`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`,A.e"/I::.IWI:
`
`
`
`6836654
`iii/iiiiiiiliiiiiiiiiiiiiiiii1:
`
`
`
`
`a;
`
`
`6836654
`
`
`
`
`
`
`
`
`CLASS mI‘m-[UNIT
`I
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`4 55
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a
`
`
`
`
`
`17/; {4377;
`
`
`
`
`
`
`’Ir‘t'51:.l~"u:%'i""!;:.
`
`
`
`
`
`
`I:::»-I~"ezz‘!::.:szaz:::i::.stat-"I Fm"
`
`
`
`
`:niI
`
`Ini«::I+.;I.=::1:sFIIEIi-"Icrsziyi
`
`
`
`cilia/11:35!
`
`
`
`Pro-2040
`12:99 ‘
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`"‘z‘f’lii’.
`
`
`
`
`'~rwas”:
`
`
`
`
`
`
`
`
`
`
`ISSUING CLASSIFICATION
`cnoss REFERENCE(S)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`suecutss (ONE suecutss PER BLOCK)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DISCLAIMER
`
`
`TERMINAL ‘
`
`
`
`Figs. Drwg.
`SheetslDrwg.
`
`
`
`
`
`
`
`
`
`_OTICE0F ALLOWANCE MAILED
`
`
`
`
`
`
`,
`I: The term of this patent
`
`
`
`
`
`
`
`i-[‘ ”Q! (
`fly E2! an; I’ Efibull
`
`
`
`(date) ,
`subsequent to
`
`
`
`
`
`
`
`has been disclaimed.
`{(Assistant Eu-siner)
`(Dale)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`w. MW
`CI The term of this patent shall
`
`
`
`
`
`
`not extend beyond the expiration date
`
`
`
`
`
`
`
`
`
`
`
`‘ WILLIAM TRUST
`of US Patent. No.
`
`
`
`
`
`
`
`
`SUPERVISORY PATENT EXAMINER
`Date Paid
`Amount Due
`
`
`
`
`
`
`
`
`TECHNOLOGY CENTER 2600 6,...ng 1, ”>50
`_
`
`
`
`JP”
`
`
`“~ (Primary Examiner)
`I 8 01'
`I
`._
`(Date)
`
`
`
`
`
`
`ISSUE BATCH NUMBER
`
`
`
`
`
` CI The terminal _months of
`
`
`
`
`
`
`this patent have been disclaimed.
`
`
`
`
`
`
` (Legal Instruments Examiner]
`
`
`
`
` WARNING:
`
`
`The information disclosed herein may be restricted. Unauthorized disclosure may be prohibited by the United States Code Title 35. Sections 122.181 and 368.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Possession outside the U.8 Patent & Trademark Ottice'Is restricted to authorized employees and contractors only.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`FILED WITH: I] DISK (CW) 1] FICHE |:| CD-ROM
`Form "043%
`
`(Rev. 6199)
`
`
`
`
`
`
`
`
`(Attached In packet on right inside tiep)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ISSUE FEE IN FILE
`
`MICROSOFT CORP.
`
`
`
`EXHIBIT 1002
`
`Page 1 of 175
`
`SAMSUNG EXHIBIT 1002
`
`(FACE)
`
`
`
`Page 1 of 175 I
`
`Page 1 of 175
`
`Page 1 of 175
`
`SAMSUNG EXHIBIT 1002
`
`
`
`
`
`'
`
`4
`"Lax"!
`
`Pit—TEN?“ gPPEIéEfiJiT '
`
`
`
`
`IIHHIIIHIlllllllllllllllllll'Ilmlllllmm
`
`
`
`
`
`
`
`
`09739507
`
`7V51?
`
`
`
`
`
`
`
`
`
`
`_"'1¢fi§‘7“3-955-m“°
`
`
`
`mull “fl,“mmmmmm“
`
`
`
`4 maynu
`b“ ‘H h ”
`
`
`
`Date ReggNTEN-rs
`(Incl. $91M.)
`Date Mailed
`
`fig:
`
`..
`
`'
`
`
`
`“:53 3.10 1
`
`INITIALS
`
`
`
`
`
`
`
`E -.-.
`
`
`Date Hecelved
`
`
`
`
`
`
`(Inct. Ear M.)
`
`
`Date Mailed
`
`
`
`
`
`
`
`'
`
`'9
`
`
`
`43.
`
`
`44.
`
`45.
`
`
`
`
`
`46.
`
`4?.
`
`
`
`48.
`
`49.
`
`50.
`
`51.
`
`
`
`
`
`
`
`
`
`52.
`
`53.
`
`54.
`
`55.
`
`56.
`
`
`
`
`
`
`
`
`
`
`
`57.
`
`
`5B.
`
`
`
`18.—___— ______
`
`59.
`
`
`
`
`
`
`19.___—___ _— 60.
`
`
`
`
`
`20.____—_______ — 61.
`
`
`21.__— __ 62.
`
`
`
`
`22._ _ 63.
`
`
`
`
`23.____— ____ 64.
`
`24.
`
`
`
`65.
`
`
`25._~__*—____ _ 55.
`
`
`
`
`
`
`
`
`26.__—______ — 67.
`
`
`27.
`
`
`
`—_ 68.
`
`28.____—__ _— 59.
`
`
`
`
`
`
`
`
`29.___,____—____ _— 70.
`
`
`30.__—__ _— 71.
`
`
`31.____—______________ —_ 72.
`
`
`
`
`
`
`32.—_____ _______
`
`
`73.
`
`
`33._____—___ — 74.
`
`34.__‘:— __ 75.
`
`
`35.—_— _h____
`
`
`76.
`
`
`36.__— __ 77'.
`
`3?.—__— _____
`
`
`78.
`
`3B._—__________ — 79.
`
`
`
`39-_._— ___ BO.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`40.____— __ B1.
`
`
`—_
`
`
`
`
`
`
`
`41.—_'_— — 82.— —
`
`
`
`
`Page 2 of 175
`
`(LEI-”I" OUT-SIDE)
`
`
`
`
`Page 2 0f175
`
`Page 2 of 175
`
`Page 2 of 175
`
`
`
`)-
`
`
`
`
`Page I of]
`
`
`—.'lm—‘rALH
`.A"a_A..IImun—I‘‘‘x._¢I__:=__'\K—.’.11'!-'w
`
`I
`
`IIIIIIIII"IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
`
`
`
`
`Bib Data Sheet
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`COMMIssIONER FOR PATENTS
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`Mswuemu. 61:. 2:: an
`
`
`
`
`
`
`
`
`
`
`III/Imusp'ogov
`
`
`CONFIRMATION NO. 3125
`
`
`
`
`
`
`SERIAL NUMBER
`
`09/739,507
`
`
`
`FILING DATE
`
`12/18/2000
`RULE
`
`
`
`
`
`
`
`
`
`
`
`
`GROUP ART UNIT
`
`2681
`
`
`
`ATTORNEY
`
`DOCKET No.
`
`PHF 99,624
`
`
`
`
`
`A PPLlCANTS
`
`
`
`
`
`
`
`
`
`Philippe Decotignie, Le Mans, FRANCE;
`
`* CONTINUING DATA *"*Wflnnauh Y ‘22‘
`
`
`
`
`
`1 FOREIGN APPLICATIONS WEI/W he «é?
`
`
`
`
`
`FRANCE 991613612/21/1999
`
`
`
`
`£5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IF REQUIRED, FOREIGN FILING LICENSE
`GRANTED “ 03l05/2001
`
`
`
`
`Foreign Priority claimed
`yes D no
`
`
`
`
`
`
`35 use 119(a-d) conditions
`M C] M D Me. an”
`
`
`
`
`
`
`
`
`mm
`,
`e ’
`All we
`
`
`
`
`erifiod and
`gI gm: Egg“ 5 g7
`22¢- a ,
`
`
`
`
`cknowled-ed
`xaminer's mature
`Initials
`
`
`
`
`
`
`
`Corporate Patent Counsel;
`
`
`
`U.S. Philips Corporation;
`580 White Plains Road;
`
`
`
`
`
`
`
`Tarrytown ,NY 10591
`
`
`
`ETATE 0R
`
`OUNTRY DRAWING
`
`
`FRANCE
`2
`
`
`
`
`
`.
`
`\
`
`TITLE
`
`
`
`
`
`
`
`Anti-theft protection for a radiotelephony device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CLAIMS
`
`10
`
`
`
`
`
`
`
`
`
`Cl 1.16 Fees (Filing)
`
`
`
`D 1.17 Fees ( Processmg Ext of
`FILING FEE FEES: Authority has been given in Paper
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`RECEIVED No.
`to charge/credit DEPOSIT ACCOUNT tIme I
`
`
`
`
`
`
`for followmg.
`CI 1.18 Fees ( ISSue)
`.
`
`
`
`
`
`m“
`
`
`D Credit
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 175
`
`Page 3 of 175
`
`Page 3 of 175
`
`Page 3 of 175
`
`
`
`];«I?‘00
`
`\P
`
`
`
`
`Case Dock
`
`
`
`
`
`
`No. PHF 99,624
`
`
`
`
`
`
`
`
`
`2
`m
`.2;
`”1.33
`=2
`:3?
`at:
`-%
`
`WWMWWWWMW
`12/18/00
`
`
`
`
`
`
`& Abstract);
`
`
`
`
`
`
`
`
`
`
`
`
`===§;
`20231
`THE COMMISSIONER FOR PATENTS, Washington, D.C.
`seed
`.
`.
`.
`
`
`
`
`
`
`
`
`5555» Enclosed for filing is the patent application of Inventor(s):
`
`
`PHILIPPE DECOTIGNIE
`——:——;c
`=_—-_'m
`
`
`
`
`
`
`
`E", For: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`_——-—-"—‘
`V
`—-___——3
`
`
`ENCLOSEDJUHP
`
`
`
`
`[X] Appointment of Associates;
`
`
`
`
`
`
`
`
`[X]
`Information Disclosure Statement, Form PTO-1449 and copies of
`
`
`
`documents listed therein;
`
`
`
`
`]
`Preliminary Amendment;
`
`
`
`
`
`
`
`X] Specification (9 Pages of Specification, Claims,
`
`
`
`
`
`
`
`[X] Declaration and Power of Attorney:
`
`
`
`
`
`
`
`
`(1 Page of a
`[ ]fully executed
`[X]unsigned Declaration);
`
`
`
`
`
`
`
`
`
`[X] Drawing (2 sheets of
`[
`]informal
`[X]formal sheets);
`
`
`
`
`
`
`
`
`
`[X] Certified copy of a FRENCH application Serial No.9916136;
`
`
`
`
`
`
`
`
`
`
`[X] Authorization Pursuant
`to 37 CFR §1.136(a)(3)
`
`
`
`] Other.
`[
`;
`
`[1 Assignment
`
`
`
`to
`
`
`
`
`
`FEE COMPUTATION
`
`i [
`
`mhfln
`
`L
`
`1;:
`
`
`
`
`CLAIMS AS FILED
`
`
`
`
`
`NUMBER FILED NUMBER
`
`
`EXTRA
`
`
`
`BASIC FEE
`
`
`
`— $710.00
`
`
`
`Total Claims
`
`
`
`Independent
`Claims
`
`
`
`
`
`
`
`2 —
`
`
`
`
`
`
`_X $18
`
`
`
`
`X $80
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Multiple Dependent Claims,
`
`
`
`
`if any
`
`
`
`
`$270-
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`
`
`
`
`
`
`
`
`$710.00
`TOTAL FILING FEE .
`
`
`
`
`
`
`
`
`
`
`Please charge Deposit Account No. 14- 1270 in the amount of
`
`
`
`
`
`
`
`
`
`the total filing fee indicated above, plus any deficiencies. The
`
`
`
`
`
`
`
`
`
`
`Commissioner is also hereby authorized to charge any other fees
`
`
`
`
`
`
`
`
`
`
`
`which may be required, except the issue fee, or credit any
`
`
`
`
`
`overpayment to Account No. 14—1270.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[
`]Amend the specification by inserting before the first line
`
`
`
`
`
`
`
`
`
`as a centered heading ——Cross Reference to Related Applications-~:
`
`
`
`
`
`
`
`
`
`
`
`and insert below that as a new paragraph ——This is a continuation—
`
`
`
`
`
`
`
`
`
`
`*
`in-part of application Serial No.
`, filed
`, which is
`
`
`
`
`
`herein incorporated by reference--.
`
`
`
`
`
`
`
`Express Mail Mailing Label No. E1458219127US
`
`
`
`
`
`
`
`
`Date of Deposit December 18 .“TO—6‘:
`Michael E, Marion, Reg.
`6
`,
`
`
`
`
`
`
`
`
`I hereby certify that this paper and/or fee is being
`Attorney
`
`
`
`
`
`
`
`
`
`
`
`deposited with the United States Postal Service "Express
`{914} 333-9541
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Mail Post Office to Addressee" service under 37 CPR.
`U.S. Philips Corporation
`
`
`1.10 on the date indicated above and is addressed to the
`580 White Plains Road
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Commissioner for Patents. W shm on, 0. 2023175
`Tarrytown, New York 1059‘]
`
`3—____.__ata|eA- Mar-2° MW S:\SL\MB13SLDO.MAO.doc
`
`
`
`
`
`Typed Name
`Signature
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CERTIFICATE OF EXPRESS MAILING
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 4 of 175
`
`Page 4 of 175
`
`Page 4 of 175
`
`Page 4 of 175
`
`
`
`
`
`
`
`PATENT APPLICATION SERIAL NO.
`
`
`
`
`
`
`
`US. DEPARTMENT OF COMMERCE
`
`
`
`
`PATENT AND TRADEMARK OFFICE
`
`
`
`FEE RECORD SHEET
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PTO-1556
`
`(5/87)
`'U.S. GPO: 2000-468-95?:‘3§5§5
`
`
`
`
`
`Page 5 of 175
`
`Page 5 of 175
`
`Page 5 of 175
`
`Page 5 of 175
`
`
`
`
`
`
`
`
`
`
`IN THE L.LTED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`
`
`
`In re Application of
`
`
`
`
`
`PHILIPPE DECOTIGNIE
`
`
`Atty. Docket
`
`
`
`
`PHF 99,624
`
`
`
`
`
`Serial No.
`
`
`
`Group Art Unit
`
`
`
`_
`
`
`
`Filed: CONCURRENTLY
`
`Ex.
`
`
`
`
`
`
`
`
`
`
`Title: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`
`
`Commissioner for Patents
`
`
`
`Washington, D.C. 20231
`
`
`
`
`
`
`
`
`
`AUTHORIZATION PURSUANT TO 37 CFR §l.l36(a)(3)
`
`
`
`
`
`AND TO CHARGE DEPOSIT ACCOUNT
`
`
`
`Sir:
`
`
`
`
`
`
`
`
`
`
`
`
`The Commissioner is hereby requested and authorized to
`
`
`
`
`
`
`
`
`
`treat any concurrent or future reply in this application requiring
`
`
`
`
`
`
`
`
`
`
`
`a petition for extension of time for its timely submission, as
`
`
`
`
`
`
`
`
`
`incorporating a petition for extension of time for the appropriate
`
`
`
`length of time.
`
`
`
`
`
`
`
`
`
`
`Please charge any additional fees which may now or in the
`
`
`
`
`
`
`
`
`
`future be required in this application,
`including extension of time
`
`
`
`
`
`
`
`
`
`
`fees, but excluding the issue fee unless explicitly requested to do
`
`
`
`
`
`
`
`
`
`
`so, and credit any overpayment,
`to Deposit Account No. 14—1270.
`
`
`
`
`
`
`
`
`
`
`
`
` ichael E.
`
`arion, Reg. 32,266
`
`
`
`
`
`Attorney
`
`(914) 333—9641
`
`
`
`\\SERVERO\SY82\WPDOCS\SL\MBl3SLEO.MAO.doc
`
`
`
`Page 6 of 175
`
`Page 6 of 175
`
`Page 6 of 175
`
`Page 6 of 175
`
`
`
`
`
`PHF 99.624
`
`
`
`
`
`
`
`Anti-theft protection for a radiotelephony device
`
`1
`
`
`01.12.2000
`
`
`DESCRIPTION
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`!
`
`
`
`
`
`FIELD OF THE INVENTION
`The invention relattis to a mobile radiotelephony device intended for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`accommodating a user identificati . module, said device comprising:
`
`
`
`
`
`
`
`
`
`
`
`
`
`connecting means for establishi g a link between the device and the identification module
`
`
`
`
`
`
`
`
`
`
`
`- blocking means for preventing th normal operation of the device,
`
`—-
`
`
`
`
`
`mounted inside the device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`— test means for activating the bloc ng means when the identification module mounted
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`inside the device is not the one that 's linked to the device.
`
`
`
`
`
`
`
`
`
`
`
`
`The invention also relates to a method of protecting such a device, and a
`
`
`
`
`
`
`computer program for implementing such a method.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The invention notably has applications in the field of portable radiotelephony.
`
`
`
`
`
`
`
`
`
`
`
`
`Portable radiotelephony devices are intended to accompany their users when they move
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`around. It happens that these devices are lost or stolen.
`
`
`
`
`
`
`
`
`PRIOR ART OF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`
`United States patent 5,913,175, published 15 June 1999 describes a method of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`protecting a radiotelephone which permits to avoid that the lost or stolen telephone can be
`
`
`20
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`used by a third party with another user identification module. This method comprises
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`establishing a link between the device and a specific user identification module and blocking
`the normal operation of the device when the user identification module that is placed inside
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the device is not the one that is linked to the device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`When the device is lost or stolen with the identification module to which it is
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`linked, the user is to warn the operator so that the use of his identification module is blocked
`
`
`
`
`
`
`at network level.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`This means that the device can be freely used until the identification module to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`which it is linked is blocked via the network. This may take a certain period of time.
`
`Page 7 of 175
`
`Page 7 of 175
`
`Page 7 of 175
`
`Page 7 of 175
`
`
`
`
`
`PHF 99.624
`
`2
`
`
`
`
`01.12.2000
`
`
`
`
`
`SUMMARY OF THE INVENTION
`It is notably an objeét of the invention to resolve this problem. For this
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`purpose, a device in accordance with‘the invention and as described in the opening paragraph
`
`
`
`
`
`
`is characterized in that it comprises:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`— timing means for activating the bloc ing means after the device has been inactive for a
`
`
`
`
`
`defined period of time,
`
`
`
`
`
`
`
`— and deblocking means for permitting no
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module placed inside the device is the one that is linked to the device and
`when a deblocking code is supplied by the\.\lser.
`
`
`
`
`
`
`
`
`
`Thus, when the device falls into the hands of a third party together with the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module to which it is linked, it has most probably been inactive for a period of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`al operation of the device when the
`
`fl {
`
`5
`
`I“
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`time that is sufficiently long for its normal operation to be blocked (advantageously, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`inactive time after which the blocking means are activated is of the order of several minutes).
`
`
`
`
`
`
`
`
`
`
`
`
`The device cannot thus be used without the deblocking code being supplied.
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`Thanks to the invention the lost or stolen device becomes totally unusable. A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`fraudulent person cannot send communications at the cost of the owner of the device. But
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`neither can he use the device with another identification module. The theft of the device
`
`
`
`
`
`
`
`
`
`
`
`
`becomes totally useless. The invention thus forms a protection against theft.
`
`
`
`
`
`
`
`
`
`In a particularly simple embodiment, the connecting means comprise reading
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`20 meansand storage means of a data stored in the identification module, and the test means
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`compare the thus stored data with the data stored in the identification module which is places
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`inside the device. The data stored is formed, for example, by the international identification
`
`
`
`
`
`
`
`
`
`
`
`
`
`number IMSI which is contained in the identification module (compare standards relating to
`
`
`
`
`
`
`
`
`
`
`
`
`the GSM radiotelephony systems). Thus, the identification module is automatically linked to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the device without the intervention of the user, more particularly without the fact that a
`
`
`25
`
`
`
`
`
`
`
`specific code has to be entered.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Advantageously the deblocking code, which is to be supplied to return to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`normal operating mode, is formed by the pin code (Personal Identity Number) which is
`
`
`
`
`
`
`
`
`
`
`
`contained in the identification module (compare standards relating to the GSM
`
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`radiotelephony systems). Thus the user need not store an additional code to ensure the
`
`
`
`
`
`protection of his device.
`
`Page 8 of 175
`
`Page 8 of 175
`
`Page 8 of 175
`
`Page 8 of 175
`
`
`
`
`
`PHF 99.624
`
`3
`
`
`
`01.12.2000
`
`
`
`
`
`
`
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`These and other aspects of the invention are apparent from and will be
`
`
`
`
`
`
`
`
`
`
`
`
`elucidated, by way of non-limitative example, with reference to the embodiment(s) described
`
`
`
`hereinafter.
`
`
`
`-
`
`5
`
`
`
`
`
`In the drawings:
`
`
`
`
`
`
`
`
`
`
`
`Fig. 1 represents a device in accordance with the invention,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Fig. 2 represents an overall electric diagram of the device of Fig. 1, and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Fig. 3 represents a flow chart explaining the operation of the device of Fig. 1.
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`
`
`In Fig. l is represented an electronic device in accordance with the invention.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In the example described here this device is a portable radiotelephone of the type used in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cellular systems. It notably comprises a microphone 5, a loudspeaker 6, a screen 8, a keypad
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`9 and an antenna 1 1. The device 1 also comprises a housing 12 intended for accommodating
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a user identification module 13. In the example of embodiment described here, this
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module 13 is a portable card of an integrated circuit in which information is
`
`
`
`
`
`
`
`
`
`
`
`
`stored, notably an international identification number currently called IMSI number, and a
`
`
`
`
`
`
`
`Personal Identification Number currently called PIN code.
`
`
`
`
`
`
`
`
`
`1 electrical diagram of this device. The operation of the
`icroprocessor assembly 20 which comprises a
`
`
`
`
`
`
`
`
`
`Fig. 2 shows the ove
`device is, in essence, controlled by a
`
`
`
`
`
`
`
`
`
`
`20
`
`
`
`i»
`
`i‘
`
`
`
`
`
`
`
`
`
`
`
`
`
`microprocessor 22 to which are assoc ted a random access memory 24 and aread-only
`
`
`
`5’3,de-
`”a
`
`I
`
`25
`
`
`memOry 26. This assembly is connecte to a man-machine interface 30 via a common line
`
`
`
`
`
`
`
`
`
`
`
`
`32. This man-machine interface 32 con
`15 the screen 8 and the keypad 9. The common line
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`32 also connects the microprocessor asse bly 20 to a transceiver assembly 35 via an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`interface circuit 38. The transceiver assem ly is connected to the antenna 11. Finally, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`common line 32 also connects the micropro essor assembly 20 to a card reader 39.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In Fig. 3 is represented a function flow chart of a device in accordance with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the invention. This flow chart starts at box K1. In box K1 the device is in a state of
`
`
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`availability, that is to say that the user has access to all the functions of the device. The user
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`has the choice of either or not locking his device. This locking (L)/unlocking (UL) is done by
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`accessing a configuration menu of the device. When the user locks his device (box K2), the
`
`
`
`identification module that is inside the device is automatically linked to the device. For this
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`purpose, the device starts reading a data D1 in the identification module (for example, the
`
`
`
`Page 9 of 175
`
`Page 9 of 175
`
`Page 9 of 175
`
`Page 9 of 175
`
`
`
`PHF 99.624
`
`
`
`
`4
`
`
`
`01.12.2000
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`international identification number IMSI) and he stores it in the random-access memory 24.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Once locked, the device remains in the state of availability indicated in box K1. When the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device is in the state of availability, one looks whether it is locked (box K3). If it is not
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`locked (arrow N3), the device remains in the state of availability indicated in box K1. If it is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`locked (arrow Y3), one looks whether the identification module which is placed inside the
`
`
`
`
`
`
`
`
`
`
`
`
`
`device is the one that is linked to the device (box K4).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`If the identification module, which is placed inside the device, is not the one
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`that is linked to the device (arrow N4), the device goes to a first blocking state indicated in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`box K5. In this first blocking state, the device is disconnected from the network. Thus it can
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`no longer receive an incoming call nor transmit an outgoing call (possibly with the exception
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`of emergency numbers). In the blocking state K5, the screen shows a message inviting the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`user to insert the proper module into the device. And when the user inserts a new module,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`one looks whether this new identification module is the one that is connected to the device
`(box K7). If this is the case (arrow Y7), the device is reconnected to the network in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`accordance with the normal procedure (box K8) and then the device returns to the state of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`availability indicated in box K1. If not (arrow N7), the operation is resumed in box K5. The
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`only way of leaving this first blocking state is thus to place the identification module that is
`
`
`
`
`
`
`
`linked to the device inside the device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`If the identification module that is placed inside the device is linked to the
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device (arrow Y4), one looks whether the device has remained in the state of availability for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a certain period of time T of the order of several minutes, for example (box K10). If this is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`not the case (arrow N10), the device remains in the state of availability indicated in box K1.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`If this is the case (arrow Y10), the device passes on to a second blocking state indicated in
`box K11 by passing through an initialization step K12 which permits to initialize a variable A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`which represents the number of attempts made at supplying a deblocking code (for example,
`
`
`
`
`
`
`
`
`the Personal Identification Number) PIN.
`
`
`
`
`
`
`
`
`
`
`
`
`In this second blocking state the device only processes incoming calls (box
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`K13) and, possibly, the outgoing calls that correspond to emergency numbers (box K14).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Once these calls have been processed, the device goes back to the second blocking state
`
`
`
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`indicated in box K11. In the second blocking state K11 a message inviting the user to supply
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a deblocking code is displayed on the screen. If the code taken by the user is recognized
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(arrow Y] 1), the device goes back to the state of availability indicated in box Kl. If it is not
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`recognized (arrow N11), the value of the variable A is tested (box K15). If this value is lower
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`than a certain figure (for example 3), the value of A is augmented by unity (box K16) and a
`
`Page 10 of 175
`
`Page 10 of 175
`
`Page 10 of 175
`
`Page 10 of 175
`
`
`
`
`PHF 99.624
`
`
`
`5
`
`
`
`01.12.2000
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`message is displayed on the screen to indicate the user that the code is not valid (box K17).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Then the device goes back to the second blocking state indicated in box K11. If the variable
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`A is higher than or equal to said figure, the test of box K15 causes the total blocking of the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device indicated in box K30. To leave this third blocking state it is necessary to contact the
`
`
`
`-
`
`5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`organization that provides the identification module. One is then again in the state of
`
`
`
`
`availability Kl.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In another embodiment of the invention, when the user locks the telephone,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the device asks for the user's name. The name given by the user is stored in the random
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`access memory 24 of the device. When the identification module that is inside the device is
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`not the one that is linked to the device, the device displays the name of the user before asking
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`him to insert his identification module as indicated in box K5. The device also displays the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`name of the user before asking him to supply his personal code as indicated in box K1 1.
`
`
`
`
`
`
`
`
`
`
`
`The embodiment that has just been described is particularly effective, because
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`it provides two separate blocking modes depending on whether the identification module that
`
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is placed inside the device is either or not linked to the device. The first blocking mode is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`applied in the case where the device has been lost or stolen. The object is then to prevent the
`
`
`
`
`
`
`
`
`
`
`
`
`device being usable with another identification module. It thus advantageously blocks the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`incoming and outgoing calls at the same time. The second blocking mode is applied in the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`case where the identification module that is linked to the device is in its place inside the
`
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device and the device is in a state of availability. The object is to prevent a third party being
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`able to send outgoing calls with this device if it is lost, stolen or left without attendance for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`some time. In that case, it is desirable for the user to be able to continue to directly receive
`
`
`
`
`
`his incoming calls.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In another embodiment the same blocking means are used as the identification
`
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`module which is placed inside the device either or not linked to the device, for example, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second blocking means. In that case it is possible for receiving incoming calls intended for
`
`
`
`
`
`
`
`
`
`
`
`
`
`the identification module that is inside the device, even when this identification module
`
`
`
`
`
`
`
`
`
`
`
`
`
`placed inside the device is not linked to the device.
`
`Page 11 of 175
`
`Page 11 of 175
`
`Page 11 of 175
`
`Page 11 of 175
`
`
`
`
`
`PHF 99.624
`
`
`:
`
`CLAIMS:
`
`
`
`6
`
`
`
`01.12.2000
`
`
`
`~
`
`
`
`1.
`
`
`
`
`
`
`
`
`
`A mobile radiotelephony device intended for accommodating a user
`
`
`
`
`
`5
`
`
`
`
`
`
`identification module, said device comprising:
`
`- connecting means for establishing\a link between the device and the identification module
`
`
`
`
`
`
`
`
`
`
`‘..
`
`
`
`
`
`mounted inside the device,
`
`.
`i\\
`
`
`
`
`
`
`
`
`
`
`— blocking means for preventing the normal operation of the device,
`
`test means for activating the blocking ineans when the identification module mounted
`—-
`
`
`
`
`
`
`
`
`
`
`
`
`inside the device is not the one that is liipmd to the device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`characterized in that it comprises:
`
`
`
`
`
`
`
`
`
`
`— timing means for activating the blocking
`
`
`
`
`
`
`
`
`
`
`
`eans after the device has been inactive for a
`
`
`
`
`
`10‘
`defined period of time,
`
`
`
`
`
`
`
`
`
`
`
`
`
`l:
`, r "
`. — and deblocking means for permitting normal peration of the device when the
`
`0': 1 u
`identification module placed inside the device '3 the one that is linked to the device and
`
`
`
`
`
`
`
`
`
`
`
`
`
`‘ V when a deblocking code is supplied by the user.\
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`A device as claimed in claim 1, charac rized in that said blocking means
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`15
`
`
`2.
`
`
`
`rrrrr
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ission and reception of calls when the
`comprise first blocking means for preventing the trans
`identification module placed inside the device is not the ne that is linked to the device, and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second blocking means for preventing the sending of call. after a defined period of time
`
`
`
`during which the device has been inactive, with the excep 'on of one or various emergency
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`20
`
`
`
`numbers.
`
`
`
`
`
`
`3.
`
`
`
`
`
`
`
`
`A device as claimed in claim 1, characterized i
`
`
`
`that it comprises
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`locking/unlocking means for locking/unlocking the device, w 16 said blocking means can
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`only be activated when the device is locked, and said link is est blished while the device is
`
`
`
`
`25
`
`
`being locked.
`
`
`
`
`
`
`4.
`
`
`
`
`
`
`
`
`
`
`
`
`
`A device as claimed in claim 1, characterized in that said connecting means
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`comprise means for reading and storing a data stored in the identific tion module, and in that
`
`
`
`
`Page 12 of 175
`
`Page 12 of 175
`
`Page 12 of 175
`
`Page 12 of 175
`
`
`
`
`
`PHF 99.624
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`said test means compare this data thus stored with the data stored in the identification module
`
`7
`
`
`
`
`01.12.2000
`
`
`
`
`
`
`that is placed inside the device.
`
`
`
`i
`
`
`
`
`5.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`A device as claimed in claim 3, characterized in that said data is formed by the
`
`
`
`
`
`
`6.
`
`
`
`
`
`A device as claimed in
`
`
`
`
`
`
`
`
`
`aim 1, characterized in that said deblocking code is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`— blocking the normal operation of the
`
`
`
`
`
`
`
`
`
`
`vice when the identification module placed inside
`
`
`
`
`
`
`
`
`
`
`
`the device is not the one that is linked o the device,
`
`
`
`
`
`
`
`
`
`
`
`characterized in that it comprises the follo ing steps:
`
`
`
`
`
`
`
`
`
`— detection of a period of inactivity of the device,
`
`
`
`
`20
`
`25
`
`
`detected,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`— blocking of the normal operation of the device when said period of inactivity has been
`i
`
`
`
`2
`
`— deblocking which permits the normal ope‘iiation ofthe device when the identification
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`module placed inside the device is the one\that is linked to the device and when a
`
`
`
`
`
`
`
`
`deblocking code has been supplied by the user.
`
`
`
`
`
`
`
`
`8.
`
`
`
`
`
`
`
`A method as claimed in claim 6
`
`
`
`
`protecting a mobile radiotelephony device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`characterized in that it comprises a step of lockin the device, while the blocking steps can
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`only be executed when the device is locked, and t 6 step of establishing a link between the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device and the identification module placed inside the device is executed when the device is
`
`30
`
`
`locked.
`
`
`
`
`
`
`9.
`
`
`
`
`
`
`
`
`
`
`
`
`
`A method as claimed in claim 6 of pr tecting a mobile radiotelephony device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`characterized in that the step of establishing a link be ween the device and the identification
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`module placed inside the device comprises a step of r ading and storing a data stored in said
`
`Page 13 of 175
`
`Page 13 of 175
`
`
`
`
`
`
`
`
`
`international identification number stoked in the user identification module.
`
`
`
`
`
`
`
`
`
`her stored in the identification module.
`
`
`
`
`
`
`formed by the personal identification 11'
`
`: i
`
`
`
`
`10 1/ .
`A method ofprotecting aimobile radiotelephony device intended for
`
`
`
`
`
`
`
`
`
`
`accommodating a user identification mo‘dule, said method comprising the following steps:
`
`
`
`
`
`
`
`
`
`
`— setting up a link between the device and the identification module placed inside the
`ifiif‘;
`Q
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`131%)”0
`device,
`3
`
`
`
`
`
`
`— testing to verify whether the identification module placed inside the device is the one that
`7
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is linked to the device,
`15
`l
`
`
`
`
`
`
`
`
`
`
`
`5
`
`
`
`
`
`
`
`
`
`Page 13 of 175
`
`Page 13 of 175
`
`
`
`
`PHF 99.624
`
`
`
`8
`01.12.2000
`\.
`
`identification module, and in that the test step comprises comparing the data thus stored with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`’\
`
`
`
`
`
`
`
`
`
`
`
`
`
`the data stored in the identification module that is placed inside the device.
`
`
`
`
`
`10.
`
`
`
`.
`.
`o
`.
`.
`
`
`
`
`
`
`
`