Abstract:
A cell-based communication system (10,58) having at least two cells (60,62) facilitating a communication link between at least one of a plurality of mobile stations (88-92) and at least one of a plurality of base transceiver stations (74-86) is characterised by at least one mobile station (88) and/or its respective serving base transceiver station (74) having means (94, 96, 108) for providing cell parameter information of a neighbour cell (62) which information is known to both the mobile station and its serving base transceiver station so as to facilitate handover of a communication between the respective serving base transceiver station (74) and a second base transceiver station (76) serving the neighbouring cell (62) without the mobile station accessing or receiving information from the neighbouring cell providing said neighbouring cell parameter information. A radio transceiver unit, base station transceiver and method for use in the system are also described.
Abstract:
A method of encrypting information to be transmitted by a transmitting terminal in a communication system providing secure communications between a plurality of terminals employing an encryption protocol that uses a shared encryption key in each of the plurality of terminals, the method including modifying the share encryption key in the transmitting terminal to provide a modified encryption key and encrypting the information to be transmitted using the modified encryption key, characterised in that the share encryption key is modified by combining with the shared encryption key identifier code used in the communication system to identify the transmitting terminal. A corresponding method of decryption and a system and mobile radio terminal using the method are also described.
Abstract:
A personal handset device for processing or communication of data includes a display (109) operable to display a plurality of indicia (301) each indicating a selectable function of the device and a navigation keypad (102) by which a user can select individual functions of the device by selecting individual indicia. The indicia have an ordering and the keypad has individual numbered keys (303) having a numbering that corresponds to the ordering of the indicia, the numbered keys of the keypad being operable to select corresponding indicia and functions represented thereby. The device may be a portable telephone or radio or a personal digital assistant (PDA). The indicia may be icons arranged to be displayed in a matrix corresponding to a matrix of numbered keys of the keypad. Each icon may represent a group of options which is displayed when the corresponding key is selected.
Abstract:
In a digital wireless communication system, a first control channel is replicated 104 into a plurality of control channels when jamming or interference on the first control channel is detected 102. Wireless communication units operating on the first control channel switch 118 to different replicated control channels. Information about the available replicated control channels may be transmitted 106 over a broadcast control channel and stored 108 in a memory of each communication unit. When the interference on the first control channel disappears, all the communication units may switch back to the first control channel so that the replicated control channels may be closed 124. Hence, the effect of interference may be minimised by distributing communication units over different control channels because jamming of all control channels is difficult and jamming of one channel affects fewer of the communication units.
Abstract:
A wireless communication system includes at least one wireless base station 122 having a processor 208 coupled to a transmitter, encrypting network identification data 330 for transmission to a remote, mobile communication unit 112. The unit 112 includes a receiver for receiving encrypted network identification data 340, from at least one of the base stations 122 and a processor 360 to decrypt the encrypted network identification data 340 in order to determine whether or not that the serving base station is a valid one. In this manner, fraudulent wireless base stations or fraudulent networks may be detected more readily.