Booster arrangement for a portable telephone
First Claim
1. A booster arrangement for a portable telephone which includes a portable telephone and a booster and in which the booster receives identity information from the portable telephone, comprising a security procedure in which:
- the booster receives a security query from a mobile communication system and transfers the query to the portable telephone;
the portable telephone performs security algorithms and sends a result to the booster; and
the booster creates an answer to the security query based on the received result.
2 Assignments
0 Petitions
Accused Products
Abstract
A booster arrangement for a portable telephone, which includes a telephone (2) and booster (1), and which booster receives identity information from the portable telephone, is characterized in that it incorporates a security procedure in which the booster receives a security query from a mobile communication system and transfers it to the portable telephone, the telephone performs security algorithms and sends an result to the booster and the booster creates an answer to the security query based on the received result. The booster (1) checks the software and hardware versions of the portable telephone (2) and the security procedure is performed based on the version information. Reception of identity information by the booster from the portable telephone also is performed based on said version information. By means of the present invention, equally good security is obtained when using a booster arrangement as when using a portable telephone. Security can also be realized when the portable telephone (2) belongs to a different system than the booster (1).
43 Citations
15 Claims
-
1. A booster arrangement for a portable telephone which includes a portable telephone and a booster and in which the booster receives identity information from the portable telephone, comprising a security procedure in which:
-
the booster receives a security query from a mobile communication system and transfers the query to the portable telephone; the portable telephone performs security algorithms and sends a result to the booster; and the booster creates an answer to the security query based on the received result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification