DK0602319T3 - Procedure for securing a mobile phone against unauthorized use - Google Patents
Procedure for securing a mobile phone against unauthorized useInfo
- Publication number
- DK0602319T3 DK0602319T3 DK93113001T DK93113001T DK0602319T3 DK 0602319 T3 DK0602319 T3 DK 0602319T3 DK 93113001 T DK93113001 T DK 93113001T DK 93113001 T DK93113001 T DK 93113001T DK 0602319 T3 DK0602319 T3 DK 0602319T3
- Authority
- DK
- Denmark
- Prior art keywords
- mobile
- transmitted
- parameter
- module
- securing
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Abstract
The method involves connecting a subscriber identification module, code card, to a mobile radio to allow data exchange. After input of a device code, the system is initialised. A number is transmitted from the mobile to the ID module. There, an authentication parameter is calculated from the number, using a code or key stored in the module and this is transmitted to the mobile. The latter stores the number and parameter as duplets in a non-volatile memory. During operation, a personal identification number is input to the radio for authentication checking. The duplet-stored number is transmitted to the ID module. An authentication parameter is calculated and transmitted to the mobile. In the mobile, the transmitted parameter is compared with the stored parameter. If they do not match, further operation, especially making connections, is blocked. If the parameters match, the mobile is freed for use.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE4242151A DE4242151C1 (en) | 1992-12-14 | 1992-12-14 | Protecting mobile radio, e.g. telephone, against unauthorised use - comparing authentication parameter from input code to stored parameter, only allowing use if they match. |
Publications (1)
Publication Number | Publication Date |
---|---|
DK0602319T3 true DK0602319T3 (en) | 1999-04-06 |
Family
ID=6475231
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DK93113001T DK0602319T3 (en) | 1992-12-14 | 1993-08-13 | Procedure for securing a mobile phone against unauthorized use |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP0602319B1 (en) |
AT (1) | ATE167608T1 (en) |
DE (2) | DE4242151C1 (en) |
DK (1) | DK0602319T3 (en) |
ES (1) | ES2119838T3 (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19527715C2 (en) * | 1995-07-31 | 1997-08-07 | Deutsche Telekom Mobil | Method for user identification and authentication for radio data links, associated chip cards and end devices |
EP0852092B1 (en) * | 1995-09-21 | 2003-11-12 | Siemens Aktiengesellschaft | Process for ensuring a securing interface between a telephone with a card and the network in a telephone system |
DE19542145A1 (en) * | 1995-11-11 | 1997-05-15 | Deutsche Telekom Ag | Method and device for universal and secure access to the telephone network |
FR2742959B1 (en) * | 1995-12-21 | 1998-01-16 | Alcatel Mobile Comm France | METHOD FOR SECURING THE USE OF A TERMINAL OF A CELLULAR RADIOCOMMUNICATION SYSTEM, CORRESPONDING TERMINAL AND USER CARD |
SE506584C2 (en) * | 1996-05-13 | 1998-01-19 | Ericsson Telefon Ab L M | Method and apparatus for monitoring mobile communication device |
FR2750285B1 (en) * | 1996-06-20 | 2000-08-04 | Sagem | CONTROLLED USE MOBILE RADIO TELEPHONY TERMINAL |
DE19722424C5 (en) * | 1997-05-28 | 2006-09-14 | Telefonaktiebolaget Lm Ericsson (Publ) | Method of securing access to a remote system |
DE19734622A1 (en) * | 1997-08-09 | 1999-02-11 | Alsthom Cge Alcatel | Terminal, authorization card and telecommunications network for a subscriber and method for changing a service profile assigned to the subscriber |
GB2329498A (en) * | 1997-09-19 | 1999-03-24 | Motorola Ltd | Data carrier and method for controlling activation of a security feature |
GB2332594B (en) * | 1997-12-19 | 2002-12-11 | Motorola Ireland Ltd | Method of processing a service request in a communications system, and control unit for same |
EP1001640A1 (en) * | 1998-11-16 | 2000-05-17 | Siemens Aktiengesellschaft | Securing mobile stations of a radio communication system |
EP1225774A1 (en) * | 2001-01-23 | 2002-07-24 | Siemens Aktiengesellschaft | Mobile phone with interface for SIM module and method for legitimation of usage of mobile phone |
DE10129551B4 (en) * | 2001-06-19 | 2009-09-03 | Halang, Wolfgang A., Prof. Dr. Dr. | Secure multi-page authentication of devices |
FR2842059B1 (en) * | 2002-07-04 | 2004-12-24 | Cit Alcatel | METHOD FOR LOCKING A MOBILE TELECOMMUNICATION TERMINAL |
CN100337502C (en) † | 2004-07-28 | 2007-09-12 | 华为技术有限公司 | Method for logic binding and verifying parts in device |
DE102007015016A1 (en) * | 2007-03-28 | 2008-10-02 | Giesecke & Devrient Gmbh | Assigning a mobile terminal and a subscriber card and checking the permissibility of using a mobile terminal with a subscriber card |
CN101621790B (en) * | 2009-07-08 | 2012-10-10 | 中兴通讯股份有限公司 | Lock-card locking method and device for wireless communication |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2659622C2 (en) * | 1976-12-30 | 1979-01-04 | Siemens Ag, 1000 Berlin Und 8000 Muenchen | Radiotelephony system |
DE3420460A1 (en) * | 1984-06-01 | 1985-12-05 | Philips Patentverwaltung Gmbh, 2000 Hamburg | METHOD FOR DETECTING THE UNAUTHORIZED USE OF AN IDENTIFICATION ASSIGNED TO A MOVABLE RADIO STATION IN A RADIO TRANSMISSION SYSTEM |
US4992783A (en) * | 1988-04-04 | 1991-02-12 | Motorola, Inc. | Method and apparatus for controlling access to a communication system |
DE3838677A1 (en) * | 1988-11-15 | 1990-05-17 | Bosch Gmbh Robert | MOBILE RADIO TELEPHONE |
ATE145511T1 (en) * | 1991-03-05 | 1996-12-15 | Siemens Ag | DEVICE FOR SECURING OPERATING PROCESSES IN A MOBILE NETWORK |
SE467559B (en) * | 1991-04-12 | 1992-08-03 | Comvik Gsm Ab | PHONE SYSTEM PROCEDURES |
-
1992
- 1992-12-14 DE DE4242151A patent/DE4242151C1/en not_active Expired - Lifetime
-
1993
- 1993-08-13 AT AT93113001T patent/ATE167608T1/en active
- 1993-08-13 DE DE59308696T patent/DE59308696D1/en not_active Expired - Lifetime
- 1993-08-13 EP EP93113001A patent/EP0602319B1/en not_active Expired - Lifetime
- 1993-08-13 ES ES93113001T patent/ES2119838T3/en not_active Expired - Lifetime
- 1993-08-13 DK DK93113001T patent/DK0602319T3/en active
Also Published As
Publication number | Publication date |
---|---|
DE4242151C1 (en) | 1994-03-24 |
EP0602319A1 (en) | 1994-06-22 |
ATE167608T1 (en) | 1998-07-15 |
EP0602319B1 (en) | 1998-06-17 |
DE59308696D1 (en) | 1998-07-23 |
ES2119838T3 (en) | 1998-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DK0602319T3 (en) | Procedure for securing a mobile phone against unauthorized use | |
US6510517B1 (en) | Method of cryptological authentification in a scanning identification system | |
CN101719955B (en) | Intelligent terminal system with fingerprint identification and information processing method | |
FR2842060B1 (en) | METHOD FOR SECURING A MOBILE TELECOMMUNICATION TERMINAL | |
US7131139B1 (en) | Method for authorizing access to computer applications | |
US20010041593A1 (en) | Mobile communication device and data concealing method | |
CA2140564A1 (en) | AuTh Card Access Module System | |
EP1028396A3 (en) | Automatic identification equipment and IC cards | |
FR2742959B1 (en) | METHOD FOR SECURING THE USE OF A TERMINAL OF A CELLULAR RADIOCOMMUNICATION SYSTEM, CORRESPONDING TERMINAL AND USER CARD | |
ATE344602T1 (en) | COMMUNICATION METHOD AND APPARATUS | |
RU2005139807A (en) | METHOD AND DEVICE FOR PREVENTING UNAUTHORIZED USE OF SUBSCRIBER IDENTIFICATION MODULE IN MOBILE TERMINAL | |
WO2002093330A3 (en) | System and method for controlling access to personal information | |
GB2211050A (en) | Telephone system | |
DE59806824D1 (en) | METHOD AND DEVICE FOR AUTHENTICATING MOBILE RADIO SUBSCRIBERS | |
CN1477842B (en) | Method for preventing user's identification module from being unallovably used | |
CN100473195C (en) | Encrypted card and its application method in mobile terminal | |
CN1202293A (en) | Process for ensuring a securing interface between telephone with card and network in telephone system | |
CN101159937B (en) | Mobile communication terminal and terminal control method | |
EP1675418A1 (en) | Method and apparatus for control of data synchronization between a user equipment and a user authentication card | |
CN100474980C (en) | Method for protecting a mobile-telephone-type telecommunication terminal and corresponding telecommunication terminal | |
KR100619882B1 (en) | A method and a apparatus of protecting illegal using of imei for mobile phone | |
KR100474290B1 (en) | Method for transmitting data stored in sim card | |
EP1039769B1 (en) | A method and apparatus for getting acccess to a digital mobile phone | |
JP2001297315A (en) | Ic card, portable electronic terminal and countermeasure system for illegal use thereof | |
JPH1127746A (en) | Portable terminal device |