EP2044788A1 - Verfahren sowie anordnung zum betrieb von mobilen kommunikationsendgeräten - Google Patents
Verfahren sowie anordnung zum betrieb von mobilen kommunikationsendgerätenInfo
- Publication number
- EP2044788A1 EP2044788A1 EP06775736A EP06775736A EP2044788A1 EP 2044788 A1 EP2044788 A1 EP 2044788A1 EP 06775736 A EP06775736 A EP 06775736A EP 06775736 A EP06775736 A EP 06775736A EP 2044788 A1 EP2044788 A1 EP 2044788A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- mobile communication
- communication terminal
- message
- area
- detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
Definitions
- the invention relates to a method for operating mobile communication terminals according to the preamble of claim 1 and to an arrangement for operating mobile communication terminals according to the preamble of claim 11.
- the object underlying the invention is to provide a contrast improved method and arrangement for operating mobile communication terminals.
- the detection is detected by detection of the mobile communication terminal at least into a near field of the action area, wherein the near field designates an area that already extends in the transition area to the action area. Furthermore, after detecting the penetration, the mobile communication terminal, starting from the radio network, is excited by a first message for transmitting determined location-determining information by means of a second message, and the radio network initiates the detection of the second message with the location-determining information.
- the mobile communication terminal is manipulated by the base station that within the action area at least a part of the communication links are inhibited, wherein upon receipt of the second message in the communication onsend réelle within the action area depending on a user of the communication terminal indicative identity information is at least partially granted.
- One advantage of the method according to the invention is the ease of implementation in existing mobile radio communication networks. This is given on the one hand by the fact that only the already existing base stations are used, but on the other hand by the fact that it also ensures backward compatibility in such a way that mobile communication terminals which are not able to perceive the suggestions made according to the invention responds to, but desirably brought into, a state desired in the localized action area.
- the method by detection in the near field allows corresponding steps to be carried out in advance of the complete penetration.
- An additional degree of freedom of the method offers the fact that the detection is realized even with already done penetration.
- the advantage here is to determine the location-determining information based on a coordinate determination by means of satellites, in particular a coordinate determination according to the Global Position System GPS.
- a coordinate determination by means of satellites in particular a coordinate determination according to the Global Position System GPS.
- mobile communication terminals that are designed for operation within such a system, and this will also increase due to the increased use of mobile communication terminals as navigation systems, thus guaranteeing a broad support of the method according to the invention and, secondly, this way of determining coordinates is globally available and very accurate.
- Intersection point determination allows an estimation of the measurement starting point, in this case the mobile communication terminal.
- An advantage of this approach is its cost-effective and simple feasibility. For this purpose, no extension of the mobile communication terminal is required and it can, for example, the already existing base stations are used as triangulation points. Not least because of the fact that this position determination is possible at almost any location with all mobile devices, it represents an advantageous addition in the sense of a fallback position to other positioning methods.
- the location-determining information can also be determined on the basis of a coordinate determination by localization of a so-called Radio Frequency Identification RFID tag.
- a so-called Radio Frequency Identification RFID tag One of the advantages of this development is that very small action areas can be defined by the limited range of the radio signals of such a tag, but also the position can be determined very accurately.
- these RFID tags can additionally be used for their actual purpose, namely the automatic transmission of data upon entry into a radio transmission / radio reception area of a corresponding reading device, the so-called RFID reader.
- the detection of the intrusion by detection of the mobile communication terminal in adjacent to the first radio coverage area and / or overlapping radio coverage areas is used in a simple way the inherent in mobile systems tracking of handsets and thus allows a low-effort Realization of the method according to the invention.
- the detection of the penetration by detection of the mobile communication terminal in the first radio coverage area is advantageously handled.
- the radius of the action area is equal to the radius of the first radio coverage area, but also if the action area is only a subset of the first radio coverage area and detection by detecting the approach to overlap areas of the radio coverage areas is not readily accomplished indicates an intrusion into the action area.
- action areas can be realized which are smaller than the first radio coverage area provided by the respective base station, which is done simply by installing RFID readers on respective inputs to detect intrusion into the action area or exit the action area by detecting the corresponding tag movement.
- the granting is based on the identification information such that these available with the radio network information is compared with in the action area for the above communication authorized person and in case that the person has been deposited as authorized, the communication on the part of the wireless network unrestrictedly.
- the advantage of this procedure is that the subsciber data present to the respective radio network when entering the mobile communication terminal into the radio coverage area need only be compared with correspondingly stored data in order to be able to initiate the state changes desired according to the invention.
- the grant is based on the identification information such that a person entitled to complete communication by a person in a near field of the mobile Determining Koinmunikationsendilless RFID tag is determined, a much more flexible handling in the implementation of the method according to the invention, which is based on the fact that the authorized persons are just handed out a chip card provided with the appropriate tag so as to distinguish legitimate from unauthorized persons , In addition, a change on the part of the radio network for implementing the method is thereby reduced to a minimum.
- the absence of the second message is determined by expiration of a predetermined time interval for sending the first message.
- the arrangement implementing the method according to the invention for the operation of mobile communication terminals advantageously allows the desired change of state in locally limited action areas.
- the figure shows a flowchart of an embodiment of the method according to the invention.
- the figure shows an implementation variant of the method according to the invention.
- a flowchart showing resulting states or actions of the overall system can be seen.
- a state of the normal function goes out, ie a state in which a handset can use all available functions.
- such checks are part of a mobile radio communication system, which initiate this type of query for determining the necessity of transferring connections from a base station providing a radio coverage area to another base station providing another radio coverage area.
- the illustrated embodiment is therefore based on the assumption that the radius of an action range corresponds to the radius of a radio cell, but the invention is not limited thereto.
- a third step S3 the mobile unit is requested to provide location information. This will generally be done so that the current base station or the base station providing the action area transmits a corresponding message to the mobile unit, whereupon the mobile unit determines, for example, if it has a GPS system, its coordinates or Mood requires the help of three base stations, which make a coordinate determination by means of triangulation and communicate to the handset.
- the handset or the user of the handset could receive location information, for example from the RFID reader, via an RFID tag which is detected by an RFID reader at the relevant location.
- a timer is started according to the invention, whose task is to give the handset a certain amount of time for the determination and transmission of the coordinates. For this purpose, it is checked in a fifth step S5 whether the coordinates or location information has been obtained by the network. If this is not the case, it is checked in a sixth step S ⁇ whether the timer has expired or not and in the negative case again in a loop, the fifth step S5 repeated.
- step S8 the identity of the mobile part or of the user of the mobile part is determined. This is necessary to check the authorization, what happens in a ninth step S9.
- the sub-scriber information available to the network can be used with a table stored in the network, or the authorized user temporarily receives, for example, a card which is equipped with RFID tag and whose identity information leads to release.
- the handset can again remain in the normal function state of the first step S1 and its functions can also be fully utilized in the action area. If, however, it turns out that it is not an authorized person, a connection block is obtained which, in the case of handsets designed in accordance with the invention, results in the fact that only emergency calls can be placed and connections beyond that can not be carried out as long as the mobile unit remains inside Action area stops.
- the inventive method thus provides a solution that works both with existing networks and terminals but is also suitable for terminals that are specially prepared for blocking.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/DE2006/001280 WO2008011841A1 (de) | 2006-07-25 | 2006-07-25 | Verfahren sowie anordnung zum betrieb von mobilen kommunikationsendgeräten |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2044788A1 true EP2044788A1 (de) | 2009-04-08 |
Family
ID=37866264
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP06775736A Withdrawn EP2044788A1 (de) | 2006-07-25 | 2006-07-25 | Verfahren sowie anordnung zum betrieb von mobilen kommunikationsendgeräten |
Country Status (5)
Country | Link |
---|---|
US (1) | US8103248B2 (de) |
EP (1) | EP2044788A1 (de) |
CN (1) | CN101502157A (de) |
DE (1) | DE112006004040A5 (de) |
WO (1) | WO2008011841A1 (de) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8620207B1 (en) * | 2006-08-18 | 2013-12-31 | Michael D. Harold | System, method and apparatus for distributed content dissemination |
JP2010268143A (ja) * | 2009-05-13 | 2010-11-25 | Panasonic Corp | 通信端末装置及びセキュリティ方法 |
US9590761B2 (en) * | 2011-09-23 | 2017-03-07 | Commscope Technologies Llc | Detective passive RF components using radio frequency identification tags |
EP2677814B1 (de) * | 2012-06-22 | 2016-05-18 | Alcatel Lucent | Kleinzellige Basisstation und Verfahren zur Steuerung der Kommunikation zwischen einem Benutzerendgerät und einer kleinzelligen Basisstation |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5163158A (en) * | 1989-01-12 | 1992-11-10 | Tendler Robert K | Modular communications system including a portable unit range extender and selective-call system |
US6157842A (en) | 1997-10-16 | 2000-12-05 | Telefonaktiebolaget Lm Ericsson | System and method for positioning a mobile station in a CDMA cellular system |
FR2803974A1 (fr) * | 2000-01-14 | 2001-07-20 | Canon Europa Nv | Procedes de souscription entre une station mobile et une station de base dans un reseau de telecommunications, et systemes les mettant en oeuvre |
DE10100825A1 (de) | 2001-01-10 | 2002-07-25 | Siemens Ag | Automatisierte Einstellung von Profilen bei mobilen Kommunikationsendgeräten |
JP2002218547A (ja) * | 2001-01-17 | 2002-08-02 | Nec Commun Syst Ltd | 移動体通信システムとその通信制御方法、及び通信制御プログラム |
US7112766B2 (en) * | 2001-02-21 | 2006-09-26 | Lerner William S | Enhanced visibility heat alert safety device for hot surfaces |
US20030008662A1 (en) * | 2001-07-09 | 2003-01-09 | Stern Edith H. | Systems and methods wherein a mobile user device operates in accordance with a location policy and user device information |
US7454217B2 (en) * | 2001-10-04 | 2008-11-18 | Stephen William Edge | Method and apparatus for wireless network timekeeping and synchronization |
FI114683B (fi) * | 2002-10-04 | 2004-11-30 | Elisa Matkapuhelinpalvelut Oy | Päätelaitteen liikkeen seuraaminen matkaviestinverkossa |
CN1268153C (zh) * | 2003-06-12 | 2006-08-02 | 华为技术有限公司 | 位置业务中目标用户设备上报位置报告的交互方法 |
FR2877804B1 (fr) * | 2004-11-10 | 2007-04-06 | Radiotelephone Sfr | Systeme, terminal mobile, module electronique portable et procede d'autorisation de controle externe de terminaux mobiles grace a des etiquettes d'identification par frequences radio(rfid) |
CN1779481B (zh) | 2004-11-26 | 2011-12-14 | 国际商业机器公司 | 位置识别的方法、移动终端和*** |
US7733224B2 (en) * | 2006-06-30 | 2010-06-08 | Bao Tran | Mesh network personal emergency response appliance |
JP4739966B2 (ja) * | 2006-01-25 | 2011-08-03 | 富士通株式会社 | 移動通信システムにおける通信方法 |
-
2006
- 2006-07-25 US US12/309,561 patent/US8103248B2/en active Active
- 2006-07-25 CN CNA2006800554631A patent/CN101502157A/zh active Pending
- 2006-07-25 DE DE112006004040T patent/DE112006004040A5/de not_active Withdrawn
- 2006-07-25 WO PCT/DE2006/001280 patent/WO2008011841A1/de active Application Filing
- 2006-07-25 EP EP06775736A patent/EP2044788A1/de not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
See references of WO2008011841A1 * |
Also Published As
Publication number | Publication date |
---|---|
US8103248B2 (en) | 2012-01-24 |
WO2008011841A1 (de) | 2008-01-31 |
CN101502157A (zh) | 2009-08-05 |
DE112006004040A5 (de) | 2009-08-13 |
US20090247126A1 (en) | 2009-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2689616B1 (de) | Ortsabhängige auswahl eines funkbasierten lokalisierungsverfahrens für ein mobiles endgerät | |
WO2018197116A1 (de) | Verfahren zum betreiben eines authentifizierungssystems und authentifizierungssystem | |
EP1058467B1 (de) | Verfahren zum Betrieb von zwei SIM-Karten in ein Mobiltelefon | |
DE60318128T2 (de) | Verfahren zur erzeugung von auslösern basierend auf der position eines mobilfunkendgerätes in einem mobilfunknetzwerk, mobilfunknetzwerk und computerprogramm dazu | |
EP2526441A1 (de) | Verfahren zum durchführen einer transaktion zwischen einem tragbaren datenträger und einem terminal | |
EP2044788A1 (de) | Verfahren sowie anordnung zum betrieb von mobilen kommunikationsendgeräten | |
EP3407307B1 (de) | Parksystem und verfahren zum betreiben eines parksystems | |
EP3146355B1 (de) | Medizingerätesystem und verfahren zur ortung von medizingeräten und mobilen steuerungseinheiten des medizingerätesystems | |
EP2689615A1 (de) | System und verfahren zum funkbasierten lokalisieren eines endgeräts | |
WO2017129188A1 (de) | Zugangskontrollverfahren sowie zugangskontrollsystem | |
DE102019211792A1 (de) | Zugangsanordnung für ein Fahrzeug | |
EP1768316B1 (de) | Entsperren einer mobilfunkkarte | |
DE602005003844T2 (de) | Lokalisierung und Identifizierung einer Person unter Verwendung eines mobilen Gerätes | |
EP3580942B1 (de) | Verfahren zur erfassung von signalstärken für eine signalstärkenbasierte positionsbestimmung eines mobilen ble-geräts | |
DE102007053437A1 (de) | Verfahren zur Positionsbestimmung eines Fahrzeugs | |
DE102019211798B4 (de) | Zugangsanordnung für ein Fahrzeug | |
WO2004073340A1 (de) | Verfahren zur lokalisierung eines mobilen kommunikationsendgerätes | |
DE102009039879B4 (de) | Verfahren zum Steuern der Freigabe einer Einrichtung oder eines Dienstes, als Master ausgebildete Sendeempfangseinrichtung sowie System mit derartiger Einrichtung | |
EP1594329B1 (de) | Verfahren zur Positionsbestimmung einer mobilen Station für die Nutzung eines standortabhängigen Dienstes innerhalb eines Funkkommunikationssystems, entsprechendes System und Einrichtung zur Unterstützung der Positionsbestimmung | |
DE60006921T2 (de) | Verfahren zur Handhabung eines Dualmodustelefons | |
WO2020088915A1 (de) | Sicherung einer multistandardisierten kommunikation | |
DE102015211825A1 (de) | Verfahren und System zum Prüfen der Authentizität empfangener Daten | |
DE102018106395A1 (de) | Verfahren und System zur Bereitstellung von Lokalisierungsdaten | |
WO2001089250A1 (de) | Notrufübermittlungsverfahren | |
DE10050668A1 (de) | Endeinrichtung, Daten- und/oder Kommunikationssystem sowie Verfahren zum Lokalisieren einer Übertragungseinrichtung einer Endeinrichtung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20081216 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR MK RS |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04W 4/00 20090101AFI20090311BHEP |
|
DAX | Request for extension of the european patent (deleted) | ||
RBV | Designated contracting states (corrected) |
Designated state(s): DE FR GB IT SE |
|
17Q | First examination report despatched |
Effective date: 20091210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20100622 |