throbber
FILE HISTORY
`
`US 6,836,654
`
`PATENT:
`
`6,836,654
`
`INVENTORS: Decotignie, Philippe
`
`TITLE:
`
`Anti-theft protection for a radiotelephony
`device
`
`NOON US2000739507A
`
`FILED:
`
`18 DEC 2000
`
`ISSUED:
`
`28 DEC 2004
`
`COMPILED:
`
`19 MAR 2018
`
`1 of 164
`1 of 164
`
`SAMSUNG EXHIBIT 1025 (part 1 of 2)
`SAMSUNG EXHIBIT 1025 (part 1 of 2)
`
`

`

` ii
`|fi
`LI Continued on lasue Siigingide File Jacket
`eeeee~~;
`
`[K
`
`eeee
`
`|
`
`|||
`
`Pais
`PHEW
`ba
`bene
`neect
`prot bia ton
`,
`
`at
`& radtebeslewhony cuvioe
`
`iePhilippe
`
`tae
`
`Fitba
`‘
`‘
`
`
`
`
`cnoseREFERENCED
`[—_see
`c
`
`
`[sass|sueciass|cuass[| evsciassqonesucinssrenmioon|
`[edeMaia]alva[yorlossesSEC
`
`
`
`INTERNATIONAL CLASSIFICATION
`
`Sr”77
`
`
`
`Fi
`
`(1 The tonm of this patent|NOTICEOFALLOWANCEMAILED|OF ALLOWANCE MAILED
`
`subsequentlo___ (data) Melce Peuths
`theo
`08folkyJOH
`been
`di
`(Aasiatant Exsjner)
`CO The term of this patent shail
`W O———
`Not extend beyond the expiration date
`t
`eee)
`ie nom
`SUPERVISORY PATENT EXAMINER
`SS TECHNOLOGY CENTER 2800 4 ¢07
`Franeee
`
`—sor
`
`naa Pant
`
`118 o¢
`ISSUE BATCH NUMBER
`
`| |
`
`0 The terminal ____months of
`this patent have been disclaimed.
`
`WARNING:
`<The information disclosed herein may be restricted. Unauthorized disclosure may be prohibited by the United States Code Title 36, Sections 122, 161 and 368,
`Seeeeeee eeeeearen
`FILED WITH: Llosk (CRF) [_]FicHe [_]co-rom
`Form PT
`a 60)
`(Attached Ip pockat on right Inside fp)
`
`ISSUE FEE IN FILE
`
`=
`
`=
`(FARE,
`
`
`2 of 164
`
`

`

`ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`6,836,654
`
`Transaction History
`
`|Date__—_—i|TransactionDescription,CCC
`
`
`12 18 2000
`Information Disclosure Statement
`(IDS) Filed
`
`
`
`02 13 2001
`
`IFW Scan & PACR Auto Security Review
`
`03 06 2001
`
`Application Is Now Complete
`
`|
`
`
`
`05 21 2001
`05 24 2001
`
`Application Dispatched from OIPE
`Case Docketed to Examiner in GAU
`
`02 19 2004|Mail Final Rejection (PTOL 326)
`02 19 2004
`| Final Rejection
`|
`
`
`
`
`
`
`| 05 212004
`
`| Workflow Request for RCE Begin
`
`|
`
`| Issue Fee Payment Received
`11 18 2004
`Dispatch to FDC
`11 29 2004
`
`11 30 2004
`Receipt into Pubs
`
`11 29 2004|Application Is Considered Ready for Issue
`
`Petition Decision Accept Late Payment of Maintenance Fees Granted
`
`06 08 2009|Petition to Accept Late Payment of Maintenance Fee PaymentFiled
`09 21 2009
`Mail Petition Decision Accept Late Payment of Maintenance Fees Granted
`09 21 2009
`
`3 of 164
`
`

`

`
`eets akaie
`|
`PATENT APPLICATION |. *A9/739501
`ni
`meee
`
`09739507
`
`
`
`eoewer!
`
`
`BEST Copy —
`[FEB 260 4'7y
`
`
`Toot
`
`CONTENTS
`Date Recelved
`Date Received
`(incl, C. of M)
`(incl, C, of M.)
`DateMalied
`Zz8z
`42,
`
`aaREB
`
`56,
`
`57.
`5a.
`59.
`
`60.
`
`og/al(es
`
`
`ti
`
`16."
`
`o
`
`542
`
`,
`
`‘
`
`,
`
`ane
`
`al eestssatd=i‘dor *
`Pada BFK
`17._Dekihenrantsol
`
`
`
`
`,aPieWMagee
`
`idea
`(FFT OUTSIDE)
`
`
`
`
`
`
`4 of 164
`
`
`TEEPEETT
`
`
`
`
`
` TTLLETTPLPELPETERLETTE
`
`

