throbber

`
`
`
`
`(12) United States Patent
`
`
`US 6,836,654 B2
`(10) Patent N0.:
`
`
`
`
`
`
`
`
`
`
`
`(45) Date of Patent:
`Dec. 28, 2004
`Decotignie
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U3006836654B2
`
`
`
`
`
`
`
`
`
`
`4/1993 Lee ....................... 340/82534
`5,204,663 A *
`
`
`
`
`
`
`1/1999 Barvesten ............... 455/565
`5,864,765 A *
`
`
`
`
`
`
`
`
`5/1999 Schroderus et al.
`..... 455/411
`5,907,804 A *
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`6(1999 Pinau!‘ ~~~~~~~~~~~~~~~~~~~ 455/558
`59137175 A *
`5,978,670 A * 11/1999 Casolietal.
`..... 455/411
`
`
`
`
`
`
`
`
`
`
`6,095,416 A *
`8/2000 Grant et al.
`............. 235/449
`
`
`
`
`
`
`
`
`
`
`..... 455/432
`6,119,000 A *
`9/2000 Stephenson etal.
`
`
`
`
`
`
`
`
`
`6,125,283 A *
`9/2000 Kolev etal. ............. 455/552
`
`
`
`
`
`
`
`
`
`
`6,141,563 A * 10/2000 Miller et al.
`................ 455/558
`
`
`
`
`
`
`
`
`
`6,339,643 B1 *
`”2002 Mastrocola et a].
`379/433.06
`
`
`
`
`
`
`
`
`
`
`6,370,400 B1 *
`4/2002 Dccotignic ct al.
`......... 455/565
`
`
`
`
`
`
`
`
`6,398,115 B2 *
`6/2002 Krause ................... 235/492
`
`
`
`
`
`
`
`
`6,490,463 B1 * 12/2002 Portalier et a1.
`.. 455/557
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`6,542,731 B1 *
`4/2003 Alos ................... 455/411
`6,583,714 B1 *
`6/2003 Gabou et al.
`340/554
`
`
`
`
`
`
`
`
`
`FOREIGN PATENT DOCUMENTS
`
`
`2287855 A
`9/1995
`
`
`
`GB
`
`
`
`
`* cited by examiner
`
`
`
`
`Primary Examiner—William Trost
`
`
`
`Assistant Examiner—Meless Zewdu
`
`
`
`(74) Attorney, Agent, or Firmilack D. Slobod
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(54) ANTI-THEFT PROTECTION FORA
`
`
`
`RADIOTELEPHONY DEVICE
`
`
`
`
`
`(75)
`
`
`
`
`
`
`
`Inventor: Philippe Decotignie, Le Mans (FR)
`
`
`
`.
`..
`.
`.
`.
`.
`.
`
`
`
`
`
`
`(73) Asmgnee‘ EOELHMIJkENIEHhPS Eleammcs N'V"
`
`
`)
`1“ 0V6“
`.
`.
`.
`.
`.
`
`
`
`
`
`
`
`
`
`( *) Notice:
`Subjectto any disclaimer, the term of this
`
`
`
`
`
`
`Paténf 15 extended or aOlJuSIed under 35
`U~5-C~ 154(b) by 509 daYS-
`
`
`
`
`
`
`
`
`(21) APPI-N0~109/739 507
`
`
`
`’
`Dec. 18, 2000
`
`
`
`(22) Filed:
`
`
`
`
`
`
`
`
`(65)
`
`
`
`Prior Publication Data
`
`
`US 2001/0016484 A1 Aug. 23, 2001
`
`
`
`
`
`
`
`
`
`
`Foreign Application Priority Data
`(30)
`
`
`
`
`
`Dec. 21, 1999
`(FR)
`............................................ 99 16136
`
`
`
`
`
`
`
`
`
`
`
`(51)
`
`Int. Cl.7 .......................... H04M 1/00; H04M 3/00;
`
`
`
`
`
`
`
`H04M 1/66; H04B 1/06; H04B 1/38; H04Q 7/20
`
`
`
`
`
`
`
`
`....................... 455/410; 455/411; 455/418;
`(52) US. Cl.
`
`
`
`
`
`
`
`455/425; 455/550.1; 455/558; 455/565
`
`
`
`
`(58) Field of Search ................................. 455/410, 411,
`
`
`
`
`
`
`
`455/4121, 412.2, 418—419, 425, 550.1,
`
`
`
`
`
`558, 26.1, 404.1, 557, 565—567; 380/264,
`
`
`
`
`
`
`268, 273; 713/158, 502, 600, 601; 705/65,
`
`
`
`
`
`
`
`66, 67
`
`
`
`(56)
`
`
`
`References Cited
`
`
`U.S. PATENT DOCUMENTS
`
`
`
`4,908,848 A *
`3/1990 Hanawa ...................... 455/565
`
`
`
`
`
`
`4,945,556 A *
`7/1990 Namekawa
`.. 455/565
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`13
`
`
`
`(57)
`
`
`
`ABSTRACT
`
`
`
`A mobile radiotelephony device intended for accommodat-
`
`
`
`
`
`
`ing a linked user identification module offers protection
`
`
`
`
`
`
`
`
`against theft. The device prevents a normal operation of the
`
`
`
`
`
`
`
`
`
`
`device With an unlinked identification module, and permits
`
`
`
`
`
`
`
`
`the normal operation of the device with the linked identifi-
`
`
`
`
`
`
`
`
`
`cation module until such time the device has been inactive
`
`
`
`
`
`
`
`
`
`
`for a defined period of time. A debugging code can be
`
`
`
`
`
`
`
`
`
`
`
`supplied to the device subsequent
`to a detection of the
`
`
`
`
`
`
`
`
`
`
`defined period of time to again permit the normal operation
`
`
`
`
`
`
`
`
`
`
`of the device with linked identification module.
`
`
`
`
`
`
`
`
`20 Claims, 2 Drawing Sheets
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`MICROSOFT CORP.
`
`EXHIBIT 1001
`
`
`
`Page 1 of 6
`
`SAMSUNG EXHIBIT 1001
`
`Page 1 of 6
`
`Page 1 of 6
`
`Page 1 of 6
`
`SAMSUNG EXHIBIT 1001
`
`

`

`
`US Patent
`
`
`
`
`
`Dec. 28, 2004
`
`
`
`
`Sheet 1 0f 2
`
`
`
`
`US 6,836,654 B2
`
`
`
`
`
` FIG. 1
`
`
`
`
`
`13
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 2 of 6
`
`Page 2 of 6
`
`Page 2 of 6
`
`Page 2 of 6
`
`

`

`
`US. Patent
`
`
`
`
`
`Dec. 28, 2004
`
`
`
`
`
`
`Sheet 2 0f 2
`
`
`
`US 6,836,654 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 6
`
`Page 3 of 6
`
`Page 3 of 6
`
`Page 3 of 6
`
`

`

`
`
`US 6,836,654 B2
`
`
`
`1
`
`ANTI-THEFT PROTECTION FOR A
`
`
`RADIOTELEPHONY DEVICE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`2
`
`stored in the identification module, and the test means
`
`
`
`
`
`
`
`
`
`compare the thus stored data with the data stored in the
`
`
`
`
`
`
`
`
`
`
`
`identification module which is places inside the device. The
`
`
`
`
`
`
`
`
`
`data stored is formed, for example, by the international
`
`
`
`
`
`
`
`
`
`identification number IMSI which is contained in the iden-
`
`
`
`
`
`
`
`
`tification module (compare standards relating to the GSM
`
`
`
`
`
`
`
`
`
`radiotelephony systems). Thus, the identification module is
`
`
`
`
`
`
`
`automatically linked to the device without the intervention
`
`
`
`
`
`
`
`
`of the user, more particularly without the fact that a specific
`
`
`
`
`
`
`
`
`
`
`
`code has to be entered.
`
`
`
`
`
`Advantageously the deblocking code, which is to be
`
`
`
`
`
`
`
`
`supplied to return to the normal operating mode, is formed
`
`
`
`
`
`
`
`
`
`
`by the pin code (Personal Identity Number) which is con-
`
`
`
`
`
`
`
`
`
`tained in the identification module (compare standards relat-
`
`
`
`
`
`
`
`ing to the GSM radiotelephony systems). Thus the user need
`
`
`
`
`
`
`
`
`
`
`not store an additional code to ensure the protection of his
`
`
`
`
`
`
`
`
`
`
`
`device.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`
`
`
`
`These and other aspects of the invention are apparent
`
`
`
`
`
`
`
`
`from and will be elucidated, by way of non-limitative
`
`
`
`
`
`
`
`
`example, with reference to the embodiment(s) described
`
`
`
`
`
`
`hereinafter.
`
`In the drawings:
`
`
`
`FIG. 1 represents a device in accordance with the
`
`
`
`
`
`
`
`
`invention,
`
`FIG. 2 represents an overall electric diagram of the device
`
`
`
`
`
`
`
`
`
`of FIG. 1, and
`
`
`
`
`FIG. 3 represents a flow chart explaining the operation of
`
`
`
`
`
`
`
`
`the device of FIG. 1.
`
`
`
`
`
`DESCRIPTION OF A PREFERRED
`
`
`
`
`EMBODIMENT OF THE INVENTION
`
`
`
`
`In FIG. 1 is represented an electronic device in accor-
`
`
`
`
`
`
`
`
`
`dance with the invention. In the example described here this
`
`
`
`
`
`
`
`
`
`
`device is a portable radiotelephone of the type used in
`
`
`
`
`
`
`
`
`
`
`cellular systems. It notably comprises a microphone 5, a
`
`
`
`
`
`
`
`
`
`loudspeaker 6, a screen 8, akeypad 9 and an antenna 11. The
`
`
`
`
`
`
`
`
`
`
`
`
`
`device 1 also comprises a housing 12 intended for accom-
`
`
`
`
`
`
`
`
`
`modating a user identification module 13. In the example of
`
`
`
`
`
`
`
`
`
`embodiment described here, this identification module 13 is
`
`
`
`
`
`
`
`
`a portable card of an integrated circuit in which information
`
`
`
`
`
`
`
`
`
`
`is stored, notably an international
`identification number
`
`
`
`
`
`
`
`currently called IMSI number, and a Personal Identification
`
`
`
`
`
`
`
`
`Number currently called PIN code.
`
`
`
`
`
`FIG. 2 shows the overall electrical diagram of this device
`
`
`
`
`
`
`
`
`
`1. The operation of the device 1 is, in essence, controlled by
`
`
`
`
`
`
`
`
`
`
`
`a microprocessor assembly 20 which comprises a micropro-
`
`
`
`
`
`
`cessor (“;1P”) 22 to which are associated a random access
`
`
`
`
`
`
`
`
`
`
`memory (“RAM”) 24 and a read—only memory (“ROM”) 26.
`
`
`
`
`
`
`
`
`This assembly is connected to a man-machine interface 30
`
`
`
`
`
`
`
`
`
`Via a common line 32. This man-machine interface 32
`
`
`
`
`
`
`
`
`
`controls the screen 8 and the keypad 9. The common line 32
`
`
`
`
`
`
`
`
`
`
`
`
`also connects the microprocessor assembly 20 to a trans—
`
`
`
`
`
`
`
`
`ceiver assembly (“TX”) 35 via an interface circuit 38. The
`
`
`
`
`
`
`
`
`
`
`transceiver assembly 35 is connected to the antenna 11.
`
`
`
`
`
`
`
`
`
`Finally, the common line 32 also connects the microproces-
`
`
`
`
`
`
`
`
`sor assembly 20 to a card reader 39.
`
`
`
`
`
`
`
`
`In FIG. 3 is represented a ftmction flow chart of a device
`
`
`
`
`
`
`
`
`
`
`
`in accordance with the invention. This flow chart starts at
`
`
`
`
`
`
`
`
`
`
`box K1. In box K1 the device is in a state of availability, that
`
`
`
`
`
`
`
`
`
`
`
`
`
`is to say that the user has access to all the functions of the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device. The user has the choice of either or not locking his
`
`
`
`
`
`
`
`
`
`
`
`
`device. This locking (L)/unlocking (UL) is done by access—
`
`
`
`
`
`
`
`
`ing a configuration menu of the device. When the user locks
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`
`15
`
`
`
`20
`
`
`
`
`
`30
`
`
`
`35
`
`
`
`40
`
`
`
`45
`
`
`
`
`
`
`
`60
`
`
`
`65
`
`
`FIELD OF THE INVENTION
`
`
`
`
`The invention relates to a mobile radiotelephony device
`
`
`
`
`
`
`
`
`intended for accommodating a user identification module,
`
`
`
`
`
`
`
`where the device has an established link to an identification
`
`
`
`
`
`
`
`
`
`
`module to thereby prevent a normal operation of the device
`
`
`
`
`
`
`
`
`
`
`when an identification module other than the linked identi-
`
`
`
`
`
`
`
`
`fication module is mounted inside the device.
`
`
`
`
`
`
`
`The invention also relates to a method of protecting such
`
`
`
`
`
`
`
`
`
`a device, and a computer program for implementing such a
`
`
`
`
`
`
`
`
`
`method.
`
`The invention notably has applications in the field of
`
`
`
`
`
`
`
`
`
`portable radiotelephony. Portable radiotelephony devices
`
`
`
`
`
`are intended to accompany their users when they move
`
`
`
`
`
`
`
`
`
`around. It happens that these devices are lost or stolen.
`
`
`
`
`
`
`
`
`
`
`PRIOR ART OF THE INVENTION
`
`
`
`
`
`US. Pat. No. 5,913,175, published Jun. 15, 1999
`
`
`
`
`
`
`
`
`describes a method of protecting a radiotelephone which
`
`
`
`
`
`
`
`
`permits to avoid that the lost or stolen telephone can be used
`
`
`
`
`
`
`
`
`
`
`
`
`by a third party with another user identification module. This
`
`
`
`
`
`
`
`
`
`method comprises establishing a link between the device
`
`
`
`
`
`
`
`
`and a specific user identification module and blocking the
`
`
`
`
`
`
`
`
`
`normal operation of the device when the user identification
`
`
`
`
`
`
`
`
`
`module that is placed inside the device is not the one that is
`
`
`
`
`
`
`
`
`
`
`
`
`
`linked to the device.
`
`
`
`
`When the device is lost or stolen with the identification
`
`
`
`
`
`
`
`
`
`
`module to which it is linked, the user is to warn the operator
`
`
`
`
`
`
`
`
`
`
`
`
`
`so that the use of his identification module is blocked at
`
`
`
`
`
`
`
`
`
`
`
`network level.
`
`
`This means that the device can be freely used until the
`
`
`
`
`
`
`
`
`
`
`identification module to which it is linked is blocked via the
`
`
`
`
`
`
`
`
`
`
`network. This may take a certain period of time.
`
`
`
`
`
`
`
`
`SUMMARY OF THE INVENTION
`
`
`
`
`It is notably an object of the invention to resolve this
`
`
`
`
`
`
`
`
`
`
`
`problem. For this purpose, a device in accordance with the
`
`
`
`
`
`
`
`
`
`
`invention (1) verifies a user identification module mounted
`
`
`
`
`
`
`
`
`inside the mobile radiotelephony device is linked to the
`
`
`
`
`
`
`
`
`
`mobile radiotelephony device, (2) detects a period of inac-
`
`
`
`
`
`
`
`
`tivity of the mobile radiotelephony device during a normal
`
`
`
`
`
`
`
`
`
`operation of the mobile radiotelepony device, wherein the
`
`
`
`
`
`
`
`
`normal operation includes a processing of all outgoing calls,
`
`
`
`
`
`
`
`
`and (3) prevents the normal operation of the mobile radio-
`
`
`
`
`
`
`
`
`
`telephony device in response to the verification of the user
`
`
`
`
`
`
`
`
`
`
`identification module and in response to the detection of the
`
`
`
`
`
`
`
`
`
`
`period of inactivity of the mobile radiotelephony device.
`
`
`
`
`
`
`
`
`Thus, when the device falls into the hands of a third party
`
`
`
`
`
`
`
`
`
`
`together with the identification module to which it is linked,
`
`
`
`
`
`
`
`
`
`it has most probably been inactive for a period of time that
`
`
`
`
`
`
`
`
`
`
`
`is sufficiently long for its normal operation to be blocked
`
`
`
`
`
`
`
`
`
`(advantageously, the inactive time after which the blocking
`
`
`
`
`
`
`
`means are activated is of the order of several minutes). The
`
`
`
`
`
`
`
`
`
`
`device cannot thus be used without the deblocking code
`
`
`
`
`
`
`
`
`being supplied.
`
`
`Thanks to the invention the lost or stolen device becomes
`
`
`
`
`
`
`
`
`
`totally unusable. A fraudulent person cannot send commu-
`
`
`
`
`
`
`
`nications at the cost of the owner of the device. But neither
`
`
`
`
`
`
`
`
`
`
`
`
`can he use the device with another identification module.
`
`
`
`
`
`
`
`
`
`The theft of the device becomes totally useless. The inven-
`
`
`
`
`
`
`
`
`
`tion thus forms a protection against theft.
`
`
`
`
`
`
`
`the connecting
`In a particularly simple embodiment,
`
`
`
`
`
`
`means comprise reading means and storage means of a data
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 4 of 6
`
`Page 4 of 6
`
`Page 4 of 6
`
`Page 4 of 6
`
`

`

`
`
`US 6,836,654 B2
`
`
`
`
`
`
`
`
`
`3
`
`his device (box K2), the identification module that is inside
`
`
`
`
`
`
`
`
`
`the device is automatically linked to the device. For this
`
`
`
`
`
`
`
`
`
`purpose, the device starts reading a data D1 in the identifi—
`
`
`
`
`
`
`
`
`
`
`cation module (for example, the international identification
`
`
`
`
`
`
`number IMSI) and he stores it in the random-access memory
`
`
`
`
`
`
`
`
`
`24. Once locked, the device remains in the state of avail-
`
`
`
`
`
`
`
`
`
`
`ability indicated in box K1. When the device is in the state
`
`
`
`
`
`
`
`
`
`
`
`
`of availability, one looks whether it is locked (box K3). If it
`
`
`
`
`
`
`
`
`
`
`
`is not locked (arrow N3), the device remains in the state of
`
`
`
`
`
`
`
`
`
`
`
`
`availability indicated in box K1. If it is locked (arrow Y3),
`
`
`
`
`
`
`
`
`
`
`one looks whether the identification module which is placed
`
`
`
`
`
`
`
`
`
`inside the device is the one that is linked to the device (box
`
`
`
`
`
`
`
`
`
`
`
`
`
`K4).
`
`If the identification module, which is placed inside the
`
`
`
`
`
`
`
`
`
`device, is not the one that is linked to the device (arrow N4),
`
`
`
`
`
`
`
`
`
`
`
`
`
`the device goes to a first blocking state indicated in box K5.
`
`
`
`
`
`
`
`
`
`
`
`
`In this first blocking state, the device is disconnected from
`
`
`
`
`
`
`
`
`
`
`the network. Thus it can no longer receive an incoming call
`
`
`
`
`
`
`
`
`
`
`
`nor transmit an outgoing call (possibly with the exception of
`
`
`
`
`
`
`
`
`
`
`emergency numbers). In the blocking state K5, the screen
`
`
`
`
`
`
`
`
`
`shows a message inviting the user to insert
`the proper
`
`
`
`
`
`
`
`
`
`
`module into the device. And when the user inserts a new
`
`
`
`
`
`
`
`
`
`
`
`module, one looks whether this new identification module is
`
`
`
`
`
`
`
`
`
`the one that is connected to the device (box K7). If this is the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`case (arrow Y7), the device is reconnected to the network in
`
`
`
`
`
`
`
`
`
`
`
`accordance with the normal procedure (box K8) and then the
`
`
`
`
`
`
`
`
`
`
`device returns to the state of availability indicated in box K1.
`
`
`
`
`
`
`
`
`
`
`
`If not (arrow N7), the operation is resumed in box K5. The
`
`
`
`
`
`
`
`
`
`
`
`
`only way of leaving this first blocking state is thus to place
`
`
`
`
`
`
`
`
`
`
`
`
`the identification module that is linked to the device inside
`
`
`
`
`
`
`
`
`
`
`the device.
`
`
`If the identification module that is placed inside the device
`
`
`
`
`
`
`
`
`
`
`is linked to the device (arrow Y4), one looks whether the
`
`
`
`
`
`
`
`
`
`
`
`
`
`device has remained in the state of availability for a certain
`
`
`
`
`
`
`
`
`
`
`
`period of time T of the order of several minutes, for example
`
`
`
`
`
`
`
`
`
`
`
`
`(box K10). If this is not the case (arrow N10), the device
`
`
`
`
`
`
`
`
`
`
`
`
`remains in the state of availability indicated in box K1. If
`
`
`
`
`
`
`
`
`
`
`
`this is the case (arrow Y10), the device passes on to a second
`
`
`
`
`
`
`
`
`
`
`
`
`
`blocking state indicated in box K11 by passing through an
`
`
`
`
`
`
`
`
`
`
`initialization step K12 which permits to initialize a variable
`
`
`
`
`
`
`
`
`
`Awhich represents the number of attempts made at supply-
`
`
`
`
`
`
`
`
`
`ing a deblocking code (for example, the Personal Identifi-
`
`
`
`
`
`
`
`
`cation Number) PIN.
`
`
`
`In this second blocking state the device only processes
`
`
`
`
`
`
`
`
`
`incoming calls (box K13) and, possibly, the outgoing calls
`
`
`
`
`
`
`
`
`
`that correspond to emergency numbers (box K14). Once
`
`
`
`
`
`
`
`
`these calls have been processed, the device goes back to the
`
`
`
`
`
`
`
`
`
`
`
`second blocking state indicated in box K11. In the second
`
`
`
`
`
`
`
`
`
`
`blocking state K11 a message inviting the user to supply a
`
`
`
`
`
`
`
`
`
`
`deblocking code is displayed on the screen. If the code taken
`
`
`
`
`
`
`
`
`
`
`
`by the user is recognized (arrow Yll), the device goes back
`
`
`
`
`
`
`
`
`
`
`
`to the state of availability indicated in box K1. If it is not
`
`
`
`
`
`
`
`
`
`
`
`
`recognized (arrow N11), the value of the variable A is tested
`
`
`
`
`
`
`
`
`
`
`
`(box K15). If this value is lower than a certain figure (for
`
`
`
`
`
`
`
`
`
`
`
`
`example 3), the value of A is augmented by unity (box K16)
`
`
`
`
`
`
`
`
`
`
`
`and a message is displayed on the screen to indicate the user
`
`
`
`
`
`
`
`
`
`
`
`
`that the code is not valid (box K17). Then the device goes
`
`
`
`
`
`
`
`
`
`
`
`
`back to the second blocking state indicated in box K11. If the
`
`
`
`
`
`
`
`
`
`
`
`
`variable A is higher than or equal to said figure, the test of
`
`
`
`
`
`
`
`
`
`
`
`
`
`box K15 causes the total blocking of the device indicated in
`
`
`
`
`
`
`
`
`
`
`
`box K30. To leave this third blocking state it is necessary to
`
`
`
`
`
`
`
`
`
`
`
`
`contact
`the organization that provides the identification
`
`
`
`
`
`
`
`module. One is then again in the state of availability K1.
`
`
`
`
`
`
`
`
`
`
`
`In another embodiment of the invention, when the user
`
`
`
`
`
`
`
`
`locks the telephone, the device asks for the user’s name. The
`
`
`
`
`
`
`
`
`
`
`name given by the user is stored in the random access
`
`
`
`
`
`
`
`
`
`
`memory 24 of the device. \Vhen the identification module
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`
`15
`
`
`
`20
`
`
`
`
`
`30
`
`
`
`35
`
`
`
`40
`
`
`
`45
`
`
`
`50
`
`
`
`
`
`60
`
`
`
`65
`
`
`
`
`
`
`
`4
`
`that is inside the device is not the one that is linked to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device,
`the device displays the name of the user before
`
`
`
`
`
`
`
`
`
`
`asking him to insert his identification module as indicated in
`
`
`
`
`
`
`
`
`
`
`box K5. The device also displays the name of the user before
`
`
`
`
`
`
`
`
`
`
`
`
`asking him to supply his personal code as indicated in box
`
`
`
`
`
`
`
`
`
`
`
`K11.
`
`The embodiment that has just been described is particu-
`
`
`
`
`
`
`
`
`larly effective, because it provides two separate blocldng
`
`
`
`
`
`
`
`
`modes depending on whether the identification module that
`
`
`
`
`
`
`
`
`is placed inside the device is either or not linked to the
`
`
`
`
`
`
`
`
`
`
`
`
`device. The first blocking mode is applied in the case where
`
`
`
`
`
`
`
`
`
`
`
`the device has been lost or stolen. The object is then to
`
`
`
`
`
`
`
`
`
`
`
`
`prevent the device being usable with another identification
`
`
`
`
`
`
`
`
`module. It thus advantageously blocks the incoming and
`
`
`
`
`
`
`
`
`outgoing calls at the same time. The second blocking mode
`
`
`
`
`
`
`
`
`
`
`is applied in the case where the identification module that is
`
`
`
`
`
`
`
`
`
`
`
`linked to the device is in its place inside the device and the
`
`
`
`
`
`
`
`
`
`
`
`
`
`device is in a state of availability. The object is to prevent a
`
`
`
`
`
`
`
`
`
`
`
`
`
`third party being able to send outgoing calls with this device
`
`
`
`
`
`
`
`
`
`
`
`if it is lost, stolen or left without attendance for some time.
`
`
`
`
`
`
`
`
`
`
`
`
`In that case, it is desirable for the user to be able to continue
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to directly receive his incoming calls.
`
`
`
`
`
`
`In another embodiment the same blocking means are used
`
`
`
`
`
`
`
`
`
`as the identification module which is placed inside the
`
`
`
`
`
`
`
`
`
`device either or not linked to the device, for example, the
`
`
`
`
`
`
`
`
`
`
`
`second blocking means.
`In that case it
`is possible for
`
`
`
`
`
`
`
`
`
`
`receiving incoming calls intended for the identification
`
`
`
`
`
`
`
`module that is inside the device, even when this identifica-
`
`
`
`
`
`
`
`
`
`tion module placed inside the device is not linked to the
`
`
`
`
`
`
`
`
`
`
`device.
`
`While the embodiments of the invention disclosed herein
`
`
`
`
`
`
`
`
`are presently considered to be preferred, various changes
`
`
`
`
`
`
`
`
`and modifications can be made without departing from the
`
`
`
`
`
`
`
`
`
`spirit and scope of the invention. The scope of the invention
`
`
`
`
`
`
`
`
`
`
`
`is indicated in the appended claims, and all changes that
`
`
`
`
`
`
`
`
`
`
`come within the meaning and range of equivalents are
`
`
`
`
`
`
`
`
`
`intended to be embraced therein.
`
`
`
`
`
`What is claimed is:
`
`
`
`
`1. A mobile radiotelephony device, comprising:
`
`
`
`
`
`
`blocking means for preventing a normal operation of the
`
`
`
`
`
`
`
`
`mobile radiotelephony device, wherein the normal
`
`
`
`
`
`operation includes a processing of outgoing calls;
`
`
`
`
`
`
`
`timing means for activating the blocking means in
`
`
`
`
`
`
`
`
`response to the mobile radiotelephony device being
`
`
`
`
`
`
`
`inactive during the normal operation of the mobile
`
`
`
`
`
`
`
`
`radiotelephony device for a defined period of time
`
`
`
`
`
`
`
`
`subsequent to a mounting of a linked user identification
`
`
`
`
`
`
`
`
`module inside the mobile radiotelephony device; and
`
`
`
`
`
`
`
`deblocking means for permitting the normal operation of
`
`
`
`
`
`
`
`
`the mobile radiotelephony device in response to a
`
`
`
`
`
`
`
`
`supply of a deblocking code to the mobile radiotele—
`
`
`
`
`
`
`
`
`phony device subsequent to the mounting of the linked
`
`
`
`
`
`
`
`
`user identification module inside the mobile radiotele-
`
`
`
`
`
`
`phony device and subsequent to the defined period of
`
`
`
`
`
`
`
`
`time.
`
`2. The mobile radiotelephony device of claim 1, wherein
`
`
`
`
`
`
`
`
`an activation of the blocking means prevents all transmis-
`
`
`
`
`
`
`
`
`sion of outgoing calls.
`
`
`
`
`3. The mobile radiotelephony device of claim 1, wherein
`
`
`
`
`
`
`
`
`an activation of the blocking means prevents all transmis-
`
`
`
`
`
`
`
`
`sions of non-emergency outgoing calls and permits all
`
`
`
`
`
`
`
`transmissions of emergency outgoing calls.
`
`
`
`
`
`4. The mobile radiotelephony device of claim 1, further
`
`
`
`
`
`
`
`
`
`comprising:
`
`locking means for facilitating an activation of the block
`
`
`
`
`
`
`
`
`means by the timing means.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 5 of 6
`
`Page 5 of 6
`
`Page 5 of 6
`
`Page 5 of 6
`
`

`

`
`
`US 6,836,654 B2
`
`
`
`
`
`
`
`
`
`
`5
`
`5. The mobile radiotelephony device of claim 1, further
`
`
`
`
`
`
`
`
`
`comprising:
`
`connecting means for establishing a link between the
`
`
`
`
`
`
`
`mobile radiotelephony device and the linked user iden-
`
`
`
`
`
`
`
`tification module.
`
`
`6. The mobile radiotelephony device of claim 5, further
`
`
`
`
`
`
`
`
`
`comprising:
`
`locking means for facilitating an establishment of the link
`
`
`
`
`
`
`
`
`
`between the mobile radiotelephony device and the
`
`
`
`
`
`
`
`linked user identification module by the connection
`
`
`
`
`
`
`
`means.
`
`7. The mobile radiotelephony device of claim 1, wherein
`
`
`
`
`
`
`
`
`an international identification number stored on the linked
`
`
`
`
`
`
`
`user identification module is stored on the mobile radiote—
`
`
`
`
`
`
`
`
`lephony device as data corresponding to a link between the
`
`
`
`
`
`
`
`
`
`mobile radiotelephony device and the linked user identifi-
`
`
`
`
`
`
`
`cation module.
`
`
`8. The mobile radiotelephony device of claim 1, wherein
`
`
`
`
`
`
`
`
`
`a personal identification number stored on the linked user
`
`
`
`
`
`
`
`
`
`identification module is stored as the deblocking code on the
`
`
`
`
`
`
`
`
`
`
`mobile radiotelephony device.
`
`
`
`9. The mobile radiotelephony device of claim 1, further
`
`
`
`
`
`
`
`
`
`comprising:
`
`tcst means for activating the blocking means when any
`
`
`
`
`
`
`
`
`unlinked user identification module is mounted inside
`
`
`
`
`
`
`the mobile radiotelephony device.
`
`
`
`
`10. A method of protecting a mobile radiotelephony
`
`
`
`
`
`
`
`device, the method comprising:
`
`
`
`
`verfying a user identification module mounted inside the
`
`
`
`
`
`
`
`mobile radiotelephony device is linked to the mobile
`
`
`
`
`
`
`
`radiotelephony device;
`
`
`detecting a period of inactivity of the mobile radiotele-
`
`
`
`
`
`
`
`
`phony device during a normal operation of the mobile
`
`
`
`
`
`
`
`
`
`radiotelephony device, wherein the normal operation
`
`
`
`
`
`
`includes a processing of all outgoing calls;
`
`
`
`
`
`
`
`preventing the normal operation of the mobile radiotele-
`
`
`
`
`
`
`
`phony device in response to the verification of the
`
`
`
`
`
`
`
`
`linked user identification module and in response to the
`
`
`
`
`
`
`
`
`detection of the period of inactivity of the mobile
`
`
`
`
`
`
`
`
`radiotelephony device.
`
`
`11. The method of claim 10, further comprising:
`
`
`
`
`
`
`
`
`permitting the normal operation of the mobile radiotele-
`
`
`
`
`
`
`
`phony device in response to the verification of the
`
`
`
`
`
`
`
`
`
`linked user identification module and in response to a
`
`
`
`
`
`
`
`
`
`supply of a deblocking code to the mobile radiotele-
`
`
`
`
`
`
`
`
`phony device subsequent to the detection of the period
`
`
`
`
`
`
`
`
`of inactivity of the mobile radiotelephony device.
`
`
`
`
`
`
`
`12. The method of claim 10, wherein the prevention of the
`
`
`
`
`
`
`
`
`
`
`normal operation of the mobile radiotelephony device pre-
`
`
`
`
`
`
`
`vents all transmissions of outgoing calls.
`
`
`
`
`
`
`13. The method of claim 10, wherein the prevention of the
`
`
`
`
`
`
`
`
`
`
`normal operation of the mobile radiotelephony device pre-
`
`
`
`
`
`
`
`vents all transmissions of non-emergency outgoing calls and
`
`
`
`
`
`
`
`permits all transmissions of emergency outgoing calls.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`
`15
`
`
`
`20
`
`
`
`
`
`30
`
`
`
`35
`
`
`
`40
`
`
`
`45
`
`
`
`
`Page 6 of 6
`
`
`
`
`
`
`
`
`
`
`
`6
`14. The method claim 10, further comprising:
`
`
`
`
`
`
`
`storing an international identification number stared on
`
`
`
`
`
`
`
`the linked user identification module onto the mobile
`
`
`
`
`
`
`
`
`radiotelephony device as data corresponding to a link
`
`
`
`
`
`
`
`
`between the mobile radiotelephony device and the
`
`
`
`
`
`
`
`linked user identification module.
`
`
`
`
`15. The method claim 11, further comprising:
`
`
`
`
`
`
`
`storing a personal identification number scored on the
`
`
`
`
`
`
`
`linked user identification module onto the mobile
`
`
`
`
`
`
`radiotelephony device as the debugging code.
`
`
`
`
`
`
`16. The method of claim 10, further comprising:
`
`
`
`
`
`
`
`
`preventing the normal operation of the mobile radiotele-
`
`
`
`
`
`
`
`phony device in response to any unlinked user identi-
`
`
`
`
`
`
`
`
`fication module being mounted inside the mobile radio—
`
`
`
`
`
`
`
`telephony device.
`
`
`17. In a mobile radiotelephony device, a computer read-
`
`
`
`
`
`
`
`
`able medium comprising:
`
`
`
`computer readable code for verifying a user identification
`
`
`
`
`
`
`module mounted inside the mobile radiotelephony
`
`
`
`
`
`device is linked to the mobile radiotelephony device;
`
`
`
`
`
`
`
`
`computer readable code for detecting a period of inactiv-
`
`
`
`
`
`
`
`
`ity of the mobile radiotelephony device during a normal
`
`
`
`
`
`
`
`operation of the mobile radiotelephony device, wherein
`
`
`
`
`
`
`
`the normal operation includes a processing of all out-
`
`
`
`
`
`
`
`
`going calls;
`
`
`computer readable code for preventing the normal opera-
`
`
`
`
`
`
`
`tion of the mobile radiotelephony device in response to
`
`
`
`
`
`
`
`
`
`the verification of the linked user identification module
`
`
`
`
`
`
`
`
`and in response to the detection of the period of
`
`
`
`
`
`
`
`
`
`
`inactivity of the mobile radiotelephony device.
`
`
`
`
`
`
`18. The computer readable medium of claim 17, further
`
`
`
`
`
`
`
`
`
`comprising:
`
`computer readable code for permitting the normal opera—
`
`
`
`
`
`
`
`tion of the mobile radiotelephony device in response to
`
`
`
`
`
`
`
`
`
`the verification of the linked user identification module
`
`
`
`
`
`
`
`
`and in response to a supply of a deblocking code to the
`
`
`
`
`
`
`
`
`
`
`
`mobile radiotelephony device subsequent to the detec—
`
`
`
`
`
`
`tion of the period of inactivity of the mobile radiote-
`
`
`
`
`
`
`
`
`
`lephony device.
`
`
`19. The computer readable medium of claim 13, further
`
`
`
`
`
`
`
`
`
`comprising:
`
`storing a personal identification number stored on the
`
`
`
`
`
`
`
`
`linked uscr identification module onto the mobile
`
`
`
`
`
`
`
`radiotelephony device as the deblocking code.
`
`
`
`
`
`
`20. The computer readable medium of claim 17, further
`
`
`
`
`
`
`
`
`
`comprising:
`
`preventing the normal operation of the mobile radiotele-
`
`
`
`
`
`
`
`phony device in response to any unlinked user identi—
`
`
`
`
`
`
`
`
`fication module being mounted inside the mobile radio-
`
`
`
`
`
`
`
`telephony device.
`
`
`*
`
`$
`
`*
`
`*
`
`*
`
`
`
`
`
`
`
`
`
`
`
`Page 6 of 6
`
`Page 6 of 6
`
`Page 6 of 6
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket