摘要 |
<p>The method involves obtaining user identification utilizing a mobile station for accessing a cellular mobile telephone system via a base station of the telephone system. Distorted authentication information is created during an approach that ensures to the mobile station that the base station is under coverage, where the distorted authentication information is defined to make the approach fail as a user uses the mobile station such that the access to the telephone system is not authorized via the base station. An independent claim is also included for a computer program comprising instructions to perform a method for controlling access of a mobile station to a base station of a cellular mobile telephone system.</p> |