`Decotignie
`
`I 1111111111111111 11111 lllll lllll lllll lllll lllll lllll lllll 111111111111111111
`US006836654B2
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 6,836,654 B2
`Dec. 28, 2004
`
`(54) ANTI-THEFT PROTECTION FORA
`RADIOTELEPHONY DEVICE
`
`(75)
`
`Inventor: Philippe Decotignie, Le Mans (FR)
`
`(73) Assignee: Koninklijke Philips Electronics N.V.,
`Eindhoven (NL)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 509 days.
`
`(21) Appl. No.: 09/739,507
`
`(22) Filed:
`
`Dec. 18, 2000
`
`(65)
`
`Prior Publication Data
`
`US 2001/0016484 Al Aug. 23, 2001
`
`(30)
`
`Foreign Application Priority Data
`
`Dec. 21, 1999
`
`(FR) ............................................ 99 16136
`
`(51)
`
`Int. Cl.7 .......................... H04M 1/00; H04M 3/00;
`H04M 1/66; H04B 1/06; H04B 1/38; H04Q 7/20
`(52) U.S. Cl. ....................... 455/410; 455/411; 455/418;
`455/425; 455/550.1; 455/558; 455/565
`(58) Field of Search ................................. 455/410, 411,
`455/412.1, 412.2, 418-419, 425, 550.1,
`558, 26.1, 404.1, 557, 565-567; 380/264,
`268, 273; 713/158, 502, 600, 601; 705/65,
`66, 67
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`4,908,848 A * 3/1990 Hanawa ...................... 455/565
`4,945,556 A * 7/1990 Namekawa ................. 455/565
`
`5,204,663 A * 4/1993 Lee ....................... 340/825.34
`5,864,765 A * 1/1999 Barvesten ................... 455/565
`5,907,804 A * 5/1999 Schroderus et al.
`........ 455/411
`5,913,175 A * 6/1999 Pinault ....................... 455/558
`5,978,670 A * 11/1999 Casoli et al.
`............... 455/411
`6,095,416 A * 8/2000 Grant et al.
`................ 235/449
`6,119,000 A * 9/2000 Stephenson et al.
`........ 455/432
`6,125,283 A * 9/2000 Kolev et al. ................ 455/552
`6,141,563 A * 10/2000 Miller et al. ................ 455/558
`6,339,643 Bl * 1/2002 Mastrocola et al.
`... 379/433.06
`6,370,400 Bl * 4/2002 Decotignie et al. ......... 455/565
`6,398,115 B2 * 6/2002 Krause ....................... 235/492
`6,490,463 Bl * 12/2002 Portalier et al.
`............ 455/557
`6,542,731 Bl * 4/2003 Alos .......................... 455/411
`6,583,714 Bl * 6/2003 Gabou et al. .............. 340/5.54
`
`FOREIGN PATENT DOCUMENTS
`
`GB
`2287855 A
`* cited by examiner
`
`9/1995
`
`Primary Examiner-William Trost
`Assistant Examiner---Meless Zewdu
`(74) Attorney, Agent, or Firm-Jack D. Slobod
`
`(57)
`
`ABSTRACT
`
`A mobile radiotelephony device intended for accommodat(cid:173)
`ing a linked user identification module offers protection
`against theft. The device prevents a normal operation of the
`device with an unlinked identification module, and permits
`the normal operation of the device with the linked identifi(cid:173)
`cation module until such time the device has been inactive
`for a defined period of time. A debugging code can be
`supplied to the device subsequent to a detection of the
`defined period of time to again permit the normal operation
`of the device with linked identification module.
`
`20 Claims, 2 Drawing Sheets
`
`6
`
`11
`
`8
`
`9
`
`j
`/I j:
`f
`r~,@o
`,0 100
`,o,oo
`I
`[_Q:o o
`000
`
`5
`
`□ 12
`
`13
`
`Page 1 of 6
`
`
`
`U.S. Patent
`
`Dec.28,2004
`
`Sheet 1 of 2
`
`US 6,836,654 B2
`
`6
`
`11
`
`□ 12
`
`13
`
`8
`
`j
`
`// f
`f
`
`j
`
`/I£ f
`r~,@o
`,o,oo
`,o,oo
`:_Q:oo
`0 00
`
`I
`
`8
`
`9
`
`5
`
`FIG. 1
`
`00 00
`00 00
`0000
`00 00
`
`30
`
`9
`
`39
`
`ODD
`ODD
`
`11
`
`KISS
`
`35
`
`38
`
`22
`
`24
`
`26
`
`20
`
`32
`
`FIG. 2
`
`Page 2 of 6
`
`
`
`U.S. Patent
`
`Dec. 28, 2004
`
`Sheet 2 of 2
`
`US 6,836,654 B2
`
`K15
`
`K16
`
`K17
`
`FIG. 3
`
`Page 3 of 6
`
`
`
`US 6,836,654 B2
`
`1
`ANTI-THEFT PROTECTION FORA
`RADIOTELEPHONY DEVICE
`
`5
`
`2
`stored in the identification module, and the test means
`compare the thus stored data with the data stored in the
`identification module which is places inside the device. The
`data stored is formed, for example, by the international
`identification number IMSI which is contained in the iden(cid:173)
`tification module ( compare standards relating to the GSM
`radiotelephony systems). Thus, the identification module is
`automatically linked to the device without the intervention
`of the user, more particularly without the fact that a specific
`code has to be entered.
`Advantageously the deblocking code, which is to be
`supplied to return to the normal operating mode, is formed
`by the pin code (Personal Identity Number) which is con(cid:173)
`tained in the identification module ( compare standards relat-
`15 ing to the GSM radiotelephony systems). Thus the user need
`not store an additional code to ensure the protection of his
`device.
`
`FIELD OF THE INVENTION
`The invention relates to a mobile radiotelephony device
`intended for accommodating a user identification module,
`where the device has an established link to an identification
`module to thereby prevent a normal operation of the device
`when an identification module other than the linked identi- 10
`fication module is mounted inside the device.
`The invention also relates to a method of protecting such
`a device, and a computer program for implementing such a
`method.
`The invention notably has applications in the field of
`portable radiotelephony. Portable radiotelephony devices
`are intended to accompany their users when they move
`around. It happens that these devices are lost or stolen.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`These and other aspects of the invention are apparent
`from and will be elucidated, by way of non-limitative
`example, with reference to the embodiment(s) described
`hereinafter.
`In the drawings:
`FIG. 1 represents a device in accordance with the
`invention,
`FIG. 2 represents an overall electric diagram of the device
`of FIG. 1, and
`FIG. 3 represents a flow chart explaining the operation of
`the device of FIG. 1.
`
`DESCRIPTION OF A PREFERRED
`EMBODIMENT OF THE INVENTION
`
`PRIOR ART OF THE INVENTION
`U.S. Pat. No. 5,913,175, published Jun. 15, 1999
`describes a method of protecting a radiotelephone which
`permits to avoid that the lost or stolen telephone can be used
`by a third party with another user identification module. This
`method comprises establishing a link between the device 25
`and a specific user identification module and blocking the
`normal operation of the device when the user identification
`module that is placed inside the device is not the one that is
`linked to the device.
`When the device is lost or stolen with the identification
`module to which it is linked, the user is to warn the operator
`so that the use of his identification module is blocked at
`network level.
`This means that the device can be freely used until the 35
`identification module to which it is linked is blocked via the
`network. This may take a certain period of time.
`
`20
`
`30
`
`SUMMARY OF THE INVENTION
`It is notably an object of the invention to resolve this 40
`problem. For this purpose, a device in accordance with the
`invention (1) verifies a user identification module mounted
`inside the mobile radiotelephony device is linked to the
`mobile radiotelephony device, (2) detects a period of inac(cid:173)
`tivity of the mobile radiotelephony device during a normal 45
`operation of the mobile radiotelepony device, wherein the
`normal operation includes a processing of all outgoing calls,
`and (3) prevents the normal operation of the mobile radio(cid:173)
`telephony device in response to the verification of the user
`identification module and in response to the detection of the 50
`period of inactivity of the mobile radiotelephony device.
`Thus, when the device falls into the hands of a third party
`together with the identification module to which it is linked,
`it has most probably been inactive for a period of time that
`is sufficiently long for its normal operation to be blocked 55
`(advantageously, the inactive time after which the blocking
`means are activated is of the order of several minutes). The
`device cannot thus be used without the deblocking code
`being supplied.
`Thanks to the invention the lost or stolen device becomes 60
`totally unusable. A fraudulent person cannot send commu(cid:173)
`nications at the cost of the owner of the device. But neither
`can he use the device with another identification module.
`The theft of the device becomes totally useless. The inven(cid:173)
`tion thus forms a protection against theft.
`In a particularly simple embodiment, the connecting
`means comprise reading means and storage means of a data
`
`In FIG. 1 is represented an electronic device in accor(cid:173)
`dance with the invention. In the example described here this
`device is a portable radiotelephone of the type used in
`cellular systems. It notably comprises a microphone 5, a
`loudspeaker 6, a screen 8, a keypad 9 and an antenna 11. The
`device 1 also comprises a housing 12 intended for accom-
`modating a user identification module 13. In the example of
`embodiment described here, this identification module 13 is
`a portable card of an integrated circuit in which information
`is stored, notably an international identification number
`currently called IMSI number, and a Personal Identification
`Number currently called PIN code.
`FIG. 2 shows the overall electrical diagram of this device
`1. The operation of the device 1 is, in essence, controlled by
`a microprocessor assembly 20 which comprises a micropro(cid:173)
`cessor ("µP") 22 to which are associated a random access
`memory ("RAM") 24 and a read-only memory ("ROM") 26.
`This assembly is connected to a man-machine interface 30
`via a common line 32. This man-machine interface 32
`controls the screen 8 and the keypad 9. The common line 32
`also connects the microprocessor assembly 20 to a trans(cid:173)
`ceiver assembly ("TX") 35 via an interface circuit 38. The
`transceiver assembly 35 is connected to the antenna 11.
`Finally, the common line 32 also connects the microproces(cid:173)
`sor assembly 20 to a card reader 39.
`In FIG. 3 is represented a function flow chart of a device
`in accordance with the invention. This flow chart starts at
`box Kl. In box Kl the device is in a state of availability, that
`is to say that the user has access to all the functions of the
`65 device. The user has the choice of either or not locking his
`device. This locking (L)/unlocking (UL) is done by access(cid:173)
`ing a configuration menu of the device. When the user locks
`
`Page 4 of 6
`
`
`
`US 6,836,654 B2
`
`3
`his device (box K2), the identification module that is inside
`the device is automatically linked to the device. For this
`purpose, the device starts reading a data D1 in the identifi(cid:173)
`cation module (for example, the international identification
`number IMSI) and he stores it in the random-access memory 5
`24. Once locked, the device remains in the state of avail(cid:173)
`ability indicated in box Kl. When the device is in the state
`of availability, one looks whether it is locked (box K3). If it
`is not locked (arrow N3), the device remains in the state of
`availability indicated in box Kl. If it is locked ( arrow Y3), 10
`one looks whether the identification module which is placed
`inside the device is the one that is linked to the device (box
`K4).
`If the identification module, which is placed inside the
`device, is not the one that is linked to the device (arrow N4),
`the device goes to a first blocking state indicated in box KS.
`In this first blocking state, the device is disconnected from
`the network. Thus it can no longer receive an incoming call
`nor transmit an outgoing call (possibly with the exception of
`emergency numbers). In the blocking state KS, the screen
`shows a message inviting the user to insert the proper
`module into the device. And when the user inserts a new
`module, one looks whether this new identification module is
`the one that is connected to the device (box K7). If this is the
`case ( arrow Y7), the device is reconnected to the network in 25
`accordance with the normal procedure (box KS) and then the
`device returns to the state of availability indicated in box Kl.
`If not (arrow N7), the operation is resumed in box KS. The
`only way of leaving this first blocking state is thus to place
`the identification module that is linked to the device inside 30
`the device.
`If the identification module that is placed inside the device
`is linked to the device ( arrow Y 4), one looks whether the
`device has remained in the state of availability for a certain
`period of time T of the order of several minutes, for example 35
`(box KlO). If this is not the case ( arrow NlO), the device
`remains in the state of availability indicated in box Kl. If
`this is the case ( arrow YlO), the device passes on to a second
`blocking state indicated in box Kll by passing through an
`initialization step K12 which permits to initialize a variable 40
`A which represents the number of attempts made at supply(cid:173)
`ing a deblocking code (for example, the Personal Identifi(cid:173)
`cation Number) PIN.
`In this second blocking state the device only processes
`incoming calls (box K13) and, possibly, the outgoing calls 45
`that correspond to emergency numbers (box K14). Once
`these calls have been processed, the device goes back to the
`second blocking state indicated in box Kll. In the second
`blocking state Kll a message inviting the user to supply a
`deblocking code is displayed on the screen. If the code taken 50
`by the user is recognized (arrow Yll), the device goes back
`to the state of availability indicated in box Kl. If it is not
`recognized ( arrow Nll ), the value of the variable A is tested
`(box KlS). If this value is lower than a certain figure (for
`example 3), the value of A is augmented by unity (box K16) 55
`and a message is displayed on the screen to indicate the user
`that the code is not valid (box K17). Then the device goes
`back to the second blocking state indicated in box Kll. If the
`variable A is higher than or equal to said figure, the test of
`box KlS causes the total blocking of the device indicated in 60
`box K30. To leave this third blocking state it is necessary to
`contact the organization that provides the identification
`module. One is then again in the state of availability Kl.
`In another embodiment of the invention, when the user
`locks the telephone, the device asks for the user's name. The 65
`name given by the user is stored in the random access
`memory 24 of the device. When the identification module
`
`4
`that is inside the device is not the one that is linked to the
`device, the device displays the name of the user before
`asking him to insert his identification module as indicated in
`box KS. The device also displays the name of the user before
`asking him to supply his personal code as indicated in box
`Kll.
`The embodiment that has just been described is particu(cid:173)
`larly effective, because it provides two separate blocking
`modes depending on whether the identification module that
`is placed inside the device is either or not linked to the
`device. The first blocking mode is applied in the case where
`the device has been lost or stolen. The object is then to
`prevent the device being usable with another identification
`module. It thus advantageously blocks the incoming and
`15 outgoing calls at the same time. The second blocking mode
`is applied in the case where the identification module that is
`linked to the device is in its place inside the device and the
`device is in a state of availability. The object is to prevent a
`third party being able to send outgoing calls with this device
`20 if it is lost, stolen or left without attendance for some time.
`In that case, it is desirable for the user to be able to continue
`to directly receive his incoming calls.
`In another embodiment the same blocking means are used
`as the identification module which is placed inside the
`device either or not linked to the device, for example, the
`second blocking means. In that case it is possible for
`receiving incoming calls intended for the identification
`module that is inside the device, even when this identifica-
`tion module placed inside the device is not linked to the
`device.
`While the embodiments of the invention disclosed herein
`are presently considered to be preferred, various changes
`and modifications can be made without departing from the
`spirit and scope of the invention. The scope of the invention
`is indicated in the appended claims, and all changes that
`come within the meaning and range of equivalents are
`intended to be embraced therein.
`What is claimed is:
`1. A mobile radiotelephony device, comprising:
`blocking means for preventing a normal operation of the
`mobile radiotelephony device, wherein the normal
`operation includes a processing of outgoing calls;
`timing means for activating the blocking means in
`response to the mobile radiotelephony device being
`inactive during the normal operation of the mobile
`radiotelephony device for a defined period of time
`subsequent to a mounting of a linked user identification
`module inside the mobile radiotelephony device; and
`deblocking means for permitting the normal operation of
`the mobile radiotelephony device in response to a
`supply of a deblocking code to the mobile radiotele(cid:173)
`phony device subsequent to the mounting of the linked
`user identification module inside the mobile radiotele(cid:173)
`phony device and subsequent to the defined period of
`time.
`2. The mobile radiotelephony device of claim 1, wherein
`an activation of the blocking means prevents all transmis(cid:173)
`sion of outgoing calls.
`3. The mobile radiotelephony device of claim 1, wherein
`an activation of the blocking means prevents all transmis(cid:173)
`sions of non-emergency outgoing calls and permits all
`transmissions of emergency outgoing calls.
`4. The mobile radiotelephony device of claim 1, further
`comprising:
`locking means for facilitating an activation of the block
`means by the timing means.
`
`Page 5 of 6
`
`
`
`US 6,836,654 B2
`
`5
`
`5
`5. The mobile radiotelephony device of claim 1, further
`comprising:
`connecting means for establishing a link between the
`mobile radiotelephony device and the linked user iden-
`tification module.
`6. The mobile radiotelephony device of claim 5, further
`comprising:
`locking means for facilitating an establishment of the link
`between the mobile radiotelephony device and the
`linked user identification module by the connection 10
`means.
`7. The mobile radiotelephony device of claim 1, wherein
`an international identification number stored on the linked
`user identification module is stored on the mobile radiote(cid:173)
`lephony device as data corresponding to a link between the 15
`mobile radiotelephony device and the linked user identifi(cid:173)
`cation module.
`8. The mobile radiotelephony device of claim 1, wherein
`a personal identification number stored on the linked user
`identification module is stored as the deblocking code on the 20
`mobile radiotelephony device.
`9. The mobile radiotelephony device of claim 1, further
`comprising:
`test means for activating the blocking means when any 25
`unlinked user identification module is mounted inside
`the mobile radiotelephony device.
`10. A method of protecting a mobile radiotelephony
`device, the method comprising:
`verfying a user identification module mounted inside the 30
`mobile radiotelephony device is linked to the mobile
`radiotelephony device;
`detecting a period of inactivity of the mobile radiotele(cid:173)
`phony device during a normal operation of the mobile
`radiotelephony device, wherein the normal operation 35
`includes a processing of all outgoing calls;
`preventing the normal operation of the mobile radiotele(cid:173)
`phony device in response to the verification of the
`linked user identification module and in response to the
`detection of the period of inactivity of the mobile 40
`radiotelephony device.
`11. The method of claim 10, further comprising:
`permitting the normal operation of the mobile radiotele(cid:173)
`phony device in response to the verification of the
`linked user identification module and in response to a 45
`supply of a deblocking code to the mobile radiotele(cid:173)
`phony device subsequent to the detection of the period
`of inactivity of the mobile radiotelephony device.
`12. The method of claim 10, wherein the prevention of the
`normal operation of the mobile radiotelephony device pre- 50
`vents all transmissions of outgoing calls.
`13. The method of claim 10, wherein the prevention of the
`normal operation of the mobile radiotelephony device pre(cid:173)
`vents all transmissions of non-emergency outgoing calls and
`permits all transmissions of emergency outgoing calls.
`
`6
`14. The method claim 10, further comprising:
`storing an international identification number stared on
`the linked user identification module onto the mobile
`radiotelephony device as data corresponding to a link
`between the mobile radiotelephony device and the
`linked user identification module.
`15. The method claim 11, further comprising:
`storing a personal identification number scored on the
`linked user identification module onto the mobile
`radiotelephony device as the debugging code.
`16. The method of claim 10, further comprising:
`preventing the normal operation of the mobile radiotele(cid:173)
`phony device in response to any unlinked user identi(cid:173)
`fication module being mounted inside the mobile radio(cid:173)
`telephony device.
`17. In a mobile radiotelephony device, a computer read(cid:173)
`able medium comprising:
`computer readable code for verifying a user identification
`module mounted inside the mobile radiotelephony
`device is linked to the mobile radiotelephony device;
`computer readable code for detecting a period of inactiv(cid:173)
`ity of the mobile radiotelephony device during a normal
`operation of the mobile radio telephony device, wherein
`the normal operation includes a processing of all out(cid:173)
`going calls;
`computer readable code for preventing the normal opera(cid:173)
`tion of the mobile radiotelephony device in response to
`the verification of the linked user identification module
`and in response to the detection of the period of
`inactivity of the mobile radiotelephony device.
`18. The computer readable medium of claim 17, further
`comprising:
`computer readable code for permitting the normal opera(cid:173)
`tion of the mobile radiotelephony device in response to
`the verification of the linked user identification module
`and in response to a supply of a deblocking code to the
`mobile radiotelephony device subsequent to the detec(cid:173)
`tion of the period of inactivity of the mobile radiote(cid:173)
`lephony device.
`19. The computer readable medium of claim 18, further
`comprising:
`storing a personal identification number stored on the
`linked user identification module onto the mobile
`radiotelephony device as the deblocking code.
`20. The computer readable medium of claim 17, further
`comprising:
`preventing the normal operation of the mobile radiotele(cid:173)
`phony device in response to any unlinked user identi(cid:173)
`fication module being mounted inside the mobile radio(cid:173)
`telephony device.
`
`* * * * *
`
`Page 6 of 6
`
`