AUTOMATIC DEREGISTRATION OF WIRELESS
COMMUNICATIONS DEVICES HAVING VARIABLE IDENTITY
Background of the Invention
The present invention relates to the field of cellular wireless
communications, and more particularly to a method of controlling the registration
of a wireless communications device that accommodates the presence of more
than one unique identifier associated with the wireless communications device.
As the technology of cellular mobile communications has propagated
throughout the world, various standards have been developed to harmonize the
communications protocols between the various types of equipment involved. One
standard, known at the Global System for Mobile Communication (GSM)
standard, evolved primarily in Europe based upon the numerous network systems
that were already in place in that area. Another standard, known as the ANSI-
41/ANSI-136 standard, is a primary standard in North America for controlling
mobile wireless communications.
Although much of the overall technology between the two standards is
shared, there are areas that the two are currently incompatible. One difference
between the GSM and ANSI-41/ANSI-136 is the matter of activating and
registering wireless communications devices within the network. ANSI-41/ANSI-
136 anticipates that subscriber information, and in particular the subscriber
identification information necessary to authenticate the subscriber to the system,
will be relatively permanently stored within the wireless communications device,
such as in the cellular telephone. Thus, an ANSI-41/ANSI-136 user is required to
use a single wireless communications device for a single service subscription. In
other words, a subscription is essentially tied to a specific mobile terminal. The
ANSI-41/ANSI-136 user cannot use a different piece of equipment for the same
subscription without somehow changing the subscriber information.
In contrast, the subscription in a GSM system is typically not tied to a
specific mobile terminal, but rather is tied to a Subscriber Identity Module (SIM),
sometimes referred to as a UIM card or a SIM card. See GSM 11.11 and GSM
11.14 for SIM card specifications in the GSM System. Basically, a SIM card is a
device, such as an integrated circuit card, that stores the user's subscription
related information. The SIM card may be thought of as an electronic
identification card; it contains the subscription-related information required to
verify the subscriber to the network. The SIM card typically includes memory and
other electronics for performing a variety of functions, but the SIM card does not
include the transceiver electronics necessary for the main GSM wireless
communications.
Relevant to the present discussion, the SIM card contains a unique fixed
identifier, such as an Electronic Serial Number (ESN). For ease of reference, this
identifier may be referred to as the ESNS. In the context of the SIM card, the
mobile telephone itself, without the SIM card, is often called the mobile terminal
(MT). The mobile terminal likewise includes a unique identifier, which may be
referred to as the ESNm. In use, the SIM card is inserted or otherwise connected
to the mobile terminal to form a complete wireless communications device that is useable in GSM.
As mentioned above, the SIM card does not include transceiver
electronics, but instead uses the transceiver electronics in the mobile terminal that
the SIM card is currently associated with. The subscriber information is read from
the SIM card by the mobile terminal and transmitted to the network where the
network determines whether the user is a valid subscriber and registers the
location of the user within the network. The user may then transmit and receive
communications as though the mobile terminal was their own property. Because
the SIM card authenticates the user to the network, the user is free to use any
compliant mobile terminal by simply mating their SIM card to the mobile terminal
and repeating the authentication and registration process with the new mobile
terminal hardware. Thus, it is not always necessary for the user to carry the
complete wireless communications device in order to access his/her wireless
service subscription. Instead, the user need only carry the SIM card and mate the
card to an appropriate transceiver that is available on-location.
It may be advantageous to utilize the ANSI-41/ANSI-136 standard already
in place with the United States, but with the subscription mobility of the SIM card
technology. In such a scenario, the subscription will be tied to the SIM card and
not to the mobile terminal. The mobile terminal will just be the access device
used by the subscription (i.e., SIM card) to connect to the mobile telephony
network. However, because the GSM technology authenticates the subscriber
based on the identity of the SIM card while the ANSI-41/ANSI-136 technology
authenticates the subscriber based on the identity of the mobile terminal, the two
systems may not be readily compatible. For instance, one central problem is that
the ANSI-41/ANSI-136 authentication algorithm may use the electronic serial
number (ESN) number of the mobile terminal as one of its input values.
Therefore, if a SIM card is moved from the original mobile terminal to another
mobile terminal, the authentication will likely fail (the new mobile terminal has a
different ESN). Thus, while there is a strong desire to introduce the SIM card
concept to ANSI-41/ANSI-136 technology, problems remain.
One area where this dual identity of the wireless communications device
presents particular problems is in roaming. The present thinking amongst
standards groups is that the ESNm will be used for authenticating, tracking, or
otherwise communicating with the combined mobile terminal and SIM card (the
wireless communications device) so as to provide greater consistency with the
presently installed ANSI-41/ANSI-136 systems. For instance, the entries in the
Visitor Location Register (VLR) and the Home Location Register (HLR) will be
based on the ESNm. This presents a particular problem with the authentication
routine associated with roaming referred to as "Shared Shared Secret Data"
(shared SSD). When SSD is shared, the inputs needed for the authentication
algorithm are stored locally in VLR, typically with the Mobile Identification Number
(MIN) as the key, and the authentication is handled by the VLR rather than the
subscription's home Authentication Center. For reference, see the standards
known as TIA/EIA-41-D and TIA/EIA/IS-725-A. In shared SSD, ESNm is typically
one input to the authentication algorithm used by the VLR; the ESNm may also be
an input to the algorithm used to generate the SSD itself. If this shared SSD
feature is utilized, there may be a problem when an mobile terminal is joined with
a first SIM card (and hence a first subscription) from a non-home (i.e., foreign)
system and then the first SIM card is replaced by different second SIM card (and
second subscription) likewise from a foreign system and previously registered
with the visited system. For instance, assume that SIM! is mated to MT, and
registered with the network; also, SIM2 is mated to MT2 and registered with the
network. Both SIM., and SIM2 are visiting in the network, e.g., roaming. SIM., is
then removed from MT, and replaced with SIM2, creating a problem. When MT.,
registers with SIM,, the input to the authentication algorithm will be the ESNm of
MT,. Thus, a record will be created in the VLR, keyed on the first subscription's
MIN, that includes the shared SSD information generated based on the ESNm of
MT., and a cipher code associated with the first subscription, such as the "A-key".
However, when the SIM2 is mated to MT., and the resulting wireless
communications device attempts to register, the registration will likely fail because
the SSD information associated with the corresponding MIN in the VLR will not
match the SSD information presently associated with the second subscription
(i.e., based on the identity of MT.,), but will instead match that of based on the
identity of MT2. Thus, while the record is maintained in the VLR, any subsequent
registration attempts from the same mobile terminal with a different SIM should
fail because of a mismatch between the VLR's shared SSD and the SSD
generated during the present authentication, resulting in an authentication failure.
Thus, there remains a need for a method of accommodating the relatively
free movement of a subscription from one mobile terminal to another, preferably
using existing system protocols of wireless communications networks that did not
anticipate such movement when installed.
Summary of the Invention
With the present invention, the mobile terminal automatically initiates a
deregistration upon a triggering event associated with a potential change in
identity. For instance, the mobile terminal may initiate a deregistration in
response to detecting that a subscription module has been operatively mated to
the mobile terminal. By way of example, the mobile terminal may include a
sensor that is tripped when the subscription module is plugged into the mobile
terminal. In response to the deregistration, the network updates its records to
reflect that the associated subscription is no longer registered with that system.
For instance, when roaming in a "visited" system, the visited system clears the
associated VLR record of the mobile terminal identifier and SSD information.
Thus, the network is effectively primed for the registration of the wireless
communications device formed by the mobile terminal and the currently mated
subscription module. In some alternative embodiments, the triggering event is not
the installation of a subscription module, but is instead the removal of a
subscription module.
By the mobile terminal automatically initiating a deregistration, the relatively
free movement of a subscription from one mobile terminal to another, e.g., the
movement of subscription modules between mobile terminals, is accommodated.
Preferably, the existing system protocols of the wireless communications
networks are used for the deregistration so as to allow operation of the method
without altering existing network programming. The method is particularly
adapted for networks using shared SSD authentication algorithms.
Brief Description of the Drawings
FIGURE 1 is a partially exploded perspective view of a wireless
communications cellular phone of the present invention showing the distinct
nature of the SIM card.
FIGURE 2 is a schematic representation of the phone of Figure 1.
FIGURE 3 shows the general process flow of one method according to the
present invention using removal-triggered deregistration.
FIGURE 4 shows the general process flow of one method according to the
present invention using installation-triggered deregistration.
Detailed Description
A wireless communications device 10 having a fully functional mobile
transceiver capable of transmitting and receiving radio frequency signals, such as
a phone, is shown in Figures 1-2. For simplicity of discussion, a cellular
telephone will be used as the example of the wireless communications device 10.
The phone 10 typically includes a main unit 25, sometimes referred to herein as
the mobile terminal, and a subscription module 50. See Figure 1. The mobile
terminal 25 includes a housing that contains a keypad 14, a display 16, a
microphone 18, and a speaker 20. The keypad 14, display 16, microphone 18,
and speaker 20 interface with a conventional transceiver circuit 22 generally
disposed inside the housing 11 of the mobile terminal 25. The transceiver circuit
22, shown in Figure 2, includes a main controller 26, such as a microprocessor,
for controlling the overall operation of the mobile telephone 10, memory 28, audio
processing circuits 30, a receiver 32, a transmitter 34, and optionally a clock 27.
Input/output circuits 38 interface the control unit 26 with the keypad 14, display
16, audio processing circuits 30, receiver 32, and transmitter 34. The keypad 14
allows the operator to dial numbers, enter commands, and select options. The
display 16 allows the operator to see dialed digits, stored information, and call
status information. The audio processing circuits 30 accept analog audio inputs
from the microphone 18 and provide basic analog audio outputs to the speaker
20. Memory 28 stores programs and data used by phone 10. The optional clock
27 helps determine the current time. The receiver 32 and transmitter 34 connect
to a common antenna 40 to receive and transmit signals over an RF channel.
The mobile terminal 25 further includes a fixed mobile terminal identity; the
mobile terminal identity is preferably hardcoded into a portion of the transceiver
circuit 22, such as memory 28, and should not be alterable by the user under
normal circumstances. For purposes of illustrative example, the mobile terminal
identity may be formatted to meet the requirements of an Electronic Serial
Number (ESN) of ANSI-41/ANSI-136. Because the details of the general
construction and operation of the mobile terminal 25, including transceiver circuit
22, are well-known in the art, they will not be further discussed herein except as
appropriate to place the invention in context.
Removably attached to the mobile terminal 25 is a subscription module 50
that includes subscription information. While the subscription module 50 may
include memory and other electronics for performing a variety of functions, for
purposes of this invention the subscription module 50 contains a unique identifier,
referred to herein as the subscription module identifier. Like the mobile terminal
identity, the subscription module identifier is preferably hardcoded into the
subscription module 50.
As pointed out above, the subscription is tied to the subscription module
identifier, not the mobile terminal identifier. Because of this, there is a need for
the network to be aware when the subscription module 50 has been moved from
one mobile terminal 25 to another, thereby changing the link between a particular
subscription module identifier and a particular mobile terminal identifier. This is
because the network may be authenticating, tracking, or otherwise
communicating with the combined mobile terminal 25 and subscription module 50
(the wireless communications device 10) based on the identity of the mobile
terminal 25. For instance, the entries in the Visitor Location Register (VLR) and
the Home Location Register (HLR) may be based on the mobile terminal
identifier. Thus, the present invention is particularly adapted to situations where
authentication and the VLR tracking process is based upon the mobile terminal
identifier, not the subscription module identifier.
The present invention relies on deregistration function(s) already present in
most wireless communications networks to cause the network records to be
updated in the proper fashion. The deregistration function is typically used to
notify the local wireless communications network that the wireless
communications device 10 is being powered off or that the wireless
communications device 10 is otherwise moving off the system. In ANSI-41/ANSI-
136 systems, the deregistration function may be known as "De-registration" or
"power down registration." Power down registration is currently available in most
ANSI-136 analog and digital systems. De-registration, on the other hand, is
typically available only in ANSI-136 digital systems. The details of both functions
are well known to those of skill in the art. For simplicity, both methods will be
referred to as "deregistration" (lower case "d" and no hyphen). In response to
receiving a deregistration notice from a wireless communications device 10, the
wireless communications network updates its records to reflect that the
subscription is no longer registered with that system. When the wireless
communications device 10 is roaming in a "visited" system, the visited system
clears the associated VLR record of the mobile terminal identifier and SSD
information.
In a first approach, the mobile terminal 25 is provided with a means for
detecting when the subscription module 50 is removed. For instance, the mobile
terminal 25 may have a reed switch that is activated when the subscription
module 50 is installed. When the reed switch is off, then the subscription module
50 is not present. Alternatively, the presence of the subscription module 50 may
be noted by checking the signals passed between the subscription module 50 and
the mobile terminal 25. Other methods known in the art for detecting the change
in installation status of the subscription module 50 in the mobile terminal 25 may
be used, the details being unimportant to the present invention. In response to
detecting the subscription module 50 removal, the mobile terminal 25
automatically initiates deregistration. In response to the deregistration, the
network should clear the VLR record and inform the appropriate HLR of the
deregistration. Thereafter, when the subscription module 50 is installed in a
different mobile terminal 25, the subscription module 50 will re-register with the
network, for instance, using a power-up registration.
This process is illustrated in Figure 3. The process begins with the
subscription module 50 being installed in the mobile terminal 25 (box 210). The
wireless communications device 10 then registers with the system (box 220)
based on the information in the subscription module 50 and the mobile terminal's
25 identity (mobile terminal identifier). Once registered, the mobile terminal 25
checks to see if the subscription module 50 has been removed (box 230). This
checking is preferably periodic, but may be continuous or triggered at irregular
intervals. If the subscription module 50 has been removed (box 230), the mobile
terminal 25 initiates deregistration (box 240).
The approach described immediately above works well when the mobile
terminal 25 is powered on when the subscription module 50 is removed.
However, if the mobile terminal 25 is powered off when the subscription module
50 is removed, the mobile terminal 25 is not necessarily able to communicate with
the network. As such, another embodiment requires that the mobile terminal 25
perform the deregistration procedure every time the mobile terminal 25 is turned
off. That way, if the subscription module 50 is removed while the mobile terminal
25 is turned off, the network will not have old data.
In another approach, the mobile terminal 25 may automatically perform the
deregistration procedure any time the mobile terminal 25 detects a new
subscription module 50 installation. The mobile terminal 25 would then perform a
new registration immediately thereafter, regardless of whether the deregistration
was successful or not. For instance, if the mobile terminal 25 is registered on an
analog control channel (ACC), the mobile terminal 25 would use the power down
registration on the ACC. If the mobile terminal 25 is instead using a digital
control channel (DCCH), the mobile terminal 25 would use the "power down
registration" or the "De-registration" procedure, depending on which of the two is
supported, with preference given to the "De-registration" procedure. If for some
reason, neither procedure is supported, the mobile terminal 25 would then merely
attempt a power-on registration with the system. If the mobile terminal 25 is in a
foreign system, the mobile terminal 25 may have to wait for the record of the
subscriber to expire within the foreign system's VLR before a power-on
registration may be successfully accomplished.
This process is illustrated in Figure 4. The process begins with the
subscription module 50 being installed in the mobile terminal 25 (box 310). The
wireless communications device 10 then registers with the system (box 320)
based on the information in the subscription module 50 and the mobile terminal
25's identity (mobile terminal identifier). The wireless communications device 10
is then optionally used in a customary fashion. The subscription module 50 is
then removed (box 330) and a subscription module 50 is installed (box 340). In
the simplest example, the newly installed subscription module 50 will be a
different subscription module 50 than the first subscription module 50; however, in
some instances, the newly installed subscription module 50 may be the same
module 50. The mobile terminal 25 detects the installation (box 350) and the
mobile terminal 25 responds by initiating deregistration (box 370) and then
initiating a new registration (box 380). Preferably, each subscription module 50
keeps track of the identifier of the last mobile terminal 50 last used by that
subscription module 50, and the deregistration of box 370 is accomplished based
upon this stored (last-used) identifier so that any authentication checks during
deregistration can be easily overcome. Further, in some optional embodiments,
represented by the dashed lines in Figure 4, the mobile terminal 25 may keep
track of the last subscription module 50 registered with that mobile terminal 25,
such as by storing the corresponding subscription module identifier in memory 28,
and initiate deregistration (box 370) when the newly installed subscription module
50 does not match the immediately previous subscription module 50 (box 360).
The discussion above has assumed that the fixed subscription module
identifier is stored in a subscription module 50. However, it should be noted that
the term "subscription module 50" as used herein merely means an identification
module that includes a unique identifier, such as an subscription module identifier,
that may be removably mated to any one of a plurality of mobile terminals 25 that
include the main transceiver for the wireless communications. Thus, the
subscription module 50 need not conform to the SIM card specifications in GSM,
but in preferred embodiments it does.
For clarity, the discussion above has assumed that the wireless
communications device 10 is a cellular telephone. However, it is to be
understood that other wireless communications devices, such as personal
communications assistants, pagers, and the like, are also within the scope of the
present invention. Further, the discussion focused on the operation of the present
invention in the context of an ANSI-41 /ANSI-136 system. However, the present
invention is not so limited, but may instead apply to terrestrial GSM, IS-95, CDMA,
WCDMA, cdma 2000, and similar systems, and also to satellite based systems,
where a single subscription is not tied to a particular mobile transceiver, but the
subscription is authenticated based on the identity of the mobile transceiver that
the subscription is currently associated with.
The present invention may, of course, be carried out in other specific ways
than those herein set forth without departing from the spirit and essential
characteristics of the invention. The present embodiments are, therefore, to be
considered in all respects as illustrative and not restrictive, and all changes
coming within the meaning and equivalency range of the appended claims are
intended to be embraced therein.