Methods and systems for obscuring network topologies
First Claim
1. A method for preventing an external party to map an identity of a network cell of a telecommunication network with a corresponding geographical location of the network cell, the method comprising:
- receiving at a base station of the telecommunication network system information from a radio network controller of the telecommunication network;
extracting, at the base station, the identity of the network cell from the received system information;
changing, at the base station, the identity or one of multiple parts of the identity of the network cell; and
sending the changed identity or the one of multiple parts of the identity to a user terminal, wherein the changing step further comprises;
generating a new identity for the network cell, wherein the new identity has multiple parts;
changing in the radio network controller a current identity of the network cell with the new identity; and
instructing the base station, which is controlled by the radio network controller and which controls the network cell, to replace a current second portion of the current identity with a new second portion of the new identity of the network cell.
1 Assignment
0 Petitions
Accused Products
Abstract
Node, computer software and method for preventing an external party (114) to map an identity of a network cell (122) of a telecommunication network (112 or 120) with a corresponding geographical location of the network cell (122). The method includes receiving at a base station (200) of the telecommunication network (112 or 120) system information from a radio network controller (203) of the telecommunication network (112 or 120); extracting, at the base station (200), the identity of the network cell (122) from the received system information; changing, at the base station (200), the identity or one of multiple parts of the identity of the network cell (122); and sending the changed identity or the one of multiple parts of the identity to a user terminal (80).
-
Citations
19 Claims
-
1. A method for preventing an external party to map an identity of a network cell of a telecommunication network with a corresponding geographical location of the network cell, the method comprising:
-
receiving at a base station of the telecommunication network system information from a radio network controller of the telecommunication network; extracting, at the base station, the identity of the network cell from the received system information; changing, at the base station, the identity or one of multiple parts of the identity of the network cell; and sending the changed identity or the one of multiple parts of the identity to a user terminal, wherein the changing step further comprises; generating a new identity for the network cell, wherein the new identity has multiple parts; changing in the radio network controller a current identity of the network cell with the new identity; and instructing the base station, which is controlled by the radio network controller and which controls the network cell, to replace a current second portion of the current identity with a new second portion of the new identity of the network cell. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A base station of a telecommunication network configured to prevent an external party to map an identity of a network cell of the telecommunication network with a corresponding geographical location of the network cell, the base station comprising:
-
a communication interface configured to receive system information from a radio network controller of the telecommunication network; and a processor configured to, extract the identity of the network cell from the received system information, change the identity or one of multiple parts of the identity of the network cell, and send the changed identity or the one of multiple parts of the identity to a user terminal, wherein the processor is configured to change the identity or one of multiple parts of the identity of the network cell by implementing an instruction transmitted from the radio network controller, the instruction instructing the base station, which is controlled by the radio network controller and which controls the network cell, to replace a current second portion of the current identity with a new second portion of a new identity of the network cell generated by the radio network controller, wherein the new identity has multiple parts, and the radio network controller is configured to change the current identity of the network cell with the new identity. - View Dependent Claims (17, 18)
-
-
19. A non-transitory computer readable medium including computer executable instructions, wherein the instructions, when executed, implement a method for preventing an external party to map an identity of a network cell of a telecommunication network with a corresponding geographical location of the network cell, the method comprising:
-
receiving at a base station of the telecommunication network system information from a radio network controller of the telecommunication network; extracting, at the base station, the identity of the network cell from the received system information; changing, at the base station, the identity or one of multiple parts of the identity of the network cell; and sending the changed identity or the one of multiple parts of the identity to a user terminal, wherein the changing step comprises implementing an instruction transmitted from the radio network controller, the instruction instructing the base station, which is controlled by the radio network controller and which controls the network cell, to replace a current second portion of the current identity with a new second portion of a new identity of the network cell generated by the radio network controller, wherein the new identity has multiple parts, and the radio network controller is configured to change the current identity of the network cell with the new identity.
-
Specification