GB2315390A - Remote programming of wireless communication unit via wireline connection - Google Patents

Remote programming of wireless communication unit via wireline connection Download PDF

Info

Publication number
GB2315390A
GB2315390A GB9710483A GB9710483A GB2315390A GB 2315390 A GB2315390 A GB 2315390A GB 9710483 A GB9710483 A GB 9710483A GB 9710483 A GB9710483 A GB 9710483A GB 2315390 A GB2315390 A GB 2315390A
Authority
GB
United Kingdom
Prior art keywords
wireless communication
management equipment
information terminal
wireless
control device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9710483A
Other versions
GB2315390B (en
GB9710483D0 (en
Inventor
Kiyoshi Matsumoto
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitsubishi Electric Corp
Original Assignee
Mitsubishi Electric Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitsubishi Electric Corp filed Critical Mitsubishi Electric Corp
Priority to GB9908695A priority Critical patent/GB2333935A/en
Publication of GB9710483D0 publication Critical patent/GB9710483D0/en
Publication of GB2315390A publication Critical patent/GB2315390A/en
Application granted granted Critical
Publication of GB2315390B publication Critical patent/GB2315390B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • H04W8/265Network addressing or numbering for mobility support for initial activation of new user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/10Metering calls from calling party, i.e. A-party charged for the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices

Abstract

A wireless communication terminal 1A includes a wire communication device 14 which obtains a telephone number (NAM), for wireless telephone communication, via wire lines from management equipment 2 which manages wireless users, a control device 11 which stores the aforementioned NAM, and a wireless communication device 13 which conducts wireless communication using the NAM, wherein registration of information such as telephone number, encryption key, and the like can be conducted in a speedy and sure manner without necessitating human intervention. Also, there is little danger of the encryption key falling into other hands upon registration thereof, since the encryption key does not pass through a third party such as a dealer.

Description

INFORMATION TERMINAL BACKGROUND OF THE INVENTION 1.Field of the Invention The present invention relates to an information terminal which comprises wire communication functions, and wireless communication functions such as cellular telephone, mobile telephone, wireless packet communication, or the like, within a single terminal.
2.Description of the Related Art Description of a known information terminal will now be made with reference to Fig. 26. In the Figure, the wireless communication system comprises an information terminal 1, user data management equipment 2, base station equipment 3, wireless telephone office 6, and dealer 7. The user data management equipment 2 and multiple base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1 comprises a control device 11, a terminal antenna 12, and a wireless communication device 13 complying with cellular telephone standards or CDPD (Cellular Digital Packet Data) standards.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN (Electronic Serial Number) 113 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, battery-backed-up RAM, or the like. With cellular telephones such as AMPS (Advanced Mobil Phone Service), the aforementioned information storage device 115 stores a NAM (Number Assignment Module, telephone number) 116, an encryption key 117, and the like.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU and the like, an ESN data table 22 which is terminal data of a plurality of users, a telephone number table 23, and encryption key table 24, and controls each of the tables. Also, the aforementioned tables are situated on a large-capacity hard disk device (HDD).
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33.
With the known information terminal (including cellular telephones and mobile telephones) 1, application to the wireless telephone office (operator) 6 and registration must be conducted at the time of purchase in order to make the information terminal actually usable. First, the serial number ESN 113 which is unique to the user terminal is reported to the wireless telephone office 6, following which the wireless telephone office 6 assigns a NAM (telephone number) to that terminal and notifies the user thereof, as well as registering the ESN and telephone number to the user data management equipment 2. The user inputs the NAM (telephone number) to his / her own terminal, and only then does the terminal becomes usable.
In other words, registration of the ESN and telephone number must be conducted by the two parties: the wireless telephone office 6;- and the user. Also, registration of an encryption key becomes necessary as well, in the event that the user desires such. This key is used in wireless communication to determine whether the connection request is from a legitimate user or not. In practice, a dealer 7 often performs the user-side registration.
With known cellular telephones and mobile telephones, there are two ways by which the NAM (telephone number) is registered to the user's terminal: the user inputting directly from a keyboard on the terminal; and the dealer 7 using a specialized writing jig for writing. While the method of inputting directly from a keyboard on the terminal does not require a specialized jig, there are problems with this method such as input errors occurring easily and the process of inputting all items taking time.
Particularly, the encryption key 117 for AMPD and D-AMPS (Dual AMPS) systems has up to 26 digits, and is not suitable for input from a keyboard.
In the event that the user has a dealer 7 to conduct the writing, a specialized writing jig is often employed for this, but this means that the dealer 7 needs a computer for writing and a specialized adapter, resulting in substantial facility investment in order to install such equipment in all dealer 7 locations. Also, in this case, a third party becomes involved in the encryption key writing process, thus creating the possibility that the information of the encryption key may fall into other hands.
Although it is preferable that the encryption key be changed periodically, considering the consequences of the encryption key falling in other hands, it is not very practical for a user to input an encryption key up to 26 digits in length from a keyboard on the terminal. Also, when changing the encryption key with the known system, alteration registration must be made with the wireless telephone office (operator) 6 again.
Further, with the known system, in order to confirm whether the telephone number, ESN, or encryption key of one's information terminal 1 have not been stolen and used unauthorized, one would have the wireless telephone office 6 send communications records compiled by the wireless telephone office 6 such as communication hysteresis, wireless communication bills, or the like, and the user would then compare these records one with another to confirm the contents thereof and thus judge whether or not the telephone number, ESN, or encryption key is being used unauthorized. However, there are limits to the what extent all of the communication records can be checked by human means, and thus unauthorized usage of stolen ESNs and telephone numbers for communication is a perpetual problem.
Further, in cases where alterations need to be made in the control program in the wireless information terminal, such as cases where the control program in the wireless information terminal is faulty and the program must be corrected, or in cases where the user desires to upgrade the program to a higher version to correspond with new functions, the known system necessitated temporary collection of the terminal for writing to be conducted by means of a specialized jig. This has resulted in increased costs for collection, investment costs for the writing jig, and labor costs for writing.
While the method of inputting directly from a keyboard on an information terminal such as described above does not require a specialized jig, there are problems with this method such as input errors occurring easily and the process of inputting all items taking time.
In the event that the user has a dealer to conduct the writing of the telephone number, etc., a specialized writing jig is often employed for this, but there are problems with this, such as that the dealer needs a computer for writing and a specialized adapter, resulting insubstantial facility investment in order to install such equipment in all dealer locations. Also, in this case, a third party becomes involved in the encryption key writing process, thus creating the possibility that the information of the encryption key may fall into other hands.
Also, there are problems when changing the encryption key with the known system, in that alteration registration must be made with the wireless telephone office (operator) again.
Further, there are problems with the known system, in that in order to confirm whether the telephone number, ESN, or encryption key of one's information terminal have not been stolen and used unauthorized, one would have the wireless telephone office send communications lists compiled by the wireless telephone office (operator), and the user mould then compare these lists one with another to confirm the contents thereof and thus. judge whether or not the telephone number, ESN, or encryption key is being used jnauthorized. However, there are limits to the extent all Df the communication records can be checked by human means, and thus unauthorized usage of stolen ESNs and telephone iumbers for communication has been a perpetual problem.
Further, in cases where alterations need to be nade in the control program in the wireless information Lerminal, the known system has necessitated temporary collection of the terminal for writing to be conducted by neans of a specialized F There are problems with this system, in that increased costs for collection, investment osts for the writing zit, and labor costs for writing, result thereby.
SUMMARY OF THE INVENTION Accordingly, the present invention has been made in view of the above-described problems, and it is an object thereof to provide an information terminal wherein registration of the ESN to the telephone office and registration of the telephone number, NAM, and encryption cey to the terminal can be conducted in a speedy and sure nanner without necessitating human intervention.
Also, the present invention has been made in view Df the above-described problems, and it is another object thereof to provide an information terminal wherein the encryption key does not fall into other hands upon conducting the process of registration of the encryption key.
Further, the present invention has been made in view of the above-described problems, and it is another object thereof to provide an information terminal wherein alteration of the control program thereof and upgrading the control program thereof to a higher version can be conducted easily without human intervention.
Further yet, the present invention has been made in view of the above-described problems, and it is another object thereof to provide an information terminal wherein the encryption key can be changed in an easy and sure manner so that unauthorized use thereof can be prevented even in the event that the encryption key does fall into other hands.
Moreover, the present invention has been made in view of the above-described problems, and it is another object thereof to provide an information terminal wherein the user can discover whether or not one's terminal number or ESN is being used by another individual.
The information terminal relating to the present invention comprises: a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users; a control device which stores the aforementioned information pertaining to wireless communication; and a wireless communication device which conducts wireless communication using the aforementioned information pertaining to wireless communication.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises a telephone number.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device ;o as to notify the aforementioned management equipment of SN via the aforementioned wire line, and so as to obtain a telephone number for wireless telephone assigned by the iforementioned management equipment, and further to store :he aforementioned obtained telephone number for wireless telephone in an information storage device within the forementioned control device, and wherein the Iforementioned wireless communication device conducts rireless communication using the aforementioned stored telephone number for wireless communication.
Also, the information terminal relating to the present invention is such wherein the aforementioned .nformation pertaining to wireless communication comprises in IP address.
Further, the information terminal relating to the resent invention is such wherein the aforementioned control levice controls the aforementioned wire communication device ;o as to notify the aforementioned management equipment of SN via the aforementioned wire line, and so as to obtain an [P address assigned by the aforementioned management equipment, and further to store the aforementioned obtained [P address in an information storage device within the lforementioned control device, and wherein the iforementioned wireless communication device conducts wireless communication using the aforementioned stored IP address.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises a wireless communication control program.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device so as to notify the aforementioned management equipment of new wireless communication control program request via the aforementioned wire line, and so as to obtain a new wireless communication control program from the aforementioned management equipment, the aforementioned wireless communication control program being stored therein, and further to store the aforementioned obtained new wireless communication control program in an information storage device within the aforementioned control device, and wherein the aforementioned wireless communication device conducts wireless communication using the aforementioned stored new wireless communication control program.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises an encryption key.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device conducts changing of encryption key by using a certain algorithm for generating a first code based on a first ESN, a first telephone number and a first encryption key stored within an information storage device within the aforementioned control device, and controls the aforementioned wire communication device so as to notify the aforementioned management equipment of encryption key change request and to send the aforementioned first ESN, the aforementioned first telephone number and the aforementioned first code via the aforementioned wire line, the aforementioned management equipment using an algorithm which is the same as the aforementioned certain algorithm for generating a second code based on a second ESN, a second telephone number and a second encryption key, the aforementioned second numbers corresponding to the aforementioned first ESN and the aforementioned first telephone number, following which the aforementioned second code and the aforementioned first code are compared, and in the event that the aforementioned codes correspond, the aforementioned control device obtains from the aforementioned management equipment via the aforementioned wire line the new encryption key generated based on the aforementioned second ESN, and wherein the aforementioned wireless communication device conducts wireless communication using the aforementioned obtained new encryption key.
Moreover, the information terminal relating to the present invention comprises: a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users; a control device which stores and processes the aforementioned information pertaining to wireless communication; and a wireless communication device which conducts wireless communication.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises communication hysteresis.
Also, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device upon inspecting communication hysteresis so as to notify the aforementioned management equipment of parameters unique to the aforementioned terminal via the aforementioned wire line, and so as to obtain a first communication hysteresis corresponding with the aforementioned parameters unique to the aforementioned terminal from the aforementioned management equipment via the aforementioned wire line, and further to compare a second communication hysteresis stored in an information storage device within the aforementioned control device with the aforementioned first communication hysteresis.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises wireless call charges.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device upon inspecting wireless call charges so as to notify the aforementioned management equipment of parameters unique to the aforementioned terminal via the aforementioned wire line, and so as to obtain a first wireless call charges corresponding with the aforementioned parameters unique to the aforementioned terminal from the aforementioned management equipment via the aforementioned wire line, and further to compare second wireless call charges stored in an information storage device within the aforementioned control device with the aforementioned first wireless call charges.
BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a block diagram illustrating the configuration of a first embodiment according to the present invention; Fig. 2 is a diagram illustrating the operation sequence of a first embodiment according to the present invention; Fig. 3 is a flowchart illustrating the operation of a first embodiment according to the present invention; Fig. 4 is a flowchart illustrating the operation of user data management equipment relating to a first embodiment according to the present invention; Fig. 5 is a block diagram illustrating the configuration of a second embodiment according to the present invention; Fig. 6 is a diagram illustrating the operation sequence of a second embodiment according to the present invention; Fig. 7 is a flowchart illustrating the operation of a second embodiment according to the present invention; Fig. 8 is a flowchart illustrating the operation of user data management equipment relating to a second embodiment according to the present invention; Fig. 9 is a block diagram illustrating the configuration of a third embodiment according to the present invention; Fig. 10 is a diagram illustrating the operation sequence of a third embodiment according to the present invention; Fig. 11 is a flowchart illustrating the operation of a third embodiment according to the present invention; Fig. 12 is a flowchart illustrating the operation of user data management equipment relating to a third embodiment according to the present invention; Fig. 13 is a block diagram illustrating the configuration of a fourth embodiment according to the present invention; Fig. 14 is a diagram illustrating the operation sequence of a fourth embodiment according to the present invention; Fig. 15 is a diagram for describing the code generating algorithm of a fourth embodiment according to the present invention; Fig. 16 is a flowchart illustrating the operation of a fourth embodiment according to the present invention; Fig. 17 is a flowchart illustrating the operation of user data management equipment relating to a fourth embodiment according to the present invention; Fig. 18 is a block diagram illustrating the configuration of a fifth embodiment according to the present invention; Fig. 19 is a diagram illustrating the operation sequence of a fifth embodiment according to the present invention; Fig. 20 is a flowchart illustrating the operation of a fifth embodiment according to the present invention; Fig. 21 is a flowchart illustrating the operation of user data management equipment relating to a fifth embodiment according to the present invention; Fig. 22 is a block diagram illustrating the configuration of a sixth embodiment according to the present invention; Fig. 23 is a diagram illustrating the operation sequence of a sixth embodiment according to the present invention; Fig. 24 is a flowchart illustrating the operation of a sixth embodiment according to the present invention; Fig. 25 is a flowchart illustrating the operation of user data management equipment relating to a sixth embodiment according to the present invention; and Fig. 26 is a block diagram illustrating the configuration of a wireless communication system including a privately known but unpublished information terminal.
DESCRIPTION OF THE PREFERRED EMBODIMENTS First Embodiment Description of the first embodiment according to the present invention will be made with reference to Figs. 1 through 4. Fig. 1 is a block diagram illustrating the configuration of the first embodiment according to the present invention. Fig. 2 is a diagram illustrating the operation sequence of the first embodiment according to the present invention. Fig. 3 and Fig. 4 are flowcharts illustrating the operation of the first embodiment according to the present invention. In the Figures, identical reference numerals or reference characters represent identical or equivalent items.
