Location security for a subscriber unit in a telecommunication system by denying a parties' location request
First Claim
1. A method in a telecommunication system comprising a mobile station handled by a first party, wherein the method comprises the steps of:
- a) the first party contacting a service provider via the mobile station and requesting a service that needs a location of the mobile station to be divulged to the service provider;
b) the service provider requesting from a positioning node to determine and divulge the location of the mobile station;
c) the positioning node asking the first party via the mobile station for permission to determine and divulge the location of the mobile station; and
d) the positioning node determining the location of the mobile station and divulging the location to the service provider when permission is received from the first party via the mobile station.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to determining the geographic location of a mobile station in a mobile communications system. The object of the invention is to protect the integrity of the user of the mobile station, so as to prevent the location of the mobile station being established by an outsider against the will of the user. In this respect, an authorization check is carried out in conjunction with a request for determination of the geographical location of a mobile station. The geographical location is only determined when authorization is found for the mobile station to be located. This authorization control involves checking that the user of the mobile station has granted permission for the location of his mobile station MS to be determined on the part of an outsider. The authority check may also include the condition that only certain outsiders may be informed of the geographical location of the mobile station.
-
Citations
7 Claims
-
1. A method in a telecommunication system comprising a mobile station handled by a first party, wherein the method comprises the steps of:
-
a) the first party contacting a service provider via the mobile station and requesting a service that needs a location of the mobile station to be divulged to the service provider;
b) the service provider requesting from a positioning node to determine and divulge the location of the mobile station;
c) the positioning node asking the first party via the mobile station for permission to determine and divulge the location of the mobile station; and
d) the positioning node determining the location of the mobile station and divulging the location to the service provider when permission is received from the first party via the mobile station. - View Dependent Claims (2, 3)
-
-
4. A method in a telecommunication system comprising a mobile station handled by a first party, wherein the method comprises the steps of:
-
a) the first party contacting a service provider via the mobile station and requesting a service that needs a location of the mobile station to be divulged to the service provider;
b) the service provider requesting a positioning node to determine and divulge the location of the mobile station;
c) the positioning node informing the mobile station of a password;
d) the mobile station informing the service provider of the password;
e) the service provider informing the positioning node of the password;
f) the positioning node comparing the password received from the service provider with the password sent to the mobile station and when the passwords are the same, the location of the mobile station is determined and divulged to the service provider. - View Dependent Claims (5, 6)
-
-
7. A secured integrity function in connection with a mobile communication system operated by an operator wherein the secured integrity function comprises,
an encrypted list of mobile station identities that are to be prohibited from being located, and an encryption key for reading the encrypted list, and wherein the secured integrity function is arranged a) to receive from the mobile communication system an inquiry of permission to determine and divulge the location of a specified mobile station and b) to determine if the specified mobile station is on the encrypted list and if so deny permission in response to the inquiry.
Specification