WO1998027768A2 - Mobile telephone security - Google Patents

Mobile telephone security Download PDF

Info

Publication number
WO1998027768A2
WO1998027768A2 PCT/GB1997/003440 GB9703440W WO9827768A2 WO 1998027768 A2 WO1998027768 A2 WO 1998027768A2 GB 9703440 W GB9703440 W GB 9703440W WO 9827768 A2 WO9827768 A2 WO 9827768A2
Authority
WO
WIPO (PCT)
Prior art keywords
code
handset
identification code
mobile telephone
telephone
Prior art date
Application number
PCT/GB1997/003440
Other languages
French (fr)
Other versions
WO1998027768A3 (en
Inventor
Alastair Sibbald
Martin Peter Todd
Original Assignee
Central Research Laboratories Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central Research Laboratories Limited filed Critical Central Research Laboratories Limited
Publication of WO1998027768A2 publication Critical patent/WO1998027768A2/en
Publication of WO1998027768A3 publication Critical patent/WO1998027768A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/68Circuit arrangements for preventing eavesdropping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/10Secret communication by using two signals transmitted simultaneously or successively
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • H04M1/727Identification code transfer arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/79Radio fingerprint

Definitions

  • the present invention relates to a means of making a mobile telephone more secure against counterfeiting, otherwise know as cloning.
  • counterfeiting occurs when a genuine mobile telephone signal is intercepted by a counterfeiter (scanned) and the security code (telephone or account number and electronic serial number of the actual handset) of the genuine telephone is recorded. This code is then used to re-program a stolen mobile telephone, thus producing a counterfeit of the genuine mobile telephone which can be used to make calls which will be billed to the genuine telephone's account.
  • the cloning of mobile telephones is currently limited to analogue networks. It represents a very large proportion of telephone calls made.
  • One recent estimate (New Engineer 9 Nov 96 pp.20) is £200 million per year in the U.K. alone. Much of this illegal traffic (particularly in the U.S.A.) is crime related, and the calls are often international.
  • UK Patent Application Nos GB-A-2163323 and EP-A-6167331 describes signal transmission systems for telecommunication equipment. In both systems code is insterted into a transmitted signal. However, the encoder and technique is relatively complex.
  • 0245037 discloses apparatus for labelling an audio signal comprising filters to eliminate a plurality of frequency notches from an audio signal, code generating means to produce a code signal having an identifying portion and a message portion represented by bursts of frequencies at the notch frequencies, and inserting the frequency bursts into the notches in the audio signal.
  • Monitoring means is provided to monitor the amplitude of the audio signal and to ensure that the inserted code signals have an amplitude relative to that of the audio signal so that they will not normally be heard.
  • a database is maintained of the ID codes which correspond to each account number (teletelephone number).
  • a plurality and preferably all base-stations contain one or more decoder chips which decode incoming signals for their ID codes.
  • the call is valid. If not, the call is considered counterfeit and dealt with in a manner to be determined by the network operator.
  • the options can include disconnection, feeding a signal back to "lock" the handset, and logging the number called for the authorities to investigate.
  • the counterfeiter would need to read the ED code from a genuine telephone and clone it in the stolen telephone. This would be quite difficult for the following reasons.
  • the serial number is sufficiently large to prevent a counterfeiter from having a full set of chips to select from.
  • the pre-blown chips are held securely to ensure they are not stolen.
  • some of the ID code is hard-wired by the chip mask, and if a serious security breach is detected the mask is altered, and codes with the known hard-wired code not used.
  • the chip has a random process within it for blowing the number, making it difficult for the counterfeiter to blow a particular desired number.
  • Figure 1 is a schematic view of an encoder chip for use in a mobile teletelephone handset
  • FIG. 2 is a block diagram of the internal construction of the chip.
  • the encoder chip has a simple 6 pin structure and a relatively low power consumption.
  • Pin 1 provides an audio input for speech to be transmitted
  • pin 2 provides an audio output
  • pin 3 is a ground
  • pin 4 is power
  • pin 5 is an erase signal
  • pin 6 receives a clock signal.
  • Pin 5 is employed to blow an ID serial number into the chip.
  • the encoder chip comprises notch filter 10 for removing two narrow bands at selected notch frequencies from an incoming signal.
  • a coding unit 12 assesses the audio signal strength and provides alternate frequency bursts at the two notch frequencies to represent an ID code stored in a store 14. These frequency bursts are inserted into the audio signal output from notch filters 10 in a combining unit 16 to provide an audio output on line 16. Details of units 10, 12, 14 are given in EP-B- 0245037 and WO-A-9621290.
  • Memory store 14 is divided into two parts, a first part 18 containing part of the ID serial number taken from the chip mask, and a second part 20 left blank, to be blown-in during testing, as is shown in the example format below.
  • the exact length and split of this format may be varied.
  • the LD process is likely to use an additional 16-20 bits for error correction overhead, giving a total 50-60 bit actual code. This improves the robustness of the scheme:-
  • FIG. 3 shows a schematic block diagram of a base station 30 which receives signals transmitted from handset 32.
  • a demultiplexer 34 separates the incoming signal from the other incoming signals and passes it to a splitter 36, which separates the account number code, which is normally present in the handset transmissions.
  • the account number is used to access a database 38, which among other verification operations provides an ID serial number for the handset associated with the account number.
  • a decoder unit 40 coupled to splitter 36, analyses the speech signals and derives the ID serial code present in the notch frequencies, essentially by the inverse of the encoding process as described above.
  • the two derived codes are compared in a comparator 42. If they correspond, no further action is necessary, but if they do not correspond, indicating a possible illegality, appropriate measures may be initiated as outlined above.
  • the decoding process is a process which analyses the incoming signal and reports the ID serial number. For the 50-60 bit actual code suggested above, it would be expected to take about 20 seconds to confirm the code in a reliable manner. The time taken to confirm the code will depend on the quality of the audio signal. Additionally, there is a trade-off which can be made by making the code more audible (and also to be present in silent periods), and so this time period can be reduced. Higher quality means shorter "time to confirm". If the counterfeiter tries to use this to circumvent the ID code, the system could detect that multiple short calls are being made to the same number with no ID confirmation.

Abstract

The invention is a method of making a mobile telephone more secure and includes generating an identification code, inserting the code into transmitted speech, detecting the code at a base station and comparing it with stored information to verify the authenticity of the mobile telephone. The identification code comprises two portions: the first portion (which stores the code) being produced during manufacture of a chip and the second portion being formed by a randomised process during commissioning of the telephone. The invention overcomes problems associated with similar, prior art systems because the chip containing the identification code has part of its code randomly selected because it is an irreversible process.

Description

Mobile Telephone Security
The present invention relates to a means of making a mobile telephone more secure against counterfeiting, otherwise know as cloning.
Such counterfeiting occurs when a genuine mobile telephone signal is intercepted by a counterfeiter (scanned) and the security code (telephone or account number and electronic serial number of the actual handset) of the genuine telephone is recorded. This code is then used to re-program a stolen mobile telephone, thus producing a counterfeit of the genuine mobile telephone which can be used to make calls which will be billed to the genuine telephone's account. The cloning of mobile telephones is currently limited to analogue networks. It represents a very large proportion of telephone calls made. One recent estimate (New Scientist 9 Nov 96 pp.20) is £200 million per year in the U.K. alone. Much of this illegal traffic (particularly in the U.S.A.) is crime related, and the calls are often international. The major aspect of the problem is not the stolen telephones which might be reported and cancelled by the network, but the aspect whereby a legitimate telephone is still in operation with its owner not aware of any problem, and a clone is running up a bill on the same telephone. Thus any solution must either make it difficult to clone, or must detect a clone in operation. A solution which would allow the genuine telephone to continue operating would be of benefit. Any solution must be cheap in terms of any additional cost to the handset. The handsets are often sold at, or below, cost. Any solution should have minimal impact on the existing network base stations in terms of re-engineering, and again minimal cost.
There are existing methods by which the cloning of a telephone can be detected.
1) A change in calling pattern. This is probably the only method in general use.
The network providers can detect when the calling pattern of a particular telephone changes and check with the owner that the calls being made are genuine. 2) The RF footprint of every telephone. Each individual telephone has a slightly different RF response, and the RF footprints can be recorded at the base station as a call comes in. The footprint is then compared to the database for that account. There is a system available for this, but currently costing around £100,000 per base station, it is considered too expensive.
UK Patent Application Nos GB-A-2163323 and EP-A-6167331 describes signal transmission systems for telecommunication equipment. In both systems code is insterted into a transmitted signal. However, the encoder and technique is relatively complex.
Summary of the Invention The present invention provides a method of making a mobile telephone handset more secure comprising:
1) Providing in a handset a means for generating at periodic intervals an identification code;
2) When the handset is being used to transmit speech, inserting said identification code into the speech signal in such a way that the identification code cannot be heard;
3) Providing in a base station a means for recognising said code in said speech patterns, the base station comparing the received code information with recorded information to identify the transmitting handset.
In a further aspect, the present invention provides a mobile telephone handset including means for generating an identification code at predetermined intervals, and means for inserting said identification code into transmitted speech signals in such a way that the code is inaudible.
The use of transmitted identification codes in broadcast signals for commercial radio stations and television stations is described in our granted European Patent EP-B- 0245037 and published International Patent Application WO-A-9621290. EP-B-
0245037 discloses apparatus for labelling an audio signal comprising filters to eliminate a plurality of frequency notches from an audio signal, code generating means to produce a code signal having an identifying portion and a message portion represented by bursts of frequencies at the notch frequencies, and inserting the frequency bursts into the notches in the audio signal. Monitoring means is provided to monitor the amplitude of the audio signal and to ensure that the inserted code signals have an amplitude relative to that of the audio signal so that they will not normally be heard.
Preferably the present invention provides each handset of a telephone with an encoder chip which is connected in the audio path, and is arranged into encode identification (ID) code containing a single serial number audio signals in real-time before the signals are transmitted,
A database is maintained of the ID codes which correspond to each account number (teletelephone number).
A plurality and preferably all base-stations contain one or more decoder chips which decode incoming signals for their ID codes.
If the decoded ID code matches the data base number, then the call is valid. If not, the call is considered counterfeit and dealt with in a manner to be determined by the network operator. The options can include disconnection, feeding a signal back to "lock" the handset, and logging the number called for the authorities to investigate.
To circumvent the invention, the counterfeiter would need to read the ED code from a genuine telephone and clone it in the stolen telephone. This would be quite difficult for the following reasons.
1. Encoder chips are blown with a random serial number at manufacture
(perhaps during testing). This involves an irreversible process, for example burning-out resistors. The serial number is sufficiently large to prevent a counterfeiter from having a full set of chips to select from. The pre-blown chips are held securely to ensure they are not stolen. To allow for this possibility, some of the ID code is hard-wired by the chip mask, and if a serious security breach is detected the mask is altered, and codes with the known hard-wired code not used. However, even if stolen, the chip has a random process within it for blowing the number, making it difficult for the counterfeiter to blow a particular desired number.
2. To read the ID code off-air, the counterfeiter would need a more sophisticated scanner which incorporates a decoder.
3. Since the encoder chip is not reprogrammable, the counterfeiter would have to replace it by a chip with the same function. By making the encoding process sufficiently complex, this would require a Digital Signal Processor (DSP) or other complex processor to perform the operation. By building in detection circuitry, which analyses current and voltages, it is made difficult for the counterfeiter to insert such programmable devices into the telephone itself. An alternative would be to cut PCB tracks within the telephone and attach a PC or "black box" into the circuitry. This would be bulky and need to remain attached whilst in use. Alternatively the counterfeiter would have to make a re-programmable chip. All these "work-arounds" make it more expensive for the counterfeiter to clone each telephone, and will make a cloning operation more difficult. This willcut out all but the most serious of counterfeiters.
Brief Description of the Drawings
A preferred embodiment of the invention will now be described with reference to the accompanying drawings wherein:-
Figure 1 is a schematic view of an encoder chip for use in a mobile teletelephone handset;
Figure 2 is a block diagram of the internal construction of the chip; and
Figure 3 is a schematic system diagram showing a mobile teletelephone handset in connection with a base station employing a decoding mechanism in accordance with the invention. Description of the Preferred Embodiment
Referring now to Figure 1, the encoder chip has a simple 6 pin structure and a relatively low power consumption. Pin 1 provides an audio input for speech to be transmitted, pin 2 provides an audio output, pin 3 is a ground, pin 4 is power, pin 5 is an erase signal and pin 6 receives a clock signal. Pin 5 is employed to blow an ID serial number into the chip.
Referring to Figure 2, the encoder chip comprises notch filter 10 for removing two narrow bands at selected notch frequencies from an incoming signal. A coding unit 12 assesses the audio signal strength and provides alternate frequency bursts at the two notch frequencies to represent an ID code stored in a store 14. These frequency bursts are inserted into the audio signal output from notch filters 10 in a combining unit 16 to provide an audio output on line 16. Details of units 10, 12, 14 are given in EP-B- 0245037 and WO-A-9621290.
Memory store 14 is divided into two parts, a first part 18 containing part of the ID serial number taken from the chip mask, and a second part 20 left blank, to be blown-in during testing, as is shown in the example format below. The exact length and split of this format may be varied. For the 36-bit data code suggested here, the LD process is likely to use an additional 16-20 bits for error correction overhead, giving a total 50-60 bit actual code. This improves the robustness of the scheme:-
16-bit (65536 masks) - 20-bit (1048576 possible codes) xxxxxxxxxxxxxxx -xxxxxxxxxxxxxxxxxxxx
samples from the same batch:-
13568 - 0219203 13568 - 1006255
13568 - 0563750 The fact that two chips may by chance have the same ID serial number does not matter, since in the application of the chip it is the correlation between the account number and ID number that counts, not whether any two accounts have the same ID number. There is a chance that a stolen telephone has the same number as a genuine one being cloned; however, the chance of this is insignificant (one in a million for a particular mask).
Referring now to Figure 3, this shows a schematic block diagram of a base station 30 which receives signals transmitted from handset 32. A demultiplexer 34 separates the incoming signal from the other incoming signals and passes it to a splitter 36, which separates the account number code, which is normally present in the handset transmissions. The account number is used to access a database 38, which among other verification operations provides an ID serial number for the handset associated with the account number. At the same time, a decoder unit 40 coupled to splitter 36, analyses the speech signals and derives the ID serial code present in the notch frequencies, essentially by the inverse of the encoding process as described above. The two derived codes are compared in a comparator 42. If they correspond, no further action is necessary, but if they do not correspond, indicating a possible illegality, appropriate measures may be initiated as outlined above.
The decoding process is a process which analyses the incoming signal and reports the ID serial number. For the 50-60 bit actual code suggested above, it would be expected to take about 20 seconds to confirm the code in a reliable manner. The time taken to confirm the code will depend on the quality of the audio signal. Additionally, there is a trade-off which can be made by making the code more audible (and also to be present in silent periods), and so this time period can be reduced. Higher quality means shorter "time to confirm". If the counterfeiter tries to use this to circumvent the ID code, the system could detect that multiple short calls are being made to the same number with no ID confirmation.
The invention has been described by way of example only and variation may be made to the embodiment described.

Claims

1. A method of making a mobile telephone handset more secure comprising: i) providing in a handset a means for generating at periodic intervals an identification code; ii) when the handset is being used to transmit speech, inserting said identification code into the speech signal in such a way that the identification code cannot be heard; and iii) providing in a base station a means for recognising said code in said speech signal patterns, the base station comparing the received code information with record information to identify the transmitting handset, characterised in that the code is held in a memory store in two parts, a first part being formed during manufacture, and a second part being formed by a randomised process during handset commissioning.
2. A method according to claim 1, wherein the identification code is in the form of bursts at predetermined frequencies and is inserted into the speech signal where the audio signal has been filtered out at such frequencies.
3. A mobile telephone handset including means for generating an identification code at predetermined intervals, and means for inserting said identification code into transmitted speech signals in such a way that the code is inaudible.
4. A mobile telephone handset according to claim 3, wherein the code is held in a memory store in two parts, a first part being formed during manufacture, and the second part being formed by a randomised blowing means operative in response to an external control signal.
5. A base station including means for separating a coded signal transmitted from a telephone, into an audio data carrying portion and a portion containing coded information and means for comparing the coded information with stored information specific to said telephone.
PCT/GB1997/003440 1996-12-14 1997-12-15 Mobile telephone security WO1998027768A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9626030.2 1996-12-14
GBGB9626030.2A GB9626030D0 (en) 1996-12-14 1996-12-14 Mobile phone security

Publications (2)

Publication Number Publication Date
WO1998027768A2 true WO1998027768A2 (en) 1998-06-25
WO1998027768A3 WO1998027768A3 (en) 1998-12-23

Family

ID=10804476

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1997/003440 WO1998027768A2 (en) 1996-12-14 1997-12-15 Mobile telephone security

Country Status (2)

Country Link
GB (1) GB9626030D0 (en)
WO (1) WO1998027768A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1241907A1 (en) * 2001-03-13 2002-09-18 Sony International (Europe) GmbH Identification of a mobile terminal in a wireless network
US7522728B1 (en) 1993-11-18 2009-04-21 Digimarc Corporation Wireless methods and devices employing steganography
US9930173B2 (en) 2007-02-15 2018-03-27 Dsi-Iti, Llc System and method for three-way call detection
US9930088B1 (en) 2017-06-22 2018-03-27 Global Tel*Link Corporation Utilizing VoIP codec negotiation during a controlled environment call
US10057398B2 (en) 2009-02-12 2018-08-21 Value-Added Communications, Inc. System and method for detecting three-way call circumvention attempts

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1498283A (en) * 1974-04-24 1978-01-18 Tekade Felten & Guilleaume Apparatus for and methods of identifying a subscriber station of a radio network
EP0167331A2 (en) * 1984-06-25 1986-01-08 Sony Corporation Signal transmission apparatus
GB2163323A (en) * 1984-08-15 1986-02-19 British Telecomm Improvements to cordless telephones
WO1992012584A1 (en) * 1990-12-31 1992-07-23 Motorola, Inc. Secure over-the-air registration of cordless telephones
US5392356A (en) * 1993-01-21 1995-02-21 Fujitsu Limited Mobile telephone terminal and method of preventing unlawful use thereof
WO1996021290A1 (en) * 1995-01-07 1996-07-11 Central Research Laboratories Limited Audio signal identification using digital labelling signals

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1498283A (en) * 1974-04-24 1978-01-18 Tekade Felten & Guilleaume Apparatus for and methods of identifying a subscriber station of a radio network
EP0167331A2 (en) * 1984-06-25 1986-01-08 Sony Corporation Signal transmission apparatus
GB2163323A (en) * 1984-08-15 1986-02-19 British Telecomm Improvements to cordless telephones
WO1992012584A1 (en) * 1990-12-31 1992-07-23 Motorola, Inc. Secure over-the-air registration of cordless telephones
US5392356A (en) * 1993-01-21 1995-02-21 Fujitsu Limited Mobile telephone terminal and method of preventing unlawful use thereof
WO1996021290A1 (en) * 1995-01-07 1996-07-11 Central Research Laboratories Limited Audio signal identification using digital labelling signals

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LO J: "WHO YA GONNA CALL?" TELEPHONY, vol. 229, no. 9, 28 August 1995, pages 22-24, 26, XP000617459 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7522728B1 (en) 1993-11-18 2009-04-21 Digimarc Corporation Wireless methods and devices employing steganography
EP1241907A1 (en) * 2001-03-13 2002-09-18 Sony International (Europe) GmbH Identification of a mobile terminal in a wireless network
US9930173B2 (en) 2007-02-15 2018-03-27 Dsi-Iti, Llc System and method for three-way call detection
US10601984B2 (en) 2007-02-15 2020-03-24 Dsi-Iti, Llc System and method for three-way call detection
US11258899B2 (en) 2007-02-15 2022-02-22 Dsi-Iti, Inc. System and method for three-way call detection
US11895266B2 (en) 2007-02-15 2024-02-06 Dsi-Iti, Inc. System and method for three-way call detection
US10057398B2 (en) 2009-02-12 2018-08-21 Value-Added Communications, Inc. System and method for detecting three-way call circumvention attempts
US9930088B1 (en) 2017-06-22 2018-03-27 Global Tel*Link Corporation Utilizing VoIP codec negotiation during a controlled environment call
US10693934B2 (en) 2017-06-22 2020-06-23 Global Tel*Link Corporation Utilizing VoIP coded negotiation during a controlled environment call
US11381623B2 (en) 2017-06-22 2022-07-05 Global Tel*Link Gorporation Utilizing VoIP coded negotiation during a controlled environment call
US11757969B2 (en) 2017-06-22 2023-09-12 Global Tel*Link Corporation Utilizing VoIP codec negotiation during a controlled environment call

Also Published As

Publication number Publication date
WO1998027768A3 (en) 1998-12-23
GB9626030D0 (en) 1997-01-29

Similar Documents

Publication Publication Date Title
US5109403A (en) System for programming of features of a mobile cellular telephone unit
US6173172B1 (en) System and method for preventing the unauthorized use of a mobile communication device
US5392356A (en) Mobile telephone terminal and method of preventing unlawful use thereof
KR930010839B1 (en) Mobil communication system insensitive to false frame sync
US6091945A (en) Authentication method for radio communication system, radio communication system, radio communication terminal and communication managing apparatus
US6996213B1 (en) Superposition of data over voice
JPS6129294A (en) Method of unauthorized use detection of identified information aligned for mobile radio station in radio transmission system
US5655019A (en) Identity protection method for use with wireless telephone systems
CA2209621A1 (en) Audio signal identification using digital labelling signals
US5065452A (en) Digital traffic news evaluation method
JPH10505982A (en) Detecting method of defective speech frame in receiver of digital speech communication system
US6208715B1 (en) Method and apparatus for transmitting messages in a telecommunication system
JP2759732B2 (en) Identification signal unauthorized use detection method
WO1998027768A2 (en) Mobile telephone security
GB2298760A (en) Monitoring the integrity of a telephone line
US4074079A (en) Coin telephone antifraud system
US6927684B2 (en) Subnet addressable radio activated switch
CA2394294A1 (en) Data obtaining method and terminals
CA1082787A (en) Method and apparatus for signaling in a communication system
KR100538891B1 (en) Cordless telecommunications system and identification code modification process
JPH06164493A (en) Mobile communication system
KR19980066625A (en) Time synchronization device and method thereof by wireless transmission
GB2108358A (en) Communications security system
CA1225702A (en) Radio paging method of arranging message information with reference to a key code and a base station and a paper receiver for use in the method
EP0755593A1 (en) Method for transmitting a time-division data communication signal

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

122 Ep: pct application non-entry in european phase