CA2207651A1 - Information terminal - Google Patents

Information terminal

Info

Publication number
CA2207651A1
CA2207651A1 CA002207651A CA2207651A CA2207651A1 CA 2207651 A1 CA2207651 A1 CA 2207651A1 CA 002207651 A CA002207651 A CA 002207651A CA 2207651 A CA2207651 A CA 2207651A CA 2207651 A1 CA2207651 A1 CA 2207651A1
Authority
CA
Canada
Prior art keywords
wireless communication
management equipment
information terminal
information
control device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002207651A
Other languages
French (fr)
Inventor
Kiyoshi Matsumoto
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitsubishi Electric Corp
Original Assignee
Mitsubishi Electric Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Corp filed Critical Mitsubishi Electric Corp
Publication of CA2207651A1 publication Critical patent/CA2207651A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • H04W8/265Network addressing or numbering for mobility support for initial activation of new user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/10Metering calls from calling party, i.e. A-party charged for the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)

Abstract

With known information terminals, the method of inputting the telephone number or like information directly from a keyboard on the terminal does not require a specialized writing implement but there have been problems with this method such as input errors occurring easily and the time consuming process of inputting all items. The information terminal relating to the present invention includes a wire communication device which obtains a telephone number for wireless telephone communication via wire lines from management equipment which manages users, a control device which stores the aforementioned telephone number for wireless telephone communication, and a wireless communication device which conducts wireless communication using the aforementioned telephone number for wireless telephone communication, wherein registration of information such as the telephone number, encryption key, and the like can be conducted in a speedy and sure manner without necessitating human intervention. Also, there is little danger of the encryption key falling into other hands upon registration thereof, since the encryption key does not pass through a third party such as a dealer.

Description

CA 022076~1 1997-06-12 INFORMATION TERMINAL

The present invention relates to an information terminal for wire communication functions, and for wireless communication functions such as cellular telephones, mobile telephones, wireless packet communications, or the like, ~ within a single terminal.
Description of an information terminal according to the prior art will now be made with reference to Fig. 26. In Figure 26, the wireless communication system comprises an information terminal 1, user data management equipment 2, base station equipment 3, wireless telephone office 6, and dealer or equipment supplier 7. The user data management equipment 2 and multiple base station equipment 3 are connected by a dedicated line 5, although Figure 26 only shows one base station equipment location.
Also, in Figure 26, the aforementioned information terminal 1 comprises a control device 11, a terminal antenna 12, and a wireless communication device 13 complying with cellular telephone standards or CDPD (Cellular Digital Packet Data) standards.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN (Electronic Serial Number) 113, which is a serial number unique to the terminal, is stored within the ROM 112. The information CA 022076~1 1997-06-12 storage device 115 is a memory device such as EEPROM, flash ROM, battery-backed-up RAM, or the like which maintains memory even in the event that the power is turned off. With cellular telephones such as AMPS (Advanced Mobil Phone Service), the aforementioned information storage device 115 stores a NAM (Number Assignment Module), telephone numbers 116, an encryption key 117, and the like.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU or the like, an ESN data table 22 which includes terminal data of a plurality of users, a telephone number table 23, an encryption key table 24, and controls for each of the tables. Also, the aforementioned tables are situated on a large-capacity hard disk device (HDD).
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU or the like, a base station antenna 32, and wireless communication equipment 33.
With the known information terminal (including cellular telephones and mobile telephones) 1, application to the wireless telephone office (operator) 6 and registration must be conducted at the time of purchase in order to make the information terminal actually usable. First, the serial number ESN 113 which is unique to the user terminal is reported to the wireless telephone office 6, following which the wireless telephone office 6 assigns a NAM telephone CA 022076~1 1997-06-12 number to that terminal and notifies the user thereof, as well as registering the ESN and telephone number in the user data management equipment 2. The user inputs the NAM
telephone number to his / her own terminal, and only then does the terminal becomes usable.
In other words, registration of the ESN and telephone number must be conducted by the two parties: the wireless telephone office 6; and the user. Also, registration of an encryption key becomes necessary as well, in the event that the user desires such. This key is used in wireless communication to determine whether the connection request is from a legitimate user or not. In practice, a dealer 7 often performs the user-side registration.
With known cellular telephones and mobile telephones, there are two ways by which the NAM telephone number is registered to the user's terminal: the user inputting directly from a keyboard on the terminal; and by the dealer 7 using a specialized writing device. While the method of inputting directly from a keyboard on the terminal does not require a specialized device there are problems with this method such as input errors and the time involved in inputting all items. Particularly, the encryption key 117 for AMPS and D-AMPS (Dual AMPS) systems has up to 26 digits, and is not suitable for input from a keyboard.
Although it is preferable that the encryption key be changed periodically, considering the consequences of the CA 022076~1 1997-06-12 encryption key falling in other hands, it is not very practical for a user to input an encryption key up to 26 digits in length from a keyboard on the terminal. Also, when changing the encryption key with the known system, registration must again be made with the wireless telephone office (operator) 6.
Further, with the known system, in order to confirm whether the telephone number, ESN, or encryption key of one's information terminal 1 has not been stolen and used without authorization one would have the wireless telephone office 6 send communications records compiled by the wireless telephone office 6 such as communication history wireless communication bills, or the like, and the user would then compare these records one with another to confirm the contents thereof and thus judge whether or not the telephone number, ESN, or encryption key is being used without authorization. However, there are limits to the extent that all of the communication records can be checked by human means, and thus unauthorized usage of stolen ESNs and telephone numbers for communication is a perpetual problem.
Further, in cases where alterations need to be made in the control program in the wireless information terminal, such as cases where the control program in the wireless information terminal is faulty and the program must be corrected, or in cases where the user desires to upgrade the CA 022076~1 1997-06-12 program to a higher version to correspond with new functions, the known system necessitates temporary collection of the terminal for writing to be conducted by means of a specialized device. This has resulted in increased costs for collection, investment costs for the writing device and labor costs for writing.
While the method of inputting directly from a keyboard on an information terminal such as described above does not require a specialized writing device there are problems with this method such as the likelihood of input errors and the process belng time consuming.
In the event that the user has a dealer to conduct the writing of the telephone number, etc., a specialized writing implement is often employed for this, but there are problems with this, such as that the dealer needs a computer for writing and a specialized adapter, resulting in substantial facility investment in order to install such equipment in all dealer locations. Also, in this case, a third party becomes involved in the encryption key writing process, thus creating the possibility that the information of the encryption key may fall into other hands.
Further, there are problems with the known system, in that in order to confirm whether the telephone number, ESN, or encryption key of one's information terminal has not been stolen and used without authorization one would need to have the wireless telephone office send communications lists CA 022076~1 1997-06-12 compiled by the wireless telephone office (operator), and the user would then compare these lists one with another to confirm the contents thereof and thus judge whether or not the telephone number, ESN, or encryption key is being used without authorization. However, there are limits to the extent all of the communication records can be checked by human means, and thus unauthorized usage of stolen ESNs and telephone numbers for communication has been a perpetual problem.

SUMMARY OF THE INVENTION
Accordingly, the present invention has been made in view of the above-described problems, and it is an object thereof to provide an information terminal wherein registration of the ESN to the telephone office and registration of the telephone number, NAM, and encryption key to the terminal can be conducted in a speedy and sure manner without necessitating human intervention.
Also, the present invention has been made in view of the above-described problems, and it is another object thereof to provide an information terminal wherein information respecting the encryption key does not fall into other hands upon conducting the process of registration of the encryption key.
Further, the present invention has been made in view of the above-described problems, and it is another object CA 022076~1 1997-06-12 thereof to provide an information terminal wherein alteration of the control program thereof and upgrading the control program thereof to a higher or later version can be conducted easily without human intervention.
Further yet, the present invention has been made in view of the above-described problems, and it is another object thereof to provide an information terminal wherein the encryption key can be changed in an easy and sure manner so that unauthorized use thereof can be prevented even in the event that the encryption key does fall into other hands.
Moreover, the present invention has been made in view of the above-described problems, and it is another object thereof to provide an information terminal wherein the user can discover whether or not one's terminal number or ESN is being used by another individual.
The information terminal relating to the present invention comprises: a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users; a control device which stores the aforementioned information pertaining to wireless communication; and a wireless communication device which conducts wireless communication using the aforementioned information pertaining to wireless communication.

CA 022076~1 1997-06-12 Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises a telephone number.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device so as to notify the aforementioned management equipment of ESN via the aforementioned wire line, and so as to obtain a telephone number for wireless telephone assigned by the aforementioned management equipment, and further to store the aforementioned obtained telephone number for wireless telephone in an information storage device within the aforementioned control device, and wherein the aforementioned wireless communication device conducts wireless communication using the aforementioned stored telephone number for wireless communication.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises an IP
address.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device so as to notify the aforementioned management equipment of ESN via the aforementioned wire line, and so as to obtain an CA 022076~1 1997-06-12 IP address assigned by the aforementioned management equipment, and further to store the aforementioned obtained IP address in an information storage device within the aforementloned control device, and wherein the aforementioned wireless communication device conducts wireless communication using the aforementioned stored IP
address.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises a wireless communication control program.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device so as to notify the aforementioned management equipment of a new wireless communication control program request via the aforementioned wire line, and so as to obtain a new wireless communication control program from the aforementioned management equipment, the aforementioned wireless communication control program being stored therein, and further to store the aforementioned obtained new wireless communication control program in an information storage device within the aforementioned control device, and wherein the aforementioned wireless communication device conducts wireless communication using the aforementioned stored new wireless communication control program.

CA 022076~1 1997-06-12 Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprlses an encryption key.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device changes the encryption key by using a certain algorithm for generating a first code based on a first ESN, a first telephone number and a first encryption key stored within an information storage device within the aforementioned control device, and controls the aforementioned wire communication device so as to notify the aforementioned management equipment of an encryption key change request and to send the aforementioned first ESN, the aforementioned first telephone number and the aforementioned first code via the aforementioned wire line, the aforementioned management equipment using an algorithm which is the same as the aforementioned certain algorithm for generating a second code based on a second ESN, a second telephone number and a second encryption key, the aforementioned second numbers corresponding to the aforementioned first ESN and the aforementioned first telephone number, following which the aforementioned second code and the aforementioned first code are compared, and in the event that the aforementioned codes correspond, the aforementioned control device obtains from the CA 022076~1 1997-06-12 aforementioned management equipment via the aforementioned wire line the new encryption key generated based on the aforementioned second ESN, and wherein the aforementioned wireless communication device conducts wireless communication using the aforementioned obtained new encryption key.
Moreover, the information terminal relating to the present invention comprises: a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users; a control device which stores and processes the aforementioned information pertaining to wireless communication; and a wireless communication device which conducts wireless communication.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises communication lists.
Also, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device upon inspecting communication lists so as to notify the aforementioned management equipment of parameters unique to the aforementioned terminal via the aforementioned wire line, and so as to obtain a first communication list corresponding with the aforementioned parameters unique to CA 022076~1 1997-06-12 the aforementioned terminal from the aforementioned management equipment via the aforementioned wire line, and further to compare a second communication list stored in an information storage device within the aforementioned control device with the aforementioned first communication list.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises wireless call charges.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device upon inspecting wireless call charges so as to notify the aforementioned management equipment of parameters unique to the aforementioned terminal via the aforementioned wire line, and so as to obtain first wireless call charges corresponding with the aforementioned parameters unique to the aforementioned terminal from the aforementioned management equipment via the aforementioned wire line, and further to compare second wireless call charges stored in an information storage device within the aforementioned control device with the aforementioned first wireless call charges.

CA 022076~1 1997-06-12 BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a block diagram illustrating the configuration of a first embodiment according to the present invention;
Fig. 2 is a diagram illustrating the operation sequence of a first embodiment according to the present invention;
Fig. 3 is a flowchart illustrating the operation of a first embodiment according to the present invention;
Fig. 4 is a flowchart illustrating the operation of user data management equipment relating to a first embodiment according to the present invention;
Fig. 5 is a block diagram illustrating the configuration of a second embodiment according to the present invention;
Fig. 6 is a diagram illustrating the operation sequence of a second embodiment according to the present invention;
Fig. 7 is a flowchart illustrating the operation of a second embodiment according to the present invention;
Fig. 8 is a flowchart illustrating the operation of user data management equipment relating to a second embodiment according to the present invention;
Fig. 9 is a block diagram illustrating the configuration of a third embodiment according to the present invention;

CA 022076~1 1997-06-12 Fig. 10 is a diagram illustrating the operation sequence of a third embodiment according to the present invention;
Fig. 11 is a flowchart illustrating the operation of a third embodiment according to the present invention;
Fig. 12 is a flowchart illustrating the operation of user data management equipment relating to a third embodiment according to the present invention;
Fig. 13 is a block diagram illustrating the configuration of a fourth embodiment according to the present invention;
Fig. 14 is a diagram illustrating the operation sequence of a fourth embodiment according to the present invention;
Fig. 15 is a diagram for describing the code generating algorithm of a fourth embodiment according to the present invention;
Fig. 16 is a flowchart illustrating the operation of a fourth embodiment according to the present invention;
Fig. 17 is a flowchart illustrating the operation of user data management equipment relating to a fourth embodiment according to the present invention;
Fig. 18 is a block diagram illustrating the configuration of a fifth embodiment according to the present invention;

CA 022076~1 1997-06-12 Fig. 19 is a diagram illustrating the operation sequence of a fifth embodiment according to the present nventlon;
Fig. 20 is a flowchart illustrating the operation of a fifth embodiment according to the present invention;
Fig. 21 is a flowchart illustrating the operation of user data management equipment relating to a fifth embodiment according to the present invention;
Fig. 22 is a block diagram illustrating the configuration of a sixth embodiment according to the present invention;
Fig. 23 is a diagram illustrating the operation sequence of a sixth embodiment according to the present invention;
Fig. 24 is a flowchart illustrating the operation of a sixth embodiment according to the present invention;
Fig. 25 is a flowchart illustrating the operation of user data management equipment relating to a sixth embodiment according to the present invention; and 2~ Fig. 26 is a block diagram illustrating the configuration of a wireless communication system including a privately known but unpublished information terminal.

CA 022076~1 1997-06-12 First Embodiment Description of the first embodiment according to the present invention will be made with reference to Figs. 1 through 4. Fig. 1 is a block diagram illustrating the configuration of the first embodiment according to the present invention. Fig. 2 is a diagram illustrating the operation sequence of the first embodiment according to the present invention. Fig. 3 and Fig. 4 are flowcharts illustrating the operation of the first embodiment according to the present invention. In the Figures, identical reference numerals or reference characters represent identical or equivalent items.
In Fig. 1, the wireless communication system comprises an information terminal lA, user data management equipment 2, and base station equipment 3. The information terminal lA and user data management equipment 2 are connected by a public wire line 4. The user data management equipment 2 and multiple locations of base statlon equipment 3 are connected by a dedicated line 5, although Figure 1 only shows one base station equipment location.
Also, in Figure 1, the aforementioned information terminal lA comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS (Advanced Mobil Phone Service), D-AMPS (Dual AMPS), CDMA (Code CA 022076~1 1997-06-12 Division Multiple Access), PDC (Personal Digital Cellular), or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN (Electronic Serial Number) 113, which is a serial number unique to the terminal, is stored within the ROM 112. The information storage device 115 is a memory device such as EEPROM, flash ROM, battery-backed-up RAM, or the like which maintains memory even in the event that the power is turned off~ With cellular telephones such as AMPS, the aforementioned information storage device 115 stores a NAM (Number Assignment Module), telephone number 116, and an encryption key 117 which is used for wireless line connection confirmation. The ESN 113 which serves as a serial number unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU or the like, an ESN data table 22 which contains terminal data of a plurality of users, a telephone number table 23, and encryption key table 24, control device 21 controls each of the tables. Also, the aforementioned tables are situated on a large-capacity hard disk device (HDD). Also, the user data management equipment 2 is equipment which manages the ESN and telephone number of CA 022076~1 1997-06-12 wireless telephone users, and judges whether requests for outgoing or incoming calls made by the information terminal lA are connection requests by a legitimate user or not.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU or the like, a base station antenna 32, and wireless communication equipment 33. The aforementioned base station equipment 3 is base station equipment for cellular telephone, such as AMPS, D-AMPS, CDMA, or the like.
The aforementioned NAM 116 is part of the parameters unique to the terminal which are necessary for wireless communication, such as a telephone number, and the like.
The telephone number for wireless telephone of the AMPS
system is equivalent to this NAM 116.
First, at the time of purchase of the information terminal lA by the user, the NAM (telephone number) is not registered in the information storage device 115 within the information terminal lA. Wireless communication can not be made in this state, since the telephone number for wireless telephone (NAM) is not registered within the terminal. The following is a description of the registration procedures of the NAM (telephone number) according to this first embodiment.
In this state, the control device 11 of the information terminal lA controls the wire communication device 14 so as to connect to the user data management equipment 2 via CA 022076~1 1997-06-12 public wire line 4, and issues a line connection request (Steps 130 through 131 of Figure 3). Subsequently, the control device 11 of the information terminal lA reads out the ESN information from the ROM 112 within the control device 11, and sends the ESN information of the terminal to which it belongs, and at the same time, also sends a telephone number assignment request (Steps 132 through 134 of Figure 3). In the event that the ESN information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal lA has no other function, sending of the ESN
information means requesting of telephone number assignment, and there is no need to conduct a separate operation of sending a telephone number assignment request.
On the other hand, upon receiving the line connection request and telephone number assignment request from the information terminal lA, the user data management equipment 2 waits for reception of the ESN, and upon reception of such, conducts telephone number assignment (Steps 200 through 203 Figure 4). The user data management equipment 2 also adds the sent ESN data to the ESN data table 22.
Further, after the line connection request, the user data management equipment 2 performs any other requests that may be made (Steps 207 through 208 Figure 4).

CA 022076~1 1997-06-12 In other words, the user data management equipment 2 assigns a NAM (telephone number for wireless telephone) for the information terminal corresponding with the ESN thereof, and adds the NAM to the telephone number table 23. The user data management equipment 2 also generates an encryption key which is stored in the encryption key table 24, and sends the encryption key along with the assigned telephone number for wireless telephone to the information terminal lA via the public wire line 4 (Steps 204 through 206 Figure 4).
In the event that the user desires that an information terminal which does not have encryption key-related functions be handled, the above-described encryption key process is unnecessary. Thus, the registration of the information terminal lA at the user data management equipment 2 is completed.
Next, upon reception of the NAM (telephone number for wireless telephone) 116 and encryption key 117 via the public wire line 4, the information terminal lA stores these in the information storage device 115 within the control device 11, and subsequently conducts wireless telephone communication using the aforementioned telephone number for wireless telephone and encryption key (Steps 135 through 136 ~igure 3). In the case of an information terminal which does not have encryption key-related functions, wireless telephone communication are conducted using only the CA 022076~1 1997-06-12 telephone number for wireless telephone without an encryption key.
According to the information terminal lA relating to the first embodiment, registration of the NAM (telephone number) 116 and encryption key 117 are conducted directly with the user data management equipment 2 via the public wire line 4, so that there is no need for the user to register the NAM ~telephone number for wireless telephone) via a terminal keyboard, consequently specialized writing implements are unnecessary. Moreover, there is little danger of the encryption key falling into other hands upon registration thereof, since the encryption key does not pass through a third party.

Second Embodiment Description of a second embodiment according to the present invention will be made with reference to Figs. 5 through 8. Fig. 5 is a block diagram illustrating the configuration of the second embodiment according to the present invention. Fig. 6 is a diagram illustrating the operation sequence of the second embodiment according to the present invention. Fig. 7 and Fig. 8 are flowcharts illustrating the operation of the second embodiment according to the present invention.

CA 022076~1 1997-06-12 In Fig. 5, the wireless communication system comprises an information terminal lB, user data management equipment 2, and a CDPD base station 3A. The information terminal lB
and user data management equipment 2 are connected by a public wire line 4. The user data management equipment 2 and multiple CDPD base stations 3A are connected by a dedicated line 5, although the Figure only shows one CDPD
base station 3A.
Also, in the Figure, the aforementioned information terminal lB comprises a control device 11, a terminal antenna 12, a CDPD standards packet communication device 13A, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN 113 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device such as EEPROM, flash ROM, battery-backed-up RAM, or the like which maintains memory even in the event that the power is turned off. The aforementioned information storage device 115 stores an NEI (Network Entity Identifier), IP
(Internet Protocol) address 118, and an encryption key 117 which is used for wireless line connection confirmation.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU or the like, an ESN data table 22 which CA 022076~1 1997-06-12 contains terminal data of a plurality of users, an IP
address table 25, and an encryption key table 24. The aforementioned tables are situated in a large-capacity hard disk device (HDD). Moreover, the user data management equipment 2 manages the ESN and IP addresses of wireless telephone users, and determines whether requests for outgoing or incoming calls made by the information terminal lB are connection requests by a legitimate user. It also manages usage charges according to the transmission and reception of packets to and from this information terminal lB, as well as managing the ESN and NEI (IP address) of the information terminal lB of the user.
Moreover, in the Figure, the aforementioned CDPD base station 3A comprises a control device 31 which includes a CPU or the like, a base station antenna 32, and wireless communication equipment 33.
At the time of purchase of the information terminal lB
by the user, the NEI (IP address) 118 is not registered in the information storage device 115 within the information terminal lB, and CDPD wireless communication can not be effected.
In this condition, the control device 11 of the information terminal lB controls the wire communication device 14 so as to connect to the user data management equipment 2 via public wire line 4, and issues a line connection request (Steps 140 through 141 Figure 7).

CA 022076~1 1997-06-12 Subsequently, the control device 11 of the information terminal lB reads out the ESN information from the ROM 112 within the control device 11, and sends the ESN information of the terminal to which it belongs, and at the same time, also sends an IP address assignment request (Steps 142 through 144 Figure 7). In the event that the ESN
information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal lB has no other function, sending of the ESN information means requesting of IP address assignment, and there is no need to conduct a separate operation of sending an IP address assignment request.
On the other hand, upon receiving the line connection request and IP address assignment request from the information terminal lB, the user data management equipment 2 waits for reception of the ESN, and upon reception of such, conducts IP address assignment (Steps 210 through 213). The user data management equipment 2 also adds the sent ESN data to the ESN data table 22. Further, after the line connection request, the user data management equipment 2 performs any other requests that may be made (Steps 217 through 218 Figure 8).
In other words, the user data management equipment 2 assigns an NEI (IP address) for the information terminal corresponding to the ESN thereof, and adds the IP address to CA 022076~1 1997-06-12 the IP address table 25. The user data management equipment 2 also generates an encryption key which is stored in the encryption key table 24, and sends the encryption key along with the assigned IP address to the information terminal lB
via the public wire line 4 (Steps 214 through 216 Figure 8).
If the information terminal does not have encryption key-related functions, the above-described encryption key process is unnecessary. Thus, the registration of the information terminal lB at the user data management equipment 2 is completed.
Next, upon reception of the NEI (IP address) and encryption key via the public wire line 4, the information terminal lB stores these in the information storage device 115 within the control device 11, and subsequently conducts CDPD communication using the aforementioned NEI (IP address) and encryption key (Steps 145 through 146 Figure 7). In the case of an information terminal which does not have encryption key-related functions, CDPD communication is conducted using only the NEI (IP address) without an encryption key.
According to the information terminal lB relating to the second embodiment, the IP address, which is a parameter relating to wireless communication and which is unique to the terminal, is obtained directly from the user data management equipment 2 via the public wire line 4. This information is stored in the information storage device 115 CA 022076~1 1997-06-12 of the control device 11 within the information terminal lB, so that registration of the ESN to the user data management equipment 2 and registration of the NEI (IP address) and encryption key to the information terminal lB is conducted without involving a third party, and in a speedy and secure manner. Moreover, there is little danger of the encryption key falling into other hands upon registration thereof, since the encryption key does not pass through a third party such as a dealer.

Third Embodiment Description of a third embodiment according to the present invention will be made with reference to Figs. 9 through 12. Fig. 9 is a block diagram illustrating the configuration of the third embodiment according to the present invention. Fig. 10 is a diagram illustrating the operating sequence of the third embodiment according to the present invention. Fig. 11 and Fig. 12 are flowcharts illustrating the operation of the third embodiment according to the present invention.
In Fig. 9, the wireless communication system comprises an information terminal lC, a computer 2A, and base station equipment 3. The information terminal lC and computer 2A
are connected by a public wire line 4. The computer 2A and multiple locations of base station equipment 3 are connected CA 022076~1 1997-06-12 by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal lC comprises a control device 11, a terminal antenna 12, a wireless communication device 13 which complies with cellular telephone standards such as AMPS, D-AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. The information storage device 115 is a memory device, such as EEPROM, flash ROM, battery-backed-up RAM, or the like, which maintains memory even in the event that the power is turned off, and stores an old wireless communication control program 119 or the like.
Further, in the Figure, the aforementioned computer 2A
is a computer of the type which performs maintenance of a wireless communication terminal, or a wireless telephone office. The computer 2A comprises a control device 21 including a CPU or the like, and a new communication control program 26.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU or the like, a base station antenna 32, and wireless communication equipment 33.

CA 022076~1 1997-06-12 There may be situations wherein the old wireless communication control program 119 within the information terminal lC requires alteration. Situations where alterations are necessary include: cases where problems are discovered in the terminal software; cases where the software needs to be changed to correspond with the functionality of a new wireless communications system; cases where the version of the communications software installed in the wireless communications device 13 is to be upgraded;
cases where the encryption algorithm has been deciphered by another party and must be changed; or the like.
The control device 11 of the information terminal lC
controls the wire communication device 14 so as to connect to the computer 2A of the maintenance company or the like via public wire line 4, and issues a line connection request (Steps 150 through 151 Figure 11). Subsequently, the control device 11 of the information terminal lC sends a new wireless communications control program request (Step 152 Figure 11).
On the other hand, upon receiving the line connection request and a new wireless communications control program request from the information terminal lC, the computer 2A
sends the new wireless communications control program stored therein to the information terminal lC (Steps 220 through 222 Figure 12). Further, after the line connection request, CA 022076~1 1997-06-12 the computer 2A performs any other requests that may be made (Steps 223 through 224 Figure 12).
Next, upon reception of the new wireless communications control program via the public wire line 4, the information terminal lC stores this in the information storage device 115 within the control device 11, i.e., conducts over-writing of the wireless communications control program, and subsequently conducts wireless communication using the aforementioned new wireless communications control program 26 (Steps 153 through 154 Figure 11).
According to the information terminal lC relating to the third embodiment, the new control program 26 relating to wireless communication is obtained directly from the user - data management equipment 2 via the public wire line 4, and this new control program 26 is stored in the information storage device 115, so that alteration of the wireless communications control program can be conducted easily and ln a secure manner.

Fourth Embodiment Description of the fourth embodiment according to the present invention will be made with reference to Figs. 13 through 17. Fig. 13 is a block diagram illustrating the configuration of the fourth embodiment according to the present invention. Fig. 14 is a diagram illustrating the operation sequence of the fourth embodiment according to the CA 022076~1 1997-06-12 present invention. Fig. 15 is a diagram for describing the code generating algorithm of the fourth embodiment according to the present invention. Fig. 16 and Fig. 17 are flowcharts illustrating the operation of the fourth embodiment according to the present invention.
In Fig. 13, the wireless communication system comprises an information terminal lD, user data management equipment 2, and base station equipment 3. The information terminal lD and user data management equipment 2 are connected by a public wire line 4. The user data management equipment 2 and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal lD comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D-AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN -A 121 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device such as EEPROM, flash ROM, battery-backed-up RAM, or the like, which maintains memory even in the event that the power is turned off, and stores a telephone number -A 122 CA 022076~1 1997-06-12 and an encryption key -A 123. The ESN -A 121 which serves as a serial number unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU or the like, an ESN data table 22 which contains terminal data of a plurality of users, a telephone number table 23, and encryption key table 24, and controls each of the tables. Also, the aforementioned tables are situated in a large-capacity hard disk device (HDD). Also, the user data management equipment 2 is equipment which manages the ESN and telephone number of wireless telephone users, and determines whether requests for outgoing or incoming calls made by the information terminal lD are connection requests by a legitimate user.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU or the like, a base station antenna 32, and wireless communication equipment 33.
In Figs. 13 and 14, the ESN, telephone number, and encryption key registered within the information terminal lD
are denoted by ESN -A 121, telephone number -A 122, and encryption key -A 123, respectively. Also, the ESN, telephone number, and encryption key registered within the user data management equipment 2 are denoted by ESN -B 27, telephone number -B 28, and encryption key -B 29, CA 022076~1 1997-06-12 respectively. In Figures 13 and 14, the information terminal lD is in a state where wireless telephone communication is available.
In this state, when the user judges that the ESN -A
121, telephone number -A 122, or encryption key -A 123 of his / her own terminal may be being used without authorization by another party, the user uses the control device 11 of the information terminal lD to control the wire communication device 14 so as to connect to the user data management equipment 2 via public wire line 4, and issue a line connection request (Steps 160 through 161 Figure 16).
Subsequently, a code A 120 is generated using a certain algorithm, based on the ESN -B 121, telephone number -B 122, and encryption key -B 123 (Step 162 Figure 16).
Now, description of the certain algorithm for generating the code A 120 will be described with reference to Fig. 15. Fig. 15 is a diagram for describing the code generating algorithm of the fourth embodiment according to the present invention.
Fig. 15 shows an example of generating an 8-byte code in the case where the ESN is 4 bytes long, the telephone number is 3 bytes long, and the encryption key is 8 bytes long. i.e., as shown in the Figure, the 4 bytes of the ESN
are first used as the higher 4 bytes, then the next 3 bytes are comprised of the telephone number, and the lowest byte CA 022076~1 1997-06-12 is comprised of a "0", thus creating an 8-byte intermediate code.
Next, the exclusive logical sum (EX-OR) of this 8-byte intermediate code and the 8-byte encryption key is obtained, thus generating an 8-byte code.
An encryption key alteration request is then sent, and the ESN -B 121, telephone number -B 122, and generated code A are sent to the user data management equipment 2 (Steps 163 through 164 Figure 16). The old encryption key -A 123 is not sent.
On the other hand, upon receiving the line connection request and encryption key alteration request from the information terminal lD, the user data management equipment 2 waits for reception of the ESN -B 121, telephone number -B 122, and generated code A, and upon reception of such, conducts generation of a code B (Steps 230 through 233 Figure 17). Further, after the line connection request, the user data management equipment 2 performs any other requests that may be made (Steps 237 through 238 Figure 17).
In other words, the user data management equipment 2 searches the ESN data table 22 and telephone number table 23 stored within for the ESN -B 27 and telephone number -B 28 corresponding to the ESN -A 121 and telephone number -A 122 that have been sent, and also searches the encryption key table 24 for the encryption key -B 29 stored therein, and thus generates a code B 30 us-ing the same algorithm as the CA 022076~1 1997-06-12 information terminal lD based on the ESN -B 27, telephone number -B 28, and encryption key -B 29.
Next, the user data management equipment 2 compares the code A 120 sent from the information terminal lD with the internally generated code B 30. If the codes match, judgment is made that the encryption key alteration request is from a legitimate user (Step 234). On the other hand, if the codes do not match, access from the information terminal lD is denied.
If the user data management equipment 2 determines that the encryption key alteration request is from a legitimate user, the user data management equipment 2 generates a new encryption key from the ESN, stores the new encryption key in the encryption key table 24, and sends the new encryption key (Step 235 through 236 Figure 17). i.e., the user data management equipment 2 replaces the old encryption key -B 29 with the new encryption key, and sends the information terminal lD the new encryption key via public wire line 4.
Next, upon reception of the new encryption key via the public wire line 4, the information terminal lD stores this in the information storage device 115 within the control device 11, i.e., conducts replacement of the old encryption key -A 123 with the new encryption key, and subsequently conducts wireless communication using the aforementioned new encryption key (Steps 165 through 166 Figure 16).

CA 022076~1 1997-06-12 According to the information terminal lD relating to the fourth embodiment, the encryption key used for wireless line connection is obtained via the public wire line 4.
This encryption key is stored in the information storage device 115, and wireless line connection confirmation (authorization) is made using this stored encryption key.
As well, wire line connection confirmation (authorization) is made using this stored encryption key, thus performing altering of the encryption key, via public wire line 4, so that alteration of the encryption key can be conducted easily.

Fifth Embodiment Description of the fifth embodiment according to the present invention will be made with reference to Figs. 18 through 21. Fig. 18 is a block diagram illustrating the configuration of the fifth embodiment according to the present invention. Fig. 19 is a diagram illustrating the operation sequence of the fifth embodiment according to the present invention. Fig. 20 and Fig. 21 are flowcharts illustrating the operation of the fifth embodiment according to the present invention.
In Fig. 18, the wireless communication system comprises an information terminal lE, user data management equipment 2B, and base station equipment 3. The information terminal lE and user data management equipment 2B are connected by a CA 022076~1 1997-06-12 public wire line 4. The user data management equipment 2B
and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal lE comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D-AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN 113 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device such as EEPROM, flash ROM, battery-backed-up RAM, or the like, which maintains memory even in the event that the power is turned off, and stores a NAM (telephone number) 116, an encryption key 117, communication histories B 124, and the like. The ESN 113 which serves as a serial number unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2B comprises a control device 21 which includes a CPU or the like, and a communication histories table 40 stored in a hard disk device (HDD) or the like.

CA 022076~1 1997-06-12 Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU or the like, a base station antenna 32, and wireless communication equipment 33.
In Figs. 18 and 19, in the event that a connection request from the information terminal lE to the base station equipment 3 (outgoing call) or a connection request from the base station equipment 3 to the information terminal lE
(incoming call) occurs, the communication history thereof is stored in the communication history list A 41 within the communication history table 40 in the user data management equipment 2B.
This aforementioned communication history list A is comprised of the telephone number of the other party (regardless of whether the call was made from the information device to the other party or vice versa), the date and time of the call, the duration of the call, etc.
This communication history list A is managed by the ESN or telephone number. The information terminal lE also stores a wireless communication history list in the information storage device 115 within the information terminal lE in the form of communication history lists B 124. The contents of this communication history list B are the same as those of the aforementioned communication history list A.
The control device 11 within the information terminal lE accesses the user data management equipment 2B via the CA 022076~1 1997-06-12 public wire line 4 either periodically or on demand by the user, and obtains the communication history list A compiled by the base station equipment 3 and user data management equipment 2B.
More specifically, the control device 11 of the information terminal lE controls the wire communication device 14 so as to connect to the user data management equipment 2B via public wire line 4, and issues a line connection request ~Steps 170 through 171 Figure 20).
Subsequently, the control device 11 of the information terminal lE reads out the ESN information 113 from the ROM
112 within the control device 11, and sends the ESN
information of the terminal to which it belongs, and at the same time, also sends a communication history list request (Steps 172 through 174 Figure 20). In the event that the ESN information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal lE has no other function, sending of the ESN information means requesting of communication histories, and there is no need to conduct a separate opération of sending a communication history list request.
On the other hand, upon receiving the line connection request and communication history request from the information terminal lE, the user data management equipment CA 022076~1 1997-06-12 2B waits for reception of the ESN, and upon reception of such, conducts a search of the corresponding communication history (Steps 240 through 243 Figure 21). Further, after the line connection request, the user data management equipment 2B performs any other requests that may be made (Steps 245 through 246 Figure 21). -In other words, the user data management equipment 2Bsearches the communication history A (telephone number of other party, date and time of call, duration of call, etc.) 41 corresponding with the sent ESN from the communication history table 40, and sends the communication history list A
to the information terminal lE via the public wire line 4 (Steps 243 through 244 Figure 21).
Next, upon reception of the communication A 41 sent via public wire line 4, the control device 11 within the information terminal lE compares this communication history list A 41 with the communication history list B 124 stored within the information storage device 115 (Steps 175 through 176 Figure 20). If these match, one can thus know that the ESN, telephone number (NAM), or encryption key of one's information terminal have not been stolen and used without authorization on another information terminal. On the other hand, if the comparison shows that the communication history list A 41 contains a call which is not in the communication history list B 124, there is the possibility that another party may have stolen and be using the ESN, telephone number CA 022076~1 1997-06-12 (NAM), or encryption key thereof. The local telephone number (NAM) may be sent to the user data management equipment 2B via the public wire line 4 instead of sending the ESN, so as to obtain the communication history list A
41.
According to this fifth embodiment, a wireless communication history list A unique to the terminal which has been compiled by the base station is obtained via public wire line 4, and a wireless communication history list B
compiled within the terminal itself is stored therein.
Comparison is made between the wireless communication list A
unique to the terminal which has been compiled by the base station and wireless communication list B compiled within the terminal itself, thus allowing for discovery of whether or not one's terminal number or ESN is being used without authorization by another party.

Sixth Embodiment Description of the sixth embodiment according to the present invention will be made with reference to Figs. 22 through 25. Fig. 22 is a block diagram illustrating the configuration of the sixth embodiment according to the present invention. Fig. 23 is a diagram illustrating the operation sequence of the sixth embodiment according to the present invention. Fig. 24 and Fig. 25 are flowcharts CA 022076~1 1997-06-12 illustrating the operation of the sixth embodiment according to the present invention.
In Fig. 22, the wireless communication system comprises an information terminal lF, user data management equipment 2C, and base station equipment 3. The information terminal lF and user data management equipment 2C are connected by a public wire line 4. The user data management equipment 2C
and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal lF comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D-AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN 113 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device such as EEPROM, flash ROM, battery-backed-up RAM, or the like, which maintains memory even in the event that the power is turned off, and stores a NAM (telephone number) 116, an encryption key 117, wireless call charges B 125, and the like. The ESN 113 which serves as a serial number CA 022076~1 1997-06-12 unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2C comprises a control device 21 which includes a CPU or the like, and a wireless call charges table 42 stored on a large-capacity hard disk device (HDD) or the like.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU or the like, a base station antenna 32, and wireless communication equipment 33.
In Figs. 22 and 23, in the event that a connection request from the information terminal lF to the base station equipment 3 (outgoing call) or a connection request from the base station equipment 3 to the information terminal lF
(incoming call) occurs, the wireless call charges thereof are stored in the wireless call charges A 43 within the wireless call charges table 42 in the user data management equipment 2C. The information terminal lF also stores wireless call charges in the information storage device 115 within the information terminal lF in the form of wireless call charges B 125. The contents of the wireless call charges A 43 and the wireless call charges B 125 are added up each time a call is made.
The control device 11 within the information terminal lF accesses the user data management equipment 2C via the CA 022076~1 1997-06-12 public wire line 4 either periodically or on demand by the user, and obtains the wireless call charges A 43 compiled by the base station equipment 3 and user data management equipment 2C.
More specifically, the control device 11 of the information terminal lF controls the wire communication device 14 so as to connect to the user data management equipment 2C via public wire line 4, and issues a line connection request (Steps 180 through 181 Figure 24).
Subsequently, the control device 11 of the information terminal lF reads out the ESN information 113 from the ROM
112 within the control device 11, and sends the ESN
information of the terminal to which it belongs, and at the same time, also sends a wireless call charges request (Steps 182 through 184 Figure 24). In the event that the ESN
information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal lF has no other function, sending of the ESN information means requesting of wireless call charges, and there is no need to conduct a separate operation of sending a wireless call charges request.
On the other hand, upon receiving the line connection request and wireless call charges request from the information terminal lF, the user data management equipment 2C waits for reception of the ESN, and upon reception of CA 022076~1 1997-06-12 such, conducts searching of the corresponding wireless call charges (Steps 250 through 253 Figure 25). Further, after the line connection request, the user data management equipment 2C performs any other requests that may be made (Steps 255 through 256 Figure 25).
In other words, the user data management equipment 2C
searches the wireless call charges A 43 corresponding with the sent ESN from the wireless call charges table 42, and sends the wireless call charges A 43 to the information terminal lF via the public wire line 4 (Steps 253 through 254 Figure 25).
Next, upon reception of the wireless call charges A 43 sent via public wire line 4, the control device 11 within the information terminal lF compares the wireless call charges A 43 with the wireless call charges B 125 stored within the information storage device 115 (Steps 185 through 186 Figure 24). If these match approximately, one can thus know that the ESN, telephone number (NAM), or encryption key of one's information terminal have not been stolen and used without authorization on another information terminal. On the other hand, if the comparison shows that the wireless call charges A 43 are considerably higher than the wireless call charges B 125, there is the possibility that another party may have stolen and be using the ESN, telephone number (NAM), or encryption key thereof. The local telephone number (NAM) may be sent to the user data management CA 022076~1 1997-06-12 equipment 2C via the public wire line 4 instead of sending the ESN, so as to obtain the wireless call charges A 43.
According to this sixth embodiment, wireless call charges A unique to the terminal which has been compiled by the base station are obtained via public wire line 4, wireless call charges B compiled within the terminal itself are stored therein, and comparison is made between the wireless call charges A unique to the terminal which has been compiled by the base station and wireless call charges 8 compiled within the terminal itself, thus allowing for discovery of whether or not the one's terminal number or ESN
is being used unauthorized by another party.

Claims (14)

THE EMBODIMENTS OF THE INVENTION IN WHICH AN EXCLUSIVE
PROPERTY OR PRIVILEGE IS CLAIMED ARE DEFINED AS FOLLOWS:
1. An information terminal comprising:
a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users;
a control device which stores said information pertaining to wireless communication; and a wireless communication device which conducts wireless communication using said information pertaining to wireless communication.
2. An information terminal according to Claim 1;
wherein said information pertaining to wireless communication comprises a telephone number.
3. An information terminal according to Claim 2;
wherein said control device controls said wire communication device so as to notify said management equipment of ESN via said wire line, and so as to obtain a telephone number for wireless telephone assigned by said management equipment, and further to store said obtained telephone number for wireless telephone in an information storage device within said control device;

and wherein said wireless communication device conducts wireless communication using said stored telephone number for wireless communication.
4. An information terminal according to Claim 1;
wherein said information pertaining to wireless communication comprises an IP address.
5. An information terminal according to Claim 4;
wherein said control device controls said wire communication device so as to notify said management equipment of ESN via said wire line, and so as to obtain an IP address assigned by said management equipment, and further to store said obtained IP address in an information storage device within said control device;
and wherein said wireless communication device conducts wireless communication using said stored IP address.
6. An information terminal according to Claim 1;
wherein said information pertaining to wireless communication comprises a wireless communication control program.
7. An information terminal according to Claim 6;
wherein said control device controls said wire communication device so as to notify said management equipment of new wireless communication control program request via said wire line, and so as to obtain a new wireless communication control program from said management equipment, said wireless communication control program being stored therein, and further to store said obtained new wireless communication control program in an information storage device within said control device;
and wherein said wireless communication device conducts wireless communication using said stored new wireless communication control program.
8. An information terminal according to Claim 1;
wherein said information pertaining to wireless communication comprises an encryption key.
9. An information terminal according to Claim 8;
wherein said control device conducts changing of encryption key by using a certain algorithm for generating a first code based on a first ESN, a first telephone number and a first encryption key stored within an information storage device within said control device, and controls said wire communication device so as to notify said management equipment of encryption key change request and to send said first ESN, said first telephone number and said first code via said wire line, said management equipment using an algorithm which is the same as said certain algorithm for generating a second code based on a second ESN, a second telephone number and a second encryption key, said second numbers corresponding to said first ESN and said first telephone number, following which said second code and said first code are compared, and in the event that said codes correspond, said control device obtains from said management equipment via said wire line the new encryption key generated based on said second ESN;
and wherein said wireless communication device conducts wireless communication using said obtained new encryption key.
10. An information terminal comprising:
a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users;
a control device which stores and processes said information pertaining to wireless communication; and a wireless communication device which conducts wireless communication.
11. An information terminal according to Claim 10;
wherein said information pertaining to wireless communication comprises communication history lists.
12. An information terminal according to Claim 11;
wherein said control device controls said wire communication device upon inspecting communication history list so as to notify said management equipment of parameters unique to said terminal via said wire line, and so as to obtain a first communication history list corresponding with said parameters unique to said terminal from said management equipment via said wire line, and further to compare said a communication history list stored in an information storage device within said control device with said first communication history list.
13. An information terminal according to Claim 10;
wherein said information pertaining to wireless communication comprises wireless call charges.
14. An information terminal according to Claim 13;
wherein said control device controls said wire communication device upon inspecting wireless call charges so as to notify said management equipment of parameters unique to said terminal via said wire line, and so as to obtain a first wireless call charges corresponding with said parameters unique to said terminal from said management equipment via said wire line, and further to compare second wireless call charges stored in an information storage device within said control device with said first wireless call charges.
CA002207651A 1996-07-12 1997-06-12 Information terminal Abandoned CA2207651A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP8183660A JPH1028293A (en) 1996-07-12 1996-07-12 Information terminal
JP8-183660 1996-07-12

Publications (1)

Publication Number Publication Date
CA2207651A1 true CA2207651A1 (en) 1998-01-12

Family

ID=16139706

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002207651A Abandoned CA2207651A1 (en) 1996-07-12 1997-06-12 Information terminal

Country Status (5)

Country Link
JP (1) JPH1028293A (en)
CN (1) CN1092878C (en)
AU (1) AU693403B2 (en)
CA (1) CA2207651A1 (en)
GB (1) GB2315390B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3338777B2 (en) 1998-04-22 2002-10-28 日本電気株式会社 Mobile terminal and screen display method thereof
JP4491847B2 (en) * 1998-11-05 2010-06-30 ソニー株式会社 Mail system, mail client, mail server, and mail transmission / reception method
CA2813536C (en) 2000-03-03 2015-08-25 Qualcomm Incorporated Method and apparatus for participating in group communication services in an existing communication system
GB2375261B (en) * 2001-04-30 2004-10-13 Nokia Corp Radiotelephone system
FR2857537B1 (en) * 2003-07-11 2005-09-02 Canon Kk METHOD AND DEVICE FOR CONTROLLING ACCESS TO A COMMUNICATION NETWORK
US20050162338A1 (en) * 2004-01-26 2005-07-28 Masayuki Ikeda Information transmitting method, electronic apparatus, and wireless communication terminal
JP3755530B2 (en) * 2004-01-29 2006-03-15 セイコーエプソン株式会社 Electronic equipment
JP3952022B2 (en) * 2004-01-26 2007-08-01 セイコーエプソン株式会社 Information transmission method in electronic equipment and electronic equipment
JP2006060392A (en) * 2004-08-18 2006-03-02 Nec Corp Unauthorized-use preventive system and identification method for information terminal device
CN100459792C (en) * 2005-03-16 2009-02-04 华为技术有限公司 Method of recording user's electronic sequence numbers
JP4624322B2 (en) * 2006-08-04 2011-02-02 シャープ株式会社 Terminal authentication system and server

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5046082A (en) * 1990-05-02 1991-09-03 Gte Mobile Communications Service Corporation Remote accessing system for cellular telephones
CA2045057C (en) * 1990-07-12 1995-05-09 Gregory P. Wilson Remote programming of a radiotelephone
US5197092A (en) * 1990-10-31 1993-03-23 Mccaw Cellular Communications, Inc. Location registration system for a personal communicator such as a cellular telephone
US5201067A (en) * 1991-04-30 1993-04-06 Motorola, Inc. Personal communications device having remote control capability
JPH04345332A (en) * 1991-05-23 1992-12-01 Sony Corp Portable telephone set

Also Published As

Publication number Publication date
GB2315390A (en) 1998-01-28
AU693403B2 (en) 1998-06-25
CN1175138A (en) 1998-03-04
GB9710483D0 (en) 1997-07-16
GB2315390B (en) 2000-01-12
AU2496497A (en) 1998-01-22
JPH1028293A (en) 1998-01-27
CN1092878C (en) 2002-10-16

Similar Documents

Publication Publication Date Title
US7925256B2 (en) Multimode roaming mobile devices
US6170057B1 (en) Mobile computer and method of packet encryption and authentication in mobile computing based on security policy of visited network
US8407769B2 (en) Methods and apparatus for wireless device registration
CN1135888C (en) System and method for authenticating cellular subscriber at registration
CN101656668B (en) Method and device for using core based nodes for state transfer
US7133670B1 (en) Roaming agreement application and database for carrying out roaming between private and public wireless networks
CN102970732B (en) Method, system and equipment for wireless local area network (WLAN) sharing authentication
KR20010007104A (en) Mobile equipment and networks providing selection between USIM/SIM dependent features
CN102361513A (en) Method for operating terminals of a mobile radio communication system
CN1997974A (en) Content protection ticket system and method
CA2207651A1 (en) Information terminal
CN1672364A (en) Method and data system for connecting a wireless local network to a umts terminal station
US7330710B1 (en) Private emergency or service-specific call approach in GSM systems
CN100405781C (en) Method and system for providing network services
CN105530714A (en) MIFI communication service system and MIFI and communication method thereof
US7502367B2 (en) Method for providing a program module in a communications system
CN100440828C (en) Optimization of point-to-point sessions
US7957726B2 (en) System and method for porting a personalized indicium assigned to a mobile communications device
EP1379053B1 (en) Method for transferring a user-id password pair, and a wireless network
CN100370767C (en) Management method for wireless LAN service usage by mobile subscriber
EP0890282A1 (en) Telecommunications system
GB2333935A (en) Remote programming of wireless communication unit via wireline connection
US8019991B1 (en) System and method for secure provisioning of a mobile station from a provisioning server using IP address translation at the BTS/BSC
KR100912287B1 (en) A user authentication system and method for interworking with code division multiple access mobile communication network and public wireless local area network
KR100652183B1 (en) Method and System for Providing Zone Based Supplementary Service by Using MAC Zone ID

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued
FZDE Discontinued

Effective date: 20001130