throbber
4,868,846
`
`
`
`
`United States Patent ts
`
`
`
`[11] Patent Number:
`
`
`
`
`
`
`Kemppi
`.
`
`Sep. 19, 1989[45] Date of Patent:
`
`
`
`
`
`
`
`
`
`[54] METHOD FOR LOCKING TO THE USER’S
`CARD IN A PORTABLE RADIO
`
`
`
`TELEPHONE
`
`
`
`
`
`
`
`
`
`
`Inventor: Yrjé Kemppi, Salo, Finland
`[75]
`
`
`
`
`
`
`
`[73] Assignee: Nokia Mobira Oy, Salo, Finland
`
`
`
`
`[21] Appl. No.: 221,079
`
`
`
`
`
`[22] Filed:
`Jul. 19, 1988
`
`
`
`
`
`[30]
`Foreign Application Priority Data
`Jul. 29, 1987 [FI]
`Finland....
`sesesssanseanee 873309
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Lint, CUS cccesssssssccsceecee
`HOIM 11/00
`[51]
`
`
`
`
`
`P52] US. CMe ccccsssssssssssssssssaseccsnseeceesees 379/144; 379/91;
`
`
`
`235/382; 235/486; 340/825.31
`
`
`
`
`
`
`
`[58] Field of Search ..scssssssssees 379/144, 91; 235/380,
`
`
`
`
`
`235/382, 486; 340/825.31, 825.33, 825.34
`
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`
`
`4,439,670 3/1984 Bosset et al. oo... csceeeeee 235/382
`
`
`
`
`
`4,480,181 10/1984 Fisher..........
`we 235/486
`
`
`
`
`
`
`4,670,746 6/1987 Taniguchi et
`340/825.31
`
`
`
`
`
`
`
`
`4,759,056 7/1988 Akiyama......
`we 379/197
`
`
`
`
`
`4,811,387
`3/1989 Hollewedet al.
`- 379/144
`
`
`
`
`
`
`3/1989 Reichardt et al. 0... 235/482
`4,814,593
`
`
`
`
`
`
`
`
`
`
`
`
`
`[56]
`
`
`
`
`
`
`
`
`
`FOREIGN PATENT DOCUMENTS
`
`
`
`0254316
`1/1988 European Pat. Off. ......... 235/486
`
`
`
`
`
`
`
`5/1988 France .....ssssssessssssssensaseesene 235/486
`2607290
`
`
`
`
`7/1983 Japam orcs: 235/486
`O125178
`
`
`
`
`2164227 3/1986 United Kingdom .
`
`
`
`
`
`
`
`Primary Examiner—Robert Lev
`
`
`
`Attorney, Agent, or Firm—Armstrong, Nikaido,
`
`
`
`Marmelstein, Kubovcik & Murray
`
`
`ABSTRACT
`[57]
`
`
`
`
`
`
`
`Theinvention relates to a methodfor the use of a porta-
`
`
`
`
`
`
`
`
`ble radio telephone, which has a processor (4) control-
`
`
`
`
`
`
`
`ling and supervising the operation, a keyboard (7) and a
`
`
`
`
`
`
`
`
`
`display (6), and a card reader (3), in which case, when
`
`
`
`
`
`
`
`
`the radio telephoneis being used, the user identification
`
`
`
`
`
`
`
`
`data required by the radio telephone system are read
`
`
`
`
`
`
`
`
`
`
`from the card (1). The identification data (21) of the
`
`
`
`
`
`
`
`
`
`
`card (1) of the user authorized to use the radio tele-
`
`
`
`
`
`
`
`phone concerned are recorded in the non-erasable
`
`
`
`
`
`
`
`memory (5) of the processor (4), whereupon the radio
`
`
`
`
`
`
`
`
`telephoneshifts into a mode locked to this card in such
`
`
`
`
`
`
`
`
`
`
`a waythat its use is possible with only a certain card (1).
`
`
`
`
`
`
`
`By means ofthis method, protectionis achieved against
`
`
`
`
`
`unauthorized use of the radio telephone.
`
`
`
`
`3 Claims, 2 Drawing Sheets
`
`
`
`
`
`4 MAGNETIC
`
`CARD
`
`
`
`MICROPROCESSOR
`
`
`
`
`
`DISPLAY
`
`
`TELEPHONE
`
`MEMORY
`
`1 of 5
`
`SAMSUNG EXHIBIT 1006
`
`1 of 5
`
`SAMSUNG EXHIBIT 1006
`
`

`

`
`
`US. Patent—Sep. 19, 1989 Sheet1 of 2 4,868,846
`
`
`
`
`
`
`
`
`4
`MAGNETIC ©
`
`
`CARD
`
`
`MICROPROCESSOR—DISPLAY
`
`
`
`4,
`
`
`
`
`
`
`
`
`CARD ID
`
`DATA
`
`10.
` 11
`1h
`15
`16
`
`
`
`
`13
`
`FIG. 2
`
`
`
`CARD
`NUMBER
`
`
`
`
`
`
`
`+
`
`
`
`
`a3
`
`
`
`
`LOCKING CODE
`
`
`
`
`22
`
`
`
`
`20
`
`
`
`COMPARISON
`
`
`
`
`31N
`CARD esr aren
`
`
`
`CAPDen
`+
`
`
`
`
`
`32
`
`
`
`30
`
`
`
`
`FIG. 3
`
`2 of 5
`
`2 of 5
`
`

`

`
`
`
`
`
`
`
`
`US. Patent—sep.19, 1989 Sheet20f2 4,868,846
`
`
`
`MEMORY
`
`
`
`Sa
`
`PROCESSOR
`
`5D
`
`MEMORY
`
`
`
`RADIO UNIT
`
`
`
`
`
`
`
`
`CARD
`READER
`
`
`
`3
`
`
`
`3 of 5
`
`3 of 5
`
`

`

`
`METHOD FOR LOCKING TO THE USER’S CARD
`
`
`
`
`
`IN A PORTABLE RADIO TELEPHONE
`
`
`
`
`1
`
`
`
`4,868,846
`
`
`
`
`
`15
`
`
`
`2
`
`
`
`
`
`
`
`According to the invention it is also possible to use
`
`
`
`
`
`
`
`
`for the locking for example a four-digit code by means
`
`
`
`
`
`
`
`
`of which the card locking is activated. The locking
`
`
`
`
`
`
`
`
`codeand theidentification code on the card may also be
`
`
`
`
`
`
`recorded in the indelible memory of the telephone.
`After the card is fed in, the identification code on the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`card is compared with the identification code recorded
`
`
`
`
`
`
`
`
`
`
`in the memory, and whenthecardis the correct one the
`
`
`
`
`
`
`
`telephone functions normally but, in the case of a wrong
`
`
`
`
`
`
`
`card, operation is prevented. The unlocking can be
`
`
`
`
`
`
`
`
`
`
`done with the same card as was used for activating the
`
`
`
`
`
`
`locking, by keying in the correct locking code.
`
`
`
`
`
`
`
`A mobile radio telephone may be made upofa sepa-
`
`
`
`
`
`
`
`rate operating apparatus (a handset) and a radio unit,
`
`
`
`
`
`
`
`each of them having a separate processor. In this case
`
`
`
`
`
`
`
`
`the locking concerns both the operating apparatus and
`the radio unit.
`
`
`
`
`
`
`
`
`
`
`By this solution a protection has been achieved in
`
`
`
`
`
`
`
`
`
`which both the operating apparatus and the radio unit
`are locked to the same card, in which case not even the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`stealing of the operating apparatus alone would be
`worth while.
`
`
`
`
`
`
`
`
`
`
`
`In the event that the operating apparatus does not
`
`
`
`
`
`
`
`have its own separate processor, the locking is imple-
`
`
`
`
`
`
`
`
`mented in the processor which controls the wholetele-
`
`
`
`
`
`
`
`
`phone. Such one processor apparatus could be, for ex-
`
`
`
`
`
`
`ample, hand telephones without a separate operating
`unit.
`
`
`
`
`
`
`
`
`The card locking can be implemented completely via
`
`
`
`
`
`
`
`
`
`the program. The card locking is seen on the userinter-
`
`
`
`
`
`
`
`
`
`face as only one locking level, which the user may
`
`
`
`
`
`
`
`select when he so desires. All that is needed additionally
`
`
`
`
`
`
`
`
`is routines for the identification comparison and for
`
`
`
`
`
`preventing the functioning of the telephone.
`
`
`
`
`
`
`
`
`
`The user card may be a plastic card, the size of a
`
`
`
`
`
`
`
`
`
`_ credit card, provided with a magnetic strip, or some
`
`
`
`
`
`
`
`
`other card suitable for the purpose, for example a so-
`
`
`
`
`
`
`called “intelligent” card provided with a processor.
`
`
`
`
`
`
`The method according to the invention is described
`
`
`
`
`
`
`
`below with the aid of an embodiment example depicted
`
`
`
`in the drawing.
`
`
`
`In the drawing,
`
`
`
`
`
`
`FIG.1: a block diagram of the principle of a portable
`
`
`
`
`
`
`
`radio telephone to the extent that it pertains to the in-
`vention;
`
`
`
`
`
`
`
`FIG.2: a representation of the principle of the identi-
`
`
`
`
`
`
`
`fication data contained in the user’s magnetic card;
`
`
`
`
`
`FIG. 3: an illustrative picture of the comparison of
`
`
`
`
`
`
`
`
`
`the locking code in the memory and the code whichis
`fed in; and
`
`
`
`
`
`
`
`
`FIG. 4: a block diagram of the principle of a portable
`
`
`
`
`
`
`radio telephone when the apparatus is made up of a
`
`
`
`
`
`
`separate operating apparatus and a radio unit.
`
`
`
`
`
`
`
`
`The method worksin such a way that, when the user
`
`
`
`
`
`
`
`wishes to lock the radio telephone depicted as a block
`
`
`
`
`
`
`diagram in FIG.1 to a certain magnetic card 1, he feeds:
`
`
`
`
`
`
`
`
`
`the card into the magnetic card reader 3 in the tele-
`
`
`
`
`
`
`
`
`phone,activates the locking by pressing the locking key
`
`
`
`
`
`
`
`
`8 in the keyboard, and keys in a four-digit locking code
`
`
`
`
`
`
`
`
`from the keyboard 7. At this time the telephone number
`
`
`
`
`
`
`
`(FIG. 2) or its part 12 on the card 1 is recordéd, to-
`
`
`
`
`
`
`
`
`
`gether with the locking code 22, into the indelible mem-
`
`
`
`
`
`
`
`
`ory 5 of the telephone. (The data contained in the mag-
`
`
`
`
`
`
`
`
`netic. card depicted in FIG. 2 pertain to the use of the
`
`
`
`
`
`
`
`radio telephone system, which is not explained here in
`
`
`greater detail.)
`
`
`
`
`
`
`
`
`When the magnetic card 1 is fed into the card reader
`
`
`
`
`
`
`
`
`
`
`3 the next time, before the initiation of the registration
`
`
`
`
`
`
`
`The invention relates to a mobile radio telephone,in
`
`
`
`
`
`
`
`particular to a method for the use of a portable radio
`
`
`
`
`
`
`telephone operating in a public radio telephone network
`
`
`
`
`
`
`
`
`
`
`which has not only the radio telephone parts but also a
`
`
`
`
`
`
`
`processor which controls and supervises the operation
`
`
`
`
`
`
`and has a non-erasable read-write memory, a keyboard
`
`
`
`
`
`
`
`
`and a display, and a card reader, in which case, when
`
`
`
`
`
`
`the radio telephoneis set up for a telephone connection,
`
`
`
`
`
`
`
`
`the user identification data required by the radio tele-
`
`
`
`
`
`
`
`
`
`phone system are read from the present card inserted in
`the card reader.
`
`
`
`
`
`
`
`
`
`
`One example of such a radio telephoneis the tele-
`
`
`
`
`
`
`phone working in the German NETZ-C network.
`
`
`
`
`
`
`
`
`The magnetic card required for the use of a NETZ-C
`
`
`
`
`
`
`
`radio telephone is a plastic card, the size of a normal
`
`
`
`
`
`
`
`
`credit card, provided with a magnetic strip. This card
`
`
`
`
`
`
`
`has all the information required by the system regarding
`
`
`
`
`
`
`
`
`
`
`the user. The possessor. of the card may feed his card
`
`
`
`
`
`
`
`
`
`into any NETZ-C telephone anduse the telephone with
`
`
`
`
`
`
`
`
`his ownidentification code, without the system know-
`
`
`
`
`
`
`
`
`ing anything about the origin of the telephoneitself.
`
`
`
`
`
`
`Owing to the above, stealing a portable telephone
`
`
`
`
`
`
`
`
`may become tempting. If the thief is not caught red-
`
`
`
`
`
`
`
`handed, tracing the telephonelater is nearly impossible.
`
`
`
`
`
`
`
`The object of the invention is to provide sufficient
`
`
`
`
`
`
`protection in the telephoneitself against unauthorized
`use.
`
`
`
`
`
`
`
`According to the invention, this protection is imple-
`
`
`
`
`
`
`mented by means of the system by recording in the
`
`
`
`
`
`
`memory of a portable radio telephonethe identification
`
`
`
`
`
`
`
`
`data of the card of one specific user authorized to use
`
`
`
`
`
`
`
`the radio telephone concerned;whereupon the radio
`
`
`
`
`
`
`
`
`telephone shifts to the locked mode, locked to this
`
`
`
`
`
`
`
`
`
`
`user’s card, in such a way that the use of the radio tele-
`40
`
`
`
`
`
`
`
`
`phone in the mode locked to the user card is possible
`
`
`
`
`
`
`
`
`
`
`only with the help of the card designated for it, and that
`
`
`
`
`
`
`unlocking, whereupon a shift is made back to the un-
`
`
`
`
`
`
`
`
`
`locked mode,is possible only with the help of the card
`the identification data of which were recorded in the
`
`
`
`
`
`
`
`45
`
`
`
`
`
`
`
`memory of the processor at the time of shifting to the
`locked mode.
`
`
`
`
`
`
`
`Protecting a telephone against unauthorized use is
`
`
`
`
`
`
`
`
`
`knownperse, but the question has always been of lock-
`
`
`
`
`
`
`
`ing the telephone apparatusitself or its operation. How-
`
`
`
`
`
`
`
`
`ever, the locking of the telephone apparatus alone does
`
`
`
`
`
`
`
`not provide sufficient protection, since opening the
`
`
`
`
`
`
`locking codeis in principle possible by experimenting
`
`
`
`
`
`
`with a sufficient number of codes, if the telephoneal-
`
`
`
`
`
`
`
`
`lowsthe locking code to be keyed in using any card.
`
`
`
`
`
`
`
`According to the invention, the radio telephone thus
`
`
`
`
`
`
`
`
`
`has, available for the user to choose, a locking level the
`
`
`
`
`
`
`
`activation of which locks the telephone to the magnetic
`
`
`
`
`
`
`
`
`card in the card reader at that moment. Thetelephone
`
`
`
`
`
`
`functions completely normally as long as the correct
`60
`
`
`
`
`
`
`
`card in in the telephone, but if an attempt is made to use
`
`
`
`
`
`
`
`
`the apparatus with a wrong card, its operation is pre-
`
`
`
`
`
`
`
`vented. If the telephone locked to a card is stolen to-
`
`
`
`
`
`
`
`
`
`
`gether with the card, calls made using the card con-
`
`
`
`
`
`
`cerned can be prevented at the system level.
`65
`
`
`
`
`
`
`In another embodiment of the invention, a locking
`
`
`
`
`
`
`
`
`key is provided in the keyboard for the user to press in
`
`
`
`
`
`
`
`
`order to shift the radio telephone to the locked mode
`and outofit.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`4 of 5
`
`4 of 5
`
`

`

`4,868,846
`
`
`
`10
`
`
`
`4
`
`
`
`
`
`
`
`the disadvantages. of
`According to the invention,
`
`
`
`
`
`
`locking, mentioned earlier, have been
`conventional
`
`
`
`
`
`
`
`
`eliminated in such a way that the telephone will not
`
`
`
`
`
`
`
`
`register in the network and will not accept commands
`
`
`
`
`
`
`
`from the keyboard,
`i.e.
`the telephone is completely
`
`
`
`
`
`
`
`
`“dumb”, if a wrong card 1 is fed into the card reader3.
`I claim:
`
`
`
`
`
`
`
`
`
`1. A methodfor use in a mobile radio telephone oper-
`
`
`
`
`
`
`
`able in a general telephone network having radio tele-
`
`
`
`
`
`phone parts, a processor, a non-erasable read/write
`
`
`
`
`
`
`memory which controls and supervises operation, a
`
`
`
`
`
`
`
`keyboard,a display, a card reader, and a readable card,
`
`
`
`
`
`
`said method comprising the steps of:
`
`
`
`
`
`
`setting up said radio telephone for a call;
`
`
`
`
`
`
`
`reading user identification data required by said tele-
`
`
`
`
`
`
`
`
`phoneinto said card reader from said card;
`
`
`
`
`
`
`
`recording said identification data of said card of a
`
`
`
`
`
`
`
`specific user authorized to use said radio telephone
`
`
`
`
`
`into said memoryofsaid processor;
`
`
`
`
`
`
`shifting said radio telephone to a locked mode;
`
`
`
`
`
`
`
`
`locking said card into said radio telephone, wherein
`
`
`
`
`
`
`
`
`
`said step of locking of said card is such that the use
`
`
`
`
`
`
`
`
`ofsaid radio telephonein said locked modeis possi-
`
`
`
`
`
`
`
`
`
`ble only with the use of said card which is specifi-
`
`
`
`
`
`
`
`cally designated for said radio telephone; and
`
`
`
`
`
`
`
`shifting to an unlocking mode, wherein the step of
`
`
`
`
`
`
`
`shifting to said unlocking mode is possible with said
`
`
`
`
`
`
`
`card having said identification data having been
`
`
`
`
`
`
`recorded in said memory at the time ofshifting to
`said locked mode.
`
`
`
`
`
`
`
`
`
`
`2. A method according to claim 1, wherein the step of
`
`
`
`
`
`
`
`
`shifting to the locked mode andout of it comprises the
`
`
`
`
`
`
`
`step of pressing a locking key arranged in the keyboard.
`
`
`
`
`
`
`3. A method according to claim 1 or 2, wherein the
`
`
`
`
`
`
`
`step of shifting to the locked mode andoutofit further
`
`
`
`
`
`
`comprises the step of keying in a several-digit code.

`x
`&
`*
`&
`
`
`
`
`3
`into the network the card number 21 recorded in the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`memory 5 and the number31 in the card whichis fed in
`
`
`
`
`
`
`
`are compared. If the numbers agree in the comparison
`
`
`
`
`
`
`
`
`of FIG. 3, the operation proceeds normally. But,if the
`
`
`
`
`
`
`
`
`card 1 is wrong,i.e. 4’-8’ (31) differ from numbers 4-8
`
`
`
`
`
`
`
`
`
`(21) the telenumbers phone will not register in the net-
`
`
`
`
`
`
`
`
`
`
`work and will not accept any commands from the key-
`board 7. Thus the unauthorized use of the radio tele-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`phone, without the correct magnetic card 1, is more or
`
`
`
`
`
`
`less completely prevented. It is possible to unlock the
`
`
`
`
`
`
`card locking by activating the unlocking by means of
`
`
`
`
`
`
`
`
`key 8 in the keyboard and by keying in the locking code
`
`
`
`
`
`
`22 given at the time of the locking.
`
`
`
`
`
`
`
`The operation ofthe parts of the radio telephone and,
`
`
`
`
`
`
`
`for example, the keying in, recording and comparison of
`
`
`
`
`
`the numbers are controlled by a microprocessor uP (4)
`
`
`
`
`
`
`
`
`in a manner known perse, not explained here in greater
`detail.
`
`
`
`
`
`
`
`Since according to FIG.4 the mobile radio telephone
`
`
`
`
`
`
`is made up ofa separate operating apparatus (= handset)
`
`
`
`
`
`
`
`
`and a radio unit, each having its own processor 4a and
`
`
`
`
`
`
`
`
`4b, the locking concerns both the operating apparatus
`and the radio unit. This means that the same identifica-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tion code (shown in FIG. 3 has been recorded in the
`
`
`
`
`
`
`
`
`indelible memories 5a and 5b of both the operating
`
`
`
`
`
`
`
`
`
`apparatus and the radio unit. After the feeding in of the
`
`
`
`
`
`
`
`
`
`card 1, both the operating apparatus and the radio unit
`
`
`
`
`
`
`compare the identification information in their memo-
`ries to both the identification code received from the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`card and that keyed in. Thereafter the processors of
`
`
`
`
`
`
`
`both units exchange information regarding the correct-
`
`
`
`
`
`
`
`ness of the identification code according to a certain
`
`
`
`
`
`
`
`data transfer protocol; both processors must agree re-
`
`
`
`
`
`
`
`garding the correctnessofthe identification code before
`
`
`
`
`a call is initiated normally.
`
`15
`
`
`
`
`
`
`
`
`
`45
`
`
`
`50
`
`
`
`55
`
`
`
`65
`
`
`
`5 of 5
`
`5 of 5
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket