throbber
fe
`
`5 j
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`‘| 6836654:
`
`
`HN—
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`if
`
`
`
`F
`09/739507
`
`
`
`
`
`
`
`
`2 -Phi ligeerbecotisanis
`
`
`
`
`
`
`
`
`
`
`
`455
`
`
`
` || APPLICATIONNO.—|CONT/PRIOR [CLASS
`
`_
`i)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`‘
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Grtie thet peobeaction for a radiobelercnorny device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ss(gigSEN | v9|20 Ism./ lesa SS
`
`
`
`
`
`
`
`
`
`
`
`opin,%o.lke|
`
`
`
`
`
`
`
`
`
`
`loll al
`Ya;
`
`
`
`
`
`
`
`ISSUING CLASSIFICATION
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TERMINAL |
`DISCLAIMER
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`¥ lf al f
`
`
`
`
`
`
`
`
`
`
`NOTICEOF ALLOWANCEMAILED
`
`
`
`Of tHJOY :
`
`
`f
`(3 Theterm of this patent
`
`
`
`
`
`
`
`
`subsequent to___ (date) | ;
`
`
`
`
`has been disclaimed.
`
`not extend beyond the expiration date
`
`
`
`
`{]
`
`
`
`
`
`
`
`
`Theterm ofthis patent shall
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`_] The terminal ___monthsof
`
`
`
`
`this patent have been disclaimed.
`
`
`
`
`
`
`
`
`{Legal Instruments Examinar)
`
`
`
`
`i}
`1
`Doe;
`
`
`
`\ (Assistant Exozdner)
`WW. CL
`
`
`
`
`
`Amount Due
`SUPERVISORY PATENT EXAMINER
`
`
`
`
`
`
`
`TECHNOLOGY CENTER 2800 y- 4-04] @ 1530
`
`Primary Examiner)
`(Date)
`
`Possession outside the U.S. Patent & Trademark Office is restricted to authorized employees and contractors only. (ov 0)
`
`
`
`:
`
`\
`
`
`
`
`Date Paid
`
`
`
`l g 04
`]
`
`
`ISSUE BATCH NUMBER
`
`
`
`
`Sin
`
`
`
`
`WARNING:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The information disclosed herein may be restrictad. Unauthorized disclosure may be prohibited by the United States Code Title 35, Sections 122, 181 and 368.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`me
`
`
`
`
`ISSUE FEE IN FILE
`
`-
`
`Page 1 of 175
`
`
`FILED with: [_] DISk (CRF)
`
`
`
`
`
`
`
`
`
`
`
`
`[]FICHE [_] CD-Rom
`
`
`
`
`
`
`
`
`(Attached in pocket on right insideflap)
`ws
`:
`
`
`|
`
`(FACE)
`
`
`
`MICROSOFT CORP.
`
`EXHIBIT 1002
`
`Page | of 175 '
`
`SAMSUNG EXHIBIT 1002
`
`Page 1 of 175
`
`Page 1 of 175
`
`SAMSUNG EXHIBIT 1002
`
`

`

`r 4
`(;
`¥.
`
`|
`
`
`
`ya
`
`:
`NT APPLICATION —
`
`
`
`
`
`
`
`
`
`
`
`
`
`7ee‘tfiam maui
`
`
`
`eis
`“4e914 U.S. PTO
`
`
`
`
`99 /739801
`
`
`
`
`
`
`
`
`
`
`
`——e
`
`FE 2604 |
`
`
`
`
`
`INITIALS
`
`
`
`
`
`Pile LF
`
`CONTENTS
`Date Received
`(incl. C, of M.)
`or
`Date Mailed
`
`
`
`Date Received
`
`
`
`
`
`
`(incl. C. of M.)
`or
`
`Date Mailed
`
`
`
`
`
`
`1. Application
`
`
`papers. Se
`
` :
`
`a!
`11,
`Crust dh TintWO
`12,
`KOE
`S|20lou
`53.
`oly TOA D Slee 64,
`myWMbirWgent
`ie) ki
`plateevi! ARhts)sat
`Pde1dKea ———
`
`7;17._petthon Granteol
`g/l
`58.
`
`
`hil ThyA. SS—————————oe[Ler tidyrcof 2396L/
`
`oYleslot
`44,
`
`
`
`
`
`4
`
`=
`
`18.
`
`59,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`|re 60.
`
`
`
`
`20.
`
`21.
`
`
`
`
`22.
`
`
`61.
`
`62.
`
`
`
`63,
`
`
`
`
`23.
`
`64.
`
`
`
`es
`
`
`
`SS—eee ee 65.
`
`25,
`
`
`66.
`
`
`
`
`
`a ee 67.
`
`
`|i 68,
`
`28.
`
`
`
`69.
`
`
`
`
`
`
`
`
`
`
`
`FseeeSSEE 70.
`
`
`2032——ee ee. 71.
`
`
`
`ee ee 72.
`
`
`
`
`
`32
`
`33
`
`
`
`
`
`34
`
`
`
`35
`
`36
`
`37
`
`38
`
`
`
`
`
`
`
`
`
`33.
`
`
`
`40.
`
`41,
`
`
`
`
`
`
`
`Page 2 of 175
`
`
`73.
`
`74.
`
`75.
`
`76.
`
`77.
`
`78.
`
`79.
`
`80.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`81
`
`
`
`
`:
`82.
`(LEFT OUTSIDE)
`
`
`
`
`
`Page 2 of 175
`
`Page 2 of 175
`
`Page 2 of 175
`
`

`

`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFIGE
`
`
`
`~
`
`
`
`
`
`
`
`
`
`[ARUNECSU
`
`
`
`Bib Data Sheet
`
`
`
`
`
`
`Page I of |
`
`
`
`
`COMMISSISNER FOR PATENTS
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`Wasreneten, 0.5. 20221
`
`WW.USP’O.gov
`
`
`
`CONFIRMATION NO.3425
`
`
`SERIAL NUMBER
`
`09/739,507
`
`
`
`
`FILING DATE
`
`42/18/2000
`
`RULE
`
`
`
`
`
`
`
`
`
`
`
`GROUP ARTUNIT]
`
`2681
`
`
`ATTORNEY
`
` SGcKet No.
`
`
`PHF 99.624
`
`
`
`
`APPLICANTS
`
`
`
`
`
`Philippe Decotignie, Le Mans, FRANCE;
`
`
`* CONTINUING DATA arensbakssSerBransnsnasa)2 . Pape
`
`
`
`
`
`« FOREIGN APPLICATIONS **s#"Yatsternas Pr. &
`
`
`
`
`25
`
`
`
`
`
`
`
`IF REQUIRED, FOREIGN FILING LICENSE
`
`
`GRANTED ** 03/05/2001
`
`
`
`
`
`
`
`
`
`yes a] no
`Fereign Priority claimed
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`19
`ta
`:
`
`35 USC 119 (a-d) conditions COUNTRY}DRAWINGyes C) no bal Met after
`
`
`
`
`
`
`
`
`
`
`met
`Allawance,
`/”7
`
`ea jet oO nfl
`De 2 -
`
`
`Signature
`xaminer's
`
`
`
`
`
`FRANCE 9916136 12/21/1999
`
`
`
`
`
`
`
`
`
`
`
`Initials
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`() other
`
`
`
`
`
`Corporate Patent Counsel:
`
`
`
`U.S. Philips Corporation;
`
`
`
`
`580 White Plains Road;
`
`
`
`Tarrytown ,NY 10591
`
`
`TITLE
`
`
`
`
`
`Anti-theft protection for a radiotelephony device
`
`
`
`
`
`
`
`
`
`
`
`
`
`C] All Fees
`
`
`
`
`
`C) 1.16 Fees(Filing )
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Cl 1.17 Fees ( Processing Ext. of |
`
`
`
`
`
`
`to charge/credit DEPOSIT ACCOUNT
`
`
`
`
`
`
`Q 1.18 Fees(Issue )
`________ for following:
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 175
`
`Page 3 of 175
`
`Page 3 of 175
`
`Page 3 of 175
`
`

`

`
`
`
`
`No. PHF 99,624
`Case Dock
`
`
`
`
`
`
`
`20231
`=0 THE COMMISSIONER FOR PATENTS, Washington, D.C.
`
`toe
`=~
`=—=w Enclosed for filing is the patent application of Inventor(s):
`
`
`
`
`
`
`
`
`== PHILIPPE DECOTIGNIE
`
`
`San
`=, For: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`
`
`
`
`
`
`——
`,
`===° ENCLOSED ARE:
`
`
`
`
`
`
`[X] Appointment of Associates;
`
`
`
`
`
`
`
`
`[X]
`Information Disclosure Statement, Form PTO-1449 and copies of
`
`
`
`documents listed therein;
`
`
`
`
`]
`[
`Preliminary Amendment;
`
`
`
`
`
`
`
`(X] Specification (9 Pages of Specification, Claims,
`
`
`
`
`
`
`
`[X] Declaration and Power of Attorney:
`
`
`
`
`
`
`
`
`(1 Page of a
`[ ]fully executed
`[X]unsigned Declaration);
`
`
`
`
`
`
`
`
`
`] Drawing (2 sheets of
`[ Jinformal
`[X] formal sheets);
`
`
`
`
`
`
`
`
`]) Certified copy of a FRENCH application Serial No.9916136;
`
`
`
`
`
`
`
`
`] Authorization Pursuant
`to 37 CFR §1.136(a) (3)
`
`
`
`] Other:
`;
`
`J) Assignment
`
`00/9/21
`
`
`
`
`
`
`
`to
`
`
`
`[2-19-e°?
`
`“Nan
`
`
`
`
`
`
`
`2
`-
`=
`Nr
`2
`on
`a
`
`m TT
`12/18/00
`
`
`
`
`
`
`& Abstract);
`
`
`
`
`
`
`
`
`
`FEE COMPUTATION
`
`
`
`
`CLAIMS AS FILED
`
`
`
`
`
`
`
`
`
`NUMBER FILED}NUMBER BASIC FEE
`
`
`EXTRA
`- $710.00
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Multiple Dependent Claims,
`
`
`
`
`
`
`
`
`
`if any
`
`
`
`
`
`
`
`TOTAL FILING FEE
`Please charge Deposit Account No. ia1270 in the amount of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the total filing fee indicated above, plus any deficiencies. The
`
`
`
`
`
`
`
`
`
`
`Commissioner is also hereby authorized to charge any other fees
`
`
`
`
`
`
`
`
`
`
`
`which may be required, except the issue fee, or credit any
`
`
`
`
`
`overpayment to Account No. 14-1270.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[ }Amend the specification by inserting before the first line
`
`
`
`
`
`
`
`
`
`as a centered heading --Cross Reference to Related Applications--;
`
`
`
`
`
`
`
`
`
`
`
`and insert below that as a new paragraph --This is a continuation-
`
`
`
`
`
`
`
`
`
`
`in-part of application Serial No.
`, filed
`, which is
`
`herein incorporated by reference--.
`
`
`
`
`
`
`
`
`
`
`
`
`CERTIFICATE OF EXPRESS MAILING
`
`
`
`
`
`Express Mail Mailing Label No. E1458219127US
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Date of Deposit__ December 18, 2000_Michael E, Marion, Reg. 327266
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`t hereby certify that this paper and/or fee is being
`Attorney
`deposited with the United States Postal Service “Express
`{914} 333-9641
`
`
`
`
`
`
`
`
`
`Mail Post Office to Addressee” service under 37 C.F.R.
`U.S. Philips Corporation
`
`
`
`
`
`
`
`
`
`
`
`1.10 on the date indicated above and is addressed to the
`580 White Plains Road
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Commissioner for Patents, Washingjon, D, Waegp
`Natale A. Manzo
`‘aweTias
`
`
`
`Typed Name
`
`
`
`
`
`
`Signature
`
`
`
`
`
`
`
`
`
`Tarrytown, New York 10591
`§:\SL\MB13SLD0.MAO.doc
`
`
`
`
`
`
`
`Page 4 of 175
`
`Page 4 of 175
`
`Page 4 of 175
`
`Page 4 of 175
`
`

`

`
`
`
`
`PATENT APPLICATION SERIAL NO.
`
`
`
`
`
`
`U.S. DEPARTMENT OF COMMERCE
`
`
`
`PATENT AND TRADEMARK OFFICE
`
`
`
`FEE RECORD SHEET
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PTO-1556
`
`(5/87)
`
`
`°U.S. GPO: 2000-468-987/5595
`
`
`
`Page 5 of 175
`
`Page 5 of 175
`
`Page 5 of 175
`
`Page 5 of 175
`
`

`

`
`
`
`
`
`
`Group Art Unit
`
`
`
`
`
`
`
`
`
`IN THE ~.i1TED STATES PATENT AND TRaueMARK OFFICE
`
`
`
`
`
`
`In re Application of
`Atty. Docket
`
`
`
`
`PHILIPPE DECOTIGNIE
`PHF 99,624
`
`
`
`Serial No.
`
`
`EX.
`Filed: CONCURRENTLY
`
`
`
`
`
`
`
`Title: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`
`
`
`
`
`Commissioner for Patents
`Washington, D.C. 20231
`
`
`
`
`
`
`
`
`
`
`
`
`AUTHORIZATION PURSUANT TO 37 CFR §1.136(a) (3)
`AND TO CHARGE DEPOSIT ACCOUNT
`
`
`
`
`
`
`
`Sir:
`
`
`
`
`
`
`
`
`The Commissioner is hereby requested and authorized to
`
`
`
`
`
`
`
`
`
`treat any concurrent or future reply in this application requiring
`
`
`
`
`
`
`
`
`
`
`
`@ petition for extension of time for its timely submission, as
`
`
`
`
`
`
`
`
`
`incorporating a petition for extension of time for the appropriate
`
`
`
`
`
`
`
`
`
`
`
`
`
`length of time.
`Please charge any additional fees which may now or in the
`
`
`
`
`
`
`
`
`
`future be required in this application,
`including extension of time
`
`
`
`
`
`
`
`
`
`
`fees, but excluding the issue fee unless explicitly requested to do
`
`
`
`
`
`
`
`
`
`
`so, and credit any overpayment,
`to Deposit Account No. 14-1270.
`
`
`
`
`
`
`
`
`
`
`
`
` Reg. 32,266
`
`
`
`
`Attorney
`(914) 333-9641
`
`
`
`
`
`
`
`\\SERVERO\SYS2\WPDOCS\SL\MB13SLE0.MA0O.doc
`
`
`
`Page 6 of 175
`
`Page 6 of 175
`
`Page 6 of 175
`
`Page 6 of 175
`
`

`

`
`
`PHF 99.624
`
`]
`
`
`
`
`
`
`Anti-theft protection for a radiotelephony device
`
`
`01.12.2000
`
`
`DESCRIPTION
`
`
`
`
`
`
`
`FIELD OF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`The invention relatds to a mobile radiotelephony device intended for
`
`
`
`
`
`
`
`
`accommodatinga user identification module, said device comprising:
`
`
`
`
`
`
`
`
`
`
`
`
`
`— connecting meansfor establishing a link between the device and the identification module
`
`
`
`
`
`mounted inside the device,
`
`
`
`
`
`
`
`
`
`
`— blocking means for preventing the normal operation ofthe device,
`
`
`
`
`
`
`
`
`
`
`
`
`- test meansfor activating the blocking means whenthe identification module mounted:
`
`
`
`
`
`
`
`
`
`
`
`
`inside the device is not the onethat\is linked to the device.
`
`
`
`
`
`
`
`
`
`
`
`The invention also relates to a method of protecting such a device, and a
`
`
`
`
`
`
`computer program for implementing such a method.
`
`
`
`
`
`
`
`
`
`
`
`The invention notably has applications in the field of portable radiotelephony.
`
`
`
`
`
`
`
`
`
`
`
`
`Portable radiotelephony devices are intended to accompanytheir users when they move
`
`
`
`
`
`
`
`
`
`
`around. It happensthat these devices are lost or stolen.
`
`
`
`
`
`
`
`
`
`
`PRIOR ART OF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`United States patent 5,913,175, published 15 June 1999 describes a method of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`protecting a radiotelephone which permits to avoid that the lost or stolen telephone can be
`
`
`
`
`
`
`
`
`
`
`
`
`
`used by a third party with another user identification module. This method comprises
`
`
`
`
`
`
`
`
`
`
`
`
`
`establishing a link between the device and a specific user identification module and blocking
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`‘the normal operation of the device when the user identification module that is placed inside
`
`
`
`
`
`
`
`
`
`
`
`
`the device is not the one that is linked to the device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Whenthe deviceis lost or stolen with the identification module to whichitis
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`linked, the user is to warn the operatorso that the use ofhis identification module is blocked
`
`
`
`at networklevel.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`This meansthat the device can be freely used until the identification module to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`whichit is linked is blocked via the network. This may take a certain period of time.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`20
`
`
`25
`
`Page 7 of 175
`
`Page 7 of 175
`
`Page 7 of 175
`
`Page 7 of 175
`
`

`

`
`
`PHF99.624
`
`
`
`2
`
`
`01.12.2000
`
`
`
`
`
`SUMMARYOFTHE INVENTION
`
`
`
`
`
`
`
`
`
`
`
`
`
`It is notably an object ofthe invention to resolve this problem. For this
`
`
`
`
`
`
`
`
`
`
`
`
`
`purpose, a device in accordance withithe invention and as described in the opening paragraph
`
`
`
`
`
`
`is characterized in that it comprises:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- timing meansfor activating the blocking meansafter the device has been inactive for a
`
`
`
`
`
`defined period oftime,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- and deblocking meansfor permitting normal operation of the device when the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module placed inside the device is the one that is linked to the device and
`
`
`
`
`
`
`
`
`
`when a deblocking code is supplied by the ser.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Thus, when the devicefalls into the handsofa third party together with the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module to whichit is linked, it has most probably been inactive for a period of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`time that is sufficiently long for its normal operation to be blocked (advantageously, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`inactive time after which the blocking meansare activated is of the order of several minutes).
`
`
`
`
`
`
`
`
`
`
`
`
`The device cannot thus be used without the deblocking code being supplied.
`
`
`
`
`
`
`
`
`
`
`
`
`Thanksto the invention the lost or stolen device becomestotally unusable. A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`fraudulent person cannot send communicationsat the cost of the ownerof the device. But
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`neither can he use the device with another identification module. Thetheft of the device
`
`
`
`
`
`
`
`
`
`
`
`becomestotally useless. The invention thus formsa protection againsttheft.
`
`
`
`
`
`
`
`
`
`In a particularly simple embodiment, the connecting means comprise reading
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`means and storage means ofa data stored in the identification module, and the test means
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`compare the thus stored data with the data stored in the identification module whichis places
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`inside the device. The data stored is formed, for example, by the international identification
`
`
`
`
`
`
`
`
`
`
`
`
`
`number IMSI whichis contained in the identification module (compare standardsrelating to
`
`
`
`
`
`
`
`
`
`
`
`
`the GSM radiotelephony systems). Thus,the identification module is automatically linked to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the device without the intervention of the user, more particularly without the fact that a
`
`
`
`
`
`
`specific code hasto be entered.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Advantageously the deblocking code, whichis to be supplied to return to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`normal operating mode, is formed by the pin code (Personal Identity Number) which is
`
`
`
`
`
`
`
`
`
`
`
`contained in the identification module (compare standardsrelating to the GSM
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`radiotelephony systems). Thusthe user need not store an additional code to ensure the
`
`
`
`
`protection of his device.
`
`
`
`
`
`
`
`
`
`
`
`
`15
`
`
`20
`
`
`25
`
`
`30
`
`Page 8 of 175
`
`Page 8 of 175
`
`Page 8 of 175
`
`Page 8 of 175
`
`

`

`
`
`PHF 99.624
`
`
`
`3
`
`01.12.2000
`
`
`
`
`
`
`
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`These and other aspects of the invention are apparent from and will be
`
`
`
`
`
`
`
`
`
`
`
`elucidated, by way of non-limitative example, with reference to the embodiments) described
`
`hereinafter.
`
`
`
`
`
`
`
`In the drawings:
`
`
`
`
`
`
`
`
`Fig. 1 represents a device in accordance with the invention,
`
`
`
`
`
`
`
`
`
`
`
`
`
`Fig. 2 represents an overall electric diagram ofthe device of Fig. 1, and
`
`
`
`
`
`
`
`
`
`
`
`
`
`Fig. 3 represents a flow chart explaining the operation ofthe device of Fig. 1.
`
`
`
`
`
`~
`
`
`
`5
`
`
`10
`
`
`
`15
`
`
`
`20
`
`x
`~
`
`
`
`
`
`
`
`
`
`DESCRIPTION OF A PREFERRED EMBODIMENTOF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`
`
`In Fig. 1 is represented an electronic device in accordance with the invention.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In the example described here this device is a portable radiotelephoneof the type used in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cellular systems. It notably comprises a microphone5, a loudspeaker6, a screen 8, a keypad
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`9 and an antenna 11. The device 1 also comprises a housing 12 intended for accommodating
`
`
`
`
`
`
`
`
`
`
`
`
`
`a user identification module 13. In the example of embodimentdescribed here,this
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module 13 is a portable card of an integrated circuit in which information is
`
`
`
`
`
`
`
`
`
`
`
`stored, notably an international identification number currently called IMSI number, and a
`
`
`
`
`
`
`
`Personal Identification Numbercurrently called PIN code.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Fig. 2 showsthe overall electrical diagram ofthis device. The operation ofthe
`nicroprocessor ass¢mbly 20 which comprises a
`deviceis, in essence, controlled by a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`microprocessor 22 to which are associated a random access memory 24 and a read-only
`}
`memory 26. This assembly is connectetl
`to a man-machineinterface 30 via a commonline
`Sands
`
`
`
`
`
`
`
`
`
`
`
`
`
`i »
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`32. This man-machineinterface 32 contfols the screen 8 and the keypad 9. The commonline
`/5 32 also connects the microprocessor assetnbly 20 to a transceiver assembly 35 via an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`interface circuit 38. The transceiver assembly is connected to the antenna 11. Finally, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`commonline 32 also connects the microprocessor assembly 20 to a card reader 39.
`
`
`
`
`
`
`
`
`
`
`
`
`In Fig. 3 is represented a function flow chart of a device in accordance with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the invention. This flow chart starts at box K1. In box K1 the deviceis in a state of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`30_—availability, that is to say that the user has accessto all the functions of the device. The user
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`has the choice ofeither or not locking his device. This locking (L)/unlocking (UL) is done by
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`accessing a configuration menu of the device. When the user locks his device (box K2), the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification modulethatis inside the device is automatically linked to the device. For this
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`purpose,the device starts reading a data D1 in the identification module (for example, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 9 of 175
`
`Page 9 of 175
`
`Page 9 of 175
`
`Page 9 of 175
`
`

`

`
`PHF 99.624
`
`
`
`
`
`
`
`5
`
`
`10
`
`
`
`
`
`
`
`
`
`
`20
`
`
`25
`
`
`30
`
`01.12.2000
`4
`
`
`
`
`
`
`
`
`
`
`
`
`internationalidentification number IMSI) andhestoresit in the random-access memory 24.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Once locked, the device remainsin the state of availability indicated in box K1. When the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`deviceis in the state of availability, one looks whetherit is locked (box K3).Ifit is not
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`locked (arrow N3), the device remainsin the state of availability indicated in box K1. Ifit is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`locked (arrow Y3), one looks whetherthe identification module whichis placedinside the
`
`
`
`
`
`
`
`
`
`
`
`
`device is the one thatis linked to the device (box K4).
`
`
`
`
`
`
`
`
`
`
`
`
`
`If the identification module, whichis placed inside the device, is not the one
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`that is linked to the device (arrow N4), the device goesto a first blocking state indicated in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`box KS.In this first blocking state, the device is disconnected from the network. Thus it can
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`no longer receive an incomingcall nor transmit an outgoing call (possibly with the exception
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`of emergency numbers). In the blocking state K5, the screen shows a messageinviting the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`user to insert the proper module into the device. And whenthe user inserts a new module,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`one looks whether this new identification moduleis the one that is connected to the device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(box K7). If this is the case (arrow Y7), the device is reconnected to the network in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`accordance with the normal procedure (box K8)and then the device returns to the state of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`availability indicated in box K1. If not (arrow N7), the operation is resumed in box K5. The
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`only way ofleavingthis first blocking state is thus to place the identification modulethatis
`
`
`
`
`
`
`
`linked to the device inside the device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`If the identification module thatis placed inside the device is linked to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device (arrow Y4), one looks whether the device has remainedin the state of availability for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a certain period of time T of the order of several minutes, for example (box K10). If this is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`not the case (arrow N10), the device remainsin the state of availability indicated in box K1.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`If this is the case (arrow Y10), the device passes on to a second blockingstate indicated in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`box K11 by passing throughan initialization step K12 which permitsto initialize a variable A
`
`
`
`
`
`
`
`
`
`
`
`
`
`which represents the number of attempts made at supplying a deblocking code (for example,
`
`
`
`
`
`the Personal Identification Number) PIN.
`
`
`
`
`
`
`
`
`
`
`
`In this second blockingstate the device only processes incomingcalls (box
`
`
`
`
`
`
`
`
`
`
`
`
`
`K13) and, possibly, the outgoing calls that correspond to emergency numbers (box K14).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Once these calls have been processed, the device goes back to the second blocking state
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`indicated in box K11. In the second blocking state K11 a message inviting the user to supply
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a deblocking code is displayed on the screen.If the code taken by the user is recognized
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(arrow Y11), the device goes back to the state of availability indicated in box K1. If it is not
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`recognized (arrow N11), the value of the variable A is tested (box K15), If this value is lower
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`than a certain figure (for example 3), the value of A is augmented by unity (box K16) and a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 10 of 175
`
`Page 10 of 175
`
`Page 10 of 175
`
`Page 10 of 175
`
`

`

`
`PHF 99.624
`
`
`
`5
`
`
`
`01.12.2000
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`messageis displayed on the screento indicate the user that the code is not valid (box K17).
`
`
`Then the device goes back to the second blockingstate indicated in box K11. If the variable
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`A is higher than or equal to said figure, the test of box K15 causes the total blocking of the
`
`
`
`device indicated in box K30. To leave this third blocking state it is necessary to contact the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`organization that provides the identification module. Oneis then again in thestate of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`availability K1.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In another embodimentof the invention, when the user locks the telephone,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the device asks for the user's name. The name givenbythe useris stored in the random
`
`
`
`access memory 24 of the device. When the identification modulethat is inside the deviceis
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`not the onethatis linked to the device, the device displays the nameof the user before asking
`
`
`
`him to insert his identification module as indicated in box K5. The device also displays the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`name ofthe user before asking him to supply his personal codeas indicated in box K11.
`
`
`
`
`
`
`
`
`
`
`
`The embodimentthat has just been describedis particularly effective, because
`
`
`
`it provides two separate blocking modes depending on whetherthe identification module that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is placed inside the deviceis either or not linked to the device. The first blocking modeis
`
`applied in the case where the device has beenlostor stolen. The object is then to prevent the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device being usable with anotheridentification module. It thus advantageously blocks the
`
`
`
`incoming and outgoingcalls at the same time. The second blocking modeis appliedin the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`case wherethe identification modulethat is linked to the deviceis in its place inside the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device and the deviceis in a state of availability. The object is to prevent a third party being
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`able to send outgoing calls with this device if it is lost, stolen or left without attendance for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`sometime. In that case, it is desirable for the user to be able to continueto directly receive
`
`
`
`
`
`20
`
`his incomingcalls.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In another embodiment the same blocking meansare used as the identification
`
`
`
`
`25
`
`module whichis placed inside the device either or not linked to the device, for example, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second blocking means.In that case it is possible for receiving incomingcalls intended for
`
`
`
`
`
`
`
`
`
`
`
`
`
`the identification module that is inside the device, even whenthis identification module
`
`
`
`placed inside the device is not linked to the device.
`
`
`
`
`
`
`
`
`
`
`
`nBhs ,
`aa
`
`Page 11 of 175
`
`Page 11 of 175
`
`Page 11 of 175
`
`Page 11 of 175
`
`

`

`
`
`PHF 99.624
`
`
`;
`
`CLAIMS:
`
`
`
`6
`
`
`
`01.12.2000
`
`
`
`
`A mobile radiotelephony device intended for accommodating a user
`1.
`
`
`
`
`
`
`
`identification module, said device comprising:
`
`
`
`
`
`— connecting meansfor establishinga link between the device and the identification module
`
`mounted inside the device,
`‘
`
`
`
`
`—- blocking meansfor preventing the ndgmal operation ofthe device,
`
`
`
`
`
`
`
`
`
`
`
`— test meansfor activating the blocking means whenthe identification module mounted
`
`
`
`
`
`
`
`
`
`
`
`inside the device is not the onethatis liked to the device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`.
`
`5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`characterized in that it comprises:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- timing meansfor activating the blocking means after the device has been inactive for a
`defined period of time,
`19
`
`
`
`
`
`
`_ — and deblocking meansfor permitting normal‘operation ofthe device when the
`os C ‘
`
`
`
`
`
`
`
`
`
`
`
`
`identification module placed inside the device js the onethat is linked to the device and
`om > ‘|
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`UV of whenadeblocking code issuppliedby theuser.
`
`
`
`
`
`
`
`
`
`
`A device as claimed in claim 1, characterized in that said blocking means
`2,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`comprise first blocking meansfor preventing the transrhission and reception of calls when the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module placed inside the device is not the\one that is linked to the device, and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second blocking means for preventing the sendingofcalls after a defined period oftime
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`during which the device has been inactive, with the exception of one or various emergency
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`~numbers.
`
`
`
`
`
`
`
`
`
`
`
`:
`-
`
`5
`
`
`20
`
`
`
`3.
`
`
`
`A device as claimed in claim 1, characterized ik
`
`
`
`
`
`
`
`that it comprises
`
`
`
`
`
`
`locking/unlocking meansfor locking/unlocking the device, while said blocking means can
`
`
`
`
`
`
`
`
`
`
`
`
`
`only be activated when the device is locked, and said link is established while the device is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`25__being locked.
`
`
`
`
`
`
`
`4,
`
`A device as claimed in claim 1, characterized in that\said connecting means
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`comprise means for reading and storing a datastored in the identificktion module, and in that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 12 of 175
`
`Page 12 of 175
`
`Page 12 of 175
`
`Page 12 of 175
`
`

`

`
`
`PHF 99.624
`
`
`01.12.2000
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`said test means comparethis data thus stored with the data stored in the identification module
`
`
`
`
`
`
`that is placed inside the device.
`
`
`
`7
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device whenthe identification module placed inside
`
`
`
`
`
`
`
`
`
`
`
`
`
`| !
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`20
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5.
`A device as claimed in\claim 3, characterized in that said data is formed by the
`
`
`
`
`
`
`
`
`
`international identification number stofed in the user identification module.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`claim 1, characterized in that said deblocking codeis
`A device as claimed in
`6.
`
`
`
`
`
`
`
`
`
`
`
`formed by the personalidentification number stored in the identification module.
`
`
`
`10x
`A methodofprotecting amobile radiotelephony device intended for
`
`
`
`
`
`
`
`
`
`
`accommodating a user identification module, said method comprising the following steps:
`
`
`
`
`
`
`
`
`
`
`
`
`ul N - setting up a link between the device and the identification module placed inside the
`
`
`
`2 fhT
`device,
`|
`
`
`
`
` testing to verify whether the identification module placed inside the device is the one that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`|
`15
`islinkedtothedevice,
`
`
`
`
`
`
`
`
`— blocking the normal operation of the
`
`
`
`
`
`
`
`
`the device is not the one that is linked to the device,
`
`
`
`
`
`
`
`
`
`characterized in that it comprises the following steps:
`
`
`
`
`
`
`
`— detection of a period of inactivity of the\device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` — blocking of the normaloperation of the device whensaid period ofinactivity has been
`
`
`detected,
`\
`
`- deblocking which permits the normal opetation ofthe device when theidentification
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`miodule placed inside the deviceis the one|that is linked to the device and when a
`
`
`
`
`
`
`
`
`deblocking code has been supplied by the user.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`8. A methodas claimed in claim 6ofprotecting a mobile radiotelephony device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`characterized in that it comprises a step of locking the device, while the blocking steps can
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`only be executed whenthe deviceis locked, and the step of establishing a link between the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device andthe identification module placed inside\the device is executed when the device is
`
`
`30~—locked.
`
`
`
`
`
`
`9.
`
`
`
`
`
`
`
`
`
`
`
`
`
`A methodas claimedin claim 6 of protecting a mobile radiotelephony device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`characterized in that the step of establishing a link between the device and the identification
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`module placed inside the device comprises a step of reading and storing a data storedin said
`
`
`
`Page 13 of 175
`
`Page 13 of 175
`
`Page 13 of 175
`
`Page 13 of 175
`
`

`

`PHF99.624
`
`
`
`
`01.12.2000
`8
`1
`
`
`identification module, and in that the test step comprises comparing the data thus stored with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`\
`
`the data stored in the identification module thatis placed inside the device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`e
`.
`.
`.
`10.
`A computer program compkising means for implementing a method as claimed
`
`
`
`
`
`
`
`
`
`
`
`
`in claim 7 of protecting a mobile radiotelephony device.
`
`
`
`
`
`
`
`
`
`
`-
`
`c f
`
`
`
`weu 4
`
`
`
`
`
`
`se f
`XD ‘
`
`
`5
`
`
`
`
`
`
`Page 14 of 175
`
`Page 14 of 175
`
`Page 14 of 175
`
`Page 14 of 175
`
`

`

`
`PHF 99.624
`
`
`
`ABSTRACT:
`
`
`
`
`
`9
`
`01.12.2000
`
`
`
`
`
`
`
`
`
`
`
`The invention proposes a method of protecting a mobile radiotelephony device
`
`
`
`
`
`
`
`
`
`
`
`
`
`intended for accommodatinga user identification module to be able to operate. The invention
`
`
`
`
`
`
`
`
`
`
`has forits object to protect such a device againsttheft.
`
`
`
`
`
`
`
`
`
`
`For this purpose, a device in accordance with the invention comprises means
`
`
`
`
`
`
`5.
`
`
`for:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`— preventing the use of the device with an identification module other than the user’s,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`— asking the user for a deblocking code after a short time that the devi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket