U.S. patent application number 10/215989 was filed with the patent office on 2002-12-19 for telecommunications system.
Invention is credited to Dervan, Aden William, Michaels, Wayne David, Timson, Anthony Richard.
Application Number | 20020193129 10/215989 |
Document ID | / |
Family ID | 27266723 |
Filed Date | 2002-12-19 |
United States Patent
Application |
20020193129 |
Kind Code |
A1 |
Michaels, Wayne David ; et
al. |
December 19, 2002 |
Telecommunications system
Abstract
In a telecommunications system such as a global mobile telephone
network in which each subscriber unit includes a Subscriber
Identity Module (SIM card), each SIM card has fixed memory
locations, to which data can be addressed over the air. Some of the
locations can not be overwritten from the subscriber unit but can
be accessed therefrom on the entry of short simple codes, each
associated with one of the locations. Further fixed memory
locations can be read over the air only when the subscriber enters
a personal identification number. Locking control files are used to
control read/write access to the locations respectively.
Inventors: |
Michaels, Wayne David;
(Berkshire, GB) ; Timson, Anthony Richard;
(Middlesex, GB) ; Dervan, Aden William; (London,
GB) |
Correspondence
Address: |
Stevens & Showalter LLP
7019 Corporate Way
Dayton
OH
45459-4238
US
|
Family ID: |
27266723 |
Appl. No.: |
10/215989 |
Filed: |
August 9, 2002 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
10215989 |
Aug 9, 2002 |
|
|
|
09455628 |
Dec 7, 1999 |
|
|
|
6453167 |
|
|
|
|
09455628 |
Dec 7, 1999 |
|
|
|
08557147 |
Apr 19, 1996 |
|
|
|
6011976 |
|
|
|
|
Current U.S.
Class: |
455/466 ;
455/558 |
Current CPC
Class: |
G06Q 20/357 20130101;
H04W 4/14 20130101; G06Q 20/341 20130101; H04M 1/275 20130101; H04M
3/4931 20130101; G06Q 20/363 20130101; H04L 67/125 20130101; H04M
1/2757 20200101; G07F 7/0866 20130101; H04W 8/18 20130101; H04M
1/72436 20210101; G07F 7/1008 20130101; H04M 2250/14 20130101 |
Class at
Publication: |
455/466 ;
455/558 |
International
Class: |
H04Q 007/20 |
Foreign Application Data
Date |
Code |
Application Number |
Jun 15, 1993 |
GB |
9312320.6 |
Jul 2, 1993 |
GB |
9313772.7 |
Jul 8, 1993 |
GB |
9314096.0 |
Claims
What is claimed is:
1. A telecommunications system comprising: at least one host
station and a plurality of subscriber units, said at least one host
station being operable to transmit messages to said subscriber
units, each said subscriber unit having a multiplicity of memory
locations and means responsive to the detection of a message to
store said message in a selected one of said memory locations,
which can be accessed from said subscriber unit when required, said
memory locations being provided in an integrated circuit module
which is removably connected to said subscriber unit, said at least
one host station being adapted to transmit a message coded in a
specific format distinguished from other message formats used in
the system, said message coded in said specific format comprising a
read command, and said module having means for distinguishing a
message coded in said specific format from said other message
formats, means for decoding and storing a message coded in said
specific format in a selected said memory location, reading means
operable in response to a decoded message to instigate an action to
be taken by the associated said subscriber unit, said action
including the transmission of information requested by said read
command.
2. A system as claimed in claim 1, wherein said module includes
means adapted to transmit said requested information, in a message
coded in said specific format, to said associated subscriber
unit.
3. A system as claimed in claim 2, wherein said associated
subscriber unit comprises means arranged to receive said message
from said module and to present said information from said message
to a user of said subscriber unit or to transmit said message to
said at least one host station.
4. A system as claimed in claim 1, wherein said at least one host
station is adapted to transmit a further message coded in said
specific format, said further message comprising information to be
stored in said module and/or an instruction to execute a program
stored in said module, and said module includes means for
distinguishing between said messages comprising information to be
stored, a request for information and an instruction.
5. A system as claimed in claim 1, wherein said message coded in
said specific format transmitted from said at least one host
station comprises a request for information stored in a secure
memory location of said module, and said module is responsive to a
personal identification signal entered in said subscriber unit by a
user to render said secure location accessible to said request
transmitted from said at least one host station.
6. A system as claimed in claim 1, wherein said message coded in
said specific format is coded in a secure format.
7. A system as claimed in claim 6, wherein said secure format is in
the form of an Embedded Command Stream which comprises a data
stream headed by a command.
8. A system as claimed in claim 7, wherein said at least one host
station is adapted to transmit a message coded in said secure
format which is headed by a write command, and said module is
responsive to said write command to store the accompanying message
in a selected said memory location as specified by said write
command.
9. A system as claimed in claim 1, wherein said module is
responsive to said read command to read information from a selected
said memory location as specified by said read command.
10. A system as claimed in claim 9, wherein said information is
read from successive said memory locations, is stored, coded in
said specific format and, thereafter, transmitted from said
module.
11. A system as claimed in claim 1, wherein said module includes
locking control means for selectively protecting said memory
locations from reading and/or overwriting by said subscriber unit
or said at least one host station.
12. A system as claimed in claim 11, wherein said at least one host
station is adapted to transmit a further message including an
attribute command and said locking control means of said module is
responsive to said attribute command to lock or unlock said memory
locations thereof as selectively to provide read and/or write
protection.
13. A system as claimed in claim 1, wherein said at least one host
station is operable to transmit said message coded in said specific
format so as to overwrite an earlier message stored in said memory
location(s) at at least one said subscriber unit.
14. A module for controlling a subscriber unit in a
telecommunications system comprising at least one host station,
said module being removably connectable to a transceiver of said
subscriber unit and comprising: a multiplicity of memory locations,
means responsive to the detection of a message transmitted from
said at least one host station to store said message in a selected
one of said memory locations, means for distinguishing a message
coded in a specific format from other message formats used in said
system, said message coded in said specific format comprising a
read command, means for decoding and storing a message coded in
said specific format in a selected said memory location, and
reading means operable in response to a decoded message to
instigate an action to be taken by said subscriber unit, said
action including the transmission of information requested by said
read command.
15. A module as claimed in claim 14, including means adapted to
transmit said requested information in a message coded in said
specific format to said subscriber unit.
16. A module as claimed in claim 14, including means for
distinguishing between, in messages coded in said specific format,
a message comprising information to be stored, a request for
information stored in said module and/or an instruction to execute
a program stored in said module.
17. A module as claimed in claim 16, including means responsive to
a personal identification signal entered in said subscriber unit by
a subscriber to render a secure memory location of said module
accessible to said request for information transmitted from said at
least one host station.
18. A module as claimed in claim 16, including means responsive to
said instruction for executing a program stored in the module.
19. A module as claimed in claim 14, including locking control
means for selectively protecting said memory locations from reading
and/or overwriting by said subscriber unit or said at least one
host station.
20. A module as claimed in claim 14, wherein each said memory
location is associated with a simple, short code and includes means
responsive to the entry of the relevant said short code to retrieve
data from said memory location.
21. A module as claimed in claim 14, including a directory
structure within which files can be stored.
22. A module as claimed in claim 14, wherein said module is in the
form of an integrated circuit card.
23. A method of operating a telecommunications system in which at
least one host station is operable to transmit messages to a
plurality of subscriber units, comprising the steps of: providing a
multiplicity of memory locations in each said subscriber unit said
memory locations being disposed in an integrated circuit module
removably connected to said subscriber unit, transmitting from said
at least one host station to at least one of said subscriber units
a message coded in a specific format distinguished from other
message formats used in said system, said message comprising a read
command, receiving said message at said at least one subscriber
unit and rewriting said message to said integrated circuit module
thereof, causing said integrated circuit module to distinguish said
message coded in said specific format from said other message
formats, routing said message coded in said specific format to
decoding means, decoding said message coded in said specific format
to produce a decoded message, storing said decoded message in a
selected said memory location, reading said decoded message and, in
response thereto, instigating an action to be taken by said at
least one subscriber unit, said action including the transmission
of information requested by said read command.
24. A method as claimed in claim 23, including the step of
transmitting said requested information as a message coded in said
specific format to said at least one subscriber unit.
25. A method as claimed in claim 24, including the step of
receiving said message and presenting said information from said
message to a user of said at least one subscriber unit or
transmitting said message to said at least one host station.
26. A method as claimed in claim 23, including the steps of
transmitting a further message from said at least one host station
to said at least one subscriber unit coded in said specific format
and comprising information to be stored in said integrated circuit
module and/or instructions to execute a program stored in said
module, and distinguishing between said messages comprising
information to be stored, a request for information and an
instruction.
27. A method as claimed in claim 23, wherein said message coded in
said specific format is coded in a secure format.
28. A method as claimed in claim 27, wherein said secure format is
in the form of an embedded command stream which comprises a data
stream headed by a command.
29. A method as claimed in claim 23, wherein said reading step
comprises detecting when said decoded message comprises an
attribute command identifying at least one of said memory locations
which is to be locked or unlocked so as to render said at least one
memory location accessible or inaccessible to said at least one
host station or said subscriber unit, and locking or unlocking said
identified at least one memory location, thereby to control access
to said at least one memory location from said at least one host
station or said subscriber unit.
Description
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation of U.S. patent
application Ser. No. 09/455,628, filed Dec. 7, 1999, which is
assigned to the same assignee as the present application, is
incorporated herein by reference and is a continuation of U.S.
patent application Ser. No. 08/557,147, filed Apr. 19, 1996, now
U.S. Pat. No. 6,011,976, which is incorporated herein by
reference.
BACKGROUND OF THE INVENTION
[0002] This invention relates to a telecommunications system. In
particular, but not exclusively, it relates to a mobile
communications system such as a cellular mobile radio or telephone
system.
[0003] A recent innovation in such systems has been the
introduction of Subscriber Identity Modules (SIM cards). These are
integrated circuit cards which can be releasably inserted into a
mobile telephone and which contain in memory the subscriber's
identity, i.e., his telephone number. These known SIM cards also
have a rolling buffer which can store a certain number of
alphanumeric characters. The buffer facilitates the so-called Short
Message Service (SMS) in which a message for a subscriber or for a
specified group of subscribers can be broadcast over the air, as an
advanced form of radiopaging. Messages can be received by a mobile
telephone whenever it is idle or on stand-by. However, if a message
is received which would overfill the buffer, data is lost on a
first-in-first-out basis.
[0004] It is an object of the invention to provide a more efficient
and remotely reconfigurable SIM card.
SUMMARY OF THE INVENTION
[0005] From one aspect, the present invention consists in a
telecommunications system comprising at least one host station and
a plurality of subscriber units, the or each host station being
operable to transmit a message to at least one of the subscriber
units, and each subscriber unit having a multiplicity of fixed
memory locations and means responsive to the detection of the
message to store the message in a selected one of the fixed memory
locations which can not be overwritten from the subscriber unit,
but which can be accessed from the subscriber unit when
required.
[0006] In the present application, a "fixed" memory location means
a location into which data can be written, and excludes
first-in-first-out or circular buffers. Overwriting of all the data
in certain "fixed" memory locations may occur in contrast to the
first-in-first-out loss of data experienced with current SMS
buffers.
[0007] Thus, for example, a set of telephone numbers, each with an
identifying alphanumeric tag, can be transmitted to the SIM card,
allowing users easy access to commonly used services such as
hotels, car hire or airline reservations. This feature is known as
a Value Added Service Directory.
[0008] A message may be retrievable by the subscriber on the entry
of simple, short codes into the subscriber unit, each memory
location corresponding to a particular code. A message may include
a telephone number and, once stored, may be able to be overwritten
over the air. Preferably, the or each host station is operable to
transmit a request for information stored in a subscriber unit. The
information may be included in a message and it may also include
information which is stored in a secure memory location, accessible
only when the subscriber enters a personal identification number
(PIN number). The information may include credit details relevant
to the subscriber, for example, a credit card number of credit
status, thus greatly facilitating credit card transactions carried
out over the telephone. Using this feature of the invention, a
credit account holder avoids having to dictate his account details
and need only enter the mandatory PIN number.
[0009] The host station may be operable to transmit instructions to
lock and/or unlock a memory location at the subscriber unit. It may
be operable to transmit instructions to run a program stored in
memory locations at the subscriber unit. The host station may be
operable to transmit files containing functional data and/or files
containing non-functional data to the subscriber unit. The
messages, requests for information and the instructions being
transmitted may be in a specific format which the subscriber unit
is able to distinguish from other formats. The specific format may
be made secure against interception.
[0010] In a preferred embodiment, the subscriber unit comprises a
mobile radio or telephone and an integrated circuit card which can
be removably connected to the radio/telephone. The integrated
circuit card may contain the memory locations and may contain means
for distinguishing the specific format from other formats. The card
may contain means for distinguishing between the messages, requests
for information and instructions. The card may also contain the
means for storing the messages and means for acting on the requests
and instructions.
[0011] From another aspect, the invention consists in a module for
controlling a subscriber unit in a telecommunications system,
comprising a multiplicity of fixed memory locations and means
responsive to the detection of a message transmitted remotely
thereto to store the message in a selected one of the fixed memory
locations, and being adapted for removable connection to a
transceiver of the subscriber unit.
[0012] At least one of the fixed memory locations may be protected
from overwriting by the subscriber. The module or card may include
means for rendering any or all of said fixed memory locations
accessible or inaccessible by either the subscriber or the host
station. The card may include a directory structure within which
files can be stored.
[0013] The invention is particularly applicable to global
telecommunication systems in which the mobile cellular telephone
networks of various countries or areas communicate using a common
standard. An example of such a global system is GSM (Global System
for Mobile Communications) currently operating in Europe. However
the invention is not limited to global systems and could be applied
to a single national cellular network or even to a fixed
land-linked network.
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] An embodiment of the invention will now be described by way
of example with reference to the accompanying drawings in
which:
[0015] FIG. 1 shows the transmission of messages to a subscriber
unit in a system according to the invention;
[0016] FIG. 2 shows a process in which a subscriber unit transmits
a message and requested information;
[0017] FIG. 3 is a block diagram showing elements of a module shown
in FIGS. 1 and 2;
[0018] FIG. 4 shows details of one of the blocks shown in FIG. 3;
and
[0019] FIG. 5 is a flowchart showing the operation of the module
shown in FIGS. 1 to 4.
DETAILED DESCRIPTION OF THE INVENTION
[0020] FIG. 1 illustrates an SMS distribution path according to the
invention. In the prior art, the short messages have usually been
directed to a single subscriber or a specified group of subscribers
such as a sales team.
[0021] However, GSM also supports a feature known as Cell Broadcast
in which messages can be sent to all the subscribers in a
particular area. In the embodiment of the invention illustrated, a
message consists of the telephone number of an advertiser and an
alphanumeric tag to identify the advertiser.
[0022] An operator enters the message into a terminal 1. The
message is then coded into a secure format known to applicants as
an Embedded Command Stream (ECS) and sent via a modem 2 and a fixed
line 3 to a local GSM switch 4. According to its delivery address,
the message is delivered to any or all of the other switches within
that network, or even across networks.
[0023] The switch 4, which in this example is in the geographical
area to which the message is to be transmitted, delivers the
message to a number of cellsites 5. The cellsites 5 are the base
transceiver stations of the GSM network.
[0024] Each cellsite 5 then broadcasts the message to a group of
transceivers or mobile telephones, hereinafter referred to as
"mobiles". If Cell Broadcast is used, the group consists of all
mobiles within the geographical area at the time of the
broadcast.
[0025] A selected mobile 6 receiving the message transmits a
confirmation of receipt back to its respective cellsite 5. From now
on, until an update situation, the system will not contact this
mobile 6 again.
[0026] The mobile 6 recognizes the message as SMS data and passes
it to a SIM card 7, which is a small self-contained microprocessor,
held in a slot in the mobile 6. The SIM card 7 in turn recognizes
the ECS using special hardware and software and stores the message
in memory in such a way that it may not be overwritten by the
subscriber. Known SIM cards contain a large number of fixed memory
locations in which the subscriber can store frequently dialed
numbers and corresponding alphanumeric tags. The SIM card 7 of the
invention stores the message in one of these locations, and then
carries out a write protect operation. The locations dedicated to
storing write protected messages may be designated by code numbers
relating to a particular category of advertiser. Thus, for example,
car hire company telephone numbers can be stored in location 01,
hotel reservations in location 02 and so on.
[0027] FIG. 2 shows a call placing process in which a subscriber
communicates with an advertiser. The subscriber, remembering that
the car hire company's number is in location 01 as shown at 8, keys
in a short code corresponding to the location, such as 01#. The
mobile 6 then interrogates the SIM card 7 to retrieve the telephone
number from the location. The SIM card 7 provides both the number
and the alphanumeric tag giving the company's name and displays it
to the subscriber. The user confirms that he wishes to proceed by
pressing SEND.
[0028] Next, the mobile obtains a voice channel through which the
call proceeds to the dialed number. The GSM system automatically
handles intra-network and inter-network hops. At this point the
subscriber can hold a voice conversation with the company.
[0029] Providing the correct equipment has been installed at the
company, as soon as the call is answered, subscriber identity
information read from the SIM card 7 gives the company immediate
customer billing details such as a name and address.
[0030] The SIM card 7 also contains information detailing the
subscriber's credit account. This information is held in a
separate, secure memory location, accessible only when the
subscriber enters a mandatory PIN number, known only to himself,
thus confirming that the mobile has not been stolen or lost. When
the subscriber has confirmed his car hire deal, he enters the PIN
number into the mobile 6, requesting the credit information from
the SIM card 7. The SIM card 7 supplies the information and the
mobile uses existing voice/data techniques to transmit the
information to the company, in a format secure against detection by
fraudsters. The sale is confirmed by the company or its equipment
and the call is terminated.
[0031] In this example, it is also possible to obtain a telephone
or fax number from the operator-assisted directory enquiries system
without the subscriber having to manually enter the number into the
communications terminal which he desires to use.
[0032] To use this feature, the subscriber calls network directory
enquiries and gives the name of the person, company or service of
which he wishes to ascertain the telephone number, as well as any
additional information requested by the operator answering the
call. The operator then locates the number, confirms it and
enquires as to whether the number is to be transmitted verbally,
transferred over SMS into a given memory location of the
subscriber's SIM card or both.
[0033] If the subscriber chooses a SIM update, the voice call is
terminated and the operator initiates the SMS process by entering a
sequence into a computer or pressing a dedicated button. The
telephone number is then encoded into an ECS message at the
despatch center and is posted across the network to the
subscriber's communications terminal, which transmits a
confirmation to the despatch center. Thus, the retry mechanism,
which operates until such a confirmation is received, is
suspended.
[0034] The communications terminal recognizes the message as SMS
data, passes it to the SIM card, and if capable, displays a
"message received" banner. The SIM card in turn recognizes the ECS
using special hardware and software, and decodes it accordingly.
The number, and any associated alphanumeric tag, which would
normally consist of the name of the person or company, are
recovered together with the memory location in which they are
intended to be stored. The number and name-tag are then written to
that location and are write-protected if requested by the
subscriber, the overwrite protection being encoded into the message
at source.
[0035] Subsequently, the subscriber attempts to place a call to the
number in the known memory location by keying in the memory
location number. The SIM card passes the telephone or fax number to
the communications terminal on demand, and upon receipt of the
subscriber's confirmation, the communications terminal sets up the
call to the desired number.
[0036] FIG. 3 shows the electronic structure of the SIM card 7. The
card communicates with the mobile to which it is connected via an
input/output (I/O) manager 15, preferably using the protocol ISO
7816 T=0. A filter 16 receives incoming data from the I/O manager
and detects any ECS messages from among the short messages
received. The ECS messages are sent directly to an extended
erasable read only memory (E.sup.2ROM) 17, which is preferably a
"flash" E.sup.2ROM. Data can also be output from the E.sup.2ROM
directly to the I/O manager 15. The remaining blocks shown in FIG.
3 are standard components of a SIM card.
[0037] FIG. 4 shows how the E.sup.2ROM is organized. A root
directory 18 contains a SIM administration and identifier 19, a GSM
directory and network data 20, and a telecom directory 21.
[0038] The telecom directory in turn contains memory locations as
follows: "abbreviated dial numbers" 22, "capability configuration"
23, "short messages" 24, "fixed dial numbers" 25, and "charging
counter" 26. Each block represents a plurality of memory locations.
The frequently dialed numbers and corresponding alphanumeric tags
are stored at locations 22.
[0039] The "abbreviated dial numbers" locations 22 and the "short
messages" locations 24 each have an associated locking control file
27, 28, respectively. The locking control files constitute means
for read/write protecting and removing read/write protection from
their associated memory locations. The locking control files 27, 28
will typically be in the telecom directory 21 as shown, however
they can be located elsewhere such as in an administration
directory.
[0040] FIG. 5 is a flowchart illustrating the operation of the SIM
card 7, which uses the specially fabricated hardware and software
which has been described above to implement the operations
illustrated. At lozenge 9, messages, requests, and instructions
having ECS are distinguished from those without. Each of these ECS
types consists of a data stream headed by a command which is one of
at least four types: write commands for the messages, read commands
for the requests for information, attribute commands for lock or
unlock instructions and run commands for instructions to run a
program.
[0041] The command and data types are decoded at box 10 and acted
on in one of the four paths 11-14.
[0042] Path 11 handles the write commands to store messages
starting at a location specified therein. Path 12 handles the read
commands; again, the requests for information contain a location to
be accessed first. Successive locations are read and the data
stored in a buffer until the required amount of data has been read.
The data in the buffer is then encoded into the ECS format and
despatched from the mobile using SMS to the calling party.
[0043] In path 13, attribute commands are used to lock or unlock
specified memory locations and render them accessible or
inaccessible, either to calling parties or to the subscriber. In
path 14, run commands cause a program stored in the SIM card to be
run.
[0044] The basic ECS system is expandable to up to 255 internal
shell commands of which write, read, lock/unlock and run are four
examples. The specific protocol used for the transfer of
information is not fixed and could be ISO7816 T=0 or any other
suitable protocol.
[0045] The internal shell commands are a supplement to the ability
of the system to create external file objects within the SIM card
7. The file objects are of two types: Application Data File
Programs (ADFP's) containing functional data which can be executed
by the SIM card processor and can self modify if required and
Application Data Files (ADF's) containing non-functional data which
does not have these capabilities. Existing ADF(P)'s can be modified
over-the-air enabling advanced facilities such as personalization,
re-personalization or downloadable phone book.
[0046] The SIM card 7 has a directory structure, similar to that of
a computer disk, and new ADF(P)'s can be downloaded into any
directory over the air. Also over the air, directories can be
created, deleted and modified, multiple tree directory operations
can be carried out and ADF(P)'s that are no longer required can be
deleted. The amount of ADF(P) data which can be downloaded is
limited only by the size of the E.sup.2ROM memory of the card.
[0047] The invention, as described, greatly extends the
applications of SIM cards. For example, using the Value Added
Services Directory, subscribers can book hotels and airline seats
over their mobiles quickly and easily.
[0048] An additional advantage of this feature of the invention is
that the geographical distribution of messages to cards in a
specific area such as the South of France is facilitated. Thus
advertisers can direct their messages to all mobile subscribers in
the specific area. This, is particularly useful when subscribers
"roam" from one area to another and have no knowledge of local
services.
[0049] The directory enquiries download enables contact telephone
or fax numbers to be delivered to a subscriber's communications
terminal without any intervention by the subscriber. The process of
manually entering a number whilst engaged in a call to the operator
is often dangerous, especially when the subscriber is driving.
[0050] The ability of the system to download ADF(P)'s means that
additional services can be added to the SIM card over the air while
maintaining total compatibility with the existing cellular system.
Thus the SIM card could acquire the functions of a credit card,
passport, driving licence, car park pass, membership card and so
on, becoming a multi-service card. Also, dynamically updatable
services can be added which require a different process to be run
each time a service is accessed.
[0051] Once the card has extra services on it, it can be used
outside of the mobile phone environment if desired as a standalone
item. This can be read from or written to by a dedicated piece of
hardware, such as a point of sale machine. If desired, the new
services can be deleted, however the card will never lose its
mobile phone SIM capability. In addition, if the card has extra
services, they will continue to function even if the subscriber has
been disconnected from the mobile phone network, unless otherwise
desired.
[0052] Modifications are possible without departing from the scope
of the invention. For example, the SIM card can be trained only to
receive messages detailing services relevant to the subscriber's
needs.
* * * * *