throbber
>\
`
`---------- --~.
`
`-·- +. -------- -·~+
`
`.. / t\•
`
`. ..,
`
`.- 4.
`PATENT NUMBER··
`: ...... ; j~· ~
`- ---:-:-: t~· ''
`-; . ,; ~8838864:-;, - l'
`.
`----~~~ ;.~; 111111/ll~llllWlllllII~lllllllllllllllf _ , ..
`L/
`U.S. UTILITY Patent Application
`PATENT DATE
`
`"··-·--
`
`6836654
`
`.
`
`.
`
`CONT/PRIOR CLASS
`F
`455
`
`APPLICATION NO.
`09/739q07
`-~~1.:...r=:·i--l ·i i 'i·F=;1~·~•r I"•E:.,,..--,-·,-~-
`-i ... ~n ·i ,:;:·
`() .... - :• .. - ' '. .-:
`' ·:.-.-· .......... ,,, ·'"
`.. ---
`:J t
`
`ART UNIT
`gG.e1 -
`/"71; rt;
`
`EXAMIN~¥&~dv~~- --- ._.·1
`
`...
`
`v.".-
`
`Anti-theft protection for a radiotelephony devic~
`
`,. ~
`
`PT0-2040
`12199
`
`.r -,
`./
`SI
`
`!.:
`i
`~: .
`, __
`I •.
`'.·
`~'
`
`l. r.
`
`ORIGINAL
`
`CLASS
`
`I
`
`.
`SUBCLASS
`Lts-s- 4 {()
`.
`
`INTERNATIONAL CLASSIFICATION
`J-J 0 ;t.I V'1 U-111 :Yn", Y66'
`1-J 0 lu ~ Vfl~ , Y-z.,?i
`u. 0 ~ ({J 7/'2f)
`
`ISSUING CLASSIFICATION
`CROSS REFERENCE(S)
`
`CLASS
`SUBCLASS (ONE SUBCLASS PER BLOCK)
`Lf.n
`411
`<..tSil-" e,;J,JAAJ
`
`'-ti~ 'f~r 5~.1 --~"">l stir
`
`D Continued on Issue Slip Inside File Jacket
`
`DRAWINGS
`
`CLAIMS ALLOWED
`
`Sheets Drwg.
`
`Figs. Drwg.
`
`Print Fig.
`
`Total Claims
`
`f
`*--[_( ~s'l_ '4
`
`(Date)
`

`
`\. (Asr.istant Ex.;;.lner)
`
`2-o
`
`Print Claim for O.G.
`(
`NOTICE OF ALLOWANCE MAILED
`og lo!.J.1 /oH
`
`DTERMINAL -
`DISCLAIMER
`
`0 The term of this patent
`(date)
`subsequent to
`has been disclaimed.
`'
`D The term of this patent shall
`not extend beyond the expiration date
`of U.S Patent. No.
`
`-
`
`.,
`
`D The terminal _months of
`this patent have been disclaimed.
`
`:L-
`.3
`.&f &g- Z~l.--'du
`V},.<i-----
`WILLIAM TROST
`SUPERVISORY PATENT EXAMINER
`Amount Due
`TECHNOLOGY CENTER 2600 ct- ;~..,t 11 1650
`
`---
`
`• ·, (Primary Examiner)
`
`(Data)
`
`(Legal lnBlruments Examiner)
`
`(Date)
`
`ISSUE FEE
`
`Date Paid
`
`f) I~, ot
`ISSUE BATCH NUMBER
`
`Jf>M
`
`WARNING:
`The information disclosed herein may be restricted. Unauthorized disclosure may be prohibited by the United States Code Tille 35, Sections 122, 181 and 368.
`Possession outside the U.S. Patent & Trademark Office is restricted to authorized employees and contractors only.
`
`FILED WITH: D DISK (CRF) D FICHE D CD-ROM
`
`(Anach9d In pocket on right inside !lap)
`
`Form PT0·436A
`(Rev. 6199)
`
`ISSUE FEE IN FILE
`
`(FACE)
`
`Page 1 of 175
`
`

`

`- - J
`-
`.
`... -
`PA TENT APPL.IC)~~ TiON
`111111111111i11~1111i 111t1111111m 111111111111i
`09739507
`
`--..
`
`-
`
`-
`-
`-
`, ...
`jc91ll U . S . ' PTO
`.09 /7 39~07
`~
`111111111m 11111m1111111111~ 11111111
`
`1.~/18/00
`
`INITIALS _
`
`_
`
`_
`
`. , ·
`
`Date Received
`(Incl. C. of M.)
`or
`Date Malled
`
`~
`
`:
`
`~
`
`.,
`
`CONTENTS
`
`42.
`
`43.
`
`44.
`
`45.
`
`46.
`
`47.
`
`48.
`
`49.
`
`50.
`
`51.
`
`52.
`
`53.
`
`54.
`
`55.
`
`56.
`
`57.
`
`58.
`
`59.
`
`60.
`
`61.
`
`62.
`
`63.
`
`64.
`
`65.
`
`66.
`
`67.
`
`68.
`
`69.
`
`70.
`
`71 .
`
`72.
`
`73.
`
`74.
`
`75.
`
`76.
`
`77.
`
`78.
`
`79.
`
`80.
`
`81.
`
`19.
`
`20.
`
`21 .
`
`22.
`
`23.
`
`24.
`
`25.
`
`26.
`
`27.
`
`28.
`
`29.
`
`30.
`
`31.
`
`32.
`
`33.
`
`34.
`
`35.
`
`36.
`
`37.
`
`38.
`
`39.
`
`40.
`
`41.
`
`.:
`
`..:
`
`(LEFT OUTGf()E)
`
`82. ________ - - - -
`
`Page 2 of 175
`
`

`

`Page I of J
`
`Ur-.lTED STATES PATENT AND ThADEMARK OFFICE
`
`111m1111111rn 11111111111111111111 m111m1111111:1111m 11111
`Bib Data Sheet
`
`SERIAL NUMBER
`09/739,507
`
`FILING DATE
`12/18/2000
`RULE
`
`COMMISSIONER FOR PATENTS
`UNITED STATES PATEl\'T ANO TRAOEMA"lK OFFICE
`'NA'SH!NCTCN, D.C. 2C 2~1
`W\vw.u~p·o.gc,
`
`CONFIRMATION NO. 3125
`
`CLASS
`455
`
`GROUP ART UNIT
`2681
`
`ATTORNEY
`DOCKET NO.
`PHF 99,624
`
`APPLICANTS
`Philippe Decotignie, Le Mans, FRANCE;
`H CONTINUING DATA,... .... ~ ......... ')\~<::.-
`"* FOREIGN APPLICATIONS ....... ';,/. .. ~/J. ...... /? ... 1:;;
`
`FRANCE 9916136 12121/1999
`
`IF REQUIRED, FOREIGN FILING LICENSE
`GRANTED ** 03/05/2001
`
`Foreign Priority claimed g yes Cl no
`
`yes CJ no CJ Met after
`m. 1..
`A~wa~~c
`)>
`!c. /.1
`(' . ' ) ,
`"Examiner's ${gnature
`•
`Initials
`
`35 USC 119 (a-d) conditions
`met
`!Verified and
`~cknowledaed
`~DD RESS
`Corporate Patent Counsel;
`U.S. Philips Corporation;
`580 White Plains Road;
`Tarrytown ,NY 10591
`
`STATE OR
`COUNTRY
`FRANCE
`
`I I
`
`SHEET~
`
`DRAWING
`2
`
`I
`
`I
`
`TOTAL ) ;NDEPE,DENT
`CLAIMS
`CLAIMS
`10
`2
`
`TITLE
`
`Anti-theft protection for a radiotelephony device
`
`FILING FEE FEES: Authority has been given in Paper
`to charge/credit DEPOSIT ACCOUNT
`RECEIVED No.
`for following:
`No.
`840
`
`lo All Fees
`I
`I
`!CJ 1.16 Fees (Filing)
`Cl 1.17 Fees ( Processing Ext. of .
`time)
`I Cl 1 .18 Fees ( Issue )
`I
`lo Other
`I
`I
`!CJ Credit
`
`Page 3 of 175
`
`

`

`/~
`
`Case Dock
`
`:.\Jo. PHF 99, 624
`
`THE COMMISSIONER FOR PATENTS, Washington, D.C.
`
`20231
`
`Enclosed for filing is the patent application of Inventor(s):
`PHILIPPE DECOTIGNIE
`
`For: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`ENCLOSED ARE:
`[X] Appointment of Associates;
`[X]
`Information Disclosure Statement, Form PT0-1449 and copies of
`documents listed therein;
`Preliminary Amendment;
`Specification (9 Pages of Specification, Claims, & Abstract);
`Declaration and Power of Attorney:
`(1 Page of a [ ]fully executed
`[X]unsigned Declaration);
`Drawing (2 sheets of [ ]informal
`[X]formal sheets);
`Certified copy of a FRENCH application Serial No.9916136;
`Authorization Pursuant to 37 CFR §1.136 (a) (3)
`Other:
`Assignment to
`
`[
`]
`[ x]
`[ x]
`[ x J
`[ x]
`[ x]
`[
`]
`-
`]
`
`FEE COMPUTATION
`
`FOR
`
`CLAIMS AS FILED
`NUMBER FILED NUMBER
`EXTRA
`
`RATE
`
`BASIC FEE
`- $710.00
`
`Total Claims
`
`10 - 20 =
`2 - 3
`=
`
`0
`
`0
`
`Independent
`Claims
`$270 =
`Multiple Dependent Claims, if any
`.
`.
`=
`$710.00
`TOTAL FILING FEE
`Please charge Deposit Account No. 14-1270 in the amount of
`the total filing fee indicated above, plus any deficiencies. The
`Commissioner is also hereby authorized to charge any other fees
`which may be required, except the issue fee, or credit any
`overpayment to Account No. 14-1270.
`
`x $18
`=
`x $80 =
`
`0.00
`
`0.00
`
`0.00
`
`[ ]Amend the specification by inserting before the
`as a centered heading --Cross Reference to Related
`and insert below that as a new paragraph --This is
`in-part of application Serial No.
`, filed
`herein incorporated by reference--. J?J~/. i
`-~
`/..,/f.A :.~:.,0..-'l-1'-'
`- . ~--
`d/CZ'
`Michael E. Marion, Reg.
`Attorney
`1914) 333-9641
`U.S. Philips Corporation
`580 White Plains Road
`Tarrytown, New York 10591
`S:\SL\MB 13SLDO.MAO.doc
`
`first line
`Applications--;
`a continuation-
`, which is
`
`6
`
`d
`
`.·
`.
`
`CERTIFICATE OF EXPRESS MAILING
`EIA58219127US
`__
`EKpress Mail Mailing Label No.
`Date of Deposit December 18, 2000-
`1 hereby certify that this paper and/or fee is being
`deposited with the United States Postal Service "EKpress
`Mail Post Office to Addressee" service under 37 C.F.R.
`1.10 on the date indicated above and is addressed to the
`Commissioner for Patent~. ~~:~~~
`.....,...~G:( MA
`Natale A. Manzo
`Typed Name
`Signature
`/ -
`
`Page 4 of 175
`
`

`

`PATENT APPLICATION SERIAL NO. ~~~~~~~~~
`
`U.S. DEPARTMENT OF COMMERCE
`PATENT AND TRADEMARK OFFICE
`FEE RECORD SHEET
`
`\
`
`- · : · . · ' l
`
`.¥. ,,.,;. .. -
`
`PT0-1556
`(5/87)
`·u.s. GPO: 2000-168-987139595
`
`Page 5 of 175
`
`

`

`IN THE ~ .. iTED STATES PATENT AND TR~u~MARK OFFICE
`
`In re Application of
`
`PHILIPPE DECOTIGNIE
`
`Atty. Docket
`
`PHF 99,624
`
`Serial No.
`
`Group Art Unit
`
`Filed: CONCURRENTLY
`
`Ex.
`
`Title: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`Commissioner for Patents
`Washington, D.C. 20231
`
`AUTHORIZATION PURSUANT TO 37 CFR §l.136(a) (3)
`AND TO CHARGE DEPOSIT ACCOUNT
`
`Sir:
`
`The Commissioner is hereby requested and authorized to
`treat any concurrent or future reply in this application requiring
`a petition for extension of time for its timely submission, as
`incorporating a petition for extension of time for the appropriate
`length of time.
`Please charge any additional fees which may now or in the
`future be required in this application, including extension of time
`fees, but excluding the issue fee unless explicitly requested to do
`so, and credit any overpayment, to Deposit Account No. 14-1270.
`
`Attorney
`(914) 333-9641
`
`Reg. 32,266
`
`\\SERVER0\SYS2\WPDOCS\SL\MB13SLEO.MAO.doc
`
`Page 6 of 175
`
`

`

`PHF 99.624
`
`Anti-theft protection for a radiotelephony device
`
`01.12.2000
`
`DESCRIPTION
`
`FIELD OF THE INVENTION
`
`The invention relatJs to a mobile radiotelephony device intended for
`~
`accommodating a user identificati module, said device comprising:
`
`\ 5
`
`/l~· . - connecting means for establishi g a link between the device and the identification module
`(, _,·_·:
`!&J~- )
`~~C\ );' - blocking means for preventing th normal operation of the device,
`
`mounttd inside the device,
`
`-
`
`test means for activating the bloc ng means when the identification module mounted·
`
`10
`
`inside the device is not the one that · s linked to the device.
`
`The invention also relates io a method of protecting such a device, and a
`computer program for implementing such a method.
`
`The invention notably has applications in the field of portable radiotelephony.
`Portable radiotelephony devices are intended to accompany their users when they move
`around. It happens that these devices are lost or stolen.
`
`15
`
`PRIOR ART OF THE INVENTION
`United States patent 5,913,175, published 15 June 1999 describes a method of
`
`protecting a radiotelephone which permits to avoid that the lost or stolen telephone can be
`
`20
`
`used by a third party with another user identification module. This method comprises
`
`establishing a link between the device and a specific user identification module and blocking
`
`the normal operation of the device when the user identification module that is placed inside
`
`the device is not the one that is linked to the device.
`When the device is lost or stolen with the identificatiqn module to which it is
`
`25
`
`linked, the user is to warn the operator so that the use of his identification module is blocked
`
`at network level.
`This means that the device can be freely used until the identification module to
`
`which it is linked is blocked via the network. This may take a certain period of time.
`
`Page 7 of 175
`
`

`

`PHF 99.624
`
`2
`
`01.12.2000
`
`SUMMARY OF THE INVENTION
`
`It is notably an objedt of the invention to resolve this problem. For this
`
`purpose, a device in accordance with\the invention and as described in the opening paragraph
`is characterized in that it comprises:
`
`-
`
`-
`
`timing means for activating the bloc ing means after the device has been inactive for a
`
`defined period of time,
`
`and deblocking means for permitting no
`
`al operation of the device when the
`
`IO
`
`identification module placed inside the de~ice is the one that is linked to the device and
`when a deblocking code is supplied by the \iser.
`\
`Thus, when the device falls into the hands of a third party together with the
`identification module to which it is linked, it has most probably been inactive for a period of
`time that is sufficiently long for its normal operation to be blocked (advantageously, the
`
`inactive time after which the blocking means are activated is of the order of several minutes).
`The device cannot thus be used without the deblocking code being supplied.
`
`15
`
`Thanks to the invention the lost or stolen device becomes totally unusable. A
`fraudulent person cannot send communications at the cost of the owner of the device. But
`
`neither can he use the device with another identification module. The theft of the device
`
`becomes totally useless. The invention thus forms a protection against theft.
`In a particularly simple embodiment, the connecting means comprise reading
`
`20 means .and storage means of a data stored in the identification module, and the test means
`
`compare the thus stored data with the data stored in the identification module which is places
`
`inside the device. The data stored is formed, for example, by the international identification
`number IMSI which is contained in the identification module (compare standards relating to
`
`the GSM radiotelephony systems). Thus, the identification module is automatically linked to
`the device without the intervention of the user, more particularly without the fact that a
`
`25
`
`!)pecific code has to be entered.
`Advantageously the deblocking code, which is to be supplied to return to the
`
`normal operating mode, is formed by the pin code (Personal Identity Number) which is
`contained in the identification module (compare standards relating to .the GSM
`
`30
`
`radiotelephony systems). Thus the user need not store an additional code to ensure the
`
`protection of his device.
`
`Page 8 of 175
`
`

`

`PHF 99.624
`
`3
`
`01.12.2000
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`These and other aspects of the invention are apparent from and will be
`
`elucidated, by way of non-limitative example, with reference to the embodiment(s) described
`
`hereinafter.
`
`In the drawings:
`
`Fig. 1 represents a device in accordance with the invention,
`
`Fig. 2 represents an overall electric diagram of the device of Fig. I, and
`
`Fig. 3 represents a flow chart explaining the operation of the device of Fig. I.
`
`5
`
`IO
`
`DESCRIP'flON OF A PREFERRED EMBODIMENT OF THE INVENTION
`
`In Fig. 1 is represented an electronic device in accordance with the invention.
`
`In the example described here this device is a portable radiotelephone of the type used in
`
`cellular systems. It notably comprises a microphone 5, a loudspeaker 6, a screen 8, a keypad
`
`15
`
`9 and an antenna 11. The device 1 also comprises a housing 12 intended for accommodating
`
`a user identification module 13. In the example of embodiment described here, this
`
`identification module 13 is a portable card of an integrated circuit in which information is
`
`stored, notably an international identification number currently called IMSI number, and a
`
`20
`
`Personal Identification Number currently called PIN code.
`Fig. 2 shows the ove~electrical diagram of this device. The operation of the
`icroprocessor ass~mbly 20 which comprises a
`device is, in essence, controlled by a
`microprocessor 22 to which are assoc ted a random access memory 24 and a 'read-only
`
`memory 26. This assembly is connecte to a man-machine interface 30 via a common line
`
`32. This man-machine interface 32 con
`
`ls the screen 8 and the keypad 9. The common line
`
`32 also connects the microprocessor asse bly 20 to a transceiver assembly 35 via an
`
`interface circuit 38. The transceiver assem ly is connected to the antenna 11. Finally, the
`
`common line 32 also connects the micropro essor assembly 20 to a card reader 39.
`
`In Fig. 3 is represented a function flow chart of a device in accordance with
`
`the invention. This flow chart starts at box Kl. In box Kl the device i_s in a state of
`
`30
`
`availability, that is to say that the user has access to all the functions of the device. The user
`
`has the choice of either or not locking his device. This locking (L)/unlocking (UL) is done by
`
`accessing a configuration menu of the device. When the user locks his device (box K2), the
`
`identification module that is inside the device is automatically linked to the device. For this
`
`purpose, the device starts reading a data Dl in the identification module (for example, the
`
`Page 9 of 175
`
`

`

`PHF 99.624
`
`01.12.2000
`international identification number IMSI) and he stores it in the random-access memory 24.
`
`4
`
`Once locked, the device remains in the state of availability indicated in box K 1. When the
`device is in the state of availability, one looks whether it is locked (box K3). If it is not
`locked (arrow N3), the device remains in the state of availability indicated in box Kl. If it is
`
`5
`
`locked (arrow Y3), one looks whether the identification module which is placed inside the
`
`device is the one that is linked to the device (box K4).
`
`If the identification module, which is placed inside the device, is not the one
`
`that is linked to the device (arrow N4), the device goes to a first blocking state indicated in
`
`box KS. In this first blocking state, the device is disconnected from the network. Thus it can
`
`10
`
`no longer receive an incoming call nor transmit an outgoing call (possibly with the exception
`
`of emergency numbers). In the blocking state KS, the screen shows a message inviting the
`
`user to insert the proper module into the device. And when the user inserts a new module,
`
`..
`
`one looks whether this new identification module is the one that is connected to the device
`(box K7). If this is the case (arrow Y7), the device is reconnected to the network in
`
`c.' .•
`
`15
`
`accordance with the normal procedure (box KS) and then the device returns to the state of
`
`availability indicated in box Kl. If not (arrow N7), the operation is resumed in box KS. The
`
`only way of leaving this first blocking state is thus to place the identification module that is
`
`linked to the device inside the device.
`If the identification module that is placed inside the device is linked to the
`
`20
`
`device (arrow Y4), one looks whether the device has remained in the state of availability for
`a certain period of time T of the order of several minutes, for example (box KIO). If this is
`
`not the case (arrow N 10), the device remains in the state of availability indicated in box Kl.
`
`If this is the case (arrow YIO), the device passes on to a second blocking state indicated in
`
`box Kl I by passing through an initialization step K12 which permits to initialize a variable A
`
`25 which represents the number of attempts made at supplying a deblocking code (for example,
`
`the Personal Identification Number) PIN.
`
`In this second blocking state the device only processes incoming calls (box
`
`K13) and, possibly, the outgoing calls that correspond to emergency numbers (box K14).
`
`Once these calls have been processed, the device goes back to the sec9nd blocking state
`
`30
`
`indicated in box Kl I. In the second blocking state Kl I a message inviting the user to supply
`
`a de blocking code is displayed on the screen. If the code taken by the user is recognized
`
`(arrow Yl 1), the device goes back to the state of availability indicated in box Kl. If it is not
`recognized (arrow NI I), the value ofthe variable A is tested (box K15). If this value is lower
`
`than a certain figure (for example 3), the value of A is augmented by unity (box K16) and a
`
`Page 10 of 175
`
`

`

`PHF 99.624
`
`5
`
`01.12.2000
`
`message is displayed on the screen to indicate the user that the code is not valid (box K 17).
`
`Then the device goes back to the second blocking state indicated in box Kl I. If the variable
`
`A is higher than or equal to said figure, the test of box K 15 causes the total blocking of the
`
`device indicated in box K30. To leave this third blocking state it is necessary to contact the
`
`5
`
`organization that provides the identification module. One is then again in the state of
`
`availability KI.
`
`In another embodiment of the invention, when the user locks the telephone,
`
`the device asks for the user's name. The name given by the user is stored in the random
`
`access memory 24 of the device. When the identification module that is inside the device is
`
`10
`
`not the one that is linked to the device, the device displays the name of the user before asking
`
`him to insert his identification module as indicated in box KS. The device also displays the
`
`name of the user before asking him to supply his personal code as indicated in box K 11.
`
`The embodiment that has just been described is particularly effective, because
`
`it provides two separate blocking modes depending on whether the identification module that
`
`15
`
`is placed inside the device is either or not linked to the device. The first blocking mode is
`
`applied in the case where the device has been lost or stolen. The object is then to prevent the
`
`device being usable with another identification module. It thus advantageously blocks the
`
`incoming and outgoing calls at the same time. The second blocking mode is applied in the
`
`case where the identification module that is linked to the device is in its place inside the
`
`20
`
`device and the device is in a state of availability. The object is to prevent a third party being
`
`able to send outgoing calls with this device if it is lost, stolen or left without attendance for
`
`some time. In that case, it is desirable for the user to be able to continue to directly receive
`
`his incoming calls.
`
`In another embodiment the same blocking means are used as the identification
`
`25 module which is placed inside the device either or not linked to the device, for example, the
`second blocking means. In that case it is possible for receiving incoming calls intended for
`
`the identification module that is inside the device, even when this identification module
`
`placed inside the device is not linked to the device.
`
`Page 11 of 175
`
`

`

`PHF 99.624
`' .
`
`CLAIMS:
`
`6
`
`01.12.2000
`
`I.
`
`\
`A mobile radiotefophony device intended for accommodating a user
`
`identification module, said device comprising:
`
`-
`
`connecting means for establishin!\,a link between the device and the identification module
`
`mounted inside the device,
`
`-
`
`-
`
`\
`\
`blocking means for preventing the ncttmal operation of the device,
`\
`test means for activating the blocking means when the identification module mounted
`inside the device is not the one that is li~ed to the device,
`characterized in that it comprises:
`
`-
`
`timing means for activating the blocking eans after the device has been inactive for a
`
`defined period of time,
`
`and deblocking means for permitting normal peration of the device when the
`
`identification module placed inside the devic~ the one that is linked to the device and
`
`when a deblocking code is supplied by the user.\
`
`5
`
`10
`\
`
`' .
`
`;-.·:_
`
`15
`
`2.
`
`A device as claimed in claim I, charac rized in that said blocking means
`
`comprise first blocking means for preventing the trans
`
`ission and reception of calls when the
`
`identification module placed inside the device is not the ne that is linked to the device, and
`
`second blocking means for preventing the sending of call. after a defined period of time
`
`during which the device has been inactive, with the excep ·on of one or various emergency
`
`20
`
`numbers.
`
`3.
`
`A device as claimed in claim I , characterized i that it comprises
`
`locking/unlocking means for locking/unlocking the device, w
`
`le said blocking means can
`
`only be activated when the device is locked, and said link is est blished while the device is
`
`25
`
`being locked.
`
`4.
`
`A device as claimed in claim I, characterized in that said connecting means
`
`comprise means for reading and storing a data stored in the identific tion module, and in that
`
`Page 12 of 175
`
`

`

`PHF 99.624
`
`said test means compare this data thus stored with the data stored in the identification module
`
`7
`
`01.12.2000
`
`that is placed inside the device.
`
`\
`
`5.
`
`A device as claimed in\claim 3, characterized in that said data is formed by the
`
`international identification number sto'~ed in the user identification module.
`i
`'
`
`6.
`
`A device as claimed in ~aim 1, characterized in that said deblocking code is
`formed by the personal identification ~i:ber stored in the identification module.
`
`!
`\
`i
`A method of protecting ~mobile radiotelephony device intended for
`
`I
`I
`
`accommodating a user identification moaule, said method comprising the following steps:
`i
`
`5
`
`IO
`
`'
`
`,
`
`0
`
`: ( Q\~- setting up a link between the device fd the identification module placed inside the
`l
`the device is not the one that is linked j the device,
`detection of a period of inactivity of the f evice,
`
`l).N \ // device,
`':; -O,_'-_)/
`· ··
`/
`
`1
`\
`testing to verify whether the identific~tion module placed inside the device is the one that
`

`
`-
`
`· "
`
`15
`
`is linked to the device,
`
`blocking the normal operation of the ~f vice when the identification module placed inside
`
`characterized in that it comprises the follo
`
`ing steps:
`
`-
`
`20
`
`25
`
`-
`
`8.
`
`blocking of the normal operation of the ~evice when said period of inactivity has been
`\
`\
`\
`deblocking which permits the normal ope\ation of the device when the identification
`
`detected,
`
`rriodule placed inside the device is the one\that is linked to the device and when a
`
`deblocking code has been supplied by the user.
`
`\
`A method as claimed in claim 6
`
`protecting a mobile radiotelephony device,
`
`characterized in that it comprises a step of lockin the device, while the blocking steps can
`
`only be executed when the device is locked, and t e step of establishing a link between the
`
`device and the identification module placed inside the device is executed when the device is
`
`30
`
`locked.
`
`9.
`characterized in that the step of establishing a link be ween the device and the identification
`
`A method as claimed in claim 6 of pr tecting a mobile radiotelephony device,
`
`module placed inside the device comprises a step of r ading and storing a data stored in said
`
`Page 13 of 175
`
`

`

`PHF 99.624
`
`'
`identification module, and in that the test step comprises comparing the data thus stored with
`\
`the data stored in the identification module that is placed inside the device.
`
`01.12.2000
`
`8
`
`10.
`
`A computer program comp 'sing means for implementing a method as claimed
`
`in claim 7 of protecting a mobile radiotelep ony device.
`
`..
`(~ " I.
`~,
`,, ..
`,r--..
`!JW'
`,. ,,.
`
`'!
`
`I
`
`u~s
`
`Page 14 of 175
`
`

`

`PHF 99.624
`
`ABSTRACT:
`
`9
`
`01.12.2000
`
`The invention proposes a method of protecting a mobile radiotelephony device
`
`intended for accommodating a user identification module to be able to operate. The invention
`
`has for its object to protect such a device against theft.
`
`For this purpose, a device in accordance with the invention comprises means
`
`5
`
`for:
`
`-
`
`-
`
`preventing the use of the device with an identification module other than the user's,
`
`asking the user for a deblocking code after a short time that the device has been inactive
`
`and preventing the use of the device if this code has not been supplied.
`
`I 0
`
`Reference: Fig. 2
`
`·.·.
`
`Page 15 of 175
`
`

`

`DECLARATION and POWER OF ATTORNEY
`
`ATTORNEY'S DOCKET NO.:
`PHF99.624
`
`As a below named inventor, I hereby declare that:
`My residence, post oHice address and citizenship are as stated below next to my name.
`I believe I am the original, first and sole inventor (if only one name is listed below) or an original, first joint inventor (if plural names are
`listed below) of the subject matter which is claimed and for which a patent is sought on the invention entitled
`"Anti-theft protection for a radiotelephony device"
`the specification of which (check one)
`D is attached hereto.
`D was filed on - - - - - - - - - - -as Application Serial No.
`
`and was amended on
`(if applicable).
`~I hereby state that I have reviewed and understand the contents of the above-identified specification, including the claims, as amended by
`the amendment(s) referred to above.
`I acknowledge the duty to disclose information which is material to patentabllity of this application in accordance with Title 37, Code of
`Federal Regulations, §1.56(a).
`I hereby claim foreign priority benefits under Title 35, United States Code, § 119 of any foreign application(s) for patent or inventor's
`certificate listed below and have also identified below any foreign application for patent or inventor's certificate having a filing date before
`that of the application on which priority is claimed:
`PRIOR FOREIGN APPLICATION(S)
`
`COUNTRY
`
`APP. NUMBER
`
`France
`
`9916136
`
`DATE OF FILING
`<DATE MONTH YEAR}
`2t December 1999
`
`PRIORITY CLAIMED
`UNDER 35 U.S.C. 119
`YES
`
`I hereby claim the benefit under Title 35, United States Code, §120 of any United States application(s) listed below and, insofar as the
`subject matter of each of the claims of this application is not disclosed in the prior United States application in the manner provided by the
`firsfparagraph of Title 35 United States Code, §112, I acknowledge the duty to disclose material information as defined in Title 37, Code of
`Federal Regulations, §1,56(a) which occurred between the filing date of the prior application and the national or PCT international filing date
`of this application:
`PRIOR UNITED STATES APPLICATION($)
`
`A.RPLICATION SERIAL NUMBER
`' ~-~
`..
`
`·.·
`
`FILING DATE
`
`STATUS (PATENTED, PENDING,
`ABANDONED)
`
`I hereby declare that all statements made herein of my own knowledge are true and that all statements made on information and belief are
`beli~ved to be true; and further that these statements were made with the knowledge that willful false statements and the like so made are
`pu6rshable by fine or imprisonment, or both, under Section 1001 of Title 18 of the United States Code and that such willful false statements
`may.ijeopardize the validity of the application or any patent issued thereon.
`
`POWER OF ATTORNEY: As a named inventor, I hereby appoint the following attorney(s) and/or agent(s) to prosecute this application and
`transact all business in the Patent and Trademark Office connected therewith. (list name and registration number)
`
`Jack E. Haken, Reg. No. 26,902
`Michael E. Marion, Reg. No. 34,266
`Edward M. Blocker, Reg. No. 30,245
`SEND CORRESPONDENCE TO: Corporate Patent Counsel;
`U.S. Philips Corporation; 580 White Plains Road;
`Tarrytown, NY 10591
`
`DIRECT TELEPHONE CALLS TO:
`(name and telephone No.)
`(914) 332-0222
`
`Dated:
`
`Last Name
`Full Name of
`DECOTIGNIE
`Inventor
`City
`Residence &
`Le Mans
`Citizenshio
`Post Office Address Street
`21, rue du Tertre Saint-
`Pierre
`
`Inventor's Signature:
`
`First Name
`Philiooe
`State or Foreign Country
`France
`City
`72000 Le Mans
`
`Middle Name
`
`Country of Citizenship
`France
`State or Country
`France
`
`Zip C0de
`
`Page 16 of 175
`
`

`

`;:-.-..
`
`...
`
`· . ;
`
`1/2
`
`6
`
`8
`
`9
`
`;f
`
`//
`~
`o~o
`i01oo
`I 0:00
`I 0 100
`t.._::::J
`000
`s .
`
`12 D
`
`13
`
`FIG.1
`
`8
`
`~I //1
`
`/
`
`'/
`
`0000
`0000
`0000
`0000
`
`MMI
`
`30
`
`9
`
`39
`
`ODD
`DOD
`
`11
`
`~~~
`~~~
`
`20
`
`FIG.2
`
`Page 17 of 175
`
`

`

`2/2
`
`LI UL
`
`K2
`
`Nl
`
`
`
`KB
`
`K12
`
`A=O
`
`A++
`
`K16
`
`\\
`
`II
`
`K11
`
`FIG.3
`FIGB
`
`Page 18 of 175
`
`Page 18 of 175
`
`

`

`-,.
`
`PRL ... T Of ORA~ L ... G~
`AS 0 RI . - r\l.L Y Jill.El>
`
`; !• ssu
`
`' --
`
`~
`
`_ .............. ·-~ ..
`
`1/2
`
`6
`
`1
`//
`~
`o@o
`12 raoo
`
`I 0:00
`I 0 100
`L-~
`000
`
`8
`
`9
`
`D
`
`13
`
`FIG.1
`
`8
`
`~/
`
`//'
`
`/,Y/
`
`0000
`0000
`0000
`0000
`
`MMI
`
`30
`
`9
`
`39
`aaa
`oaa
`
`11
`
`KISS
`
`35
`38
`
`~~~
`~EJ~
`
`20
`
`32
`
`FIG.2
`
`. :-·.
`
`. ~
`
`.
`
`.
`
`•· . ·.' .
`
`.
`
`.
`
`.. .;
`
`Page 19 of 175
`
`

`

`- - - i ..........
`
`PRU>tT Of D.RA~L'tG,:,
`AS ORI-- - ALLY FILED
`=-·--~=
`
`---
`· -s• ; I • - a .. ""'IR.ll-:f!'!i! ~-: ...
`.,.
`2/2
`
`LI UL
`
`K2
`
`N7
`
`KB
`
`K12
`
`A:O
`
`A-++
`
`K16
`
`\\
`
`II
`
`K11
`
`FIG.3
`
`=·
`
`Page 20 of 175
`
`

`

`FEE CALCULATION .... 1EET
`(FOR USE WITH FORM PT0·81S~
`
`ASFILEO
`
`/NO.
`
`DEP.
`
`AFTER
`AFTER
`111 AMENDMENT 2nd AMENDMENT
`INO.
`DEP.
`IND.
`DEP.
`
`I APPL1CANT1sl
`
`-1"\IMS
`
`•
`
`IND.
`
`DEP.
`
`-
`
`-
`-
`
`DEP.
`
`•
`IND.
`
`•
`IND.
`
`· DEP.
`
`I
`
`1
`2
`3
`4
`s
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`29
`30
`31
`32
`33
`34
`35
`36
`37
`38
`39
`40
`41
`42
`43
`44
`4S
`46
`47
`48
`49
`so
`TOTAL
`IND.
`TOTAL
`DEP.
`TOTAL
`CLAIMS
`PTQ->360 (3·781
`
`·--
`
`.
`
`·-
`
`---
`
`--~--
`
`·-
`
`--L---- -
`
`--
`
`·-·----1---·-
`
`-
`. .:- .__
`
`.J
`
`.J
`
`-_I
`
`Sl
`52
`53
`54
`55
`66
`57
`58
`59
`60
`61
`62
`63
`64
`65
`66
`67
`68
`69
`70
`71
`72
`73
`74
`75
`76
`77
`78
`79
`80
`81
`82
`83
`84
`85
`86
`81
`88
`89
`90
`91
`92
`93
`94
`95
`96
`97
`98
`99
`100
`TOTAL
`IND •
`TOTAL
`DEP.
`TOTAL
`CLAIMS
`
`•MAY BG: IJ!iED FOR ADDITIONAL CLMMS OR A/11/iNDNBNTS
`
`:
`
`T
`
`.J i---.J i---_J
`I
`I
`
`PARTMENT of C MMERCF.
`U.S OE
`0
`P1un1 •nd T11d•m1t111 Office
`
`Page 21 of 175
`
`

`

`~). cp.,..., filing re< paid.
`2. E~s claims fees· paid:
`a. Excess rot.al claims more than 20.
`. Excess independen1 claims more 1han 3.
`•
`..2"'c. First mulrlple dependenr claim fee paid .
`/
`..,L3. Miscellaneous paper fee paid.
`
`. .
`
`FINAL STEPS
`J~Sign and da.1e
`cen1.er of filewrapper~ under flap.
`:;::i2'5.: Docketed to examiner. ·
`NOTES TO SUPERVISOR'
`
`0
`
`Page 22 of 175
`
`

`

`CHecKilST FOR PROC
`
`~:~-~-~-~=~---
`
`~
`..........•......... ········-····················-···-----~---··-----
`revised 6/29/95
`.
`1NSTRUCTIONS:
`-··············
`.
`.
`1 .. Make a checkmark beside .each icem IF verified.
`.
`2. If correc1ions are required, wrile no1es to Che examiner or supci"v.isor on reverse side .
`. ... . .. . . ·-.................................................................................. _.: .............................. .
`D. CLAIMS (as filed)
`t. .f-ACE or: nm FJLf:
`V'i. Co~~lere fonn 1360 and 875:
`L l . ·Prin1ed and s1.amped serial
`7
`(fonns on right side of t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket