`
`US 6,836,654
`
`PATENT:
`
`6,836,654
`
`INVENTORS: Decotignie, Philippe
`
`TITLE:
`
`Anti-theft protection for a radiotelephony
`device
`
`NOON US2000739507A
`
`FILED:
`
`18 DEC 2000
`
`ISSUED:
`
`28 DEC 2004
`
`COMPILED:
`
`19 MAR 2018
`
`1 of 164
`1 of 164
`
`SAMSUNG EXHIBIT 1025 (part 1 of 2)
`SAMSUNG EXHIBIT 1025 (part 1 of 2)
`
`
`
` ii
`|fi
`LI Continued on lasue Siigingide File Jacket
`eeeee~~;
`
`[K
`
`eeee
`
`|
`
`|||
`
`Pais
`PHEW
`ba
`bene
`neect
`prot bia ton
`,
`
`at
`& radtebeslewhony cuvioe
`
`iePhilippe
`
`tae
`
`Fitba
`‘
`‘
`
`
`
`
`cnoseREFERENCED
`[—_see
`c
`
`
`[sass|sueciass|cuass[| evsciassqonesucinssrenmioon|
`[edeMaia]alva[yorlossesSEC
`
`
`
`INTERNATIONAL CLASSIFICATION
`
`Sr”77
`
`
`
`Fi
`
`(1 The tonm of this patent|NOTICEOFALLOWANCEMAILED|OF ALLOWANCE MAILED
`
`subsequentlo___ (data) Melce Peuths
`theo
`08folkyJOH
`been
`di
`(Aasiatant Exsjner)
`CO The term of this patent shail
`W O———
`Not extend beyond the expiration date
`t
`eee)
`ie nom
`SUPERVISORY PATENT EXAMINER
`SS TECHNOLOGY CENTER 2800 4 ¢07
`Franeee
`
`—sor
`
`naa Pant
`
`118 o¢
`ISSUE BATCH NUMBER
`
`| |
`
`0 The terminal ____months of
`this patent have been disclaimed.
`
`WARNING:
`<The information disclosed herein may be restricted. Unauthorized disclosure may be prohibited by the United States Code Title 36, Sections 122, 161 and 368,
`Seeeeeee eeeeearen
`FILED WITH: Llosk (CRF) [_]FicHe [_]co-rom
`Form PT
`a 60)
`(Attached Ip pockat on right Inside fp)
`
`ISSUE FEE IN FILE
`
`=
`
`=
`(FARE,
`
`
`2 of 164
`
`
`
`ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`6,836,654
`
`Transaction History
`
`|Date__—_—i|TransactionDescription,CCC
`
`
`12 18 2000
`Information Disclosure Statement
`(IDS) Filed
`
`
`
`02 13 2001
`
`IFW Scan & PACR Auto Security Review
`
`03 06 2001
`
`Application Is Now Complete
`
`|
`
`
`
`05 21 2001
`05 24 2001
`
`Application Dispatched from OIPE
`Case Docketed to Examiner in GAU
`
`02 19 2004|Mail Final Rejection (PTOL 326)
`02 19 2004
`| Final Rejection
`|
`
`
`
`
`
`
`| 05 212004
`
`| Workflow Request for RCE Begin
`
`|
`
`| Issue Fee Payment Received
`11 18 2004
`Dispatch to FDC
`11 29 2004
`
`11 30 2004
`Receipt into Pubs
`
`11 29 2004|Application Is Considered Ready for Issue
`
`Petition Decision Accept Late Payment of Maintenance Fees Granted
`
`06 08 2009|Petition to Accept Late Payment of Maintenance Fee PaymentFiled
`09 21 2009
`Mail Petition Decision Accept Late Payment of Maintenance Fees Granted
`09 21 2009
`
`3 of 164
`
`
`
`
`eets akaie
`|
`PATENT APPLICATION |. *A9/739501
`ni
`meee
`
`09739507
`
`
`
`eoewer!
`
`
`BEST Copy —
`[FEB 260 4'7y
`
`
`Toot
`
`CONTENTS
`Date Recelved
`Date Received
`(incl, C. of M)
`(incl, C, of M.)
`DateMalied
`Zz8z
`42,
`
`aaREB
`
`56,
`
`57.
`5a.
`59.
`
`60.
`
`og/al(es
`
`
`ti
`
`16."
`
`o
`
`542
`
`,
`
`‘
`
`,
`
`ane
`
`al eestssatd=i‘dor *
`Pada BFK
`17._Dekihenrantsol
`
`
`
`
`,aPieWMagee
`
`idea
`(FFT OUTSIDE)
`
`
`
`
`
`
`4 of 164
`
`
`TEEPEETT
`
`
`
`
`
` TTLLETTPLPELPETERLETTE
`
`
`
`199UC OLLY SL AFL AKEA (for additional cross references)
`
`frPe
`OUPE.CLASSIFIER=||OSBIEH/|
`
`ENeTOHO|399%Josiielo]
`
`
`Fo
`pieltyPepry
`a=pat
`
`Fragtae
`wesTo|Tt|
`ayes|jt|Tyyy
`pei2e]PFT
`NOeee
`pols]ingTTTtTt
`
`es] ||Lj| aseER
`feo]TTTTT TTTT
`rolFTmy}TTCECE
`
`tfeeTT
`
`risTPPet SCS eee
`
`
`
`|_jeofTTTeetteT
`
`
`Lfod|TTTTtTryty| iA|_jso}JTTyyyyyt
`
`J L
`AS
`
`;
`
`:
`
`If more than 150 claims or 10 actions
`staple additional sheet here
`(LEFT INSIDE)
`
`;
`
`5 of 164
`
`
`
`
`
`6 of 164
`
`
`
`WEST Roline Search
`
`hitp //westhrs.8002/binicgi-ban/PreSear
`
`
`
`Search Results -
`sssntetnnigreinreanetsiensommetororsammameseiidaeSats!sennasosssgrmsasserssenesselamssnititreabbentbesistitionns §
`aeeerene aosatestng oifares
`Term
`i
`notteteedaeeeBeene Sateteetereine GtteeeeneeBene
`eenennedeneemertnceteeteteeseeneete geeted wedAtemacout teeeerennse‘semeteomeetovsanees|
`JLOAD
`1303783 |
`sacsnspessbanentaitoisapenibinpeuntestnsdReesndanatesais sespspeeescusinsenungeecayiyeseedaana syeceemnsenscentsininry samniniertamy o
`seetann wieatedte pirmscrondectentorevesbnteonte
`4
`293188!
`sesseter mereeeeraeercerrenrmrenrrercoerenermenneneent srterera@ireverarnesernttowtsemmesntg© ouameeneemnemmermmmnsneora
`[CONGGESTION
`"
`T
`[CONGGESTIONS
`0}
`secseteessine eusequsen/—eeresaeenecenemneaectansnimmammamecmietsegesseniseretenttaneetseaeinanuisestaniaranavemeenigetamenntaaaisevetaiansensanssavsessesinnis pesaemiansiseion cantare vabecess|
`[MEASURS
`i
`0!
`rebrandbibsipemliraiesimenorvbiotenieessaieseiasisaiiinietieidntssiettreeaneemmetentetiiieintatiabaneMniasatenaarerenssalsaiedseunspanineneteianistiohese,Shsomtnmesetecemrentcomet
`{MEASUR
`327
`meguainagentsPoe
`RaASUBA oo
`————-7]
`eeerrtt
`MEASURABILITIES_
`{
`2:
`|MEASURABILITY
`i
`354)
`L1 AND (MEASUR$ NEAR7 (LOAD OR
`"
`et
`ICONGGESTION))).USPT,PGPB,JPAB,EPAB,DWPI,TDBD
`|
`|
`
`
`
`Search:
`
`Database:
`
`
`
`DATE: Wednesday, August 20,2003
`
`Printable Copy Create Cage
`
`
`
`7 of 164
`
`
`
`SetName
`
`
`HitCountSetNameresult set
`side by side
`DB=USPT,PGPB,JPAB,EPAB,DWPI,TDBD; PLUR=YES; OP=ADJ
`L7_Land (measur$ near? (load or conggestion))
`14,
`L72
`18
`L6
`16
`_LS and (transmission near7 (power near3 control$))
`7
`OLS
`LS
`_((ratio or relative) same ((power adj up) near!0 (power adj down)))
`La
`(transmi$ near5 (power near4 (control$ adj command))) same
`((control$ or regulat$) same (overload or conggestion orcollision))
`_—L2 and (load same cell)
`L3
`LI and ((relative or ratio or difference or percent$) same (downlink
`L?
`44) 2
`
`==—__or uplink or increase or decrease or total))
`874
`Li
`Li
`__transmi$ near7 (commands near5S (power adj contro!$))
`
`ll
`
`“4
`
`34—isdLB
`
`vammemr 8
`
`WESTReline Search
`
`END OF SEARCH HISTORY
`
`8 of 164
`
`
`
`WEST Refi Search
`
`http/Avesthrs8002/tan/cgi-biPreSear
`
`Sz.
`
`Li
`
`22
`
`~=2OLS
`
`8433
`
`1 2
`
`99307
`
`=LI
`
`Set
`et N.
`HitCount Name
`sideby side
`result set
`DB=¥SRT,PGPB,JP4B,SPAR:DHE1,TDBD; PLUR=YES; OP=ADJ
`L7
`—_L6 and ((deactivat$ or disabl$) same (predetermined adj time))
`16
`((sim adj card) or (memory adj card) or smart adj card) and (code
`1936=L6
`==.
`near? (block$ or lock$ or disabl$ or unuseable))
`LS
`—_LA and (code near7 (block$ or lock$ or disabl$ orunuseable))
`82
`L4
`L4_L3 and (card near3 (smart or memory))
`LB
`U1 and (((unlwaful adj use)or(illgal adj use) or lost) same (prevent$
`or protect$))
`L LI and ((sim or memory adj card) same ((anti adj theft) or (theft
`near3 prevent$) or (unautohriz$ near3 use)))
`455/§
`
`Li
`
`END OF SEARCH HISTORY
`
`9 of 164
`9 of 164
`
`
`
`“WESTRefine Search
`
`uote
`
`Soarekn
`B1B—OY
`Refine Search
`
`
`he
`
`Page 1 of2
`
`Your wildcard search against 10000 terms has yielded the results below.
`Your result setfor the last L#t is incomplete.
`The probable cause is use of unlimited truncation. Revise your search strategy to use limited truncation.
`Search Results -
`
` __—————
`
`
`
`DS)
`
`,POPB,USPT,USOCEPABJPAB.DWPLTDED.
`
`__'
`Search:
`
`
`
`DyPOPSSPO ARPABDWMLTND,3
`
`|
`
`Database:
`
`Search History
`
`DATE: Wednesday, August 18,2004 PrintableCopyCreateCase
`
`Set
`
`h
`
`eb
`
`b
`
`cg b
`
`ee ch
`
`10 of 164
`10 of 164
`
`
`
`
`
`WESTRefine Search
`
`FREREESEEEEBEEEEEE&BERBR
`
`621
`1404
`
`1530
`
`61
`
`96
`
`282
`0
`243011
`12157
`89618
`53638
`137103
`1627
`1012
`631
`76
`515
`91
`91
`160
`62
`0
`
`‘Name Query
`side
`
`DB=PGPB, USPT, USOC,EPAB,JPAB, DWPI,TDBD; PLUR=YES; OP=ADJ
`L23 and (user near3 id$)
`L22 and code
`
`FREEEERSEEEEGEEEERSEB&ERBR
`
`L20 and (timing or timer)
`L20 and tim$3
`115 and (self near5 (deactivat$ or block$ or disabl$ or activat$ or enabl$ or
`deblock$ or unblock$))
`L18 and code
`
`L17 and (tim$3 near9 (deactivat$ or block$ or disabl$ or activat$ or
`enabl$ or deblock§ or unblock$))
`(15 or 16 or 110) and L15
`(15 or 16 or 110) same L15
`111 or 112 or 113 or L14
`
`wireless adj $4phone
`laptop or radiotelephone or palmtop or pda
`cellular adj $4phone
`mobile adj (unit or station or $4phoneor apparatus or device)
`17 or 18 or 19
`713/600-601 cls,
`713/502.cels.
`713/158.cels.
`705/65-67.ccls.
`12 nor 13 or 14
`380/273.cels.
`380/268.ccls.
`380/264.ccls.
`
`380/(264,268,273).ccls.
`
`END OF SEARCH HISTORY
`
`h
`
`eb
`
`bo
`
`cg b
`
`ee ch
`
`11 of 164
`11 of 164
`
`
`
`a2) United States Patent
`Decotignie
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 6,836,654 B2
`Dec. 28, 2004
`
`US006836654B2
`
`(54) ANTI-THEFT PROTECTION FOR A
`RADIOTELEPHONY DEVICE
`
`(75)
`
`Inventor: Philippe Decotignie, Le Mans (FR)
`
`03) éedgane KRenitghitths Philips Eisehiaties N.V.,
`Eindhoven (NI)
`
`(*) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 509 days.
`
`(30)
`z
`
`(21) Appl. No.: 09/739,S07
`(22)
`Filed:
`Dee. 18, 2000
`(65)
`Prior Publication Data
`US 20010016484 Al Aug. 23, 2001
`Foreign Application Priority Data
`20, 1999
`(PRY ccsccsssssseenssseunsansecessssieesee 99 16136
`Tint, CI? coocccecsccesecessseee HO4M. 1/00; HO4M 3/00;
`HO4M 1/66, HO4B 1/06, HO4B 1/38; H04Q 7/20
`(52) UNS. CW. cerececccneeere 455/40; 455/411, 455/418;
`455/425; 455/550.1; 455/558; 455/565
`(58) Fleld of Searels ..........--:ccccccscvere 455/410, 411,
`455/412.1, 412.2, 418-419, 425, 550.1,
`558, 26.1, 404.1, 557, 565-567; 380/264,
`268, 273, 713/158, 502, 600, 601; 705/65,
`66, 67
`
`(51)
`
`(56)
`
`References Cited
`U.S, PATENT DOCUMENTS
`4908.48 A *
`3/1990 Hanawa ...
`4,945,556 A *
`7/1990 Namekowa ..
`
`
`455/565
`455/505
`
`5,204,663 A *
`5,864,765 A *
`5,907504 A *
`$913,175 A *
`5,978,670 A * LI/L999
`6,095,416 A *
`8/2000 Grant etal.
`...
`
`6,119,000 A * 9/2000 Stephenson et al.
`
`........
`52
`6,125,283 A * S/2000 Kolev et al.
`6,141,563 A * 10/2000 Mille? #4 Glcaiisesence ASSIS
`... 379/433.06
`6,339,643 Bl *
`1/2002 Mastrocola et al.
`
`. 455/565
`4/2002 Decotignie et al.
`6,370,900 BI
`*
`6,398,115 B2" 6/2002 Krause ..........
`=
`
`6,490,463 Bl * 12/2002 Portalier et al.
`sa
`6,542,731 Bl *
`6,583,714 Bl *
`
`FOREIGN PATENT DOCUMENTS.
`| 2878S A
`OLS
`GB
`* cited by examiner
`Primary Examiner—William Trost
`Assistant Examiner—Meless Zewdu
`(74) Attorney, Agent, or Firm—Jack D. Slobod
`(7)
`ABSTRACT
`A mobile radiotelephony device intended for accommoclat-
`ing a linked user identification module offers protection
`against theft. The device prevents a normal operation of the
`device with an unlinked identification module, aud permits
`the nommal operation of the device with the linked identifi-
`cation module until such time the device has been inactive
`for a defined period of time. A debugging code can be
`supplied to the device subsequent
`to a detection of the
`defined period of time to again permit the normal operation
`of the device with linked identificalion module.
`
`20 Claims, 2 Drawing Sheets
`
`
`
`13
`
`12 of 164
`12 of 164
`
`
`
`U.S. Patent
`
`Dec. 28, 2004
`
`Sheet 1 of 2
`
`US 6,836,654 B2
`
`13
`
`
`a]
`
`
`
`FIG. 2
`
`13 of 164
`13 of 164
`
`
`
`Sheet 2 of 2
`
`Dec. 28, 2004
`
`US 6,836,654 B2
`
`U.S. Patent
`
`14 of 164
`14 of 164
`
`
`
`US6,836,654 B2
`1
`2
`ANTI-THEFT PROTECTION FOR A
`stored in the identification module, and the test means
`RADIOTELEPHONY DEVICE
`compare the thus stored data with the dala stored in the
`identification module which is places. inside the device. The
`data stored is formed,
`for cxample, by the international
`identification number IMS1 which is contained in the iden-
`tification module (compare standards relating to the GSM
`radiotelephony systems). ‘Thus, the identification moduleis
`automatically linked to the device without the intervention
`of the user, more particularly without the fact that a specific
`code has to be entered.
`Advantageously the deblocking code, which is to be
`supplied to return to the normal operating mode, is formed
`by the pin code (Personal Identity Number) which is. con-
`tained io the identification module (conipare stacdiets retat-
`ing lo the GSM radiotelephony systems). Thus the uscr need
`fot store an additional code to ensure the protection of his
`device.
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIELD OF THE INVENTION
`‘The invention relates to a mobile radiotelephony device
`intended for accommodating a user identification module,
`where the device bas an established link to an identification .
`module to thereby prevent a normal operation ofthe device
`wheo an identification module other than the linked identi-
`fication module is mounted inside the device,
`‘The invention also relates to a method of protecting such
`a device, and a computer program for implemeating such a
`method.
`‘The invention notably has applications im the. ficld of
`portable radiotelephuny. Portable radiotelephony devices
`are intended to accompany their users when they move
`around. It happens thal these devices are los! or stolen.
`PRIOR ART OF THE INVENTION
`U.S. Pat. No. 5,913,175, published Jun. 15, 1999
`describes a method of protecting a radiotelephone which
`permitsto avoid that the lost or stolen telephone can be used
`by a third party with another user identification module. This
`method comprises establishing a link between the device
`aod a specific user identification module and blocking the
`normaloperation of the device when the user identification
`module that is placed inside the device is not the one that is
`linked to the deviec.
`Whenthe device is lost or stolen with the identification
`module to which it is linked, the user is to warn the operator
`so that the use of his identification module. is blocked at
`networklevel.
`This means that the device can be freely used until the
`identification module to whichit is linked is blocked via the
`In FIG. 1 is represented an electronic device in accor-
`network. This may take a certain period of time.
`dance with the invention. In the example described bere this
`device is a portable radiotelephone of the type used in
`SUMMARYOF THE INVENTION
`cellular systems.
`It notably comprises a microphone 5, a
`It is notably an object of the invention to resolve this
`loudspeaker 6, a screen 8, a keypad 9 and an antenna 1. The
`problem. For this purpose, a device in accordance with the
`device 1 also comprises a housing 12 intended for accom-
`invention (1) verifies a user identification module mounted
`modating a user identification module 13. In the example of
`embodiment described bere, this identification module 13 is
`inside the mobile radiotclepboay device is linked w the
`mobile radiotelephuny device, (2) detects a period of inac-
`a portable card of an integrated circuit in which information
`is stored, notably an international
`identification number
`tivity of the mobile radiotelepbony device during a normal
`currently called [MSI number, and a Personal Identification
`operation of the mobile radiotelepony device, wherein the
`normal operation includes a processing of all outgoing calls,
`Number currently called PIN code.
`and (3) prevents the oormal operation of the mobile radio-
`FIG. 2 shows the overall electrical diagram of this device
`telephony device in response to the verification of the user
`1. The operation of the device1is, in essence, controlled by
`identification module and in response to the detection of the
`a microprocessor assembly 20 which comprises a micropro-
`period of inactivity of the mobile radiotelephony device.
`cessor (“wP") 22 to which are associated a random access
`‘Thus, when the device falls into the hands of a third party
`memory (“RAM”) 24 and a read-only memory (“ROM") 26.
`together with the identification module to whichit is linked,
`This assembly is connected to a man-machine interface
`' Via a’common line 32. This man-machine interface. 32
`it has most probably been inactive for a period of time that
`55
`is sufficiently long for its normal operation to be blocked
`controls the screen 8 and the keypad 9. The common line 32
`(advantageously, the inactive time aller which the blocking
`also connects the microprocessor assembly 20 io a trans-
`mcans are activated is of the order of several minutes). The
`ceiver assembly (“TX”) 35 via an interface circuit 38. ‘be
`transceiver assembly 35 is connected lo the antenna 11.
`’ device cannot thus be used without the deblocking code
`being supplied,
`Finally, the common line 32 also coancets the microproces-
`Thanks to the invention the lost or stolen device becomes
`sor assembly 20 to a card reader 39.
`.
`;
`totally unusable. A fraudulent person cannot send commu-
`In FIG, 3 is represented a function flow chart of a device
`nications al the cost of the owner of the device. But neither
`in accordance with the invention. This flow chart starts at
`can he use the device with another identification module.
`box KL. In box K1 the device is in a state ofavailability, that
`The theft of the device becomes totally uscless. The inven-
`is wesay thal the user bas access to all ihe functions of the
`tion thus forms a protection against thefl.
`device. The user has the choice of either or not locking his
`the connecting
`Ta a particularly simple embodiment,
`device. This locking (L)funlocking (UL) is done by access-
`means comprise reading, means and storage means of a data
`ing a configuration menu of the device. When the user locks
`
`These and other aspects of the invention are appareal
`from and will be clucidated, by way of non-limilative
`example, with reference to the embodiment(s) described
`hereinafter.
`.
`In the drawings:
`FIG.
`1
`represents a device in accordance with the
`invention,
`.
`FIG. 2 represents an overall clectric diagram ofthe device
`of FIG. 1, and
`FIG. 3 represents a flow chart explaining the opcration of
`the device of FIG, 1:
`.
`DESCRIPTION OF A PREFERRED
`EMBODIMENT OF THE INVENTION
`
`20
`
`»
`
`as
`
`5
`
`15
`
`oo
`
`15 of 164
`15 of 164
`
`
`
`4
`that is inside the device is not the one thal is linked to the
`device,
`the device displays the name of the user before
`asking him to insert his identification module as indicated in
`box K5. The device also displays the name of the user before
`$ asking him to supply bis personal code as indicated in box
`Kil.
`‘The embodimentthat has just been described is particu-
`lariy.cffective, because it provides two separate blocking
`modes depending on whether the identification module that
`10 js placed inside the device is cither or pot linked to the
`device. The first blocking mode is applied in the case where
`the device has been lost or stolen. ‘The object is then to
`prevent the device being usable with another identification
`module.
`[it thus advantageously blocks the incoming and
`15 outgoing calls al the same time. The secoad blocking mode
`is applied in the case where the identification module that is
`linked to the device is in its place inside the device and the
`device is in a state of availability. The object is to prevent a
`third party being able to send outgoing calls with this device
`20 if it is lost, stolen orleft without attendance for some time.
`In that case,it is desirable for the user to be able to continue
`to directly receive his incoming calls.
`7
`In another embodiment the same blocking means are used
`as the identification module which is placed inside the
`aa device either or not linked to the device, for example, the
`second blocking means.
`In that case it
`is possible for.
`.
`teceiving incoming calls intended for the ilentification
`module thalis inside the device, even when this identifica-
`tion module placed inside the device is not linked to the
`device.
`;
`While the embodiments of the invention disclosed herein
`are presently considered (o be preferred, various changes
`and modifications can be made without departing from the
`spirit and scope ofthe invention. The scope ofthe invention
`is indicated in the appended claims, and all changes that
`come within the meaning aod range of equivalents are
`intended to be embraced therein.
`. Whatis claimed is:
`1. Amobile radiotelephony device, comprising:
`blocking means for preventing a normal operation of the
`mobile radiotelephooy device, wherein the normal
`operation includes a processing of oulgoing calls,
`liming means for activating the blocking means in
`response to the mobile radiotelephoay device being
`inactive during the normal dgexetien of the snotile
`cadiotelephony device for
`a defined period of time
`subsequent to a mounting of a linked user identification
`module inside the mobile radiotelephony device; and
`deblocking means for permitting the normal operation of
`the mobile radiotelephony device in response to a
`supply of a deblocking code to the mobile radiotele-
`phony device subsequent to the mounting of the linked
`user identification module inside the mobile radiotele-
`phony device and subsequent to the dcfined period of
`ae
`vice ofclaim L wherein
`iS prevents all transmis-
`Bee
`sion of outgoing calls.
`3. The mobile radiotelephony device of claim 1, wherein
`an activation of the blocking means prevents all transmis-
`sions of non-emergency outgoing calls and permits all
`transmissions of emergency outgoing calls.
`4. The mobile radictelepbony device of claim 1, funter
`6s comprising:
`locking means for facilitating an activation of the block
`means by the timing means.
`
`55
`
`as
`
`so:
`
`eu
`
`US 6,836,654 B2
`
`:
`
`3
`.
`his device (box K2), the identification module that is inside
`the device is automatically linked to the device. For this
`purpose, the devicestarts reading a data DIL in the identifi-
`cation module (for example, the international identification
`number IMS!) and be stores it in the random-access memory
`24. Once locked, the device remains in the slate of avail-
`ability indicated in box Kl. Whenthe device is in the stale
`of availability, one looks whether it is locked (box K3). If it
`is not locked (arrow N3), the device remains in the slate of
`availability indicated in box K1. If it is locked (arrow Y3),
`one looks whether the identification module whichis placed
`inside the device is the one thatis linked to the device (box
`K4).
`If the identification module, which is placed inside the
`device, is not the one thatis linked to the device (arrow N4),
`the device goes to a first blocking stale indicated in bax KS.
`In this first blocking state, the device is disconnected from
`the network. Thus il can no longer receive an incoming call
`por transmit an outgoing call (passibly with the exception of
`emergency numbers). In the blocking state K5, the screea
`shows @ message inviting the user lo insert
`the proper
`module into the device. And when the user inserts a new
`module, one looks whether this new identification moduleis
`the one that is connected to the devier (box K7). If this is the
`case (arrow Y7), the device is reconnected to the network in
`accordance with the normal procedure (box K8)and then the
`device returns to the state ofavailability indicated in box K1.
`If not (arrow N7), the operation is resumed in box KS. The
`only way of leaving this first blocking state is thus to place
`the identification module thatis linked to the device inside
`the device,
`If the identification module thalis placed inside the device
`is linked to the device (arrow Y4), one looks whether the
`device has remained in the state of availability for a certain
`period of time T ofthe order of several minutes, for example
`(box KO). If this is not the case (arrow N10), the device
`remains in the state of availability indicated in box KL. If
`this is the case (arrow Y10), the device passes on to a second
`blocking state indicated in box KIL by passing through an
`inilializalion step K.12 which permils to inilialize a variable
`Awhich represents the number of attempts made al supply-
`ing a deblocking code (for example, the Personal Identifi-
`cation Number) PIN.
`In this second blocking slate the device only processes
`incoming calls (box K13) and, possibly, the outgoing calls
`that correspond to emergency numbers (box K14), Oace
`these calls have been processed, the device goes back to the
`sccond blocking slate indicated in box K11. In the second
`blocking statc K11 a message inviling the user to supply a
`deblocking code is displayed on the screen.Ifthe code taken
`by the user is recognized (arrow ¥11), the device goes hack
`to the state of availability indicated in box KIL.If it is not
`recognized (arrow N11), the value of the variable A is tested
`(box K15). If this value is lower than a certain figure (for
`example 3), the value of Ais augmented by unily (box K16)
`and a message is displayed on the screento indicate the user
`that the code is not valid (box KL7). Then the devigg.goes
`backto the second blocking state indicated in box
`Ke
`Tt the
`variable A is higher than or equal to said figure, the test of
`box KIS causes the total blocking of the device indicated in
`box K3@. To leave this third blocking state it is necessary to
`conlact
`the organization thal provides the identification
`module. One is then again in the slate of availability KL.
`In another embodiment of the invention, when the user
`locks the telephone, the device asks for the user's name.‘he
`fame given ty the aser i stored itt the rantom access
`memory 24 of the device. When the idcotification module
`
`16 of 164
`16 of 164
`
`
`
`US 6,836,654 B2
`
`6
`14. The method claim 10, further comprising:
`storing ao international identification umber stared on
`the linked user identification module onto the mobile
`radiotelephony device as data corresponding to a link
`between the mobile radiowclepbony device and the
`linked user identification module.
`15. The method claim Ll, further comprising:
`storing a personal identification number scored on the
`linked user identification module onto the mobile
`radiotelephony device as the debugging code.
`16. The method of claim 10, further comprising:
`preventing the normal operation of the mobile radintele-
`phony device in response to any unlinked user identi-
`fication module being mounted inside the mobile radio-
`telephony device.
`17. In a mobile radiotelephony device, a computer read-
`able medium comprising:
`computer readable code for verifying a user identification
`module mounted inside the mobile radiotelephony
`device is linked to the mobile radiotelepbony device;
`computer readable code for detecting a period of inactiv-
`ity of the mobile radiotelephany device during a normal
`operation of the mobile radiotelephony device, wherein
`the normal operation includes a processing of all out-
`going calls;
`computer readable code for preventing the normal opera-
`tion of the mobile radiotelephooy device in response to
`the verification of the linked user identification module
`and in response to the detection of the period of
`inactivity of the mobile radiotelephony device.
`18. The computer readable medium of claim 17, further
`comprising:
`computer readable code for permitting the normal opera-
`tion of the mobile radiotelephony device im response to
`the verification of the linked user identification module
`and in response to a supply of a deblocking code to the
`mobile radiotelephony device subsequent to the detec-
`tion of the period of inactivity of the mobile radiote-
`lephony device.
`19. The computer readable medium of claim 18, further
`comprising:
`.
`storing a personal
`identification number stored on the
`linked uscr identification module onto the mobile
`fadiotelephony device as the deblocking code.
`20. The computer readable medium of claim 17, further
`“comprising:
`preventing the normal operation of the mobile radiotele-
`phony device in response to any unlinked user identi-
`fication module being mounted inside the mobile radio-
`telephony device.
`
`__
`
`5
`5. The mobile radiotelephony device of claim 1, further
`comprising:
`counecting means for establishing a link between the
`mobile radiotelephony device and the linked user iden-
`tification module,
`~
`6. ‘The mobile radiotelepbony device of claim 5, further
`comprising:
`locking means for facilitating an establishmentofthe link
`between the mobile radiotelephony device and the
`linked user identification module by the connection
`means.
`7. The mobile radiotelephony device of claim 1, wherein
`an international identification number stored on the linked
`user identification module is stored on the mobile radiote-
`lephony device as data corresponding to a link between the
`mobile radiotelephony device and the linked! user identifi-
`cation module.
`8. The mobile radiotelephony device of claim 1, wherein
`a personal identification number stored on the linked user
`identification moduleis stored as the dcblocking code on the
`mobile radictelephony device.
`9. The mobile radiotelephony device of claim 1, further
`comprising:
`,
`tes! means for activating the blocking means whea any
`unlinked user identification module is mounted inside
`the mobile radiotelephony device.
`10. A method of protecting a mobile radiotelephony
`device, the method comprising:
`;
`verfying a user identification module mounted inside the
`mobile radiotelephony device is linked to the mobile
`radiotelephony device;
`detecting a period of inactivity of the mobile radiotele-
`phony device during a normal operation of the mobile
`radiotelephony device, wherein the normal operation
`includes a processing of all outgoing calls;
`preventing the normal operation of the mobile radiotcl:-
`phony device in response to the verification of the
`linked user identification module and in response to the
`detection of the period of inactivity of the mobile
`radiotelephony device.
`Ul. The method of claim 10, further comprising:
`pemnitting the normal operation of the mobile radiotele-
`phony device in response to the verification of the
`linked user identification module and in response to a
`supply of a deblocking code to the mobile radiotele-
`phony device subsequentto the detection ofthe period
`of inactivity of the mobile radiotclophony device.
`12. The method of claim 10, wherein the prevention ofthe
`normal operation of the mobile radiotelephony device pre- a
`vents all transmissions of outgoing calls.
`13. The method ofclaim 10, wherein the prevention ofthe
`normal operation of the mobile radiotelephony device pre-
`ventsall transmissions of non-emergency outgoing calls and
`permits all iransmissions of emergency oulgoing calls.
`
`17 of 164
`17 of 164
`
`
`
`Page | of 1
`
` UNtrED STATES PATENT AND TRADEMARK
`
`COMMISSIONER FOR PATENTS
`“
`= RRR)
`ee ieee Reteeae oe
`Vey
`rereUSLON
`YOa .
`CONFIRMATION NO. 3125
`Bib Data Sheet
`
`'
`
`APPLICANTS
`Philippe Decotignie, Le Mans, FRANCE;
`* CONTINUING DATA sarsdhdshSonSbnsssssens)\ . & -
`« FOREIGN APPLICATIONS “HAtonee JP. >
`FRANCE 9916136 12/21/1999
`
`.______ for following:
`
`SERIAL NUMBER
`09/739,507
`
`GROUP ART UNIT
`=n
`
`ATTORNEY
`DOCKETNO.
`PHF 99,624
`
`iF REQUIRED, FOREIGN FILING LICENSE
`RANTED “™* 03/05/2001
`
`orporate Patent Counsel;
`.S. Philips Corporation;
`80 White Plains Road;
`arrytown ,NY 10591
`TLE
`
`Anti-theft protection for a radiotelephony device
`
`Cl 1.16 Fees(Filing
`
`FILING FEE |FEES:Authority has been given in Paper
`RECEIVED
`.
`to charge/credit DEPOSIT ACCOUNT
`840
`
`18 of 164
`18 of 164
`
`
`
`PATENT APPLICATION SERIAL NO.
`
`U.S. DEPARTMENT OF COMMERCE
`PATENT AND TRADEMARK OFFICE
`FEE RECORD SHEET
`
`12/21/2000 HLE333
`O: FCSi0L
`
`0000055 141270
`710.00 CH
`
`09739507
`
`PTO-1556
`
`(5/87)
`“US. GPO 2000-468-087/99595
`
`19 of 164
`19 of 164
`
`
`
`@emp4THE COMMISSIONER FOR PATENTS, Washington, D.C. 20231 £ mm
`
`
`
`[a-19-9°
`Case Dock
`
`io. PHF 99,624
`
`A
`
`
`
`PS
`“>
`Ad
`» Enclosed for filing is the patent application of Inventor(s):
`a
`Mc PHILIPPE DECOTIGNIE
`“s
`— w
`.
`~~
`aes For: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`a
`=
`3
`| SS ENCLOSED ARE:
`1 =
`{X] Appointment of Associates;
`{X]
`Information Disclosure Statement, Form PTO-1449 and copies of
`documents listed therein;
`] Preliminary Amendment;
`{
`{X] Specification (9 Pages of Specification, Claims,
`{X] Declaration and Power of Attorney:
`(1 Page of a
`[ )fully executed
`(X]unsigned Declaration);
`{X} Drawing (2 sheets of
`{ Jinformal
`(X} formal sheets) ;
`{X} Certified copy of a FRENCH application Serial No.9916136;
`{X} Authorization Pursuant
`to 37 CFR §1.136(a) (3)
`.
`{
`]} Other:
`{
`] Assignment to
`
`:
`
`& Abstract);
`
`Sa
`
`FEE COMPUTATION
`
`CLAIMS AS FILED
`at
`
`
`
`
`ioy
`EXTRA
`- $710.00
`
`_ NUMBER FILED|NUMBER: RATE BASIC FEE
`
`
`
`SSSaeed
`
`$710.00
`.
`TOTAL FILING FEE .
`ps amount of
`Please charge Deposit Account No. 14-1270 in
`the total filing fee indicated above, plus any deficiencies. The
`Commissioner is also hereby authorized to charge any other fees
`which may be required, except the issue fee, or credit any
`overpayment to Account No. 14-1270.
`
`A=
`
`x
`
`ak
`v
`os
`=
`
`Total Cains | 19-20=[o |xsie =| 0-00
`.
`Independent
`2-3
`ah
`Claims
`
`]Amend the specification by inserting before the first line
`{
`as a centered heading --Cross Reference to Related Applications--;
`and insert below that as a new paragraph --This is a continuation-
`in-part of application Serial No.
`,, filed
`+ which is
`
`herein incorporated by reference--, TE OF EXPRESS MAILING
`
`Expreas Mail Mailing Label No. ELA4S8219127US
`Dote of Deposit
`) hereby certity that this paper and/or fee is being
`deposited with the United States Postal Service “Express
`Mail Post Office to Addressee” service under 37 C.F.A.
`1.10 on the date indicated above and Is addrassed to the
`Commissioner for Patents, Washi
`Of,
`20231.
`Typed Name
`Signature
`
`ttorney
`Astor4) 733-9641
`U.S. Philips Corporation
`580 White Plains Road
`Tarrytown, New York 10591
`
`:
`
`NataleA,Manzo __ ‘faditlPawgyS:\SL\MB13SLD0.MA0.doc
`
`20 of 164
`20 of 164
`
`
`
`IN THE
`
`-TED STATES PATENT AND TRALSMARK OFFICE
`
`In re Application of
`
`/
`
`PHILIPPE DECOTIGNIE
`
`Atty. Docket
`
`PHF 99,624
`
`Serial No.
`
`Group Art Unit
`
`Filed: CONCURRENTLY
`
`Ex.
`
`Title: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`Commissioner for Patents
`Washington, D.C. 20231