`
`---------- --~.
`
`-·- +. -------- -·~+
`
`.. / t\•
`
`. ..,
`
`.- 4.
`PATENT NUMBER··
`: ...... ; j~· ~
`- ---:-:-: t~· ''
`-; . ,; ~8838864:-;, - l'
`.
`----~~~ ;.~; 111111/ll~llllWlllllII~lllllllllllllllf _ , ..
`L/
`U.S. UTILITY Patent Application
`PATENT DATE
`
`"··-·--
`
`6836654
`
`.
`
`.
`
`CONT/PRIOR CLASS
`F
`455
`
`APPLICATION NO.
`09/739q07
`-~~1.:...r=:·i--l ·i i 'i·F=;1~·~•r I"•E:.,,..--,-·,-~-
`-i ... ~n ·i ,:;:·
`() .... - :• .. - ' '. .-:
`' ·:.-.-· .......... ,,, ·'"
`.. ---
`:J t
`
`ART UNIT
`gG.e1 -
`/"71; rt;
`
`EXAMIN~¥&~dv~~- --- ._.·1
`
`...
`
`v.".-
`
`Anti-theft protection for a radiotelephony devic~
`
`,. ~
`
`PT0-2040
`12199
`
`.r -,
`./
`SI
`
`!.:
`i
`~: .
`, __
`I •.
`'.·
`~'
`
`l. r.
`
`ORIGINAL
`
`CLASS
`
`I
`
`.
`SUBCLASS
`Lts-s- 4 {()
`.
`
`INTERNATIONAL CLASSIFICATION
`J-J 0 ;t.I V'1 U-111 :Yn", Y66'
`1-J 0 lu ~ Vfl~ , Y-z.,?i
`u. 0 ~ ({J 7/'2f)
`
`ISSUING CLASSIFICATION
`CROSS REFERENCE(S)
`
`CLASS
`SUBCLASS (ONE SUBCLASS PER BLOCK)
`Lf.n
`411
`<..tSil-" e,;J,JAAJ
`
`'-ti~ 'f~r 5~.1 --~"">l stir
`
`D Continued on Issue Slip Inside File Jacket
`
`DRAWINGS
`
`CLAIMS ALLOWED
`
`Sheets Drwg.
`
`Figs. Drwg.
`
`Print Fig.
`
`Total Claims
`
`f
`*--[_( ~s'l_ '4
`
`(Date)
`
`·
`
`\. (Asr.istant Ex.;;.lner)
`
`2-o
`
`Print Claim for O.G.
`(
`NOTICE OF ALLOWANCE MAILED
`og lo!.J.1 /oH
`
`DTERMINAL -
`DISCLAIMER
`
`0 The term of this patent
`(date)
`subsequent to
`has been disclaimed.
`'
`D The term of this patent shall
`not extend beyond the expiration date
`of U.S Patent. No.
`
`-
`
`.,
`
`D The terminal _months of
`this patent have been disclaimed.
`
`:L-
`.3
`.&f &g- Z~l.--'du
`V},.<i-----
`WILLIAM TROST
`SUPERVISORY PATENT EXAMINER
`Amount Due
`TECHNOLOGY CENTER 2600 ct- ;~..,t 11 1650
`
`---
`
`• ·, (Primary Examiner)
`
`(Data)
`
`(Legal lnBlruments Examiner)
`
`(Date)
`
`ISSUE FEE
`
`Date Paid
`
`f) I~, ot
`ISSUE BATCH NUMBER
`
`Jf>M
`
`WARNING:
`The information disclosed herein may be restricted. Unauthorized disclosure may be prohibited by the United States Code Tille 35, Sections 122, 181 and 368.
`Possession outside the U.S. Patent & Trademark Office is restricted to authorized employees and contractors only.
`
`FILED WITH: D DISK (CRF) D FICHE D CD-ROM
`
`(Anach9d In pocket on right inside !lap)
`
`Form PT0·436A
`(Rev. 6199)
`
`ISSUE FEE IN FILE
`
`(FACE)
`
`Page 1 of 175
`
`
`
`- - J
`-
`.
`... -
`PA TENT APPL.IC)~~ TiON
`111111111111i11~1111i 111t1111111m 111111111111i
`09739507
`
`--..
`
`-
`
`-
`-
`-
`, ...
`jc91ll U . S . ' PTO
`.09 /7 39~07
`~
`111111111m 11111m1111111111~ 11111111
`
`1.~/18/00
`
`INITIALS _
`
`_
`
`_
`
`. , ·
`
`Date Received
`(Incl. C. of M.)
`or
`Date Malled
`
`~
`
`:
`
`~
`
`.,
`
`CONTENTS
`
`42.
`
`43.
`
`44.
`
`45.
`
`46.
`
`47.
`
`48.
`
`49.
`
`50.
`
`51.
`
`52.
`
`53.
`
`54.
`
`55.
`
`56.
`
`57.
`
`58.
`
`59.
`
`60.
`
`61.
`
`62.
`
`63.
`
`64.
`
`65.
`
`66.
`
`67.
`
`68.
`
`69.
`
`70.
`
`71 .
`
`72.
`
`73.
`
`74.
`
`75.
`
`76.
`
`77.
`
`78.
`
`79.
`
`80.
`
`81.
`
`19.
`
`20.
`
`21 .
`
`22.
`
`23.
`
`24.
`
`25.
`
`26.
`
`27.
`
`28.
`
`29.
`
`30.
`
`31.
`
`32.
`
`33.
`
`34.
`
`35.
`
`36.
`
`37.
`
`38.
`
`39.
`
`40.
`
`41.
`
`.:
`
`..:
`
`(LEFT OUTGf()E)
`
`82. ________ - - - -
`
`Page 2 of 175
`
`
`
`Page I of J
`
`Ur-.lTED STATES PATENT AND ThADEMARK OFFICE
`
`111m1111111rn 11111111111111111111 m111m1111111:1111m 11111
`Bib Data Sheet
`
`SERIAL NUMBER
`09/739,507
`
`FILING DATE
`12/18/2000
`RULE
`
`COMMISSIONER FOR PATENTS
`UNITED STATES PATEl\'T ANO TRAOEMA"lK OFFICE
`'NA'SH!NCTCN, D.C. 2C 2~1
`W\vw.u~p·o.gc,
`
`CONFIRMATION NO. 3125
`
`CLASS
`455
`
`GROUP ART UNIT
`2681
`
`ATTORNEY
`DOCKET NO.
`PHF 99,624
`
`APPLICANTS
`Philippe Decotignie, Le Mans, FRANCE;
`H CONTINUING DATA,... .... ~ ......... ')\~<::.-
`"* FOREIGN APPLICATIONS ....... ';,/. .. ~/J. ...... /? ... 1:;;
`
`FRANCE 9916136 12121/1999
`
`IF REQUIRED, FOREIGN FILING LICENSE
`GRANTED ** 03/05/2001
`
`Foreign Priority claimed g yes Cl no
`
`yes CJ no CJ Met after
`m. 1..
`A~wa~~c
`)>
`!c. /.1
`(' . ' ) ,
`"Examiner's ${gnature
`•
`Initials
`
`35 USC 119 (a-d) conditions
`met
`!Verified and
`~cknowledaed
`~DD RESS
`Corporate Patent Counsel;
`U.S. Philips Corporation;
`580 White Plains Road;
`Tarrytown ,NY 10591
`
`STATE OR
`COUNTRY
`FRANCE
`
`I I
`
`SHEET~
`
`DRAWING
`2
`
`I
`
`I
`
`TOTAL ) ;NDEPE,DENT
`CLAIMS
`CLAIMS
`10
`2
`
`TITLE
`
`Anti-theft protection for a radiotelephony device
`
`FILING FEE FEES: Authority has been given in Paper
`to charge/credit DEPOSIT ACCOUNT
`RECEIVED No.
`for following:
`No.
`840
`
`lo All Fees
`I
`I
`!CJ 1.16 Fees (Filing)
`Cl 1.17 Fees ( Processing Ext. of .
`time)
`I Cl 1 .18 Fees ( Issue )
`I
`lo Other
`I
`I
`!CJ Credit
`
`Page 3 of 175
`
`
`
`/~
`
`Case Dock
`
`:.\Jo. PHF 99, 624
`
`THE COMMISSIONER FOR PATENTS, Washington, D.C.
`
`20231
`
`Enclosed for filing is the patent application of Inventor(s):
`PHILIPPE DECOTIGNIE
`
`For: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`ENCLOSED ARE:
`[X] Appointment of Associates;
`[X]
`Information Disclosure Statement, Form PT0-1449 and copies of
`documents listed therein;
`Preliminary Amendment;
`Specification (9 Pages of Specification, Claims, & Abstract);
`Declaration and Power of Attorney:
`(1 Page of a [ ]fully executed
`[X]unsigned Declaration);
`Drawing (2 sheets of [ ]informal
`[X]formal sheets);
`Certified copy of a FRENCH application Serial No.9916136;
`Authorization Pursuant to 37 CFR §1.136 (a) (3)
`Other:
`Assignment to
`
`[
`]
`[ x]
`[ x]
`[ x J
`[ x]
`[ x]
`[
`]
`-
`]
`
`FEE COMPUTATION
`
`FOR
`
`CLAIMS AS FILED
`NUMBER FILED NUMBER
`EXTRA
`
`RATE
`
`BASIC FEE
`- $710.00
`
`Total Claims
`
`10 - 20 =
`2 - 3
`=
`
`0
`
`0
`
`Independent
`Claims
`$270 =
`Multiple Dependent Claims, if any
`.
`.
`=
`$710.00
`TOTAL FILING FEE
`Please charge Deposit Account No. 14-1270 in the amount of
`the total filing fee indicated above, plus any deficiencies. The
`Commissioner is also hereby authorized to charge any other fees
`which may be required, except the issue fee, or credit any
`overpayment to Account No. 14-1270.
`
`x $18
`=
`x $80 =
`
`0.00
`
`0.00
`
`0.00
`
`[ ]Amend the specification by inserting before the
`as a centered heading --Cross Reference to Related
`and insert below that as a new paragraph --This is
`in-part of application Serial No.
`, filed
`herein incorporated by reference--. J?J~/. i
`-~
`/..,/f.A :.~:.,0..-'l-1'-'
`- . ~--
`d/CZ'
`Michael E. Marion, Reg.
`Attorney
`1914) 333-9641
`U.S. Philips Corporation
`580 White Plains Road
`Tarrytown, New York 10591
`S:\SL\MB 13SLDO.MAO.doc
`
`first line
`Applications--;
`a continuation-
`, which is
`
`6
`
`d
`
`.·
`.
`
`CERTIFICATE OF EXPRESS MAILING
`EIA58219127US
`__
`EKpress Mail Mailing Label No.
`Date of Deposit December 18, 2000-
`1 hereby certify that this paper and/or fee is being
`deposited with the United States Postal Service "EKpress
`Mail Post Office to Addressee" service under 37 C.F.R.
`1.10 on the date indicated above and is addressed to the
`Commissioner for Patent~. ~~:~~~
`.....,...~G:( MA
`Natale A. Manzo
`Typed Name
`Signature
`/ -
`
`Page 4 of 175
`
`
`
`PATENT APPLICATION SERIAL NO. ~~~~~~~~~
`
`U.S. DEPARTMENT OF COMMERCE
`PATENT AND TRADEMARK OFFICE
`FEE RECORD SHEET
`
`\
`
`- · : · . · ' l
`
`.¥. ,,.,;. .. -
`
`PT0-1556
`(5/87)
`·u.s. GPO: 2000-168-987139595
`
`Page 5 of 175
`
`
`
`IN THE ~ .. iTED STATES PATENT AND TR~u~MARK OFFICE
`
`In re Application of
`
`PHILIPPE DECOTIGNIE
`
`Atty. Docket
`
`PHF 99,624
`
`Serial No.
`
`Group Art Unit
`
`Filed: CONCURRENTLY
`
`Ex.
`
`Title: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`Commissioner for Patents
`Washington, D.C. 20231
`
`AUTHORIZATION PURSUANT TO 37 CFR §l.136(a) (3)
`AND TO CHARGE DEPOSIT ACCOUNT
`
`Sir:
`
`The Commissioner is hereby requested and authorized to
`treat any concurrent or future reply in this application requiring
`a petition for extension of time for its timely submission, as
`incorporating a petition for extension of time for the appropriate
`length of time.
`Please charge any additional fees which may now or in the
`future be required in this application, including extension of time
`fees, but excluding the issue fee unless explicitly requested to do
`so, and credit any overpayment, to Deposit Account No. 14-1270.
`
`Attorney
`(914) 333-9641
`
`Reg. 32,266
`
`\\SERVER0\SYS2\WPDOCS\SL\MB13SLEO.MAO.doc
`
`Page 6 of 175
`
`
`
`PHF 99.624
`
`Anti-theft protection for a radiotelephony device
`
`01.12.2000
`
`DESCRIPTION
`
`FIELD OF THE INVENTION
`
`The invention relatJs to a mobile radiotelephony device intended for
`~
`accommodating a user identificati module, said device comprising:
`
`\ 5
`
`/l~· . - connecting means for establishi g a link between the device and the identification module
`(, _,·_·:
`!&J~- )
`~~C\ );' - blocking means for preventing th normal operation of the device,
`
`mounttd inside the device,
`
`-
`
`test means for activating the bloc ng means when the identification module mounted·
`
`10
`
`inside the device is not the one that · s linked to the device.
`
`The invention also relates io a method of protecting such a device, and a
`computer program for implementing such a method.
`
`The invention notably has applications in the field of portable radiotelephony.
`Portable radiotelephony devices are intended to accompany their users when they move
`around. It happens that these devices are lost or stolen.
`
`15
`
`PRIOR ART OF THE INVENTION
`United States patent 5,913,175, published 15 June 1999 describes a method of
`
`protecting a radiotelephone which permits to avoid that the lost or stolen telephone can be
`
`20
`
`used by a third party with another user identification module. This method comprises
`
`establishing a link between the device and a specific user identification module and blocking
`
`the normal operation of the device when the user identification module that is placed inside
`
`the device is not the one that is linked to the device.
`When the device is lost or stolen with the identificatiqn module to which it is
`
`25
`
`linked, the user is to warn the operator so that the use of his identification module is blocked
`
`at network level.
`This means that the device can be freely used until the identification module to
`
`which it is linked is blocked via the network. This may take a certain period of time.
`
`Page 7 of 175
`
`
`
`PHF 99.624
`
`2
`
`01.12.2000
`
`SUMMARY OF THE INVENTION
`
`It is notably an objedt of the invention to resolve this problem. For this
`
`purpose, a device in accordance with\the invention and as described in the opening paragraph
`is characterized in that it comprises:
`
`-
`
`-
`
`timing means for activating the bloc ing means after the device has been inactive for a
`
`defined period of time,
`
`and deblocking means for permitting no
`
`al operation of the device when the
`
`IO
`
`identification module placed inside the de~ice is the one that is linked to the device and
`when a deblocking code is supplied by the \iser.
`\
`Thus, when the device falls into the hands of a third party together with the
`identification module to which it is linked, it has most probably been inactive for a period of
`time that is sufficiently long for its normal operation to be blocked (advantageously, the
`
`inactive time after which the blocking means are activated is of the order of several minutes).
`The device cannot thus be used without the deblocking code being supplied.
`
`15
`
`Thanks to the invention the lost or stolen device becomes totally unusable. A
`fraudulent person cannot send communications at the cost of the owner of the device. But
`
`neither can he use the device with another identification module. The theft of the device
`
`becomes totally useless. The invention thus forms a protection against theft.
`In a particularly simple embodiment, the connecting means comprise reading
`
`20 means .and storage means of a data stored in the identification module, and the test means
`
`compare the thus stored data with the data stored in the identification module which is places
`
`inside the device. The data stored is formed, for example, by the international identification
`number IMSI which is contained in the identification module (compare standards relating to
`
`the GSM radiotelephony systems). Thus, the identification module is automatically linked to
`the device without the intervention of the user, more particularly without the fact that a
`
`25
`
`!)pecific code has to be entered.
`Advantageously the deblocking code, which is to be supplied to return to the
`
`normal operating mode, is formed by the pin code (Personal Identity Number) which is
`contained in the identification module (compare standards relating to .the GSM
`
`30
`
`radiotelephony systems). Thus the user need not store an additional code to ensure the
`
`protection of his device.
`
`Page 8 of 175
`
`
`
`PHF 99.624
`
`3
`
`01.12.2000
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`These and other aspects of the invention are apparent from and will be
`
`elucidated, by way of non-limitative example, with reference to the embodiment(s) described
`
`hereinafter.
`
`In the drawings:
`
`Fig. 1 represents a device in accordance with the invention,
`
`Fig. 2 represents an overall electric diagram of the device of Fig. I, and
`
`Fig. 3 represents a flow chart explaining the operation of the device of Fig. I.
`
`5
`
`IO
`
`DESCRIP'flON OF A PREFERRED EMBODIMENT OF THE INVENTION
`
`In Fig. 1 is represented an electronic device in accordance with the invention.
`
`In the example described here this device is a portable radiotelephone of the type used in
`
`cellular systems. It notably comprises a microphone 5, a loudspeaker 6, a screen 8, a keypad
`
`15
`
`9 and an antenna 11. The device 1 also comprises a housing 12 intended for accommodating
`
`a user identification module 13. In the example of embodiment described here, this
`
`identification module 13 is a portable card of an integrated circuit in which information is
`
`stored, notably an international identification number currently called IMSI number, and a
`
`20
`
`Personal Identification Number currently called PIN code.
`Fig. 2 shows the ove~electrical diagram of this device. The operation of the
`icroprocessor ass~mbly 20 which comprises a
`device is, in essence, controlled by a
`microprocessor 22 to which are assoc ted a random access memory 24 and a 'read-only
`
`memory 26. This assembly is connecte to a man-machine interface 30 via a common line
`
`32. This man-machine interface 32 con
`
`ls the screen 8 and the keypad 9. The common line
`
`32 also connects the microprocessor asse bly 20 to a transceiver assembly 35 via an
`
`interface circuit 38. The transceiver assem ly is connected to the antenna 11. Finally, the
`
`common line 32 also connects the micropro essor assembly 20 to a card reader 39.
`
`In Fig. 3 is represented a function flow chart of a device in accordance with
`
`the invention. This flow chart starts at box Kl. In box Kl the device i_s in a state of
`
`30
`
`availability, that is to say that the user has access to all the functions of the device. The user
`
`has the choice of either or not locking his device. This locking (L)/unlocking (UL) is done by
`
`accessing a configuration menu of the device. When the user locks his device (box K2), the
`
`identification module that is inside the device is automatically linked to the device. For this
`
`purpose, the device starts reading a data Dl in the identification module (for example, the
`
`Page 9 of 175
`
`
`
`PHF 99.624
`
`01.12.2000
`international identification number IMSI) and he stores it in the random-access memory 24.
`
`4
`
`Once locked, the device remains in the state of availability indicated in box K 1. When the
`device is in the state of availability, one looks whether it is locked (box K3). If it is not
`locked (arrow N3), the device remains in the state of availability indicated in box Kl. If it is
`
`5
`
`locked (arrow Y3), one looks whether the identification module which is placed inside the
`
`device is the one that is linked to the device (box K4).
`
`If the identification module, which is placed inside the device, is not the one
`
`that is linked to the device (arrow N4), the device goes to a first blocking state indicated in
`
`box KS. In this first blocking state, the device is disconnected from the network. Thus it can
`
`10
`
`no longer receive an incoming call nor transmit an outgoing call (possibly with the exception
`
`of emergency numbers). In the blocking state KS, the screen shows a message inviting the
`
`user to insert the proper module into the device. And when the user inserts a new module,
`
`..
`
`one looks whether this new identification module is the one that is connected to the device
`(box K7). If this is the case (arrow Y7), the device is reconnected to the network in
`
`c.' .•
`
`15
`
`accordance with the normal procedure (box KS) and then the device returns to the state of
`
`availability indicated in box Kl. If not (arrow N7), the operation is resumed in box KS. The
`
`only way of leaving this first blocking state is thus to place the identification module that is
`
`linked to the device inside the device.
`If the identification module that is placed inside the device is linked to the
`
`20
`
`device (arrow Y4), one looks whether the device has remained in the state of availability for
`a certain period of time T of the order of several minutes, for example (box KIO). If this is
`
`not the case (arrow N 10), the device remains in the state of availability indicated in box Kl.
`
`If this is the case (arrow YIO), the device passes on to a second blocking state indicated in
`
`box Kl I by passing through an initialization step K12 which permits to initialize a variable A
`
`25 which represents the number of attempts made at supplying a deblocking code (for example,
`
`the Personal Identification Number) PIN.
`
`In this second blocking state the device only processes incoming calls (box
`
`K13) and, possibly, the outgoing calls that correspond to emergency numbers (box K14).
`
`Once these calls have been processed, the device goes back to the sec9nd blocking state
`
`30
`
`indicated in box Kl I. In the second blocking state Kl I a message inviting the user to supply
`
`a de blocking code is displayed on the screen. If the code taken by the user is recognized
`
`(arrow Yl 1), the device goes back to the state of availability indicated in box Kl. If it is not
`recognized (arrow NI I), the value ofthe variable A is tested (box K15). If this value is lower
`
`than a certain figure (for example 3), the value of A is augmented by unity (box K16) and a
`
`Page 10 of 175
`
`
`
`PHF 99.624
`
`5
`
`01.12.2000
`
`message is displayed on the screen to indicate the user that the code is not valid (box K 17).
`
`Then the device goes back to the second blocking state indicated in box Kl I. If the variable
`
`A is higher than or equal to said figure, the test of box K 15 causes the total blocking of the
`
`device indicated in box K30. To leave this third blocking state it is necessary to contact the
`
`5
`
`organization that provides the identification module. One is then again in the state of
`
`availability KI.
`
`In another embodiment of the invention, when the user locks the telephone,
`
`the device asks for the user's name. The name given by the user is stored in the random
`
`access memory 24 of the device. When the identification module that is inside the device is
`
`10
`
`not the one that is linked to the device, the device displays the name of the user before asking
`
`him to insert his identification module as indicated in box KS. The device also displays the
`
`name of the user before asking him to supply his personal code as indicated in box K 11.
`
`The embodiment that has just been described is particularly effective, because
`
`it provides two separate blocking modes depending on whether the identification module that
`
`15
`
`is placed inside the device is either or not linked to the device. The first blocking mode is
`
`applied in the case where the device has been lost or stolen. The object is then to prevent the
`
`device being usable with another identification module. It thus advantageously blocks the
`
`incoming and outgoing calls at the same time. The second blocking mode is applied in the
`
`case where the identification module that is linked to the device is in its place inside the
`
`20
`
`device and the device is in a state of availability. The object is to prevent a third party being
`
`able to send outgoing calls with this device if it is lost, stolen or left without attendance for
`
`some time. In that case, it is desirable for the user to be able to continue to directly receive
`
`his incoming calls.
`
`In another embodiment the same blocking means are used as the identification
`
`25 module which is placed inside the device either or not linked to the device, for example, the
`second blocking means. In that case it is possible for receiving incoming calls intended for
`
`the identification module that is inside the device, even when this identification module
`
`placed inside the device is not linked to the device.
`
`Page 11 of 175
`
`
`
`PHF 99.624
`' .
`
`CLAIMS:
`
`6
`
`01.12.2000
`
`I.
`
`\
`A mobile radiotefophony device intended for accommodating a user
`
`identification module, said device comprising:
`
`-
`
`connecting means for establishin!\,a link between the device and the identification module
`
`mounted inside the device,
`
`-
`
`-
`
`\
`\
`blocking means for preventing the ncttmal operation of the device,
`\
`test means for activating the blocking means when the identification module mounted
`inside the device is not the one that is li~ed to the device,
`characterized in that it comprises:
`
`-
`
`timing means for activating the blocking eans after the device has been inactive for a
`
`defined period of time,
`
`and deblocking means for permitting normal peration of the device when the
`
`identification module placed inside the devic~ the one that is linked to the device and
`
`when a deblocking code is supplied by the user.\
`
`5
`
`10
`\
`
`' .
`
`;-.·:_
`
`15
`
`2.
`
`A device as claimed in claim I, charac rized in that said blocking means
`
`comprise first blocking means for preventing the trans
`
`ission and reception of calls when the
`
`identification module placed inside the device is not the ne that is linked to the device, and
`
`second blocking means for preventing the sending of call. after a defined period of time
`
`during which the device has been inactive, with the excep ·on of one or various emergency
`
`20
`
`numbers.
`
`3.
`
`A device as claimed in claim I , characterized i that it comprises
`
`locking/unlocking means for locking/unlocking the device, w
`
`le said blocking means can
`
`only be activated when the device is locked, and said link is est blished while the device is
`
`25
`
`being locked.
`
`4.
`
`A device as claimed in claim I, characterized in that said connecting means
`
`comprise means for reading and storing a data stored in the identific tion module, and in that
`
`Page 12 of 175
`
`
`
`PHF 99.624
`
`said test means compare this data thus stored with the data stored in the identification module
`
`7
`
`01.12.2000
`
`that is placed inside the device.
`
`\
`
`5.
`
`A device as claimed in\claim 3, characterized in that said data is formed by the
`
`international identification number sto'~ed in the user identification module.
`i
`'
`
`6.
`
`A device as claimed in ~aim 1, characterized in that said deblocking code is
`formed by the personal identification ~i:ber stored in the identification module.
`
`!
`\
`i
`A method of protecting ~mobile radiotelephony device intended for
`
`I
`I
`
`accommodating a user identification moaule, said method comprising the following steps:
`i
`
`5
`
`IO
`
`'
`
`,
`
`0
`
`: ( Q\~- setting up a link between the device fd the identification module placed inside the
`l
`the device is not the one that is linked j the device,
`detection of a period of inactivity of the f evice,
`
`l).N \ // device,
`':; -O,_'-_)/
`· ··
`/
`
`1
`\
`testing to verify whether the identific~tion module placed inside the device is the one that
`
`·
`
`-
`
`· "
`
`15
`
`is linked to the device,
`
`blocking the normal operation of the ~f vice when the identification module placed inside
`
`characterized in that it comprises the follo
`
`ing steps:
`
`-
`
`20
`
`25
`
`-
`
`8.
`
`blocking of the normal operation of the ~evice when said period of inactivity has been
`\
`\
`\
`deblocking which permits the normal ope\ation of the device when the identification
`
`detected,
`
`rriodule placed inside the device is the one\that is linked to the device and when a
`
`deblocking code has been supplied by the user.
`
`\
`A method as claimed in claim 6
`
`protecting a mobile radiotelephony device,
`
`characterized in that it comprises a step of lockin the device, while the blocking steps can
`
`only be executed when the device is locked, and t e step of establishing a link between the
`
`device and the identification module placed inside the device is executed when the device is
`
`30
`
`locked.
`
`9.
`characterized in that the step of establishing a link be ween the device and the identification
`
`A method as claimed in claim 6 of pr tecting a mobile radiotelephony device,
`
`module placed inside the device comprises a step of r ading and storing a data stored in said
`
`Page 13 of 175
`
`
`
`PHF 99.624
`
`'
`identification module, and in that the test step comprises comparing the data thus stored with
`\
`the data stored in the identification module that is placed inside the device.
`
`01.12.2000
`
`8
`
`10.
`
`A computer program comp 'sing means for implementing a method as claimed
`
`in claim 7 of protecting a mobile radiotelep ony device.
`
`..
`(~ " I.
`~,
`,, ..
`,r--..
`!JW'
`,. ,,.
`
`'!
`
`I
`
`u~s
`
`Page 14 of 175
`
`
`
`PHF 99.624
`
`ABSTRACT:
`
`9
`
`01.12.2000
`
`The invention proposes a method of protecting a mobile radiotelephony device
`
`intended for accommodating a user identification module to be able to operate. The invention
`
`has for its object to protect such a device against theft.
`
`For this purpose, a device in accordance with the invention comprises means
`
`5
`
`for:
`
`-
`
`-
`
`preventing the use of the device with an identification module other than the user's,
`
`asking the user for a deblocking code after a short time that the device has been inactive
`
`and preventing the use of the device if this code has not been supplied.
`
`I 0
`
`Reference: Fig. 2
`
`·.·.
`
`Page 15 of 175
`
`
`
`DECLARATION and POWER OF ATTORNEY
`
`ATTORNEY'S DOCKET NO.:
`PHF99.624
`
`As a below named inventor, I hereby declare that:
`My residence, post oHice address and citizenship are as stated below next to my name.
`I believe I am the original, first and sole inventor (if only one name is listed below) or an original, first joint inventor (if plural names are
`listed below) of the subject matter which is claimed and for which a patent is sought on the invention entitled
`"Anti-theft protection for a radiotelephony device"
`the specification of which (check one)
`D is attached hereto.
`D was filed on - - - - - - - - - - -as Application Serial No.
`
`and was amended on
`(if applicable).
`~I hereby state that I have reviewed and understand the contents of the above-identified specification, including the claims, as amended by
`the amendment(s) referred to above.
`I acknowledge the duty to disclose information which is material to patentabllity of this application in accordance with Title 37, Code of
`Federal Regulations, §1.56(a).
`I hereby claim foreign priority benefits under Title 35, United States Code, § 119 of any foreign application(s) for patent or inventor's
`certificate listed below and have also identified below any foreign application for patent or inventor's certificate having a filing date before
`that of the application on which priority is claimed:
`PRIOR FOREIGN APPLICATION(S)
`
`COUNTRY
`
`APP. NUMBER
`
`France
`
`9916136
`
`DATE OF FILING
`<DATE MONTH YEAR}
`2t December 1999
`
`PRIORITY CLAIMED
`UNDER 35 U.S.C. 119
`YES
`
`I hereby claim the benefit under Title 35, United States Code, §120 of any United States application(s) listed below and, insofar as the
`subject matter of each of the claims of this application is not disclosed in the prior United States application in the manner provided by the
`firsfparagraph of Title 35 United States Code, §112, I acknowledge the duty to disclose material information as defined in Title 37, Code of
`Federal Regulations, §1,56(a) which occurred between the filing date of the prior application and the national or PCT international filing date
`of this application:
`PRIOR UNITED STATES APPLICATION($)
`
`A.RPLICATION SERIAL NUMBER
`' ~-~
`..
`
`·.·
`
`FILING DATE
`
`STATUS (PATENTED, PENDING,
`ABANDONED)
`
`I hereby declare that all statements made herein of my own knowledge are true and that all statements made on information and belief are
`beli~ved to be true; and further that these statements were made with the knowledge that willful false statements and the like so made are
`pu6rshable by fine or imprisonment, or both, under Section 1001 of Title 18 of the United States Code and that such willful false statements
`may.ijeopardize the validity of the application or any patent issued thereon.
`
`POWER OF ATTORNEY: As a named inventor, I hereby appoint the following attorney(s) and/or agent(s) to prosecute this application and
`transact all business in the Patent and Trademark Office connected therewith. (list name and registration number)
`
`Jack E. Haken, Reg. No. 26,902
`Michael E. Marion, Reg. No. 34,266
`Edward M. Blocker, Reg. No. 30,245
`SEND CORRESPONDENCE TO: Corporate Patent Counsel;
`U.S. Philips Corporation; 580 White Plains Road;
`Tarrytown, NY 10591
`
`DIRECT TELEPHONE CALLS TO:
`(name and telephone No.)
`(914) 332-0222
`
`Dated:
`
`Last Name
`Full Name of
`DECOTIGNIE
`Inventor
`City
`Residence &
`Le Mans
`Citizenshio
`Post Office Address Street
`21, rue du Tertre Saint-
`Pierre
`
`Inventor's Signature:
`
`First Name
`Philiooe
`State or Foreign Country
`France
`City
`72000 Le Mans
`
`Middle Name
`
`Country of Citizenship
`France
`State or Country
`France
`
`Zip C0de
`
`Page 16 of 175
`
`
`
`;:-.-..
`
`...
`
`· . ;
`
`1/2
`
`6
`
`8
`
`9
`
`;f
`
`//
`~
`o~o
`i01oo
`I 0:00
`I 0 100
`t.._::::J
`000
`s .
`
`12 D
`
`13
`
`FIG.1
`
`8
`
`~I //1
`
`/
`
`'/
`
`0000
`0000
`0000
`0000
`
`MMI
`
`30
`
`9
`
`39
`
`ODD
`DOD
`
`11
`
`~~~
`~~~
`
`20
`
`FIG.2
`
`Page 17 of 175
`
`
`
`2/2
`
`LI UL
`
`K2
`
`Nl
`
`
`
`KB
`
`K12
`
`A=O
`
`A++
`
`K16
`
`\\
`
`II
`
`K11
`
`FIG.3
`FIGB
`
`Page 18 of 175
`
`Page 18 of 175
`
`
`
`-,.
`
`PRL ... T Of ORA~ L ... G~
`AS 0 RI . - r\l.L Y Jill.El>
`
`; !• ssu
`
`' --
`
`~
`
`_ .............. ·-~ ..
`
`1/2
`
`6
`
`1
`//
`~
`o@o
`12 raoo
`
`I 0:00
`I 0 100
`L-~
`000
`
`8
`
`9
`
`D
`
`13
`
`FIG.1
`
`8
`
`~/
`
`//'
`
`/,Y/
`
`0000
`0000
`0000
`0000
`
`MMI
`
`30
`
`9
`
`39
`aaa
`oaa
`
`11
`
`KISS
`
`35
`38
`
`~~~
`~EJ~
`
`20
`
`32
`
`FIG.2
`
`. :-·.
`
`. ~
`
`.
`
`.
`
`•· . ·.' .
`
`.
`
`.
`
`.. .;
`
`Page 19 of 175
`
`
`
`- - - i ..........
`
`PRU>tT Of D.RA~L'tG,:,
`AS ORI-- - ALLY FILED
`=-·--~=
`
`---
`· -s• ; I • - a .. ""'IR.ll-:f!'!i! ~-: ...
`.,.
`2/2
`
`LI UL
`
`K2
`
`N7
`
`KB
`
`K12
`
`A:O
`
`A-++
`
`K16
`
`\\
`
`II
`
`K11
`
`FIG.3
`
`=·
`
`Page 20 of 175
`
`
`
`FEE CALCULATION .... 1EET
`(FOR USE WITH FORM PT0·81S~
`
`ASFILEO
`
`/NO.
`
`DEP.
`
`AFTER
`AFTER
`111 AMENDMENT 2nd AMENDMENT
`INO.
`DEP.
`IND.
`DEP.
`
`I APPL1CANT1sl
`
`-1"\IMS
`
`•
`
`IND.
`
`DEP.
`
`-
`
`-
`-
`
`DEP.
`
`•
`IND.
`
`•
`IND.
`
`· DEP.
`
`I
`
`1
`2
`3
`4
`s
`6
`7
`8
`9
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`29
`30
`31
`32
`33
`34
`35
`36
`37
`38
`39
`40
`41
`42
`43
`44
`4S
`46
`47
`48
`49
`so
`TOTAL
`IND.
`TOTAL
`DEP.
`TOTAL
`CLAIMS
`PTQ->360 (3·781
`
`·--
`
`.
`
`·-
`
`---
`
`--~--
`
`·-
`
`--L---- -
`
`--
`
`·-·----1---·-
`
`-
`. .:- .__
`
`.J
`
`.J
`
`-_I
`
`Sl
`52
`53
`54
`55
`66
`57
`58
`59
`60
`61
`62
`63
`64
`65
`66
`67
`68
`69
`70
`71
`72
`73
`74
`75
`76
`77
`78
`79
`80
`81
`82
`83
`84
`85
`86
`81
`88
`89
`90
`91
`92
`93
`94
`95
`96
`97
`98
`99
`100
`TOTAL
`IND •
`TOTAL
`DEP.
`TOTAL
`CLAIMS
`
`•MAY BG: IJ!iED FOR ADDITIONAL CLMMS OR A/11/iNDNBNTS
`
`:
`
`T
`
`.J i---.J i---_J
`I
`I
`
`PARTMENT of C MMERCF.
`U.S OE
`0
`P1un1 •nd T11d•m1t111 Office
`
`Page 21 of 175
`
`
`
`~). cp.,..., filing re< paid.
`2. E~s claims fees· paid:
`a. Excess rot.al claims more than 20.
`. Excess independen1 claims more 1han 3.
`•
`..2"'c. First mulrlple dependenr claim fee paid .
`/
`..,L3. Miscellaneous paper fee paid.
`
`. .
`
`FINAL STEPS
`J~Sign and da.1e
`cen1.er of filewrapper~ under flap.
`:;::i2'5.: Docketed to examiner. ·
`NOTES TO SUPERVISOR'
`
`0
`
`Page 22 of 175
`
`
`
`CHecKilST FOR PROC
`
`~:~-~-~-~=~---
`
`~
`..........•......... ········-····················-···-----~---··-----
`revised 6/29/95
`.
`1NSTRUCTIONS:
`-··············
`.
`.
`1 .. Make a checkmark beside .each icem IF verified.
`.
`2. If correc1ions are required, wrile no1es to Che examiner or supci"v.isor on reverse side .
`. ... . .. . . ·-.................................................................................. _.: .............................. .
`D. CLAIMS (as filed)
`t. .f-ACE or: nm FJLf:
`V'i. Co~~lere fonn 1360 and 875:
`L l . ·Prin1ed and s1.amped serial
`7
`(fonns on right side of t