`
`5 j
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`‘| 6836654:
`
`
`HN—
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`if
`
`
`
`F
`09/739507
`
`
`
`
`
`
`
`
`2 -Phi ligeerbecotisanis
`
`
`
`
`
`
`
`
`
`
`
`455
`
`
`
` || APPLICATIONNO.—|CONT/PRIOR [CLASS
`
`_
`i)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`‘
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Grtie thet peobeaction for a radiobelercnorny device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ss(gigSEN | v9|20 Ism./ lesa SS
`
`
`
`
`
`
`
`
`
`
`
`opin,%o.lke|
`
`
`
`
`
`
`
`
`
`
`loll al
`Ya;
`
`
`
`
`
`
`
`ISSUING CLASSIFICATION
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TERMINAL |
`DISCLAIMER
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`¥ lf al f
`
`
`
`
`
`
`
`
`
`
`NOTICEOF ALLOWANCEMAILED
`
`
`
`Of tHJOY :
`
`
`f
`(3 Theterm of this patent
`
`
`
`
`
`
`
`
`subsequent to___ (date) | ;
`
`
`
`
`has been disclaimed.
`
`not extend beyond the expiration date
`
`
`
`
`{]
`
`
`
`
`
`
`
`
`Theterm ofthis patent shall
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`_] The terminal ___monthsof
`
`
`
`
`this patent have been disclaimed.
`
`
`
`
`
`
`
`
`{Legal Instruments Examinar)
`
`
`
`
`i}
`1
`Doe;
`
`
`
`\ (Assistant Exozdner)
`WW. CL
`
`
`
`
`
`Amount Due
`SUPERVISORY PATENT EXAMINER
`
`
`
`
`
`
`
`TECHNOLOGY CENTER 2800 y- 4-04] @ 1530
`
`Primary Examiner)
`(Date)
`
`Possession outside the U.S. Patent & Trademark Office is restricted to authorized employees and contractors only. (ov 0)
`
`
`
`:
`
`\
`
`
`
`
`Date Paid
`
`
`
`l g 04
`]
`
`
`ISSUE BATCH NUMBER
`
`
`
`
`Sin
`
`
`
`
`WARNING:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The information disclosed herein may be restrictad. Unauthorized disclosure may be prohibited by the United States Code Title 35, Sections 122, 181 and 368.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`me
`
`
`
`
`ISSUE FEE IN FILE
`
`-
`
`Page 1 of 175
`
`
`FILED with: [_] DISk (CRF)
`
`
`
`
`
`
`
`
`
`
`
`
`[]FICHE [_] CD-Rom
`
`
`
`
`
`
`
`
`(Attached in pocket on right insideflap)
`ws
`:
`
`
`|
`
`(FACE)
`
`
`
`MICROSOFT CORP.
`
`EXHIBIT 1002
`
`Page | of 175 '
`
`SAMSUNG EXHIBIT 1002
`
`Page 1 of 175
`
`Page 1 of 175
`
`SAMSUNG EXHIBIT 1002
`
`
`
`r 4
`(;
`¥.
`
`|
`
`
`
`ya
`
`:
`NT APPLICATION —
`
`
`
`
`
`
`
`
`
`
`
`
`
`7ee‘tfiam maui
`
`
`
`eis
`“4e914 U.S. PTO
`
`
`
`
`99 /739801
`
`
`
`
`
`
`
`
`
`
`
`——e
`
`FE 2604 |
`
`
`
`
`
`INITIALS
`
`
`
`
`
`Pile LF
`
`CONTENTS
`Date Received
`(incl. C, of M.)
`or
`Date Mailed
`
`
`
`Date Received
`
`
`
`
`
`
`(incl. C. of M.)
`or
`
`Date Mailed
`
`
`
`
`
`
`1. Application
`
`
`papers. Se
`
` :
`
`a!
`11,
`Crust dh TintWO
`12,
`KOE
`S|20lou
`53.
`oly TOA D Slee 64,
`myWMbirWgent
`ie) ki
`plateevi! ARhts)sat
`Pde1dKea ———
`
`7;17._petthon Granteol
`g/l
`58.
`
`
`hil ThyA. SS—————————oe[Ler tidyrcof 2396L/
`
`oYleslot
`44,
`
`
`
`
`
`4
`
`=
`
`18.
`
`59,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`|re 60.
`
`
`
`
`20.
`
`21.
`
`
`
`
`22.
`
`
`61.
`
`62.
`
`
`
`63,
`
`
`
`
`23.
`
`64.
`
`
`
`es
`
`
`
`SS—eee ee 65.
`
`25,
`
`
`66.
`
`
`
`
`
`a ee 67.
`
`
`|i 68,
`
`28.
`
`
`
`69.
`
`
`
`
`
`
`
`
`
`
`
`FseeeSSEE 70.
`
`
`2032——ee ee. 71.
`
`
`
`ee ee 72.
`
`
`
`
`
`32
`
`33
`
`
`
`
`
`34
`
`
`
`35
`
`36
`
`37
`
`38
`
`
`
`
`
`
`
`
`
`33.
`
`
`
`40.
`
`41,
`
`
`
`
`
`
`
`Page 2 of 175
`
`
`73.
`
`74.
`
`75.
`
`76.
`
`77.
`
`78.
`
`79.
`
`80.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`81
`
`
`
`
`:
`82.
`(LEFT OUTSIDE)
`
`
`
`
`
`Page 2 of 175
`
`Page 2 of 175
`
`Page 2 of 175
`
`
`
`
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFIGE
`
`
`
`~
`
`
`
`
`
`
`
`
`
`[ARUNECSU
`
`
`
`Bib Data Sheet
`
`
`
`
`
`
`Page I of |
`
`
`
`
`COMMISSISNER FOR PATENTS
`
`
`
`
`
`
`UNITED STATES PATENT AND TRADEMARK OFFICE
`
`
`
`
`Wasreneten, 0.5. 20221
`
`WW.USP’O.gov
`
`
`
`CONFIRMATION NO.3425
`
`
`SERIAL NUMBER
`
`09/739,507
`
`
`
`
`FILING DATE
`
`42/18/2000
`
`RULE
`
`
`
`
`
`
`
`
`
`
`
`GROUP ARTUNIT]
`
`2681
`
`
`ATTORNEY
`
` SGcKet No.
`
`
`PHF 99.624
`
`
`
`
`APPLICANTS
`
`
`
`
`
`Philippe Decotignie, Le Mans, FRANCE;
`
`
`* CONTINUING DATA arensbakssSerBransnsnasa)2 . Pape
`
`
`
`
`
`« FOREIGN APPLICATIONS **s#"Yatsternas Pr. &
`
`
`
`
`25
`
`
`
`
`
`
`
`IF REQUIRED, FOREIGN FILING LICENSE
`
`
`GRANTED ** 03/05/2001
`
`
`
`
`
`
`
`
`
`yes a] no
`Fereign Priority claimed
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`19
`ta
`:
`
`35 USC 119 (a-d) conditions COUNTRY}DRAWINGyes C) no bal Met after
`
`
`
`
`
`
`
`
`
`
`met
`Allawance,
`/”7
`
`ea jet oO nfl
`De 2 -
`
`
`Signature
`xaminer's
`
`
`
`
`
`FRANCE 9916136 12/21/1999
`
`
`
`
`
`
`
`
`
`
`
`Initials
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`() other
`
`
`
`
`
`Corporate Patent Counsel:
`
`
`
`U.S. Philips Corporation;
`
`
`
`
`580 White Plains Road;
`
`
`
`Tarrytown ,NY 10591
`
`
`TITLE
`
`
`
`
`
`Anti-theft protection for a radiotelephony device
`
`
`
`
`
`
`
`
`
`
`
`
`
`C] All Fees
`
`
`
`
`
`C) 1.16 Fees(Filing )
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Cl 1.17 Fees ( Processing Ext. of |
`
`
`
`
`
`
`to charge/credit DEPOSIT ACCOUNT
`
`
`
`
`
`
`Q 1.18 Fees(Issue )
`________ for following:
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 175
`
`Page 3 of 175
`
`Page 3 of 175
`
`Page 3 of 175
`
`
`
`
`
`
`
`No. PHF 99,624
`Case Dock
`
`
`
`
`
`
`
`20231
`=0 THE COMMISSIONER FOR PATENTS, Washington, D.C.
`
`toe
`=~
`=—=w Enclosed for filing is the patent application of Inventor(s):
`
`
`
`
`
`
`
`
`== PHILIPPE DECOTIGNIE
`
`
`San
`=, For: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`
`
`
`
`
`
`——
`,
`===° ENCLOSED ARE:
`
`
`
`
`
`
`[X] Appointment of Associates;
`
`
`
`
`
`
`
`
`[X]
`Information Disclosure Statement, Form PTO-1449 and copies of
`
`
`
`documents listed therein;
`
`
`
`
`]
`[
`Preliminary Amendment;
`
`
`
`
`
`
`
`(X] Specification (9 Pages of Specification, Claims,
`
`
`
`
`
`
`
`[X] Declaration and Power of Attorney:
`
`
`
`
`
`
`
`
`(1 Page of a
`[ ]fully executed
`[X]unsigned Declaration);
`
`
`
`
`
`
`
`
`
`] Drawing (2 sheets of
`[ Jinformal
`[X] formal sheets);
`
`
`
`
`
`
`
`
`]) Certified copy of a FRENCH application Serial No.9916136;
`
`
`
`
`
`
`
`
`] Authorization Pursuant
`to 37 CFR §1.136(a) (3)
`
`
`
`] Other:
`;
`
`J) Assignment
`
`00/9/21
`
`
`
`
`
`
`
`to
`
`
`
`[2-19-e°?
`
`“Nan
`
`
`
`
`
`
`
`2
`-
`=
`Nr
`2
`on
`a
`
`m TT
`12/18/00
`
`
`
`
`
`
`& Abstract);
`
`
`
`
`
`
`
`
`
`FEE COMPUTATION
`
`
`
`
`CLAIMS AS FILED
`
`
`
`
`
`
`
`
`
`NUMBER FILED}NUMBER BASIC FEE
`
`
`EXTRA
`- $710.00
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Multiple Dependent Claims,
`
`
`
`
`
`
`
`
`
`if any
`
`
`
`
`
`
`
`TOTAL FILING FEE
`Please charge Deposit Account No. ia1270 in the amount of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the total filing fee indicated above, plus any deficiencies. The
`
`
`
`
`
`
`
`
`
`
`Commissioner is also hereby authorized to charge any other fees
`
`
`
`
`
`
`
`
`
`
`
`which may be required, except the issue fee, or credit any
`
`
`
`
`
`overpayment to Account No. 14-1270.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`[ }Amend the specification by inserting before the first line
`
`
`
`
`
`
`
`
`
`as a centered heading --Cross Reference to Related Applications--;
`
`
`
`
`
`
`
`
`
`
`
`and insert below that as a new paragraph --This is a continuation-
`
`
`
`
`
`
`
`
`
`
`in-part of application Serial No.
`, filed
`, which is
`
`herein incorporated by reference--.
`
`
`
`
`
`
`
`
`
`
`
`
`CERTIFICATE OF EXPRESS MAILING
`
`
`
`
`
`Express Mail Mailing Label No. E1458219127US
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Date of Deposit__ December 18, 2000_Michael E, Marion, Reg. 327266
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`t hereby certify that this paper and/or fee is being
`Attorney
`deposited with the United States Postal Service “Express
`{914} 333-9641
`
`
`
`
`
`
`
`
`
`Mail Post Office to Addressee” service under 37 C.F.R.
`U.S. Philips Corporation
`
`
`
`
`
`
`
`
`
`
`
`1.10 on the date indicated above and is addressed to the
`580 White Plains Road
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Commissioner for Patents, Washingjon, D, Waegp
`Natale A. Manzo
`‘aweTias
`
`
`
`Typed Name
`
`
`
`
`
`
`Signature
`
`
`
`
`
`
`
`
`
`Tarrytown, New York 10591
`§:\SL\MB13SLD0.MAO.doc
`
`
`
`
`
`
`
`Page 4 of 175
`
`Page 4 of 175
`
`Page 4 of 175
`
`Page 4 of 175
`
`
`
`
`
`
`
`PATENT APPLICATION SERIAL NO.
`
`
`
`
`
`
`U.S. DEPARTMENT OF COMMERCE
`
`
`
`PATENT AND TRADEMARK OFFICE
`
`
`
`FEE RECORD SHEET
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PTO-1556
`
`(5/87)
`
`
`°U.S. GPO: 2000-468-987/5595
`
`
`
`Page 5 of 175
`
`Page 5 of 175
`
`Page 5 of 175
`
`Page 5 of 175
`
`
`
`
`
`
`
`
`
`Group Art Unit
`
`
`
`
`
`
`
`
`
`IN THE ~.i1TED STATES PATENT AND TRaueMARK OFFICE
`
`
`
`
`
`
`In re Application of
`Atty. Docket
`
`
`
`
`PHILIPPE DECOTIGNIE
`PHF 99,624
`
`
`
`Serial No.
`
`
`EX.
`Filed: CONCURRENTLY
`
`
`
`
`
`
`
`Title: ANTI-THEFT PROTECTION FOR A RADIOTELEPHONY DEVICE
`
`
`
`
`
`
`Commissioner for Patents
`Washington, D.C. 20231
`
`
`
`
`
`
`
`
`
`
`
`
`AUTHORIZATION PURSUANT TO 37 CFR §1.136(a) (3)
`AND TO CHARGE DEPOSIT ACCOUNT
`
`
`
`
`
`
`
`Sir:
`
`
`
`
`
`
`
`
`The Commissioner is hereby requested and authorized to
`
`
`
`
`
`
`
`
`
`treat any concurrent or future reply in this application requiring
`
`
`
`
`
`
`
`
`
`
`
`@ petition for extension of time for its timely submission, as
`
`
`
`
`
`
`
`
`
`incorporating a petition for extension of time for the appropriate
`
`
`
`
`
`
`
`
`
`
`
`
`
`length of time.
`Please charge any additional fees which may now or in the
`
`
`
`
`
`
`
`
`
`future be required in this application,
`including extension of time
`
`
`
`
`
`
`
`
`
`
`fees, but excluding the issue fee unless explicitly requested to do
`
`
`
`
`
`
`
`
`
`
`so, and credit any overpayment,
`to Deposit Account No. 14-1270.
`
`
`
`
`
`
`
`
`
`
`
`
` Reg. 32,266
`
`
`
`
`Attorney
`(914) 333-9641
`
`
`
`
`
`
`
`\\SERVERO\SYS2\WPDOCS\SL\MB13SLE0.MA0O.doc
`
`
`
`Page 6 of 175
`
`Page 6 of 175
`
`Page 6 of 175
`
`Page 6 of 175
`
`
`
`
`
`PHF 99.624
`
`]
`
`
`
`
`
`
`Anti-theft protection for a radiotelephony device
`
`
`01.12.2000
`
`
`DESCRIPTION
`
`
`
`
`
`
`
`FIELD OF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`The invention relatds to a mobile radiotelephony device intended for
`
`
`
`
`
`
`
`
`accommodatinga user identification module, said device comprising:
`
`
`
`
`
`
`
`
`
`
`
`
`
`— connecting meansfor establishing a link between the device and the identification module
`
`
`
`
`
`mounted inside the device,
`
`
`
`
`
`
`
`
`
`
`— blocking means for preventing the normal operation ofthe device,
`
`
`
`
`
`
`
`
`
`
`
`
`- test meansfor activating the blocking means whenthe identification module mounted:
`
`
`
`
`
`
`
`
`
`
`
`
`inside the device is not the onethat\is linked to the device.
`
`
`
`
`
`
`
`
`
`
`
`The invention also relates to a method of protecting such a device, and a
`
`
`
`
`
`
`computer program for implementing such a method.
`
`
`
`
`
`
`
`
`
`
`
`The invention notably has applications in the field of portable radiotelephony.
`
`
`
`
`
`
`
`
`
`
`
`
`Portable radiotelephony devices are intended to accompanytheir users when they move
`
`
`
`
`
`
`
`
`
`
`around. It happensthat these devices are lost or stolen.
`
`
`
`
`
`
`
`
`
`
`PRIOR ART OF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`United States patent 5,913,175, published 15 June 1999 describes a method of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`protecting a radiotelephone which permits to avoid that the lost or stolen telephone can be
`
`
`
`
`
`
`
`
`
`
`
`
`
`used by a third party with another user identification module. This method comprises
`
`
`
`
`
`
`
`
`
`
`
`
`
`establishing a link between the device and a specific user identification module and blocking
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`‘the normal operation of the device when the user identification module that is placed inside
`
`
`
`
`
`
`
`
`
`
`
`
`the device is not the one that is linked to the device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Whenthe deviceis lost or stolen with the identification module to whichitis
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`linked, the user is to warn the operatorso that the use ofhis identification module is blocked
`
`
`
`at networklevel.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`This meansthat the device can be freely used until the identification module to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`whichit is linked is blocked via the network. This may take a certain period of time.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`20
`
`
`25
`
`Page 7 of 175
`
`Page 7 of 175
`
`Page 7 of 175
`
`Page 7 of 175
`
`
`
`
`
`PHF99.624
`
`
`
`2
`
`
`01.12.2000
`
`
`
`
`
`SUMMARYOFTHE INVENTION
`
`
`
`
`
`
`
`
`
`
`
`
`
`It is notably an object ofthe invention to resolve this problem. For this
`
`
`
`
`
`
`
`
`
`
`
`
`
`purpose, a device in accordance withithe invention and as described in the opening paragraph
`
`
`
`
`
`
`is characterized in that it comprises:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- timing meansfor activating the blocking meansafter the device has been inactive for a
`
`
`
`
`
`defined period oftime,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- and deblocking meansfor permitting normal operation of the device when the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module placed inside the device is the one that is linked to the device and
`
`
`
`
`
`
`
`
`
`when a deblocking code is supplied by the ser.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Thus, when the devicefalls into the handsofa third party together with the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module to whichit is linked, it has most probably been inactive for a period of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`time that is sufficiently long for its normal operation to be blocked (advantageously, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`inactive time after which the blocking meansare activated is of the order of several minutes).
`
`
`
`
`
`
`
`
`
`
`
`
`The device cannot thus be used without the deblocking code being supplied.
`
`
`
`
`
`
`
`
`
`
`
`
`Thanksto the invention the lost or stolen device becomestotally unusable. A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`fraudulent person cannot send communicationsat the cost of the ownerof the device. But
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`neither can he use the device with another identification module. Thetheft of the device
`
`
`
`
`
`
`
`
`
`
`
`becomestotally useless. The invention thus formsa protection againsttheft.
`
`
`
`
`
`
`
`
`
`In a particularly simple embodiment, the connecting means comprise reading
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`means and storage means ofa data stored in the identification module, and the test means
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`compare the thus stored data with the data stored in the identification module whichis places
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`inside the device. The data stored is formed, for example, by the international identification
`
`
`
`
`
`
`
`
`
`
`
`
`
`number IMSI whichis contained in the identification module (compare standardsrelating to
`
`
`
`
`
`
`
`
`
`
`
`
`the GSM radiotelephony systems). Thus,the identification module is automatically linked to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the device without the intervention of the user, more particularly without the fact that a
`
`
`
`
`
`
`specific code hasto be entered.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Advantageously the deblocking code, whichis to be supplied to return to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`normal operating mode, is formed by the pin code (Personal Identity Number) which is
`
`
`
`
`
`
`
`
`
`
`
`contained in the identification module (compare standardsrelating to the GSM
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`radiotelephony systems). Thusthe user need not store an additional code to ensure the
`
`
`
`
`protection of his device.
`
`
`
`
`
`
`
`
`
`
`
`
`15
`
`
`20
`
`
`25
`
`
`30
`
`Page 8 of 175
`
`Page 8 of 175
`
`Page 8 of 175
`
`Page 8 of 175
`
`
`
`
`
`PHF 99.624
`
`
`
`3
`
`01.12.2000
`
`
`
`
`
`
`
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`These and other aspects of the invention are apparent from and will be
`
`
`
`
`
`
`
`
`
`
`
`elucidated, by way of non-limitative example, with reference to the embodiments) described
`
`hereinafter.
`
`
`
`
`
`
`
`In the drawings:
`
`
`
`
`
`
`
`
`Fig. 1 represents a device in accordance with the invention,
`
`
`
`
`
`
`
`
`
`
`
`
`
`Fig. 2 represents an overall electric diagram ofthe device of Fig. 1, and
`
`
`
`
`
`
`
`
`
`
`
`
`
`Fig. 3 represents a flow chart explaining the operation ofthe device of Fig. 1.
`
`
`
`
`
`~
`
`
`
`5
`
`
`10
`
`
`
`15
`
`
`
`20
`
`x
`~
`
`
`
`
`
`
`
`
`
`DESCRIPTION OF A PREFERRED EMBODIMENTOF THE INVENTION
`
`
`
`
`
`
`
`
`
`
`
`
`In Fig. 1 is represented an electronic device in accordance with the invention.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In the example described here this device is a portable radiotelephoneof the type used in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`cellular systems. It notably comprises a microphone5, a loudspeaker6, a screen 8, a keypad
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`9 and an antenna 11. The device 1 also comprises a housing 12 intended for accommodating
`
`
`
`
`
`
`
`
`
`
`
`
`
`a user identification module 13. In the example of embodimentdescribed here,this
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module 13 is a portable card of an integrated circuit in which information is
`
`
`
`
`
`
`
`
`
`
`
`stored, notably an international identification number currently called IMSI number, and a
`
`
`
`
`
`
`
`Personal Identification Numbercurrently called PIN code.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Fig. 2 showsthe overall electrical diagram ofthis device. The operation ofthe
`nicroprocessor ass¢mbly 20 which comprises a
`deviceis, in essence, controlled by a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`microprocessor 22 to which are associated a random access memory 24 and a read-only
`}
`memory 26. This assembly is connectetl
`to a man-machineinterface 30 via a commonline
`Sands
`
`
`
`
`
`
`
`
`
`
`
`
`
`i »
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`32. This man-machineinterface 32 contfols the screen 8 and the keypad 9. The commonline
`/5 32 also connects the microprocessor assetnbly 20 to a transceiver assembly 35 via an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`interface circuit 38. The transceiver assembly is connected to the antenna 11. Finally, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`commonline 32 also connects the microprocessor assembly 20 to a card reader 39.
`
`
`
`
`
`
`
`
`
`
`
`
`In Fig. 3 is represented a function flow chart of a device in accordance with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the invention. This flow chart starts at box K1. In box K1 the deviceis in a state of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`30_—availability, that is to say that the user has accessto all the functions of the device. The user
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`has the choice ofeither or not locking his device. This locking (L)/unlocking (UL) is done by
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`accessing a configuration menu of the device. When the user locks his device (box K2), the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification modulethatis inside the device is automatically linked to the device. For this
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`purpose,the device starts reading a data D1 in the identification module (for example, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 9 of 175
`
`Page 9 of 175
`
`Page 9 of 175
`
`Page 9 of 175
`
`
`
`
`PHF 99.624
`
`
`
`
`
`
`
`5
`
`
`10
`
`
`
`
`
`
`
`
`
`
`20
`
`
`25
`
`
`30
`
`01.12.2000
`4
`
`
`
`
`
`
`
`
`
`
`
`
`internationalidentification number IMSI) andhestoresit in the random-access memory 24.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Once locked, the device remainsin the state of availability indicated in box K1. When the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`deviceis in the state of availability, one looks whetherit is locked (box K3).Ifit is not
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`locked (arrow N3), the device remainsin the state of availability indicated in box K1. Ifit is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`locked (arrow Y3), one looks whetherthe identification module whichis placedinside the
`
`
`
`
`
`
`
`
`
`
`
`
`device is the one thatis linked to the device (box K4).
`
`
`
`
`
`
`
`
`
`
`
`
`
`If the identification module, whichis placed inside the device, is not the one
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`that is linked to the device (arrow N4), the device goesto a first blocking state indicated in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`box KS.In this first blocking state, the device is disconnected from the network. Thus it can
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`no longer receive an incomingcall nor transmit an outgoing call (possibly with the exception
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`of emergency numbers). In the blocking state K5, the screen shows a messageinviting the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`user to insert the proper module into the device. And whenthe user inserts a new module,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`one looks whether this new identification moduleis the one that is connected to the device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(box K7). If this is the case (arrow Y7), the device is reconnected to the network in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`accordance with the normal procedure (box K8)and then the device returns to the state of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`availability indicated in box K1. If not (arrow N7), the operation is resumed in box K5. The
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`only way ofleavingthis first blocking state is thus to place the identification modulethatis
`
`
`
`
`
`
`
`linked to the device inside the device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`If the identification module thatis placed inside the device is linked to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device (arrow Y4), one looks whether the device has remainedin the state of availability for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a certain period of time T of the order of several minutes, for example (box K10). If this is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`not the case (arrow N10), the device remainsin the state of availability indicated in box K1.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`If this is the case (arrow Y10), the device passes on to a second blockingstate indicated in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`box K11 by passing throughan initialization step K12 which permitsto initialize a variable A
`
`
`
`
`
`
`
`
`
`
`
`
`
`which represents the number of attempts made at supplying a deblocking code (for example,
`
`
`
`
`
`the Personal Identification Number) PIN.
`
`
`
`
`
`
`
`
`
`
`
`In this second blockingstate the device only processes incomingcalls (box
`
`
`
`
`
`
`
`
`
`
`
`
`
`K13) and, possibly, the outgoing calls that correspond to emergency numbers (box K14).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Once these calls have been processed, the device goes back to the second blocking state
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`indicated in box K11. In the second blocking state K11 a message inviting the user to supply
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a deblocking code is displayed on the screen.If the code taken by the user is recognized
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(arrow Y11), the device goes back to the state of availability indicated in box K1. If it is not
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`recognized (arrow N11), the value of the variable A is tested (box K15), If this value is lower
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`than a certain figure (for example 3), the value of A is augmented by unity (box K16) and a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 10 of 175
`
`Page 10 of 175
`
`Page 10 of 175
`
`Page 10 of 175
`
`
`
`
`PHF 99.624
`
`
`
`5
`
`
`
`01.12.2000
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`messageis displayed on the screento indicate the user that the code is not valid (box K17).
`
`
`Then the device goes back to the second blockingstate indicated in box K11. If the variable
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`A is higher than or equal to said figure, the test of box K15 causes the total blocking of the
`
`
`
`device indicated in box K30. To leave this third blocking state it is necessary to contact the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`organization that provides the identification module. Oneis then again in thestate of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`availability K1.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In another embodimentof the invention, when the user locks the telephone,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the device asks for the user's name. The name givenbythe useris stored in the random
`
`
`
`access memory 24 of the device. When the identification modulethat is inside the deviceis
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`not the onethatis linked to the device, the device displays the nameof the user before asking
`
`
`
`him to insert his identification module as indicated in box K5. The device also displays the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`name ofthe user before asking him to supply his personal codeas indicated in box K11.
`
`
`
`
`
`
`
`
`
`
`
`The embodimentthat has just been describedis particularly effective, because
`
`
`
`it provides two separate blocking modes depending on whetherthe identification module that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`is placed inside the deviceis either or not linked to the device. The first blocking modeis
`
`applied in the case where the device has beenlostor stolen. The object is then to prevent the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device being usable with anotheridentification module. It thus advantageously blocks the
`
`
`
`incoming and outgoingcalls at the same time. The second blocking modeis appliedin the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`case wherethe identification modulethat is linked to the deviceis in its place inside the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device and the deviceis in a state of availability. The object is to prevent a third party being
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`able to send outgoing calls with this device if it is lost, stolen or left without attendance for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`sometime. In that case, it is desirable for the user to be able to continueto directly receive
`
`
`
`
`
`20
`
`his incomingcalls.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In another embodiment the same blocking meansare used as the identification
`
`
`
`
`25
`
`module whichis placed inside the device either or not linked to the device, for example, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second blocking means.In that case it is possible for receiving incomingcalls intended for
`
`
`
`
`
`
`
`
`
`
`
`
`
`the identification module that is inside the device, even whenthis identification module
`
`
`
`placed inside the device is not linked to the device.
`
`
`
`
`
`
`
`
`
`
`
`nBhs ,
`aa
`
`Page 11 of 175
`
`Page 11 of 175
`
`Page 11 of 175
`
`Page 11 of 175
`
`
`
`
`
`PHF 99.624
`
`
`;
`
`CLAIMS:
`
`
`
`6
`
`
`
`01.12.2000
`
`
`
`
`A mobile radiotelephony device intended for accommodating a user
`1.
`
`
`
`
`
`
`
`identification module, said device comprising:
`
`
`
`
`
`— connecting meansfor establishinga link between the device and the identification module
`
`mounted inside the device,
`‘
`
`
`
`
`—- blocking meansfor preventing the ndgmal operation ofthe device,
`
`
`
`
`
`
`
`
`
`
`
`— test meansfor activating the blocking means whenthe identification module mounted
`
`
`
`
`
`
`
`
`
`
`
`inside the device is not the onethatis liked to the device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`.
`
`5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`characterized in that it comprises:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`- timing meansfor activating the blocking means after the device has been inactive for a
`defined period of time,
`19
`
`
`
`
`
`
`_ — and deblocking meansfor permitting normal‘operation ofthe device when the
`os C ‘
`
`
`
`
`
`
`
`
`
`
`
`
`identification module placed inside the device js the onethat is linked to the device and
`om > ‘|
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`UV of whenadeblocking code issuppliedby theuser.
`
`
`
`
`
`
`
`
`
`
`A device as claimed in claim 1, characterized in that said blocking means
`2,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`comprise first blocking meansfor preventing the transrhission and reception of calls when the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`identification module placed inside the device is not the\one that is linked to the device, and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second blocking means for preventing the sendingofcalls after a defined period oftime
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`during which the device has been inactive, with the exception of one or various emergency
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`~numbers.
`
`
`
`
`
`
`
`
`
`
`
`:
`-
`
`5
`
`
`20
`
`
`
`3.
`
`
`
`A device as claimed in claim 1, characterized ik
`
`
`
`
`
`
`
`that it comprises
`
`
`
`
`
`
`locking/unlocking meansfor locking/unlocking the device, while said blocking means can
`
`
`
`
`
`
`
`
`
`
`
`
`
`only be activated when the device is locked, and said link is established while the device is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`25__being locked.
`
`
`
`
`
`
`
`4,
`
`A device as claimed in claim 1, characterized in that\said connecting means
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`comprise means for reading and storing a datastored in the identificktion module, and in that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 12 of 175
`
`Page 12 of 175
`
`Page 12 of 175
`
`Page 12 of 175
`
`
`
`
`
`PHF 99.624
`
`
`01.12.2000
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`said test means comparethis data thus stored with the data stored in the identification module
`
`
`
`
`
`
`that is placed inside the device.
`
`
`
`7
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device whenthe identification module placed inside
`
`
`
`
`
`
`
`
`
`
`
`
`
`| !
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`20
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`5.
`A device as claimed in\claim 3, characterized in that said data is formed by the
`
`
`
`
`
`
`
`
`
`international identification number stofed in the user identification module.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`claim 1, characterized in that said deblocking codeis
`A device as claimed in
`6.
`
`
`
`
`
`
`
`
`
`
`
`formed by the personalidentification number stored in the identification module.
`
`
`
`10x
`A methodofprotecting amobile radiotelephony device intended for
`
`
`
`
`
`
`
`
`
`
`accommodating a user identification module, said method comprising the following steps:
`
`
`
`
`
`
`
`
`
`
`
`
`ul N - setting up a link between the device and the identification module placed inside the
`
`
`
`2 fhT
`device,
`|
`
`
`
`
` testing to verify whether the identification module placed inside the device is the one that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`|
`15
`islinkedtothedevice,
`
`
`
`
`
`
`
`
`— blocking the normal operation of the
`
`
`
`
`
`
`
`
`the device is not the one that is linked to the device,
`
`
`
`
`
`
`
`
`
`characterized in that it comprises the following steps:
`
`
`
`
`
`
`
`— detection of a period of inactivity of the\device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` — blocking of the normaloperation of the device whensaid period ofinactivity has been
`
`
`detected,
`\
`
`- deblocking which permits the normal opetation ofthe device when theidentification
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`miodule placed inside the deviceis the one|that is linked to the device and when a
`
`
`
`
`
`
`
`
`deblocking code has been supplied by the user.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`8. A methodas claimed in claim 6ofprotecting a mobile radiotelephony device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`characterized in that it comprises a step of locking the device, while the blocking steps can
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`only be executed whenthe deviceis locked, and the step of establishing a link between the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device andthe identification module placed inside\the device is executed when the device is
`
`
`30~—locked.
`
`
`
`
`
`
`9.
`
`
`
`
`
`
`
`
`
`
`
`
`
`A methodas claimedin claim 6 of protecting a mobile radiotelephony device,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`characterized in that the step of establishing a link between the device and the identification
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`module placed inside the device comprises a step of reading and storing a data storedin said
`
`
`
`Page 13 of 175
`
`Page 13 of 175
`
`Page 13 of 175
`
`Page 13 of 175
`
`
`
`PHF99.624
`
`
`
`
`01.12.2000
`8
`1
`
`
`identification module, and in that the test step comprises comparing the data thus stored with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`\
`
`the data stored in the identification module thatis placed inside the device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`e
`.
`.
`.
`10.
`A computer program compkising means for implementing a method as claimed
`
`
`
`
`
`
`
`
`
`
`
`
`in claim 7 of protecting a mobile radiotelephony device.
`
`
`
`
`
`
`
`
`
`
`-
`
`c f
`
`
`
`weu 4
`
`
`
`
`
`
`se f
`XD ‘
`
`
`5
`
`
`
`
`
`
`Page 14 of 175
`
`Page 14 of 175
`
`Page 14 of 175
`
`Page 14 of 175
`
`
`
`
`PHF 99.624
`
`
`
`ABSTRACT:
`
`
`
`
`
`9
`
`01.12.2000
`
`
`
`
`
`
`
`
`
`
`
`The invention proposes a method of protecting a mobile radiotelephony device
`
`
`
`
`
`
`
`
`
`
`
`
`
`intended for accommodatinga user identification module to be able to operate. The invention
`
`
`
`
`
`
`
`
`
`
`has forits object to protect such a device againsttheft.
`
`
`
`
`
`
`
`
`
`
`For this purpose, a device in accordance with the invention comprises means
`
`
`
`
`
`
`5.
`
`
`for:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`— preventing the use of the device with an identification module other than the user’s,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`— asking the user for a deblocking code after a short time that the devi