`

`199UC OLLY SL AFL AKEA (for additional cross references)
`
`frPe
`OUPE.CLASSIFIER=||OSBIEH/|
`
`ENeTOHO|399%Josiielo]
`
`
`Fo
`pieltyPepry
`a=pat
`
`Fragtae
`wesTo|Tt|
`ayes|jt|Tyyy
`pei2e]PFT
`NOeee
`pols]ingTTTtTt
`
`es] ||Lj| aseER
`feo]TTTTT TTTT
`rolFTmy}TTCECE
`
`tfeeTT
`
`risTPPet SCS eee
`
`
`
`|_jeofTTTeetteT
`
`
`Lfod|TTTTtTryty| iA|_jso}JTTyyyyyt
`
`J L
`AS
`
`;
`
`:
`
`If more than 150 claims or 10 actions
`staple additional sheet here
`(LEFT INSIDE)
`
`;
`
`5 of 164
`
`

`

`
`
`6 of 164
`
`

`

`WEST Roline Search
`
`hitp //westhrs.8002/binicgi-ban/PreSear
`
`
`
`Search Results -
`sssntetnnigreinreanetsiensommetororsammameseiidaeSats!sennasosssgrmsasserssenesselamssnititreabbentbesistitionns §
`aeeerene aosatestng oifares
`Term
`i
`notteteedaeeeBeene Sateteetereine GtteeeeneeBene
`eenennedeneemertnceteeteteeseeneete geeted wedAtemacout teeeerennse‘semeteomeetovsanees|
`JLOAD
`1303783 |
`sacsnspessbanentaitoisapenibinpeuntestnsdReesndanatesais sespspeeescusinsenungeecayiyeseedaana syeceemnsenscentsininry samniniertamy o
`seetann wieatedte pirmscrondectentorevesbnteonte
`4
`293188!
`sesseter mereeeeraeercerrenrmrenrrercoerenermenneneent srterera@ireverarnesernttowtsemmesntg© ouameeneemnemmermmmnsneora
`[CONGGESTION
`"
`T
`[CONGGESTIONS
`0}
`secseteessine eusequsen/—eeresaeenecenemneaectansnimmammamecmietsegesseniseretenttaneetseaeinanuisestaniaranavemeenigetamenntaaaisevetaiansensanssavsessesinnis pesaemiansiseion cantare vabecess|
`[MEASURS
`i
`0!
`rebrandbibsipemliraiesimenorvbiotenieessaieseiasisaiiinietieidntssiettreeaneemmetentetiiieintatiabaneMniasatenaarerenssalsaiedseunspanineneteianistiohese,Shsomtnmesetecemrentcomet
`{MEASUR
`327
`meguainagentsPoe
`RaASUBA oo
`————-7]
`eeerrtt
`MEASURABILITIES_
`{
`2:
`|MEASURABILITY
`i
`354)
`L1 AND (MEASUR$ NEAR7 (LOAD OR
`"
`et
`ICONGGESTION))).USPT,PGPB,JPAB,EPAB,DWPI,TDBD
`|
`|
`
`
`
`Search:
`
`Database:
`
`
`
`DATE: Wednesday, August 20,2003
`
`Printable Copy Create Cage
`
`
`
`7 of 164
`
`

`

`SetName
`
`
`HitCountSetNameresult set
`side by side
`DB=USPT,PGPB,JPAB,EPAB,DWPI,TDBD; PLUR=YES; OP=ADJ
`L7_Land (measur$ near? (load or conggestion))
`14,
`L72
`18
`L6
`16
`_LS and (transmission near7 (power near3 control$))
`7
`OLS
`LS
`_((ratio or relative) same ((power adj up) near!0 (power adj down)))
`La
`(transmi$ near5 (power near4 (control$ adj command))) same
`((control$ or regulat$) same (overload or conggestion orcollision))
`_—L2 and (load same cell)
`L3
`LI and ((relative or ratio or difference or percent$) same (downlink
`L?
`44) 2
`
`==—__or uplink or increase or decrease or total))
`874
`Li
`Li
`__transmi$ near7 (commands near5S (power adj contro!$))
`
`ll
`
`“4
`
`34—isdLB
`
`vammemr 8
`
`WESTReline Search
`
`END OF SEARCH HISTORY
`
`8 of 164
`
`

`

`WEST Refi Search
`
`http/Avesthrs8002/tan/cgi-biPreSear
`
`Sz.
`
`Li
`
`22
`
`~=2OLS
`
`8433
`
`1 2
`
`99307
`
`=LI
`
`Set
`et N.
`HitCount Name
`sideby side
`result set
`DB=¥SRT,PGPB,JP4B,SPAR:DHE1,TDBD; PLUR=YES; OP=ADJ
`L7
`—_L6 and ((deactivat$ or disabl$) same (predetermined adj time))
`16
`((sim adj card) or (memory adj card) or smart adj card) and (code
`1936=L6
`==.
`near? (block$ or lock$ or disabl$ or unuseable))
`LS
`—_LA and (code near7 (block$ or lock$ or disabl$ orunuseable))
`82
`L4
`L4_L3 and (card near3 (smart or memory))
`LB
`U1 and (((unlwaful adj use)or(illgal adj use) or lost) same (prevent$
`or protect$))
`L LI and ((sim or memory adj card) same ((anti adj theft) or (theft
`near3 prevent$) or (unautohriz$ near3 use)))
`455/§
`
`Li
`
`END OF SEARCH HISTORY
`
`9 of 164
`9 of 164
`
`

`

`“WESTRefine Search
`
`uote
`
`Soarekn
`B1B—OY
`Refine Search
`
`
`he
`
`Page 1 of2
`
`Your wildcard search against 10000 terms has yielded the results below.
`Your result setfor the last L#t is incomplete.
`The probable cause is use of unlimited truncation. Revise your search strategy to use limited truncation.
`Search Results -
`
` __—————
`
`
`
`DS)
`
`,POPB,USPT,USOCEPABJPAB.DWPLTDED.
`
`__'
`Search:
`
`
`
`DyPOPSSPO ARPABDWMLTND,3
`
`|
`
`Database:
`
`Search History
`
`DATE: Wednesday, August 18,2004 PrintableCopyCreateCase
`
`Set
`
`h
`
`eb
`
`b
`
`cg b
`
`ee ch
`
`10 of 164
`10 of 164
`
`

`

`
`
`WESTRefine Search
`
`FREREESEEEEBEEEEEE&BERBR
`
`621
`1404
`
`1530
`
`61
`
`96
`
`282
`0
`243011
`12157
`89618
`53638
`137103
`1627
`1012
`631
`76
`515
`91
`91
`160
`62
`0
`
`‘Name Query
`side
`
`DB=PGPB, USPT, USOC,EPAB,JPAB, DWPI,TDBD; PLUR=YES; OP=ADJ
`L23 and (user near3 id$)
`L22 and code
`
`FREEEERSEEEEGEEEERSEB&ERBR
`
`L20 and (timing or timer)
`L20 and tim$3
`115 and (self near5 (deactivat$ or block$ or disabl$ or activat$ or enabl$ or
`deblock$ or unblock$))
`L18 and code
`
`L17 and (tim$3 near9 (deactivat$ or block$ or disabl$ or activat$ or
`enabl$ or deblock§ or unblock$))
`(15 or 16 or 110) and L15
`(15 or 16 or 110) same L15
`111 or 112 or 113 or L14
`
`wireless adj $4phone
`laptop or radiotelephone or palmtop or pda
`cellular adj $4phone
`mobile adj (unit or station or $4phoneor apparatus or device)
`17 or 18 or 19
`713/600-601 cls,
`713/502.cels.
`713/158.cels.
`705/65-67.ccls.
`12 nor 13 or 14
`380/273.cels.
`380/268.ccls.
`380/264.ccls.
`
`380/(264,268,273).ccls.
`
`END OF SEARCH HISTORY
`
`h
`
`eb
`
`bo
`
`cg b
`
`ee ch
`
`11 of 164
`11 of 164
`
`

`

`a2) United States Patent
`Decotignie
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 6,836,654 B2
`Dec. 28, 2004
`
`US006836654B2
`
`(54) ANTI-THEFT PROTECTION FOR A
`RADIOTELEPHONY DEVICE
`
`(75)
`
`Inventor: Philippe Decotignie, Le Mans (FR)
`
`03) éedgane KRenitghitths Philips Eisehiaties N.V.,
`Eindhoven (NI)
`
`(*) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 509 days.
`
`(30)
`z
`
`(21) Appl. No.: 09/739,S07
`(22)
`Filed:
`Dee. 18, 2000
`(65)
`Prior Publication Data
`US 20010016484 Al Aug. 23, 2001
`Foreign Application Priority Data
`20, 1999
`(PRY ccsccsssssseenssseunsansecessssieesee 99 16136
`Tint, CI? coocccecsccesecessseee HO4M. 1/00; HO4M 3/00;
`HO4M 1/66, HO4B 1/06, HO4B 1/38; H04Q 7/20
`(52) UNS. CW. cerececccneeere 455/40; 455/411, 455/418;
`455/425; 455/550.1; 455/558; 455/565
`(58) Fleld of Searels ..........--:ccccccscvere 455/410, 411,
`455/412.1, 412.2, 418-419, 425, 550.1,
`558, 26.1, 404.1, 557, 565-567; 380/264,
`268, 273, 713/158, 502, 600, 601; 705/65,
`66, 67
`
`(51)
`
`(56)
`
`References Cited
`U.S, PATENT DOCUMENTS
`4908.48 A *
`3/1990 Hanawa ...
`4,945,556 A *
`7/1990 Namekowa ..
`
`
`455/565
`455/505
`
`5,204,663 A *
`5,864,765 A *
`5,907504 A *
`$913,175 A *
`5,978,670 A * LI/L999
`6,095,416 A *
`8/2000 Grant etal.
`...
`
`6,119,000 A * 9/2000 Stephenson et al.
`
`........
`52
`6,125,283 A * S/2000 Kolev et al.
`6,141,563 A * 10/2000 Mille? #4 Glcaiisesence ASSIS
`... 379/433.06
`6,339,643 Bl *
`1/2002 Mastrocola et al.
`
`. 455/565
`4/2002 Decotignie et al.
`6,370,900 BI
`*
`6,398,115 B2" 6/2002 Krause ..........
`=
`
`6,490,463 Bl * 12/2002 Portalier et al.
`sa
`6,542,731 Bl *
`6,583,714 Bl *
`
`FOREIGN PATENT DOCUMENTS.
`| 2878S A
`OLS
`GB
`* cited by examiner
`Primary Examiner—William Trost
`Assistant Examiner—Meless Zewdu
`(74) Attorney, Agent, or Firm—Jack D. Slobod
`(7)
`ABSTRACT
`A mobile radiotelephony device intended for accommoclat-
`ing a linked user identification module offers protection
`against theft. The device prevents a normal operation of the
`device with an unlinked identification module, aud permits
`the nommal operation of the device with the linked identifi-
`cation module until such time the device has been inactive
`for a defined period of time. A debugging code can be
`supplied to the device subsequent
`to a detection of the
`defined period of time to again permit the normal operation
`of the device with linked identificalion module.
`
`20 Claims, 2 Drawing Sheets
`
`
`
`13
`
`12 of 164
`12 of 164
`
`

`

`U.S. Patent
`
`Dec. 28, 2004
`
`Sheet 1 of 2
`
`US 6,836,654 B2
`
`13
`
`
`a]
`
`
`
`FIG. 2
`
`13 of 164
`13 of 164
`
`

`

`Sheet 2 of 2
`
`Dec. 28, 2004
`
`US 6,836,654 B2
`
`U.S. Patent
`
`14 of 164
`14 of 164
`
`

`

`US6,836,654 B2
`1
`2
`ANTI-THEFT PROTECTION FOR A
`stored in the identification module, and the test means
`RADIOTELEPHONY DEVICE
`compare the thus stored data with the dala stored in the
`identification module which is places. inside the device. The
`data stored is formed,
`for cxample, by the international
`identification number IMS1 which is contained in the iden-
`tification module (compare standards relating to the GSM
`radiotelephony systems). ‘Thus, the identification moduleis
`automatically linked to the device without the intervention
`of the user, more particularly without the fact that a specific
`code has to be entered.
`Advantageously the deblocking code, which is to be
`supplied to return to the normal operating mode, is formed
`by the pin code (Personal Identity Number) which is. con-
`tained io the identification module (conipare stacdiets retat-
`ing lo the GSM radiotelephony systems). Thus the uscr need
`fot store an additional code to ensure the protection of his
`device.
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIELD OF THE INVENTION
`‘The invention relates to a mobile radiotelephony device
`intended for accommodating a user identification module,
`where the device bas an established link to an identification .
`module to thereby prevent a normal operation ofthe device
`wheo an identification module other than the linked identi-
`fication module is mounted inside the device,
`‘The invention also relates to a method of protecting such
`a device, and a computer program for implemeating such a
`method.
`‘The invention notably has applications im the. ficld of
`portable radiotelephuny. Portable radiotelephony devices
`are intended to accompany their users when they move
`around. It happens thal these devices are los! or stolen.
`PRIOR ART OF THE INVENTION
`U.S. Pat. No. 5,913,175, published Jun. 15, 1999
`describes a method of protecting a radiotelephone which
`permitsto avoid that the lost or stolen telephone can be used
`by a third party with another user identification module. This
`method comprises establishing a link between the device
`aod a specific user identification module and blocking the
`normaloperation of the device when the user identification
`module that is placed inside the device is not the one that is
`linked to the deviec.
`Whenthe device is lost or stolen with the identification
`module to which it is linked, the user is to warn the operator
`so that the use of his identification module. is blocked at
`networklevel.
`This means that the device can be freely used until the
`identification module to whichit is linked is blocked via the
`In FIG. 1 is represented an electronic device in accor-
`network. This may take a certain period of time.
`dance with the invention. In the example described bere this
`device is a portable radiotelephone of the type used in
`SUMMARYOF THE INVENTION
`cellular systems.
`It notably comprises a microphone 5, a
`It is notably an object of the invention to resolve this
`loudspeaker 6, a screen 8, a keypad 9 and an antenna 1. The
`problem. For this purpose, a device in accordance with the
`device 1 also comprises a housing 12 intended for accom-
`invention (1) verifies a user identification module mounted
`modating a user identification module 13. In the example of
`embodiment described bere, this identification module 13 is
`inside the mobile radiotclepboay device is linked w the
`mobile radiotelephuny device, (2) detects a period of inac-
`a portable card of an integrated circuit in which information
`is stored, notably an international
`identification number
`tivity of the mobile radiotelepbony device during a normal
`currently called [MSI number, and a Personal Identification
`operation of the mobile radiotelepony device, wherein the
`normal operation includes a processing of all outgoing calls,
`Number currently called PIN code.
`and (3) prevents the oormal operation of the mobile radio-
`FIG. 2 shows the overall electrical diagram of this device
`telephony device in response to the verification of the user
`1. The operation of the device1is, in essence, controlled by
`identification module and in response to the detection of the
`a microprocessor assembly 20 which comprises a micropro-
`period of inactivity of the mobile radiotelephony device.
`cessor (“wP") 22 to which are associated a random access
`‘Thus, when the device falls into the hands of a third party
`memory (“RAM”) 24 and a read-only memory (“ROM") 26.
`together with the identification module to whichit is linked,
`This assembly is connected to a man-machine interface
`' Via a’common line 32. This man-machine interface. 32
`it has most probably been inactive for a period of time that
`55
`is sufficiently long for its normal operation to be blocked
`controls the screen 8 and the keypad 9. The common line 32
`(advantageously, the inactive time aller which the blocking
`also connects the microprocessor assembly 20 io a trans-
`mcans are activated is of the order of several minutes). The
`ceiver assembly (“TX”) 35 via an interface circuit 38. ‘be
`transceiver assembly 35 is connected lo the antenna 11.
`’ device cannot thus be used without the deblocking code
`being supplied,
`Finally, the common line 32 also coancets the microproces-
`Thanks to the invention the lost or stolen device becomes
`sor assembly 20 to a card reader 39.
`.
`;
`totally unusable. A fraudulent person cannot send commu-
`In FIG, 3 is represented a function flow chart of a device
`nications al the cost of the owner of the device. But neither
`in accordance with the invention. This flow chart starts at
`can he use the device with another identification module.
`box KL. In box K1 the device is in a state ofavailability, that
`The theft of the device becomes totally uscless. The inven-
`is wesay thal the user bas access to all ihe functions of the
`tion thus forms a protection against thefl.
`device. The user has the choice of either or not locking his
`the connecting
`Ta a particularly simple embodiment,
`device. This locking (L)funlocking (UL) is done by access-
`means comprise reading, means and storage means of a data
`ing a configuration menu of the device. When the user locks
`
`These and other aspects of the invention are appareal
`from and will be clucidated, by way of non-limilative
`example, with reference to the embodiment(s) described
`hereinafter.
`.
`In the drawings:
`FIG.
`1
`represents a device in accordance with the
`invention,
`.
`FIG. 2 represents an overall clectric diagram ofthe device
`of FIG. 1, and
`FIG. 3 represents a flow chart explaining the opcration of
`the device of FIG, 1:
`.
`DESCRIPTION OF A PREFERRED
`EMBODIMENT OF THE INVENTION
`
`20
`

`
`as
`
`5
`
`15
`
`oo
`
`15 of 164
`15 of 164
`
`

`

`4
`that is inside the device is not the one thal is linked to the
`device,
`the device displays the name of the user before
`asking him to insert his identification module as indicated in
`box K5. The device also displays the name of the user before
`$ asking him to supply bis personal code as indicated in box
`Kil.
`‘The embodimentthat has just been described is particu-
`lariy.cffective, because it provides two separate blocking
`modes depending on whether the identification module that
`10 js placed inside the device is cither or pot linked to the
`device. The first blocking mode is applied in the case where
`the device has been lost or stolen. ‘The object is then to
`prevent the device being usable with another identification
`module.
`[it thus advantageously blocks the incoming and
`15 outgoing calls al the same time. The secoad blocking mode
`is applied in the case where the identification module that is
`linked to the device is in its place inside the device and the
`device is in a state of availability. The object is to prevent a
`third party being able to send outgoing calls with this device
`20 if it is lost, stolen orleft without attendance for some time.
`In that case,it is desirable for the user to be able to continue
`to directly receive his incoming calls.
`7
`In another embodiment the same blocking means are used
`as the identification module which is placed inside the
`aa device either or not linked to the device, for example, the
`second blocking means.
`In that case it
`is possible for.
`.
`teceiving incoming calls intended for the ilentification
`module thalis inside the device, even when this identifica-
`tion module placed inside the device is not linked to the
`device.
`;
`While the embodiments of the invention disclosed herein
`are presently considered (o be preferred, various changes
`and modifications can be made without departing from the
`spirit and scope ofthe invention. The scope ofthe invention
`is indicated in the appended claims, and all changes that
`come within the meaning aod range of equivalents are
`intended to be embraced therein.
`. Whatis claimed is:
`1. Amobile radiotelephony device, comprising:
`blocking means for preventing a normal operation of the
`mobile radiotelephooy device, wherein the normal
`operation includes a processing of oulgoing calls,
`liming means for activating the blocking means in
`response to the mobile radiotelephoay device being
`inactive during the normal dgexetien of the snotile
`cadiotelephony device for
`a defined period of time
`subsequent to a mounting of a linked user identification
`module inside the mobile radiotelephony device; and
`deblocking means for permitting the normal operation of
`the mobile radiotelephony device in response to a
`supply of a deblocking code to the mobile radiotele-
`phony device subsequent to the mounting of the linked
`user identification module inside the mobile radiotele-
`phony device and subsequent to the dcfined period of
`ae
`vice ofclaim L wherein
`iS prevents all transmis-
`Bee
`sion of outgoing calls.
`3. The mobile radiotelephony device of claim 1, wherein
`an activation of the blocking means prevents all transmis-
`sions of non-emergency outgoing calls and permits all
`transmissions of emergency outgoing calls.
`4. The mobile radictelepbony device of claim 1, funter
`6s comprising:
`locking means for facilitating an activation of the block
`means by the timing means.
`
`55
`
`as
`
`so:
`
`eu
`
`US 6,836,654 B2
`
`:
`
`3
`.
`his device (box K2), the identification module that is inside
`the device is automatically linked to the device. For this
`purpose, the devicestarts reading a data DIL in the identifi-
`cation module (for example, the international identification
`number IMS!) and be stores it in the random-access memory
`24. Once locked, the device remains in the slate of avail-
`ability indicated in box Kl. Whenthe device is in the stale
`of availability, one looks whether it is locked (box K3). If it
`is not locked (arrow N3), the device remains in the slate of
`availability indicated in box K1. If it is locked (arrow Y3),
`one looks whether the identification module whichis placed
`inside the device is the one thatis linked to the device (box
`K4).
`If the identification module, which is placed inside the
`device, is not the one thatis linked to the device (arrow N4),
`the device goes to a first blocking stale indicated in bax KS.
`In this first blocking state, the device is disconnected from
`the network. Thus il can no longer receive an incoming call
`por transmit an outgoing call (passibly with the exception of
`emergency numbers). In the blocking state K5, the screea
`shows @ message inviting the user lo insert
`the proper
`module into the device. And when the user inserts a new
`module, one looks whether this new identification moduleis
`the one that is connected to the devier (box K7). If this is the
`case (arrow Y7), the device is reconnected to the network in
`accordance with the normal procedure (box K8)and then the
`device returns to the state ofavailability indicated in box K1.
`If not (arrow N7), the operation is resumed in box KS. The
`only way of leaving this first blocking state is thus to place
`the identification module thatis linked to the device inside
`the device,
`If the identification module thalis placed inside the device
`is linked to the device (arrow Y4), one looks whether the
`device has remained in the state of availability for a certain
`period of time T ofthe order of several minutes, for example
`(box KO). If this is not the case (arrow N10), the device
`remains in the state of availability indicated in box KL. If
`this is the case (arrow Y10), the device passes on to a second
`blocking state indicated in box KIL by passing through an
`inilializalion step K.12 which permils to inilialize a variable
`Awhich represents the number of attempts made al supply-
`ing a deblocking code (for example, the Personal Identifi-
`cation Number) PIN.
`In this second blocking slate the device only processes
`incoming calls (box K13) and, possibly, the outgoing calls
`that correspond to emergency numbers (box K14), Oace
`these calls have been processed, the device goes back to the
`sccond blocking slate indicated in box K11. In the second
`blocking statc K11 a message inviling the user to supply a
`deblocking code is displayed on the screen.Ifthe code taken
`by the user is recognized (arrow ¥11), the device goes hack
`to the state of availability indicated in box KIL.If it is not
`recognized (arrow N11), the value of the variable A is tested
`(box K15). If this value is lower than a certain figure (for
`example 3), the value of Ais augmented by unily (box K16)
`and a message is displayed on the screento indicate the user
`that the code is not valid (box KL7). Then the devigg.goes
`backto the second blocking state indicated in box
`Ke
`Tt the
`variable A is higher than or equal to said figure, the test of
`box KIS causes the total blocking of the device indicated in
`box K3@. To leave this third blocking state it is necessary to
`conlact
`the organization thal provides the identification
`module. One is then again in the slate of availability KL.
`In another embodiment of the invention, when the user
`locks the telephone, the device asks for the user's name.‘he
`fame given ty the aser i stored itt the rantom access
`memory 24 of the device. When the idcotification module
`
`16 of 164
`16 of 164
`
`

`

`US 6,836,654 B2
`
`6
`14. The method claim 10, further comprising:
`storing ao international identification umber stared on
`the linked user identification module onto the mobile
`radiotelephony device as data corresponding to a link
`between the mobile radiowclepbony device and the
`linked user identification module.
`15. The method claim Ll, further comprising:
`storing a personal identification number scored on the
`linked user identification module onto the mobile
`radiotelephony device as the debugging code.
`16. The method of claim 10, further comprising:
`preventing the normal operation of the mobile radintele-
`phony device in response to any unlinked user identi-
`fication module being mounted inside the mobile radio-
`telephony device.
`17. In a mobile radiotelephony device, a computer read-
`able medium comprising:
`computer readable code for verifying a user identification
`module mounted inside the mobile radiotelephony
`device is linked to the mobile radiotelepbony device;
`computer readable code for detecting a period of inactiv-
`ity of the mobile radiotelephany device during a normal
`operation of the mobile radiotelephony device, wherein
`the normal operation includes a processing of all out-
`going calls;
`computer readable code for preventing the normal opera-
`tion of the mobile radiotelephooy device in response to
`the verification of the linked user identification module
`and in response to the detection of the period of
`inactivity of the mobile radiotelephony device.
`18. The computer readable medium of claim 17, further
`comprising:
`computer readable code for permitting the normal opera-
`tion of the mobile radiotelephony device im response to
`the verification of the linked user identification module
`and in response to a supply of a deblocking code to the
`mobile radiotelephony device subsequent to the detec-
`tion of the period of inactivity of the mobile radiote-
`lephony device.
`19. The computer readable medium of claim 18, further
`comprising:
`.
`storing a personal
`identification number stored on the
`linked uscr identification module onto the mobile
`fadiotelephony device as the deblocking code.
`20. The computer readable medium of claim 17, further
`“comprising:
`preventing the normal operation of the mobile radiotele-
`phony device in response to any unlinked user identi-
`fication module being mounted inside the mobile radio-
`telephony device.
`
`__
`
`5
`5. The mobile radiotelephony device of claim 1, further
`comprising:
`counecting means for establishing a link between the
`mobile radiotelephony device and the linked user iden-
`tification module,
`~
`6. ‘The mobile radiotelepbony device of claim 5, further
`comprising:
`locking means for facilitating an establishmentofthe link
`between the mobile radiotelephony device and the
`linked user identification module by the connection
`means.
`7. The mobile radiotelephony device of claim 1, wherein
`an international identification number stored on the linked
`user identification module is stored on the mobile radiote-
`lephony device as data corresponding to a link between the
`mobile radiotelephony device and the linked! user identifi-
`cation module.
`8. The mobile radiotelephony device of claim 1, wherein
`a personal identification number stored on the linked user
`identification moduleis stored as the dcblocking code on the
`mobile radictelephony device.
`9. The mobile radiotelephony device of claim 1, further
`comprising:
`,
`tes! means for activating the blocking means whea any
`unlinked user identification module is mounted inside
`the mobile radiotelephony device.
`10. A method of protecting a mobile radiotelephony
`device, the method comprising:
`;
`verfying a user identification module mounted inside the
`mobile radiotelephony device is linked to the mobile
`radiotelephony device;
`detecting a period of inactivity of the mobile radiotele-
`phony device during a normal operation of the mobile
`radiotelephony device, wherein the normal operation
`includes a processing of all outgoing calls;
`preventing the normal operation of the mobile radiotcl:-
`phony device in response to the verification of the
`linked user identification module and in response to the
`detection of the period of inactivity of the mobile
`radiotelephony device.
`Ul. The method of claim 10, further comprising:
`pemnitting the normal operation of the mobile radiotele-
`phony device in response to the verification of the
`linked user identification module and in response to a
`supply of a deblocking code to the mobile radiotele-
`phony device subsequentto the detection ofthe period
`of inactivity of the mobile radiotclophony device.
`12. The method of claim 10, wherein the prevention ofthe
`normal operation of the mobile radiotelephony device pre- a
`vents all transmissions of outgoing calls.
`13. The method ofclaim 10, wherein the prevention ofthe
`normal operation of the mobile radiotelephony device pre-
`ventsall transmissions of non-emergency outgoing calls and
`permits all iransmissions of emergency oulgoing calls.
`
`17 of 164
`17 of 164
`
`

`

`Page | of 1
`
` UNtrED STATES PATENT AND TRADEMARK
`
`COMMISSIONER FOR PATENTS
`“
`= RRR)
`ee ieee Reteeae oe
`Vey
`rereUSLON
`YOa .
`CONFIRMATION NO. 3125
`Bib Data Sheet
`
`'
`
`APPLICANTS
`Philippe Decotignie, Le Mans, FRANCE;
`* CONTINUING DATA sarsdhdshSonSbnsssssens)\ . & -
`« FOREIGN APPLICATIONS “HAtonee JP. >
`FRANCE 9916136 12/21/1999
`
`.______ for following:
`
`SERIAL NUMBER
`09/739,507
`
`GROUP ART UNIT
`=n
`
`ATTORNEY
`DOCKETNO.
`PHF 99,624
`
`iF REQUIRED, FOREIGN FILING LICENSE
`RANTED “™* 03/05/2001
`
`orporate Patent Counsel;
`.S. Philips Corporation;
`80 White Plains Road;
`arrytown ,NY 10591
`TLE
`
`Anti-theft protection for a radiotelephony device
`
`Cl 1.16 Fees(Filing
`
`FILING FEE |FEES:Authority has been given in Paper
`RECEIVED
`.
`to charge/credit DEPOSIT ACCOUNT
`840
`
`18 of 164
`18 of 164
`
`

`

`PATENT APPLICATION SERIAL NO.
`
`U.S. DEPARTMENT OF COMMERCE
`PATENT AND TRADEMARK OFFICE
`FEE RECORD SHEET
`
`12/21/2000 HLE333
`O: FCSi0L
`
`0000055 141270
`710.00 CH
`
`09739507
`
`PTO-1556
`
`(5/87)
`“US. GPO 2000-468-087/99595
`
`19 of 164
`19 of 164
`
`

`

`@emp4THE COMMISSIONER FOR PATENTS, Washington, D.C. 20231 £ mm
`
`
`
`[a-19-9°
`Case Dock
`
`io. PHF 99,624
`
`A
`
`
`
`PS
`“>
`Ad
`» Enclosed for filing is the patent application of Inventor(s):
`a
`Mc PHILIPPE DECOTIGNIE
`“s
`— w
`.
`~~
`aes For: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`a
`=
`3
`| SS ENCLOSED ARE:
`1 =
`{X] Appointment of Associates;
`{X]
`Information Disclosure Statement, Form PTO-1449 and copies of
`documents listed therein;
`] Preliminary Amendment;
`{
`{X] Specification (9 Pages of Specification, Claims,
`{X] Declaration and Power of Attorney:
`(1 Page of a
`[ )fully executed
`(X]unsigned Declaration);
`{X} Drawing (2 sheets of
`{ Jinformal
`(X} formal sheets) ;
`{X} Certified copy of a FRENCH application Serial No.9916136;
`{X} Authorization Pursuant
`to 37 CFR §1.136(a) (3)
`.
`{
`]} Other:
`{
`] Assignment to
`
`:
`
`& Abstract);
`
`Sa
`
`FEE COMPUTATION
`
`CLAIMS AS FILED
`at
`
`
`
`
`ioy
`EXTRA
`- $710.00
`
`_ NUMBER FILED|NUMBER: RATE BASIC FEE
`
`
`
`SSSaeed
`
`$710.00
`.
`TOTAL FILING FEE .
`ps amount of
`Please charge Deposit Account No. 14-1270 in
`the total filing fee indicated above, plus any deficiencies. The
`Commissioner is also hereby authorized to charge any other fees
`which may be required, except the issue fee, or credit any
`overpayment to Account No. 14-1270.
`
`A=
`
`x
`
`ak
`v
`os
`=
`
`Total Cains | 19-20=[o |xsie =| 0-00
`.
`Independent
`2-3
`ah
`Claims
`
`]Amend the specification by inserting before the first line
`{
`as a centered heading --Cross Reference to Related Applications--;
`and insert below that as a new paragraph --This is a continuation-
`in-part of application Serial No.
`,, filed
`+ which is
`
`herein incorporated by reference--, TE OF EXPRESS MAILING
`
`Expreas Mail Mailing Label No. ELA4S8219127US
`Dote of Deposit
`) hereby certity that this paper and/or fee is being
`deposited with the United States Postal Service “Express
`Mail Post Office to Addressee” service under 37 C.F.A.
`1.10 on the date indicated above and Is addrassed to the
`Commissioner for Patents, Washi
`Of,
`20231.
`Typed Name
`Signature
`
`ttorney
`Astor4) 733-9641
`U.S. Philips Corporation
`580 White Plains Road
`Tarrytown, New York 10591
`
`:
`
`NataleA,Manzo __ ‘faditlPawgyS:\SL\MB13SLD0.MA0.doc
`
`20 of 164
`20 of 164
`
`

`

`IN THE
`
`-TED STATES PATENT AND TRALSMARK OFFICE
`
`In re Application of
`
`/
`
`PHILIPPE DECOTIGNIE
`
`Atty. Docket
`
`PHF 99,624
`
`Serial No.
`
`Group Art Unit
`
`Filed: CONCURRENTLY
`
`Ex.
`
`Title: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`Commissioner for Patents
`Washington, D.C. 20231

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket