means may be located in the portable terminal. Each of the first and second transmitter means and control means may be system applications or the like and the terms do not necessarily relate to hardware.
  • the first transmitter means includes paging means to generate and include in the first message paging information specifying the identity of the at least one portable terminal for which the broadcast is intended, the control means being responsive also to this paging information such that only a portable terminal having the specified portable terminal identity will be instructed to receive the encrypted broadcast message on the selected channel. This allows broadcast messages to be directed to specific portable terminals.
  • the broadcast system may also be provided with assigning means for selectively assigning a portable terminal with a portable terminal identity of the type suitable for specifying by the paging means. Therefore, by assigning a number of portable terminals with a common identity, all such terminals may be instructed to receive a broadcast by including in the first message paging information specifying only that one common identity.
  • broadcast messages are encrypted by the broadcast message encryption means using a specific encryption algorithm and encryption key such that only portable terminals in possession of a corresponding decryption algorithm and decryption key can decrypt the received encrypted broadcast message.
  • a broadcast message may be provided with an identifier which is included in the first message.
  • the identifier may be used by a portable terminal receiving an encrypted broadcast message to select an appropriate decryption algorithm and / or decryption key.
  • the assigning means may selectively assign a portable terminal with a portable terminal identity which is a Temporary Portable User Identity (TPUI).
  • TPUI Temporary Portable User Identity
  • the specified broadcast channel may be a DECT physical channel which may then be used to support a DECT simplex bearer.
  • the specified channel can be used to support a connectionless downlink bearer.
  • a method for communicating a broadcast message in a cordless telecommunications system having at least one fixed terminal for communication with one or more portable terminal over an air interface, said method comprising the steps of: transmitting a first message from the fixed terminal, the message including information specifying a channel, selected for that fixed terminal, to convey the broadcast message; instructing the at least one portable terminal to receive on the selected channel; encrypting broadcast messages; and transmitting from the fixed terminal on the selected channel a broadcast message in encrypted form for reception and decryption by the at least one portable terminal.
  • broadcasts may allow multiple streams of information to be broadcast to a plurality of wireless portable terminals.
  • a communications device apparatus having the technical features of the first transmitter means in the broadcast system.
  • a communications device apparatus having the technical features of the control means in the broadcast message system.
  • a communications device apparatus having the technical features of the second transmitter means in the broadcast message system.
  • a communications device apparatus having the technical features of the broadcast message encryption means.
  • a communications device apparatus having the technical features of the portable terminal usable in conjunction with the broadcast system for reception and decryption of a broadcast message.
  • Figure 1 shows a schematic representation of a telecommunications system incorporating the present invention
  • Figure 2 shows an overview of an encryption / decryption process
  • Figure 3 shows schematically components of a system suitable for generating an encryption key.
  • the particular communications system shown in Figure 1 is based on a DECT compliant cellular communications system 1 in which the fixed terminal takes the form of a DECT fixed part (FP) 2 which includes a plurality of radio end points in the form of DECT radio fixed parts (RFP's) 3.
  • FP DECT fixed part
  • RFP's DECT radio fixed parts
  • the present system is based on a DECT compliant system, the present system is provided with various features which fall outside the scope of the current DECT base standards. Such features will be highlighted where appropriate, but for the purpose of understanding the present invention, references to 'DECT compliant' or 'DECT when discussing particular features should be taken to indicate normal DECT functionality unless otherwise stated.
  • the RFP's 3 are networked together and FP 2 is connectable via an interface to external telecommunication networks such as the public switched telephone network 4 although this is optional.
  • the FP also includes a control unit 5 which serves to control the general operation of the whole system including the interoperability of the RFP's 3 with each other.
  • the control unit 5 may also be provided with private automatic branch exchange (PABX) functionality.
  • PABX private automatic branch exchange
  • a portable terminal takes the form of a portable part (PP) 6 which is capable of establishing communication with the fixed part by establishing a wireless link with a RFP 3a, 3b, 3c. This allows the exchange of traffic such as voice or data, as is well known to the person skilled in the art. Although twelve PP's are shown other numbers may be used.
  • the wireless link communication between an RFP and a PP is provided by so- called bearers which are established on one or more DECT physical channels (channel). Each channel is created by transmitting on one particular slot on one particular radio frequency (RF) in successive time division multiple access (TDMA) frames.
  • RF radio frequency
  • a DECT communications system may be provided with one RFP 3 or a number of RFP's 3. Obviously, if the system has only one RFP 3 then this RFP must cater for all connections that are established with the PP's 6. However, in the case of a system having a plurality of RFP's 3, (as is the case for the system illustrated in Figure 1 ), provided for the purpose of increasing system capacity and/or coverage area, connections are established between RFP's 3 and PP's 6 depending on the available link quality, which usually though not always results in a link being established between the PP 6 and the nearest RFP 3. Before the PP6 can participate in traffic communication with the fixed system it needs to attain a condition where it is synchronised with a RFP 3 of the FP 2.
  • each RFP 3 maintains transmissions that carry information relating to the identity of the particular RFP 3 and the FP 2 it is connected with together with other system information. Because each RFP 3 is always transmitting such information a PP 6 is able to receive on each DECT system channel in turn and to monitor for activity on those channels.
  • N-channel and Q-channel information This transmitted information is called N-channel and Q-channel information as will be understood by the person skilled in the art.
  • DECT N-channel and DECT Q-channel are logical channels and not DECT physical channels. Because it is the responsibility of the PP 6 to detect the presence of any nearby RFP's 3, when a PP 6 is activated it begins to listen on each DECT channel for N-channel and Q-channel information broadcast by the RFP's 3. If a given RFP 3 is not involved in supporting a traffic connection with a PP then this information is broadcast by itself on a so-called dummy bearer.
  • the RFP 3 broadcasts this information on each traffic bearer.
  • a RFP 3 supporting at least one traffic connection may drop the dummy bearer although the broadcast of the N-channel and Q-channel information on the dummy must be restored if all traffic connections with that RFP 3 cease.
  • a RFP 3 will always be transmitting N and Q-channel information on at least one DECT channel.
  • the dummy bearer is not intended for reception by a particular PP 6 but is merely for making RFP 3 identity and system information available all of the time to any in-range PP's 6 that happen to be in the vicinity.
  • a PP 6 When a PP 6 is initially switched on, it listens out for the presence of an in-range RFP 3 by scanning through all the valid DECT channels until if finds one with some activity. If the RFP 3 is indeed already supporting a voice or data call to one or more other PP then so-called traffic bearers are already established between the RFP 3 and those PP's and the system information will be found in these. This is sufficient to service the PP 6 with the system information that it needs to synchronise with the RFP 3 and be in a condition ready to make or receive calls to it.
  • the RFP 3 is not supporting any voice or data calls there will be no traffic bearers and hence PP's 6 in the vicinity of the RFP 3 rely on the so-called dummy bearer transmitted by the RFP 3 at regular intervals on one of the valid DECT channels so that the PP's may synchronise with this.
  • the PP 6 sets up a so-called synchronisation bearer on the various
  • DECT channels to determine if a nearby RFP is indeed transmitting on that channel. If it is established that this is not the case, a synchronisation bearer is set up on a different DECT channel until a channel is found that is carrying N-channel and Q-channel information. Setting up a synchronisation bearer allows any N-channel and Q-channel information on a DECT channel to be read. This information is used by the PP 6 to determine if it has access rights to the fixed part, and if it does, the PP 6 enters a state in which it is ready to make and receive calls.
  • a traffic bearer as is normally used for voice or data communication, operates in a connection oriented mode since it involves the three stages of setting up a connection from one source to one or more destination, transferring data, and finally releasing the connections.
  • a dummy bearer operates in a connectionless mode, since it involves the transmission of self contained units of data from one source to one or more destination.
  • a further type of bearer exists and is called a connectionless bearer. It is similar to a dummy bearer, except that while a dummy bearer can only carry system information, the connectionless bearer can carry other types of information. Further information on the nature of these different bearers is given in the above mentioned DECT standard and will not be reproduced herein unless relevant to understanding of the present invention.
  • That PP In order to broadcast a message such as an audio message or data file to a particular PP, that PP is first invited to receive on a particular DECT channel that will be used as the broadcast channel for carrying the broadcast information. Once the PP is receiving on that channel the message is transmitted on that channel for reception by the PP. By inviting a plurality of DECT PP's to receive on that channel, all of those PP's will then be able to receive the broadcast message.
  • a connectionless downlink bearer is set up by each RFP on the broadcast channel, which may be different for each RFP. All PP's in range of a RFP are now capable of receiving the broadcast message simultaneously if they listen to the channel selected on that RFP for carrying the connectionless downlink bearer.
  • a connectionless bearer is similar to a dummy bearer, but in this case the connectionless bearer has it's B-field filled with information relating to the broadcast message itself, as will be understood by the person skilled in the art.
  • the message may contain voice or data file information, other types of information could be broadcast such as information representing an alarm signal.
  • a DECT RFP cluster is only capable of supporting a limited number of traffic bearers and there is an absolute number of traffic bearers that may be established in a DECT system anyway before frequency reuse becomes necessary. Therefore, by employing a connectionless bearer for carrying the broadcast message, a plurality of PP's may receive the message without unduly loading the telecommunications system. In order for a given PP to actually receive and reproduce the broadcast message, a first message containing information telling the PP's which DECT channel is being used for the broadcast message is transmitted by each RFP on all bearers as a short page message.
  • the short page message which is transmitted on the P-channel is used to identify the DECT channel that will carry the broadcast message.
  • Short page messages are normally carried in the A-field, as will be known to the person skilled in the art.
  • it is preferable to convert the dummy bearer into a connectionless downlink bearer for carrying the broadcast message thus claiming the DECT channel previously used for carrying the dummy bearer, rather than to set up a connectionless downlink bearer on a different DECT channel.
  • the second broadcast message is provided by setting up a second connectionless downlink bearer from each RFP.
  • the second connectionless downlink bearer will be on a DECT channel different to the first connectionless downlink bearer.
  • the B-field of the second connectionless downlink bearer is filled with information relating to the second broadcast message itself, as will be understood by the person skilled in the art.
  • first message In order for a given PP to actually receive and reproduce the second broadcast message, a further instance of first message is generated which contains information telling the PP's which DECT channel is being used for the second broadcast message.
  • This further instance of first message is transmitted by each RFP as a short page message on all existing bearers.
  • the short page messages are carried on the P-channel they can be present and are normally contained in all bearers and are normally carried in the A-field. This results in all PP's hearing the short page messages which notifies them of the existence of a broadcast.
  • a PP can then receive on the DECT channel carrying the second connectionless bearer, and therefore the second broadcast message, to reproduce the second broadcast message.
  • each broadcast message having an associated first message. Because each broadcast message may be performed independently of the others, it is possible to provide multiple overlapping simultaneous broadcast messages in the system. It is noted that the second and further connectionless downlink bearers are unlikely to be set up by converting the dummy bearer into one of these connectionless downlinks, since the dummy will have normally been converted into the first connectionless downlink bearer. By 'simultaneous' it is meant that more than one broadcast message may be provided at the same time. Since each broadcast message is unrelated and independent of any other broadcast message there is no such requirement that the broadcast messages are to be synchronised with each other or necessarily performed at the same time.
  • connectionless message control relates to the functions that control and distribute the information of all connectionless services to one or more connectionless bearer control, as will be understood by the person skilled in the art.
  • PP's may be assigned an identity or group identity, and only those PP's carrying that particular identity may elect to receive a given broadcast. This may be achieved in a DECT system by assigning a Group Temporary Portable User Identity (TPUl) to a portable part, or a group of portable parts so that only those PP's having a particular TPUl are invited to receive the broadcast message. More than one TPUl may be employed in the system thus allowing different groups of PP's to be created and independently selected for receiving a broadcast.
  • TPUl Group Temporary Portable User Identity
  • the TPUl related information is also present in the P-channel and is carried in the short page message, so again, all PP's are capable of receiving this information.
  • identities and addressing will be known to the person skilled in the art and further information is contained in the DECT standards.
  • a reference to a TPUl should be read as a reference to a connectionless group TPUl unless the context suggests otherwise. An example of where this is not the case would be a reference to an individual TPUl, as will also be understood by the person skilled in the art.
  • the MAC layer information in the short page message contains the location of the connectionless bearer, i.e. in terms of time slot and frequency. This may be different for each RFP.
  • the short page message may originate from an application in the RFP.
  • the short page message contains information present in the P-channel; that is the identity of the PP's which should receive the broadcast message, and the DECT channel the broadcast is transmitted on.
  • the broadcast message may originate from anywhere in the system and for example may originate from the PSTN or from another PP. In the latter case the message is transmitted from the PP to an in-range RFP over a normal traffic bearer, after which the message is broadcast to the other PP's by the mechanism described above.
  • the originator of the broadcast message may specify the group for which the broadcast is intended by forwarding the appropriate TPUl information. In one example this may be generated by the user indicating the intended recipients by entering information via the keypad of the PP.
  • Each RFP ensures the quality is maintained of each connectionless downlink bearer currently in use. Connectionless bearer hopping may be employed to change to another DECT channel if channel quality is poor.
  • a short page message can be used to inform PP's synchronised with the RFP of the new channel carrying the connectionless bearer.
  • the connectionless bearer When the connectionless bearer is moved to a different channel, a new page is sent out regularly to inform all of the in range PP's of this.
  • it's associated connectionless downlink bearer will not necessarily be on the same DECT channel for each RFP, so short page messages specifying the location of the connectionless downlink bearer and the broadcast call TPUl information will be sent out regularly by each RFP for the entire duration of the broadcast message.
  • TPUI's may be used, each having a priority value assigned.
  • a PP can be set to receive or reject a broadcast call depending on the priority value associated with the broadcast.
  • a given PP may have a number of identities assigned to it. Furthermore, if a given PP is instructed to receive more than one broadcast message simultaneously a signal could be generated by the portable part alerting the user to switch to a different broadcast. The user could be alerted, for example by an audio tone or a display message. Alternatively, if the broadcast message is of data, an application on the portable part could automatically switch to a different one of the broadcast calls. Each broadcast message may be assigned a priority value allowing the PP to alert the user of the PP depending on the priority value of the message. Furthermore, the PP may automatically switch to receive the broadcast message having the highest priority value. A priority value could be reserved for indicating an emergency status in which case any broadcast having such an assigned priority value will be received and reproduced by portable parts irrespective of whether they are already supporting a broadcast or normal connection based call.
  • a given PP could receive more than one broadcast message simultaneously. This would allow an audio broadcast, for example, to be reproduced, while a further audio broadcast could be stored. Other combinations of received broadcasts include audio and data and audio and video broadcasts.
  • a signal could be generated by the portable part alerting the user of the broadcast allowing the user to switch to the broadcast or ignore it. The user could be alerted, for example, by an audio tone or a displayed message. If the user chooses to accept the broadcast, the normal connection based call may be put on hold. Alternatively, the portable part could automatically switch to reproduce the broadcast, perhaps also putting the normal call on hold. The automatic switch could be implemented so that it only occurs if broadcasts have specified associated priority values.
  • a PP may be provided with means for reproducing a audio broadcast call at a volume which is greater than that employed during a normal connection based call.
  • a loudspeaker may be provided in the portable part which may be activated automatically.
  • the broadcast could be representative of an alarm signal.
  • Such a broadcast could be initiated by a user of a PP activating an alarm function provided on the PP.
  • the control unit sends a broadcast message to all RFP's containing the group TPUl and which broadcast messages are to be transmitted by the RFP's.
  • the broadcast group identities (which are group TPUI's in the specific example) can be assigned to a PP just after the PP has subscribed, or at location registration when the individual TPUl is assigned. Alternatively, the identity could be assigned at any time since it is permitted to re-arrange a PP into different groups at any time.
  • a PP can be a member of multiple groups.
  • broadcast message encryption means 11 Before broadcast messages are transmitted from the fixed terminal, they are encrypted by broadcast message encryption means 11.
  • the encryption means employs an encryption algorithm 12 and an encryption key 13.
  • a non-encrypted message (a so-called 'plaintext' message) 30 is input to the encryption means 11 and the broadcast encryption means 11 operates on the non-encrypted message 30 to convert it into an encrypted broadcast message 40 (a so-called ciphertext message). It is this encrypted message 40 which is broadcast over the air interface from the fixed terminal 3 to the portable terminals 6. Because the broadcast message is encrypted, any unauthorised interception of the message will not allow the content of the message to be readily deciphered.
  • broadcast message decryption means 21 If the broadcast message is received and subsequently decrypted, the original content of the message may be recovered and reproduced. Those portable terminals for which the broadcast message is intended are therefore provided with broadcast message decryption means 21.
  • the decryption means 21 In order for the decryption means 21 to convert a received encrypted message 40 into the original non-encrypted message 30, the decryption means 21 requires a specific decryption algorithm 22 and specific decryption key 23.
  • the specific decryption algorithm 22 and specific decryption key 23 are associated with the encryption algorithm 12 and encryption key 13 that were originally used to encrypt the broadcast message. Only the correct decryption algorithm 22 and correct decryption key 23 will allow the broadcast message decryption means 21 to decrypt the message correctly.
  • One way is to provide a portable terminal with a specific decryption algorithm and specific decryption key during manufacture.
  • Another way is to provide a portable terminal with a specific decryption algorithm and specific decryption key that is normally fixed but may be modified if necessary by the user or a system administrator.
  • the key and algorithm are transferred to the portable terminal via a physical link established with a programming unit or equivalent.
  • the unit may take the form of a cradle. It is important that the link is a physical one and not a link established over the air.
  • the fixed terminal by providing the fixed terminal with the necessary information about the portable terminal including the specific decryption algorithm and specific decryption key, the fixed terminal can generate an encrypted broadcast message that may be received and decrypted by the said portable terminal.
  • Advantages of this system include: 1) the decryption process is transparent to the user of the portable terminal so the user is not required to take any action; 2) the decryption algorithm and key are hidden in the portable terminal and therefore are not readily accessible; 3) a portable terminal may be provided with an identifier relating to the in-built algorithm and key allowing a plurality of portables bearing the same identifier to be selected, and since each has the same decryption algorithm and decryption key, a group may be formed which is capable of decrypting the same encrypted broadcast message.
  • An extension of this system is to provide a portable terminal with a plurality of decryption algorithm and decryption key pairs which may be selected as appropriate, either automatically within the portable terminal or by intervention of the user.
  • a disadvantage of this system is that the decryption key and decryption algorithm may not be re-programmed which can result in an inflexible system and cause security problems if a portable terminal is acquired by an unauthorised person.
  • such an algorithm and key may be provided by passing the group TPUI's and SCK's / DCK's to the PP via an electrical connection (for example a serial link). This contributes towards the security of the system because the information is not transmitted over the air interface.
  • Another way is to provide portable terminals with one or more standard decryption algorithm but to use individual encryption keys at the fixed terminal and corresponding individual decryption keys at the portable terminal, where the individual keys may be changed.
  • the broadcast messages are encrypted taking into account the decryption algorithm and key held in the or each portable terminal for which the broadcast is intended.
  • the key may be input by the user of the portable terminal, or generated from information input by the user of the portable terminal.
  • This system has the advantage that the key can be changed when required simply by informing the user (via a secure channel) of the new key, or information required to generate the new key, that is required for correct decryption.
  • the required key can be generated from a combination of information input by the user and information associated with the portable terminal itself, for example an equipment serial number.
  • the information input by the user may be stored for a duration which conveniently allows the user to receive broadcast messages without the necessity to input information each time a broadcast occurs.
  • a received encrypted broadcast message could be decrypted using the key stream generator together with a decryption key in the form of a static cipher key (SCK) as will be understood by the person skilled in the art.
  • SCK itself may be input by the user of the DECT portable part or be generated from information input by the user, thereby allowing a reduced amount of information to be input by the user.
  • the SCK may be generated from a combination of information such as the portable terminal's IPUI (International portable user identity) or IPEI (International portable equipment identity) and information input by the user.
  • Another way is to provide each portable terminal with one or more selectable decryption algorithm and to generate the decryption key internally. In this case it is necessary for the portable terminal to generate a decryption key that is suitable for decrypting the broadcasts that are received. Likewise it is necessary for the fixed terminal to use an encryption key and algorithm such that the broadcast encrypted message can be decrypted by the or each appropriate portable terminal.
  • a powerful and secure broadcast message system is possible. Furthermore, if a portable terminal can be so commanded by the fixed terminal over a non-secure channel without appreciably compromising security, the system is also convenient to use.
  • a DECT fixed terminal (Fixed Part, FP) is able to authenticate a DECT portable terminal (Portable Part, PP) to establish that a portable part is one that it claims to be.
  • Authentication involves the use of a cryptographic challenge-response mechanism wherein the FP challenges a PP to perform a calculation and present a result. The FP also performs the same calculation and if the result generated by the PP matches the (expected) result generated by the FP, the FP accepts the PP as being genuine.
  • the result generated by the PP is denoted as 'RES1 ' which is produced by authentication processes A11 and A12.
  • the inputs to the processes are 'K', an authentication key, 'RS', a value used to establish authentication session keys and 'RAND F', a random value.
  • the value RS and RAND F are issued by the FP and broadcast over the air interface to the PP.
  • the FP is also provided with authentication processes A1 1 and A12. Because the FP knows what the value of K is for the genuine PP it is attempting to authentic, and also knows RS and RAND F, the FP can calculate locally the expected value of RES1.
  • the PP calculates the value RES1 and transmits it back to the FP over the air interface and if the value matches the locally calculated value this indicates that the PP is genuine. This process allows the PP to demonstrate it's knowledge of the correct value of K without disclosing the value over the air.
  • DCK Derived Cipher Key
  • K is generated from authentication code AC via authentication key stream process B1. The authentication code in input by the user of the PP.
  • each portable terminal may be capable of possessing a plurality of such pairs. Furthermore, irrespective of whether the algorithm and / or key is selected automatically by an application in the portable terminal or selected or input by a user, there can be a requirement that the correct pair is applied to a particular broadcast message, especially where there are multiple broadcasts present, or broadcasts requiring different privileges for access. To allow for this each broadcast message carries an identity allowing the correct pair to be selected and applied to it. For example, at a basic level, a portable terminal could indicate in a display that an incoming broadcast message carries identity number 1. The user would note this information and input the correct decryption key for messages carrying such identity numbers.
  • Octet 3 of the element is used to indicate the identity type coding for portable identities.
  • the identity is a temporary portable user identity (TPUl)
  • TPUl temporary portable user identity
  • bits 8, 7, 6 and 5 of octet 5 are always set to zero. Therefore these bits are employed in this implementation to indicate the identity of the broadcast message and since four bits are available, a maximum of 16 different broadcast messages may be identified, although this is not to be interpreted as limiting the scope of the present invention.
  • the use of these bits for providing a broadcast message identity may possible deviate from the teaching of the DECT base standards.
  • Such identity information can be especially beneficial in those systems which, like a DECT based telecommunication system, may assign a different group TPUl to a PP as it roams from one cell to another.
  • a PP can roam into another cell and continue to receive and decrypt a broadcast message despite a different TPUl being used. This is because the broadcast identity may be used by the PP to determine which broadcast message it is receiving and therefore which decryption key and algorithm to use.
  • Other ways of providing a portable terminal with decryption keys and algorithms may be employed although they may offer a lower standard of security.
  • the decryption key could be the group TPUl itself, a function of the group TPUl, a key that is broadcast in the first message, or a key based on the user authentication key. It will be appreciated by the person skilled in the art that some of these techniques will be more suitable for broadcasts to individual portable terminals rather than groups of terminals and vice versa.
  • a DCK could be associated with a group TPUl. Indeed a PP may hold several DCK's associated with many group TPUI's.
  • a second group call is in the process of being set up while a first group call is in the process of being received by a PP
  • the PP receives a short page message, informs the user of the call and the user may decide whether listen to the second call. If the user decides to listen, a the DCK associated with the group call is loaded into the encryption algorithm and the MAC is set to listen to the correct slot and frequency of the second connectionless bearer. The received B-field data is then decrypted.
  • connectionless broadcast message could carry information which marks the message as being encrypted. If the broadcast system is based on a DECT telecommunications system, this may be done by transmitting a MAC control encrypt start request message periodically on the bearer itself.

Abstract

A broadcast system for communicating single or multiple encrypted broadcast messages in a telecommunications system (1) is provided, where the telecommunications system has at least one fixed terminal (2) for communication with one or more portable terminals (6). The broadcast system includes means for transmitting first messages from the or each fixed terminal (2) for reception by portable terminals (6) in the reception area of that fixed terminal, the first message including information that specifies a channel, selected for that fixed terminal, which will be used to convey an associated broadcast message. A control means is provided for causing the or each portable terminal to receive on the specified broadcast message channels. The transmitter means then transmits from the fixed terminal (2) the encrypted broadcast messages on the said specified broadcast channels for reception, decryption and reproduction of a broadcast message, such as an audio broadcast message, by the or each portable terminal (6).

Description

DESCRIPTION
SYSTEM AND METHOD OF COMMUNICATING ENCRYPTED GROUP BROADCAST MESSAGES
The present invention relates to a system and method for communicating an encrypted broadcast message over a telecommunications system to a plurality of subscriber terminals and in particular to a system and method that allows the broadcasting of information to a plurality of wireless portable terminals. The system is particularly but not essentially based on the Digital Enhanced Telecommunications (DECT) standard.
It is known to provide telecommunications systems with an audio broadcast facility of some type, depending on the requirements and the capability of the particular system. The message that is broadcast may then be received by a plurality of the system users. One basic system is noted in the English language abstract of Japanese patent application number JP-A-5- 48684. The abstract relates to a cordless telephone set having a telephone master set provided with a voice recording part, a radio (transmitting) part and antenna. A plurality of slave sets are provided with an antenna, radio part, an amplifier and a speaker. A recorded voice message may then be transmitted from the master set to the slave sets.
With such an arrangement, if each slave set is provided with only a simple receiver section (radio part), the receiver section may then be required to support not only reception of the broadcast but also support the exchange of normal telephone traffic with the master set. Problems can arise if a slave set is already being used for conducting a telephone conversation. Further problems may be experienced when attempting to transmit a broadcast to particular slave sets.
Another approach to providing an audio broadcast facility to a plurality of terminals in a telecommunications system is for a base station or some other type of control unit to set up a telecommunications link with each terminal of the plurality in a manner that is conventional for the system, that is, the type of link that is used to carry voice or data file traffic. The audio message is then broadcast by sending it over each of the links simultaneously in the same manner that the voice signal of a normal telephone conversation would be carried. Since an individual point-to-point link needs to be established with each terminal simultaneously, this can place a heavy, if not impossible demand on the system which may only be provided with resources sufficient to establish calls to a limited number of terminals at a given time. The problem may be alleviated to some extent by setting up calls to individual terminals of the plurality one by one, or to fractions of the total number of the terminals sequentially, although this will lead to a delay while a broadcast is made to each of the terminals (or fractions of the total number of terminals) for which the broadcast is intended. This may be unacceptable in certain situations and applications, especially if the welfare of personnel using the terminals is somewhat dependant on timely reception of the broadcasts. In telecommunications systems employing wireless links to portable terminals, attempting to provide a broadcast (such as an audio broadcast) by establishing such traffic calls to a large number of portable terminals simultaneously is even more difficult. This is partly due to the limited number of channels that may be handled by a single base station and the amount of radio spectrum that has been allocated for use by such telecommunication systems. An example of one such system is a DECT compliant telecommunications system (DECT is an abbreviation for Digital Enhanced Cordless Telecommunications). DECT systems are described in the standard ETS 300 175 of which there are several parts. The standard is published by the European Telecommunication Standards Institute and is incorporated herein by reference.
In each of the above mentioned arrangements there is no safeguard to prevent an unauthorised entity receiving and interpreting the broadcasts. This may cause problems where security is an issue.
It is an object of the present invention to provide a system for the broadcasting of encrypted messages such as audio messages or data files over a telecommunications system that allows a plurality of portable terminals to receive and decrypt the messages that are broadcast.
It is another object of the present invention to provide a system for the broadcasting of encrypted messages such as audio messages or data files over a telecommunications system and which allows a plurality of portable terminals to receive and decrypt messages that are broadcast, while at the same time making efficient use of system resources.
In accordance with a first aspect of the present invention there is provided a broadcast system for communicating a broadcast message in a cordless telecommunications system, the telecommunications system having at least one fixed terminal for communication with one or more portable terminal over an air interface, said broadcast system including: first transmitter means for transmitting a first message from the fixed terminal, the message including information specifying a channel, selected for that fixed terminal, to convey the broadcast message; control means, responsive to the first message, for instructing the at least one portable terminal to receive on the selected channel; broadcast message encryption means for encrypting broadcast messages; and second transmitter means for transmitting from the fixed terminal on the selected channel a broadcast message in encrypted form for reception and decryption by the at least one portable terminal.
The broadcast messages are typically audio or data file type messages.
The first and second transmitter means may be incorporated in the fixed terminal. Indeed the first and second transmitter means may be the same entity. The first and second transmitter means may be the same system component. The control means may be located in the portable terminal. Each of the first and second transmitter means and control means may be system applications or the like and the terms do not necessarily relate to hardware.
By broadcasting the message as a connectionless message it is possible to transmit substantially simultaneously to a plurality of portable terminals without setting up an individual call to each portable terminal and therefore without exceeding the limitations of the system. Such a broadcast facility would be of particular use where portable terminals are being carried by security guards or medical workers, where quick substantially simultaneous broadcasting of messages or an alarm signal to personnel is important. Preferably, the first transmitter means includes paging means to generate and include in the first message paging information specifying the identity of the at least one portable terminal for which the broadcast is intended, the control means being responsive also to this paging information such that only a portable terminal having the specified portable terminal identity will be instructed to receive the encrypted broadcast message on the selected channel. This allows broadcast messages to be directed to specific portable terminals.
The broadcast system may also be provided with assigning means for selectively assigning a portable terminal with a portable terminal identity of the type suitable for specifying by the paging means. Therefore, by assigning a number of portable terminals with a common identity, all such terminals may be instructed to receive a broadcast by including in the first message paging information specifying only that one common identity.
Preferably broadcast messages are encrypted by the broadcast message encryption means using a specific encryption algorithm and encryption key such that only portable terminals in possession of a corresponding decryption algorithm and decryption key can decrypt the received encrypted broadcast message.
A broadcast message may be provided with an identifier which is included in the first message. In this case, the identifier may be used by a portable terminal receiving an encrypted broadcast message to select an appropriate decryption algorithm and / or decryption key.
If the cordless telecommunications system is a DECT based telecommunications system then the assigning means may selectively assign a portable terminal with a portable terminal identity which is a Temporary Portable User Identity (TPUI). If the telecommunications system is based on the DECT standard, or a modified form of the DECT standard, the specified broadcast channel may be a DECT physical channel which may then be used to support a DECT simplex bearer. The specified channel can be used to support a connectionless downlink bearer. This has a particular advantage in a DECT compliant system, as the applicants have recognised, since the DECT standard allows for connectionless communications to be set up from the radio fixed parts of the fixed terminals to the portable parts although these connectionless communications are normally only used to carry system information and other control information.
In accordance with a second aspect of the present invention there is provided a method for communicating a broadcast message in a cordless telecommunications system having at least one fixed terminal for communication with one or more portable terminal over an air interface, said method comprising the steps of: transmitting a first message from the fixed terminal, the message including information specifying a channel, selected for that fixed terminal, to convey the broadcast message; instructing the at least one portable terminal to receive on the selected channel; encrypting broadcast messages; and transmitting from the fixed terminal on the selected channel a broadcast message in encrypted form for reception and decryption by the at least one portable terminal.
Multiple instances of broadcast messages may be established to allow the presence of multiple at least partially overlapping broadcast messages. Such broadcasts may allow multiple streams of information to be broadcast to a plurality of wireless portable terminals.
In accordance with a further aspect of the present invention there is provided a communications device apparatus having the technical features of the first transmitter means in the broadcast system.
In accordance with a yet further aspect of the present invention there is provided a communications device apparatus having the technical features of the control means in the broadcast message system. In accordance with a yet further aspect of the present invention there is provided a communications device apparatus having the technical features of the second transmitter means in the broadcast message system.
In accordance with a yet further aspect of the present invention there is provided a communications device apparatus having the technical features of the broadcast message encryption means.
In accordance with a yet further aspect of the present invention there is provided a communications device apparatus having the technical features of the portable terminal usable in conjunction with the broadcast system for reception and decryption of a broadcast message.
Other aspects and optional features of the present invention appear in the appended claims, to which reference should now be made and the disclosure of which is incorporated herein by reference.
The present invention will now be described by way of example only with reference to the accompanying drawings in which:
Figure 1 shows a schematic representation of a telecommunications system incorporating the present invention; Figure 2 shows an overview of an encryption / decryption process; and
Figure 3 shows schematically components of a system suitable for generating an encryption key.
The particular communications system shown in Figure 1 is based on a DECT compliant cellular communications system 1 in which the fixed terminal takes the form of a DECT fixed part (FP) 2 which includes a plurality of radio end points in the form of DECT radio fixed parts (RFP's) 3. Three such RFP's
3a, 3b, 3c are shown.
Although the present system is based on a DECT compliant system, the present system is provided with various features which fall outside the scope of the current DECT base standards. Such features will be highlighted where appropriate, but for the purpose of understanding the present invention, references to 'DECT compliant' or 'DECT when discussing particular features should be taken to indicate normal DECT functionality unless otherwise stated. The RFP's 3 are networked together and FP 2 is connectable via an interface to external telecommunication networks such as the public switched telephone network 4 although this is optional. The FP also includes a control unit 5 which serves to control the general operation of the whole system including the interoperability of the RFP's 3 with each other. The control unit 5 may also be provided with private automatic branch exchange (PABX) functionality. Although a number of RFP's 3 are used to form a multi cell system, it is possible to provide a single cell system which uses only one RFP 3. In a DECT compliant system a portable terminal takes the form of a portable part (PP) 6 which is capable of establishing communication with the fixed part by establishing a wireless link with a RFP 3a, 3b, 3c. This allows the exchange of traffic such as voice or data, as is well known to the person skilled in the art. Although twelve PP's are shown other numbers may be used. The wireless link communication between an RFP and a PP is provided by so- called bearers which are established on one or more DECT physical channels (channel). Each channel is created by transmitting on one particular slot on one particular radio frequency (RF) in successive time division multiple access (TDMA) frames.
As stated above, a DECT communications system may be provided with one RFP 3 or a number of RFP's 3. Obviously, if the system has only one RFP 3 then this RFP must cater for all connections that are established with the PP's 6. However, in the case of a system having a plurality of RFP's 3, (as is the case for the system illustrated in Figure 1 ), provided for the purpose of increasing system capacity and/or coverage area, connections are established between RFP's 3 and PP's 6 depending on the available link quality, which usually though not always results in a link being established between the PP 6 and the nearest RFP 3. Before the PP6 can participate in traffic communication with the fixed system it needs to attain a condition where it is synchronised with a RFP 3 of the FP 2. This is made possible in a DECT system because each RFP 3 maintains transmissions that carry information relating to the identity of the particular RFP 3 and the FP 2 it is connected with together with other system information. Because each RFP 3 is always transmitting such information a PP 6 is able to receive on each DECT system channel in turn and to monitor for activity on those channels.
This transmitted information is called N-channel and Q-channel information as will be understood by the person skilled in the art. For the purpose of clarity it should be mentioned that the DECT N-channel and DECT Q-channel are logical channels and not DECT physical channels. Because it is the responsibility of the PP 6 to detect the presence of any nearby RFP's 3, when a PP 6 is activated it begins to listen on each DECT channel for N-channel and Q-channel information broadcast by the RFP's 3. If a given RFP 3 is not involved in supporting a traffic connection with a PP then this information is broadcast by itself on a so-called dummy bearer. If a given RFP 3 is involved in supporting one or more traffic connection with one or more PP's 6, the RFP 3 broadcasts this information on each traffic bearer. A RFP 3 supporting at least one traffic connection may drop the dummy bearer although the broadcast of the N-channel and Q-channel information on the dummy must be restored if all traffic connections with that RFP 3 cease. In any case a RFP 3 will always be transmitting N and Q-channel information on at least one DECT channel. The dummy bearer is not intended for reception by a particular PP 6 but is merely for making RFP 3 identity and system information available all of the time to any in-range PP's 6 that happen to be in the vicinity. When a PP 6 is initially switched on, it listens out for the presence of an in-range RFP 3 by scanning through all the valid DECT channels until if finds one with some activity. If the RFP 3 is indeed already supporting a voice or data call to one or more other PP then so-called traffic bearers are already established between the RFP 3 and those PP's and the system information will be found in these. This is sufficient to service the PP 6 with the system information that it needs to synchronise with the RFP 3 and be in a condition ready to make or receive calls to it. If however the RFP 3 is not supporting any voice or data calls there will be no traffic bearers and hence PP's 6 in the vicinity of the RFP 3 rely on the so-called dummy bearer transmitted by the RFP 3 at regular intervals on one of the valid DECT channels so that the PP's may synchronise with this. The PP 6 sets up a so-called synchronisation bearer on the various
DECT channels to determine if a nearby RFP is indeed transmitting on that channel. If it is established that this is not the case, a synchronisation bearer is set up on a different DECT channel until a channel is found that is carrying N-channel and Q-channel information. Setting up a synchronisation bearer allows any N-channel and Q-channel information on a DECT channel to be read. This information is used by the PP 6 to determine if it has access rights to the fixed part, and if it does, the PP 6 enters a state in which it is ready to make and receive calls.
A traffic bearer, as is normally used for voice or data communication, operates in a connection oriented mode since it involves the three stages of setting up a connection from one source to one or more destination, transferring data, and finally releasing the connections. In contrast, a dummy bearer operates in a connectionless mode, since it involves the transmission of self contained units of data from one source to one or more destination. A further type of bearer exists and is called a connectionless bearer. It is similar to a dummy bearer, except that while a dummy bearer can only carry system information, the connectionless bearer can carry other types of information. Further information on the nature of these different bearers is given in the above mentioned DECT standard and will not be reproduced herein unless relevant to understanding of the present invention.
Since all types of bearer contain RFP and system information in the form of N-channel and Q-channel information, all PP's in range of and synchronised with a RFP, whatever their present state (for example, engaged with a voice call or in an idle condition), receive and have access to this information. Another type of DECT logical channel is called the P-channel which contains paging information from the RFP to the PP. When paging information is transmitted, it also appears on all bearers. Therefore any PP which is able to receive N-channel and Q-channel information will also be able to receive any transmitted P-channel information. Because all synchronised PP's always hear any P-channel information that is transmitted, information is carried on this channel to instruct a particular PP which channel to receive on. In order to broadcast a message such as an audio message or data file to a particular PP, that PP is first invited to receive on a particular DECT channel that will be used as the broadcast channel for carrying the broadcast information. Once the PP is receiving on that channel the message is transmitted on that channel for reception by the PP. By inviting a plurality of DECT PP's to receive on that channel, all of those PP's will then be able to receive the broadcast message.
A connectionless downlink bearer is set up by each RFP on the broadcast channel, which may be different for each RFP. All PP's in range of a RFP are now capable of receiving the broadcast message simultaneously if they listen to the channel selected on that RFP for carrying the connectionless downlink bearer. As stated above, a connectionless bearer is similar to a dummy bearer, but in this case the connectionless bearer has it's B-field filled with information relating to the broadcast message itself, as will be understood by the person skilled in the art. Although the message may contain voice or data file information, other types of information could be broadcast such as information representing an alarm signal. It is noted that this is in contrast to the concept of establishing a traffic bearer to each in-range PP for which the broadcast message is intended and relaying the message over these traffic bearers. A DECT RFP cluster is only capable of supporting a limited number of traffic bearers and there is an absolute number of traffic bearers that may be established in a DECT system anyway before frequency reuse becomes necessary. Therefore, by employing a connectionless bearer for carrying the broadcast message, a plurality of PP's may receive the message without unduly loading the telecommunications system. In order for a given PP to actually receive and reproduce the broadcast message, a first message containing information telling the PP's which DECT channel is being used for the broadcast message is transmitted by each RFP on all bearers as a short page message. The short page message which is transmitted on the P-channel is used to identify the DECT channel that will carry the broadcast message. Short page messages are normally carried in the A-field, as will be known to the person skilled in the art. In practice, if a dummy bearer is in use by a particular RFP, it is preferable to convert the dummy bearer into a connectionless downlink bearer for carrying the broadcast message thus claiming the DECT channel previously used for carrying the dummy bearer, rather than to set up a connectionless downlink bearer on a different DECT channel. One reason for this preference arises because if a given RFP is transmitting only a dummy bearer, any PP's synchronised with that RFP will be receiving on the DECT channel carrying the dummy bearer. This will generally avoid the need to instruct a PP to receive on a different DECT channel.
Now taking the example of providing a second broadcast message while the first broadcast message is being transmitted, the second broadcast message is provided by setting up a second connectionless downlink bearer from each RFP. For a given RFP, the second connectionless downlink bearer will be on a DECT channel different to the first connectionless downlink bearer. The B-field of the second connectionless downlink bearer is filled with information relating to the second broadcast message itself, as will be understood by the person skilled in the art.
In order for a given PP to actually receive and reproduce the second broadcast message, a further instance of first message is generated which contains information telling the PP's which DECT channel is being used for the second broadcast message. This further instance of first message is transmitted by each RFP as a short page message on all existing bearers. As stated above, because the short page messages are carried on the P-channel they can be present and are normally contained in all bearers and are normally carried in the A-field. This results in all PP's hearing the short page messages which notifies them of the existence of a broadcast. A PP can then receive on the DECT channel carrying the second connectionless bearer, and therefore the second broadcast message, to reproduce the second broadcast message. It is possible to provide further instances of broadcast messages in the same way that the second broadcast message is provided, each broadcast message having an associated first message. Because each broadcast message may be performed independently of the others, it is possible to provide multiple overlapping simultaneous broadcast messages in the system. It is noted that the second and further connectionless downlink bearers are unlikely to be set up by converting the dummy bearer into one of these connectionless downlinks, since the dummy will have normally been converted into the first connectionless downlink bearer. By 'simultaneous' it is meant that more than one broadcast message may be provided at the same time. Since each broadcast message is unrelated and independent of any other broadcast message there is no such requirement that the broadcast messages are to be synchronised with each other or necessarily performed at the same time. The above described mechanism of providing a single broadcast message in a DECT telecommunications system would appear to comply with the current DECT standards. However, the presently described mechanism of providing second and further instances of simultaneous broadcast messages by adding second and further connectionless downlink bearers, respectively, requires a departure from the current version of the DECT base standards. According to the standards, for each cluster of cells only one instance of connectionless message control downlink service may exist. Connectionless message control (CMC) relates to the functions that control and distribute the information of all connectionless services to one or more connectionless bearer control, as will be understood by the person skilled in the art. Although each CMC allows a maximum of two connectionless bearers, the second is only intended for channel hopping purposes and the data on each bearer is exactly the same. Therefore, second and further broadcast calls carried on second and further connectionless downlink bearers require second and further instances of CMC respectively.
The presence of second and further instances of CMC does not affect the normal operation of a DECT based system. This means that it is possible to use an unmodified PP with the telecommunications system, although such a PP would not be able to receive broadcast calls.
It is not always a requirement for all PP's to receive a broadcast message and it is possible to cause a given broadcast message to be received by only one of the PP's or a selection of the PP's. PP's may be assigned an identity or group identity, and only those PP's carrying that particular identity may elect to receive a given broadcast. This may be achieved in a DECT system by assigning a Group Temporary Portable User Identity (TPUl) to a portable part, or a group of portable parts so that only those PP's having a particular TPUl are invited to receive the broadcast message. More than one TPUl may be employed in the system thus allowing different groups of PP's to be created and independently selected for receiving a broadcast. The TPUl related information is also present in the P-channel and is carried in the short page message, so again, all PP's are capable of receiving this information. The use of identities and addressing will be known to the person skilled in the art and further information is contained in the DECT standards. Throughout the description, a reference to a TPUl should be read as a reference to a connectionless group TPUl unless the context suggests otherwise. An example of where this is not the case would be a reference to an individual TPUl, as will also be understood by the person skilled in the art.
The MAC layer information in the short page message contains the location of the connectionless bearer, i.e. in terms of time slot and frequency. This may be different for each RFP. The short page message may originate from an application in the RFP. In particular the short page message contains information present in the P-channel; that is the identity of the PP's which should receive the broadcast message, and the DECT channel the broadcast is transmitted on.
The broadcast message may originate from anywhere in the system and for example may originate from the PSTN or from another PP. In the latter case the message is transmitted from the PP to an in-range RFP over a normal traffic bearer, after which the message is broadcast to the other PP's by the mechanism described above. The originator of the broadcast message may specify the group for which the broadcast is intended by forwarding the appropriate TPUl information. In one example this may be generated by the user indicating the intended recipients by entering information via the keypad of the PP. Each RFP ensures the quality is maintained of each connectionless downlink bearer currently in use. Connectionless bearer hopping may be employed to change to another DECT channel if channel quality is poor. A short page message can be used to inform PP's synchronised with the RFP of the new channel carrying the connectionless bearer. When the connectionless bearer is moved to a different channel, a new page is sent out regularly to inform all of the in range PP's of this. Furthermore, for a given broadcast message, it's associated connectionless downlink bearer will not necessarily be on the same DECT channel for each RFP, so short page messages specifying the location of the connectionless downlink bearer and the broadcast call TPUl information will be sent out regularly by each RFP for the entire duration of the broadcast message. This will allow PP's to roam into a cell served by a different RFP which may well be transmitting the connectionless downlink for a given broadcast message on another DECT channel, and still receive the broadcast message if necessary by receiving on that channel. It also allows a PP which is activated only during a broadcast to begin receiving the broadcast. Connectionless bearer handover could also be implemented in other ways although this may violate the DECT standard.
Optionally a number of TPUI's may be used, each having a priority value assigned. Where priority values are employed, a PP can be set to receive or reject a broadcast call depending on the priority value associated with the broadcast.
A given PP may have a number of identities assigned to it. Furthermore, if a given PP is instructed to receive more than one broadcast message simultaneously a signal could be generated by the portable part alerting the user to switch to a different broadcast. The user could be alerted, for example by an audio tone or a display message. Alternatively, if the broadcast message is of data, an application on the portable part could automatically switch to a different one of the broadcast calls. Each broadcast message may be assigned a priority value allowing the PP to alert the user of the PP depending on the priority value of the message. Furthermore, the PP may automatically switch to receive the broadcast message having the highest priority value. A priority value could be reserved for indicating an emergency status in which case any broadcast having such an assigned priority value will be received and reproduced by portable parts irrespective of whether they are already supporting a broadcast or normal connection based call.
A given PP could receive more than one broadcast message simultaneously. This would allow an audio broadcast, for example, to be reproduced, while a further audio broadcast could be stored. Other combinations of received broadcasts include audio and data and audio and video broadcasts.
If a PP is already being used for a normal connection based call, the occurrence of a broadcast to that terminal can have a number of effects. For example, a signal could be generated by the portable part alerting the user of the broadcast allowing the user to switch to the broadcast or ignore it. The user could be alerted, for example, by an audio tone or a displayed message. If the user chooses to accept the broadcast, the normal connection based call may be put on hold. Alternatively, the portable part could automatically switch to reproduce the broadcast, perhaps also putting the normal call on hold. The automatic switch could be implemented so that it only occurs if broadcasts have specified associated priority values. A PP may be provided with means for reproducing a audio broadcast call at a volume which is greater than that employed during a normal connection based call. For this purpose a loudspeaker may be provided in the portable part which may be activated automatically. As stated above, the broadcast could be representative of an alarm signal. Such a broadcast could be initiated by a user of a PP activating an alarm function provided on the PP. The control unit sends a broadcast message to all RFP's containing the group TPUl and which broadcast messages are to be transmitted by the RFP's. The broadcast group identities (which are group TPUI's in the specific example) can be assigned to a PP just after the PP has subscribed, or at location registration when the individual TPUl is assigned. Alternatively, the identity could be assigned at any time since it is permitted to re-arrange a PP into different groups at any time. A PP can be a member of multiple groups.
Now that a mechanism has been described for providing single and multiple broadcast calls in a DECT-based telecommunications system, the encryption related operations will now be described, with reference to Figures 2 and 3. With reference to Figure 2, before broadcast messages are transmitted from the fixed terminal, they are encrypted by broadcast message encryption means 11. The encryption means employs an encryption algorithm 12 and an encryption key 13. A non-encrypted message (a so-called 'plaintext' message) 30 is input to the encryption means 11 and the broadcast encryption means 11 operates on the non-encrypted message 30 to convert it into an encrypted broadcast message 40 (a so-called ciphertext message). It is this encrypted message 40 which is broadcast over the air interface from the fixed terminal 3 to the portable terminals 6. Because the broadcast message is encrypted, any unauthorised interception of the message will not allow the content of the message to be readily deciphered.
If the broadcast message is received and subsequently decrypted, the original content of the message may be recovered and reproduced. Those portable terminals for which the broadcast message is intended are therefore provided with broadcast message decryption means 21. In order for the decryption means 21 to convert a received encrypted message 40 into the original non-encrypted message 30, the decryption means 21 requires a specific decryption algorithm 22 and specific decryption key 23. The specific decryption algorithm 22 and specific decryption key 23 are associated with the encryption algorithm 12 and encryption key 13 that were originally used to encrypt the broadcast message. Only the correct decryption algorithm 22 and correct decryption key 23 will allow the broadcast message decryption means 21 to decrypt the message correctly. By providing a suitable form of algorithm and a large number of possible decryption keys, it is very difficult to perform a successful decryption operation on an encrypted message without possessing the correct decryption algorithm and decryption key for that message. By this mechanism, a message may be broadcast with the knowledge that it will be comprehended readily only by intended recipients.
For the above mentioned encryption system to work effectively, there needs to be a procedure in place to provide the intended recipients of the broadcast message (the portable terminal) with the correct decryption algorithm and decryption key. There are a number of possible ways to do this, some of which will now be discussed, first in general terms and secondly in a telecommunications system based on a DECT-compliant telecommunications system.
One way is to provide a portable terminal with a specific decryption algorithm and specific decryption key during manufacture. Another way is to provide a portable terminal with a specific decryption algorithm and specific decryption key that is normally fixed but may be modified if necessary by the user or a system administrator. In this case the key and algorithm are transferred to the portable terminal via a physical link established with a programming unit or equivalent. The unit may take the form of a cradle. It is important that the link is a physical one and not a link established over the air. In both cases, by providing the fixed terminal with the necessary information about the portable terminal including the specific decryption algorithm and specific decryption key, the fixed terminal can generate an encrypted broadcast message that may be received and decrypted by the said portable terminal. Advantages of this system include: 1) the decryption process is transparent to the user of the portable terminal so the user is not required to take any action; 2) the decryption algorithm and key are hidden in the portable terminal and therefore are not readily accessible; 3) a portable terminal may be provided with an identifier relating to the in-built algorithm and key allowing a plurality of portables bearing the same identifier to be selected, and since each has the same decryption algorithm and decryption key, a group may be formed which is capable of decrypting the same encrypted broadcast message. An extension of this system is to provide a portable terminal with a plurality of decryption algorithm and decryption key pairs which may be selected as appropriate, either automatically within the portable terminal or by intervention of the user. A disadvantage of this system is that the decryption key and decryption algorithm may not be re-programmed which can result in an inflexible system and cause security problems if a portable terminal is acquired by an unauthorised person. In a DECT based telecommunications system such an algorithm and key may be provided by passing the group TPUI's and SCK's / DCK's to the PP via an electrical connection (for example a serial link). This contributes towards the security of the system because the information is not transmitted over the air interface.
Another way is to provide portable terminals with one or more standard decryption algorithm but to use individual encryption keys at the fixed terminal and corresponding individual decryption keys at the portable terminal, where the individual keys may be changed. The broadcast messages are encrypted taking into account the decryption algorithm and key held in the or each portable terminal for which the broadcast is intended. The key may be input by the user of the portable terminal, or generated from information input by the user of the portable terminal. This system has the advantage that the key can be changed when required simply by informing the user (via a secure channel) of the new key, or information required to generate the new key, that is required for correct decryption. In some cases the required key can be generated from a combination of information input by the user and information associated with the portable terminal itself, for example an equipment serial number. The information input by the user may be stored for a duration which conveniently allows the user to receive broadcast messages without the necessity to input information each time a broadcast occurs.
In a DECT based telecommunications system a received encrypted broadcast message could be decrypted using the key stream generator together with a decryption key in the form of a static cipher key (SCK) as will be understood by the person skilled in the art. The SCK itself may be input by the user of the DECT portable part or be generated from information input by the user, thereby allowing a reduced amount of information to be input by the user. The SCK may be generated from a combination of information such as the portable terminal's IPUI (International portable user identity) or IPEI (International portable equipment identity) and information input by the user. This offers the advantage of allowing less user information to be input while at the same time increasing the security of the encrypted broadcast, since knowledge only of the information input by the user will not allow generation of the required SCK. A disadvantage of the latter system is that encrypted group broadcasts cannot be made since each portable terminal will have a different IPEI and IPUI leading to the generation of different SCK's in each portable terminal.
Another way is to provide each portable terminal with one or more selectable decryption algorithm and to generate the decryption key internally. In this case it is necessary for the portable terminal to generate a decryption key that is suitable for decrypting the broadcasts that are received. Likewise it is necessary for the fixed terminal to use an encryption key and algorithm such that the broadcast encrypted message can be decrypted by the or each appropriate portable terminal. By providing a way for a specific portable terminal to generate a particular decryption key on the command of the fixed terminal, a powerful and secure broadcast message system is possible. Furthermore, if a portable terminal can be so commanded by the fixed terminal over a non-secure channel without appreciably compromising security, the system is also convenient to use.
This may be implemented in a DECT based telecommunications system as an extension of the process for authentication of a portable part. With reference to Figure 3, a DECT fixed terminal (Fixed Part, FP) is able to authenticate a DECT portable terminal (Portable Part, PP) to establish that a portable part is one that it claims to be. Authentication involves the use of a cryptographic challenge-response mechanism wherein the FP challenges a PP to perform a calculation and present a result. The FP also performs the same calculation and if the result generated by the PP matches the (expected) result generated by the FP, the FP accepts the PP as being genuine. The result generated by the PP is denoted as 'RES1 ' which is produced by authentication processes A11 and A12. The inputs to the processes are 'K', an authentication key, 'RS', a value used to establish authentication session keys and 'RAND F', a random value. The value RS and RAND F are issued by the FP and broadcast over the air interface to the PP. The FP is also provided with authentication processes A1 1 and A12. Because the FP knows what the value of K is for the genuine PP it is attempting to authentic, and also knows RS and RAND F, the FP can calculate locally the expected value of RES1. The PP calculates the value RES1 and transmits it back to the FP over the air interface and if the value matches the locally calculated value this indicates that the PP is genuine. This process allows the PP to demonstrate it's knowledge of the correct value of K without disclosing the value over the air.
Another product of the authentication process A1 1 and A12 is a so called Derived Cipher Key (DCK). A new DCK is generated on each occurrence of authentication. Authentication occurs at the beginning of a call but may be invoked at any time during a call. When a DECT PP receives an encrypted broadcast call, this may be decrypted using the key stream generator together with the correct DCK, rather than the SCK as described above. It will be apparent that a number of PP's may be provided with the same
DCK by ensuring that each PP performs the same authentication process A1 1 and A12 on the same values of K, RS and RAND F. If each of the number of PP's is provided with the same DCK this means that a group broadcast could be received and decrypted by these PP's. In order to maintain security of the broadcasts, K is generated from authentication code AC via authentication key stream process B1. The authentication code in input by the user of the PP.
Whichever method is selected for providing a portable with the required decryption algorithm and decryption key pair, each portable terminal may be capable of possessing a plurality of such pairs. Furthermore, irrespective of whether the algorithm and / or key is selected automatically by an application in the portable terminal or selected or input by a user, there can be a requirement that the correct pair is applied to a particular broadcast message, especially where there are multiple broadcasts present, or broadcasts requiring different privileges for access. To allow for this each broadcast message carries an identity allowing the correct pair to be selected and applied to it. For example, at a basic level, a portable terminal could indicate in a display that an incoming broadcast message carries identity number 1. The user would note this information and input the correct decryption key for messages carrying such identity numbers. Users not authorised to receive messages carrying such an identity number would not be provided with the correct decryption key. In a system where user intervention is undesirable, an application in the portable terminal would note the message identity number and apply the correct decryption key automatically. A portable terminal not authorised to receive messages carrying such an identity number would not be provided with the correct decryption key. Identity numbers could also be used to indicate or select the appropriate decryption algorithm. In a DECT based encrypted broadcast system, such a broadcast message identifier may be carried in the first message together with the group TPUl information. One way to implement this is by use of the «PORTABLE IDENTITY» information element. This element is normally used to transport the DECT portable identity during paging. Octet 3 of the element is used to indicate the identity type coding for portable identities. When octet 3 indicates that the identity is a temporary portable user identity (TPUl), the actual TPUl value is contained in octets 5, 6 and 7. However, bits 8, 7, 6 and 5 of octet 5 are always set to zero. Therefore these bits are employed in this implementation to indicate the identity of the broadcast message and since four bits are available, a maximum of 16 different broadcast messages may be identified, although this is not to be interpreted as limiting the scope of the present invention. The use of these bits for providing a broadcast message identity may possible deviate from the teaching of the DECT base standards.
Such identity information can be especially beneficial in those systems which, like a DECT based telecommunication system, may assign a different group TPUl to a PP as it roams from one cell to another. Through the use of a broadcast identity, a PP can roam into another cell and continue to receive and decrypt a broadcast message despite a different TPUl being used. This is because the broadcast identity may be used by the PP to determine which broadcast message it is receiving and therefore which decryption key and algorithm to use. Other ways of providing a portable terminal with decryption keys and algorithms may be employed although they may offer a lower standard of security. For example, the decryption key could be the group TPUl itself, a function of the group TPUl, a key that is broadcast in the first message, or a key based on the user authentication key. It will be appreciated by the person skilled in the art that some of these techniques will be more suitable for broadcasts to individual portable terminals rather than groups of terminals and vice versa. A DCK could be associated with a group TPUl. Indeed a PP may hold several DCK's associated with many group TPUI's. In one specific example, if a second group call is in the process of being set up while a first group call is in the process of being received by a PP, the PP receives a short page message, informs the user of the call and the user may decide whether listen to the second call. If the user decides to listen, a the DCK associated with the group call is loaded into the encryption algorithm and the MAC is set to listen to the correct slot and frequency of the second connectionless bearer. The received B-field data is then decrypted.
In order to inform a portable terminal of the fact that a broadcast message is encrypted, the connectionless broadcast message could carry information which marks the message as being encrypted. If the broadcast system is based on a DECT telecommunications system, this may be done by transmitting a MAC control encrypt start request message periodically on the bearer itself.
This application is related to our co-pending UK patent applications number GB9920325 entitled 'Broadcast Facility' and number GB9920324 entitled 'Multiple Broadcast Facility'. While the present invention is described in some detail with reference to a DECT compliant telecommunications system carrying modifications, it is noted that the invention could be implemented in other telecommunication systems capable of establishing single or multiple instances of encrypted connectionless messaging. In this case portable terminals are instructed to receive the messages using a form of addressing different to DECT TPUl addressing. That is, the target audience of the call is defined by a group identity, which may be programmable for each portable terminal. Details of the encryption mechanism will likely differ from those described above with reference to a DECT-based system.
From reading the present disclosure, other modifications will be apparent to persons skilled in the art. Such modifications may involve other features which are already known in the design, manufacture and use of systems and devices and component parts thereof and which may be used instead of or in addition to features already described herein.

Claims

1. A broadcast system for communicating a broadcast message in a cordless telecommunications system (1), the telecommunications system having at least one fixed terminal (2) for communication with one or more portable terminal (6) over an air interface, said broadcast system including:
first transmitter means for transmitting a first message from the fixed terminal (2), the message including information specifying a channel, selected for that fixed terminal, to convey the broadcast message;
control means, responsive to the first message, for instructing the at least one portable terminal to receive on the selected channel;
broadcast message encryption means (11) for encrypting broadcast messages; and
second transmitter means for transmitting from the fixed terminal (2) on the selected channel a broadcast message in encrypted form for reception and decryption by the at least one portable terminal (6).
2. A broadcast system in accordance with claim 1 wherein the first transmitter means includes paging means to generate and include in the first message paging information specifying the identity of the at least one portable terminal (6) for which the broadcast is intended, the control means being responsive also to this paging information such that only a portable terminal (6) having the specified portable terminal identity will be instructed to receive the encrypted broadcast message on the selected channel.
3. A broadcast system in accordance with claim 1 or 2 and further including assigning means for selectively assigning a portable terminal (6) with a portable terminal identity of the type suitable for specifying by the paging means.
4. A broadcast system in accordance with claim 1 , 2 or 3 and further including message decryption (21) means provided in each at least one portable terminal, the message decryption means employing a decryption algorithm (22) and decryption key (23).
5. A broadcast system in accordance with claim 4 and further including means for providing the decryption means (21) with a decryption algorithm and/or a decryption key.
6. A broadcast system in accordance with claim 4 or 5 wherein a broadcast message is encrypted by the broadcast message encryption means (11 ) using a specific encryption algorithm (12) and encryption key (13) such that only portable terminals in possession of a corresponding decryption algorithm (22) and decryption key (23) can decrypt the received encrypted broadcast message.
7. A broadcast system in accordance with any one of claims 1 to 6 wherein the broadcast message has a message identifier, the message identifier being included by the first transmitter means in the first message.
8. A broadcast system in accordance with claim 7 when appended to claim 4, 5 or 6 wherein the decryption means (21) is responsive to the message identifier to select a decryption algorithm and / or decryption key.
9. A broadcast system in accordance with any one of claims 1 to 8 wherein the cordless telecommunications system (1) is a DECT based telecommunications system and the broadcast message channel is connectionless.
10. A broadcast system in accordance with claim 9 when appended to claim 2 or 3 wherein the portable terminal identity of the at least one portable terminal (6) is specified or assigned, respectively, using a temporary portable user identity (TPUl).
11. A broadcast system in accordance with claim 9 when appended to claim 7 or 8, wherein the identifier is a value transported in the «PORTABLE IDENTITY» information element and located at bit 8, 7, 6 and 5 of octet 5 when octet 3 indicates that the identity type coding is a temporary portable user identity (TPUl).
12. A broadcast system in accordance with claim 4 when appended to claim 3 wherein the decryption key (23) is derived from the portable terminal identity.
13. A method for communicating a broadcast message in a cordless telecommunications system (1 ) having at least one fixed terminal (2) for communication with one or more portable terminal (6) over an air interface, said method comprising the steps of:
transmitting a first message from the fixed terminal (2), the message including information specifying a channel, selected for that fixed terminal, to convey the broadcast message,
instructing the at least one portable terminal (6) to receive on the selected channel;
encrypting broadcast messages; and
transmitting from the fixed terminal (2) on the selected channel a broadcast message in encrypted form for reception and decryption by the at least one portable terminal (6).
14. A method in accordance with claim 13 and further comprising the steps of: generating and including in the first message paging information specifying the identity of the at least one portable terminal for which the broadcast is intended, such that only a portable terminal (6) having the specified portable terminal identity will be instructed to receive the encrypted broadcast message on the selected channel.
15. A method in accordance with claim 14 and further including the step of selectively assigning a portable terminal (6) with a portable terminal identity.
PCT/EP2000/007692 1999-08-28 2000-08-07 System and method of communicating encrypted group broadcast messages WO2001017288A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP00960409A EP1131964A1 (en) 1999-08-28 2000-08-07 System and method of communicating encrypted group broadcast messages
JP2001521100A JP2003508984A (en) 1999-08-28 2000-08-07 System and method for communicating an encrypted group broadcast message
KR1020017005207A KR20010080908A (en) 1999-08-28 2000-08-07 System and method of communicating encrypted group broadcast messages

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9920323.4 1999-08-28
GBGB9920323.4A GB9920323D0 (en) 1999-08-28 1999-08-28 Encrypted broadcast facility

Publications (1)

Publication Number Publication Date
WO2001017288A1 true WO2001017288A1 (en) 2001-03-08

Family

ID=10859926

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2000/007692 WO2001017288A1 (en) 1999-08-28 2000-08-07 System and method of communicating encrypted group broadcast messages

Country Status (7)

Country Link
EP (1) EP1131964A1 (en)
JP (1) JP2003508984A (en)
KR (1) KR20010080908A (en)
CN (1) CN1168331C (en)
GB (1) GB9920323D0 (en)
TW (1) TW541844B (en)
WO (1) WO2001017288A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1213935A2 (en) * 2000-12-05 2002-06-12 Siemens Information and Communication Products, L.L.C. Cordless phone system capable of supporting a broadcast mode
WO2003036907A1 (en) * 2001-10-24 2003-05-01 Nokia Corporation Ciphering as a part of the multicast concept
WO2003056855A1 (en) * 2001-12-21 2003-07-10 Oy Radiolinja Ab Method for detection of accessability of a group of terminals located within a defined area
WO2003061156A1 (en) * 2002-01-15 2003-07-24 Motorola Inc Variable frequency spacing in a fdd communication system
EP1410605A2 (en) * 2001-06-22 2004-04-21 Paperless Interactive Newspaper, LLC Multimedia broadcasting, broadcast services for cell phone and other users and modified sim card and related means for enabling such broadcast reception
EP1732333A1 (en) * 2005-06-10 2006-12-13 LG Electronics Inc. Method and system for downloading data in a mobile communication terminal
WO2007021141A1 (en) * 2005-08-17 2007-02-22 Samsung Electronics Co., Ltd. Method and apparatus for providing notification message in a broadcasting system
US7359375B2 (en) 2001-06-25 2008-04-15 Nokia Corporation Method and apparatus for obtaining data information
JP2009514405A (en) * 2005-10-27 2009-04-02 クゥアルコム・インコーポレイテッド Method and apparatus for processing a QuickPage block in a wireless communication system
US8199661B2 (en) 2005-10-27 2012-06-12 Qualcomm Incorporated Method and apparatus for processing supplemental and non supplemental assignments
TWI383341B (en) * 2009-03-16 2013-01-21 Chiou Haun Lee Multilayer Diffusion and Decryption Methods
US8457092B2 (en) 2005-06-16 2013-06-04 Qualcomm Incorporated Quick paging channel with reduced probability of missed page
US8761080B2 (en) 2005-03-15 2014-06-24 Qualcomm Incorporated Multiple other sector information combining for power control in a wireless communication system
US8832458B2 (en) 2005-03-22 2014-09-09 Seagate Technology Llc Data transcription in a data storage device
US9055552B2 (en) 2005-06-16 2015-06-09 Qualcomm Incorporated Quick paging channel with reduced probability of missed page
CN113079492A (en) * 2021-03-22 2021-07-06 广东湾区智能终端工业设计研究院有限公司 Information sharing method and device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100958519B1 (en) 2002-08-14 2010-05-17 엘지전자 주식회사 Method for receive and transmission in mobile communications system
KR101289810B1 (en) * 2011-07-20 2013-07-26 (주)누비콤 Transmitter, receiver, data transmitting method, data receiving method, and data transmitting and receiving method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998010605A1 (en) * 1996-09-06 1998-03-12 Nokia Mobile Phones Limited Mobile station and network having hierarchical index for cell broadcast service
GB2327567A (en) * 1997-07-17 1999-01-27 Orange Personal Comm Serv Ltd Controlling Access to SMSCB Service

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998010605A1 (en) * 1996-09-06 1998-03-12 Nokia Mobile Phones Limited Mobile station and network having hierarchical index for cell broadcast service
GB2327567A (en) * 1997-07-17 1999-01-27 Orange Personal Comm Serv Ltd Controlling Access to SMSCB Service

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1213935A3 (en) * 2000-12-05 2003-01-22 Siemens Information and Communication Mobile LLC Cordless phone system capable of supporting a broadcast mode
EP1213935A2 (en) * 2000-12-05 2002-06-12 Siemens Information and Communication Products, L.L.C. Cordless phone system capable of supporting a broadcast mode
US6738620B2 (en) 2000-12-05 2004-05-18 Siemens Information & Communication Mobile, Llc. Cordless phone system capable of supporting a broadcast over broadcast mode
EP1410605A2 (en) * 2001-06-22 2004-04-21 Paperless Interactive Newspaper, LLC Multimedia broadcasting, broadcast services for cell phone and other users and modified sim card and related means for enabling such broadcast reception
EP1410605A4 (en) * 2001-06-22 2006-08-16 Paperless Interactive Newspape Multimedia broadcasting, broadcast services for cell phone and other users and modified sim card and related means for enabling such broadcast reception
US7359375B2 (en) 2001-06-25 2008-04-15 Nokia Corporation Method and apparatus for obtaining data information
WO2003036908A1 (en) * 2001-10-24 2003-05-01 Nokia Corporation Ciphering as a part of the multicast concept
US8307204B2 (en) 2001-10-24 2012-11-06 Nokia Siemens Networks Oy Ciphering as a part of the multicast concept
US8549287B2 (en) 2001-10-24 2013-10-01 Nokia Corporation Ciphering as a part of the multicast concept
WO2003036907A1 (en) * 2001-10-24 2003-05-01 Nokia Corporation Ciphering as a part of the multicast concept
US9520996B2 (en) 2001-10-24 2016-12-13 Nokia Technologies Oy Ciphering data for transmission in a network
WO2003056855A1 (en) * 2001-12-21 2003-07-10 Oy Radiolinja Ab Method for detection of accessability of a group of terminals located within a defined area
WO2003061156A1 (en) * 2002-01-15 2003-07-24 Motorola Inc Variable frequency spacing in a fdd communication system
US8761080B2 (en) 2005-03-15 2014-06-24 Qualcomm Incorporated Multiple other sector information combining for power control in a wireless communication system
US8832458B2 (en) 2005-03-22 2014-09-09 Seagate Technology Llc Data transcription in a data storage device
US7761089B2 (en) 2005-06-10 2010-07-20 Lg Electronics Inc. Method and system for downloading data
EP1732333A1 (en) * 2005-06-10 2006-12-13 LG Electronics Inc. Method and system for downloading data in a mobile communication terminal
US9055552B2 (en) 2005-06-16 2015-06-09 Qualcomm Incorporated Quick paging channel with reduced probability of missed page
US8750908B2 (en) 2005-06-16 2014-06-10 Qualcomm Incorporated Quick paging channel with reduced probability of missed page
US8457092B2 (en) 2005-06-16 2013-06-04 Qualcomm Incorporated Quick paging channel with reduced probability of missed page
WO2007021141A1 (en) * 2005-08-17 2007-02-22 Samsung Electronics Co., Ltd. Method and apparatus for providing notification message in a broadcasting system
US8547977B2 (en) 2005-08-17 2013-10-01 Samsung Electronics Co., Ltd. Method and apparatus for providing notification message in a broadcasting system
US8326330B2 (en) 2005-10-27 2012-12-04 Qualcomm Incorporated Method and apparatus for updating configuration attributes using FastRepage attribute in wireless communication systems
US8744444B2 (en) 2005-10-27 2014-06-03 Qualcomm Incorporated Method and apparatus for transmitting a pilot report (PilotReport) message in wireless communication systems
JP2009514405A (en) * 2005-10-27 2009-04-02 クゥアルコム・インコーポレイテッド Method and apparatus for processing a QuickPage block in a wireless communication system
US8457042B2 (en) 2005-10-27 2013-06-04 Qualcomm Incorporated Method and apparatus for transmitting and receiving a sectorparameters message in an active state in wireless communication system
US8289897B2 (en) 2005-10-27 2012-10-16 Qualcomm Incorporated Method and apparatus for processing open state in wireless communication system
US8477808B2 (en) 2005-10-27 2013-07-02 Qualcomm Incorporated Method and apparatus of assigning in wireless communication systems
US8520628B2 (en) 2005-10-27 2013-08-27 Qualcomm Incorporated Method and apparatus for monitoring other channel interference in wireless communication system
US8289908B2 (en) 2005-10-27 2012-10-16 Qualcomm Incorporated Method and apparatus for processing simultaneous assignment in wireless communication systems
US8265066B2 (en) 2005-10-27 2012-09-11 Qualcomm Incorporated Method and apparatus for reducing power consumption in wireless communication systems
US8599712B2 (en) 2005-10-27 2013-12-03 Qualcomm Incorporated Method and apparatus for setting reverse link CQI reporting modes in wireless communication system
US8675549B2 (en) 2005-10-27 2014-03-18 Qualcomm Incorporated Method of serving sector maintenance in a wireless communication systems
US8331285B2 (en) 2005-10-27 2012-12-11 Qualcomm Incorporated Method and apparatus of establishing access channel in wireless communication systems
US8248950B2 (en) 2005-10-27 2012-08-21 Qualcomm Incorporated Method of transmitting and receiving a redirect message in a wireless communication system
US8238289B2 (en) 2005-10-27 2012-08-07 Qualcomm Incorporated Method and apparatus for requesting selected interlace mode in wireless communication systems
US8218479B2 (en) 2005-10-27 2012-07-10 Qualcomm Incorporated Method and apparatus for processing a multi-code word assignment in wireless communication systems
US8923211B2 (en) 2005-10-27 2014-12-30 Qualcomm Incorporated Method and apparatus of processing an access grant block in wireless communication systems
US8971222B2 (en) 2005-10-27 2015-03-03 Qualcomm Incorporated Method and apparatus for decrementing assignments in wireless communication systems
US8199661B2 (en) 2005-10-27 2012-06-12 Qualcomm Incorporated Method and apparatus for processing supplemental and non supplemental assignments
US9125078B2 (en) 2005-10-27 2015-09-01 Qualcomm Incorporated Method and apparatus for setting reverse link CQI reporting modes in wireless communication system
TWI383341B (en) * 2009-03-16 2013-01-21 Chiou Haun Lee Multilayer Diffusion and Decryption Methods
CN113079492A (en) * 2021-03-22 2021-07-06 广东湾区智能终端工业设计研究院有限公司 Information sharing method and device
CN113079492B (en) * 2021-03-22 2022-04-05 广东湾区智能终端工业设计研究院有限公司 Information sharing method and device

Also Published As

Publication number Publication date
TW541844B (en) 2003-07-11
KR20010080908A (en) 2001-08-25
CN1327690A (en) 2001-12-19
GB9920323D0 (en) 1999-11-03
EP1131964A1 (en) 2001-09-12
JP2003508984A (en) 2003-03-04
CN1168331C (en) 2004-09-22

Similar Documents

Publication Publication Date Title
JP2782954B2 (en) Dynamic encryption key selection for encrypted wireless transmission
JP4445005B2 (en) Method and apparatus for providing a private communication system in a public telephone network
WO2001017288A1 (en) System and method of communicating encrypted group broadcast messages
JPH0746643A (en) System to access to digitally coded communication in dispersion type switching network
EP1638355B1 (en) A communication system and method of call group management therefor
US6690943B1 (en) Multiple broadcast facility
GB2324682A (en) Connection of a mobile wireless terminal to a host computer
JP2008503906A (en) Communication decoding method and apparatus
US7400730B2 (en) Cryptographic communication method in communication system
JP4516257B2 (en) Broadcast equipment
EP1428403B1 (en) Communications methods, systems and terminals
EP2208371A1 (en) Secure communication system comprising terminals with different security capability levels
JP2951311B1 (en) Mobile communication dynamic secure grouping communication method
JP2967089B1 (en) Cryptographic communication device
JPH11234260A (en) System and method for updating cryptographic key
EP1641175A1 (en) Receiver and method of receiving an encrypted communication
JPH0818657A (en) Digital cordless telephone set
JP2004235818A (en) Call originator number information transfer system

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 00802309.3

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): CN JP KR

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

WWE Wipo information: entry into national phase

Ref document number: 2000960409

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2001 521100

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1020017005207

Country of ref document: KR

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWP Wipo information: published in national office

Ref document number: 1020017005207

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 2000960409

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2000960409

Country of ref document: EP