In Fig. 1, the wireless communication system comprises an information terminal 1A, user data management equipment 2, and base station equipment 3. The information terminal 1A and user data management equipment 2 are connected by a public wire line 4. The user data management equipment 2 and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1A comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS (Advanced Mobil Phone Service) , D-AMPS (Dual AMPS), CDMA (Code Division Multiple Access) , PDC (Personal Digital Cellular), or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN (Electronic Serial Number) 113 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, battery-backed-up RAM, or the like. With cellular telephones such as AMPS, the aforementioned information storage device 115 stores a NAM (Number assignment Module, telephone number) 116, and an encryption key 117 which is used for wireless line connection onfirmation. The ESN 113 which serves as a serial number Jnique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned lser data management equipment 2 comprises a control device 21 which includes a CPU and the like, an ESN data table 22 which is terminal data of a plurality of users, a telephone lumber table 23, and encryption key table 24, and controls Lach of the tables. Also, the aforementioned tables are ;ituated on a large-capacity hard disk device (HDD). Also, the user data management equipment 2 is equipment which nanages the ESN and telephone number of wireless telephone Isers, and judges whether requests for outgoing or incoming rallys made by the information terminal 1A are connection requests by a legitimate user or not.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33. The aforementioned Dase station equipment 3 is base station equipment for cellular telephone, such as AMPS, D-AMPS, CDMA, or the like.
The aforementioned NAM 116 is part of the parameters unique to the terminal which are necessary for wireless communication, such as a telephone number, and the like. The telephone number for wireless telephone of the MPS system is equivalent to this NAM 116.
First, at the time of purchase of the information terminal 1A by the user, the NAM (telephone number) is not registered in the information storage device 115 within the information terminal 1A. Wireless communication can not be made in this state, since the telephone number for wireless telephone (NAM) is not registered within the terminal. The following is a description of the registration procedures of the NAM (telephone number) according to this first embodiment.
In this state, the control device 11 of the information terminal 1A controls the wire communication device 14 so as to connect to the user data management equipment 2 via public wire line 4, and issues a line connection request (Steps 130 through 131). Subsequently, the control device 11 of the information terminal 1A reads out the ESN information from the ROM 112 within the control device 11, and sends the ESN information of the terminal to which it belongs, and at the same time, also sends a telephone number assignment request (Steps 132 through 134).
In the event that the ESN information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal 1A has no other function, sending of the ESN information means requesting of telephone number assignment, and there is no need to conduct a separate operation of sending a telephone number assignment request.
On the other hand, upon receiving the line connection request and telephone number assignment request from the information terminal 1A, the user data management equipment 2 waits for reception of the ESN, and upon reception of such, conducts telephone number assignment (Steps 200 through 203). The user data management equipment 2 also adds the sent ESN data to the ESN data table 22.
Further, after the line connection request, the user data management equipment 2 performs any other requests that may be made (Steps 207 through 208).
In other words, the user data management equipment 2 assigns a NAM (telephone number for wireless telephone) for the information terminal corresponding with the ESN thereof, and adds the NAM to the telephone number table 23.
The user data management equipment 2 also generates an encryption key which is stored to the encryption key table 24, and sends the encryption key along with the assigned telephone number for wireless telephone to the information terminal 1A via the public wire line 4 (Steps 204 through 206) In the event that the user desires that an information terminal which does not have encryption keyrelated functions be handled, the above-described encryption key process is unnecessary. Thus, the registration of the information terminal 1A at the user data management equipment 2 is completed.
Next, upon reception of the NAM (telephone number for wireless telephone) 116 and encryption key 117 via the public wire line 4, the information terminal 1A stores these in the information storage device 115 within the control device 11, and subsequently conducts wireless telephone communication using the aforementioned telephone number for wireless telephone and encryption key (Steps 135 through 136). In the case of an information terminal which does not have encryption key-related functions, wireless telephone communication are conducted using only the telephone number for wireless telephone without an encryption key.
According to the information terminal 1A relating to the first embodiment, registration of the NAM (telephone number ) 116 and encryption key 117 are conducted directly with the user data management equipment 2 via the public wire line 4, so that there is no need for the user to conduct registration of the NAM (telephone number for wireless telephone) via a terminal keyboard, and specialized writing jigs are also thus made unnecessary. Moreover, there is little danger of the encryption key falling into other hands upon registration thereof, since the encryption key does not pass through a third party.
Second Embodiment Description of a second embodiment according to the present invention will be made with reference to Figs. 5 through 8. Fig. 5 is a block diagram illustrating the configuration of the second embodiment according to the present invention. Fig. 6 is a diagram illustrating the operation sequence of the second embodiment according to the present invention. Fig. 7 and Fig. 8 are flowcharts illustrating the operation of the second embodiment according to the present invention.
In - Fig. 5, the wireless communication system comprises an information terminal 1B, user data management equipment 2, and a CDPD base station 3A. The information terminal 1B and u connected by a public wire line 4. The user data management equipment 2 and multiple CDPD base stations 3A are connected by a dedicated line 5, although the Figure only shows one DPD base station 3A.
Also, in the Figure, the aforementioned information terminal 1B comprises a control device 11, a terminal antenna 12, a CDPD standards packet communication device 13A, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN 113 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, battery > acked-up RAM, or the like. The aforementioned information storage device 115 stores an NEI (Network Entity Identifier, tP (Internet Protocol) address ) 118, and an encryption key 117 which is used for wireless line connection confirmation.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU and the like, an ESN data table 22 which is terminal data of a plurality of users, an IP address table 25, and encryption key table 24. The aforementioned tables are situated on a large-capacity hard disk device (HDD) . Moreover, the user data management equipment 2 is equipment which manages the ESN and IP address of wireless telephone users, and judges whether requests for outgoing or incoming calls made by the information terminal 1B are connection requests by a legitimate user or not, as well as managing usage charges according to the sending and r.eceiving of packets to and from this information terminal 1B, and also managing the ESN and NEI (IP address) of the information terminal 1B of the user.
Moreover, in the Figure, the aforementioned CDPD base station 3A comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33.
First, at the time of purchase of the information terminal 1B by the user, the NEI (IP address) 118 is not registered in the information storage device 115 within the information terminal 1B, and CDPD wireless communication can not be made in such a state.
In this state, the control device 11 of the information terminal 1B controls the wire communication device 14 so as to connect to the user data management equipment 2 via public wire line 4, and issues a line connection request (Steps 140 through 141). Subsequently, the control device 11 of the information terminal 1B reads out the ESN information from the ROM 112 within the control device 11, and sends the ESN information of the terminal to which it belongs, and at the same time, also sends an IP address assignment request (Steps 142 through 144). In the event that the ESN information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal 1B has no other function, sending of the ESN information means requesting of IP address assignment, and there is no need to conduct a separate operation of sending an IP address assignment request.
On the other hand, upon receiving the line connection request and IP address assignment request from the information terminal 1B, the user data management equipment 2 waits for reception of the ESN, and upon reception of such, conducts IP address assignment (Steps 210 through 213). The user data management equipment 2 also adds the sent ESN data to the ESN data table 22. Further, after the line connection request, the user data management equipment 2 performs any other requests that may be made (Steps 217 through 218).
In other words, the user data management equipment 2 assigns an NEI (IP address) for the information terminal corresponding with the ESN thereof, and adds the IP address to the IP address table 25. The user data management equipment 2 also generates an encryption key which is stored to the encryption key table 24, and sends the encryption key along with the assigned IP address to the information terminal 1B via the public wire line 4 (Steps 214 through 216) In the event that the user desires that an information terminal which does not have encryption keyrelated functions be handled, the above-described encryption key process is unnecessary. Thus, the registration of the information terminal 1B at the user data management equipment 2 is completed.
Next, upon reception of the NEI (IP address) and encryption key via the public wire line 4, the information terminal 1B stores these in the information storage device 115 within the control device 11, and subsequently conducts CDPD communication using the aforementioned NEI (IP address) and encryption key (Steps 145 through 146). In the case of an information terminal which does not have encryption keyrelated functions, CDPD communication is conducted using only the NEI (IP address) without an encryption key.
According to the information terminal 1B relating to the second embodiment, the IP address, which is a parameter relating to wireless communication and which is unique to the terminal, is obtained directly from the user data management equipment 2 via the public wire line 4, and this information is stored in the information storage device 115 of the control device 11 within the information terminal 1B, so that registration of the ESN to the user data management equipment 2 and registration of the NEI (IP address) and encryption key to the information terminal 1B is conducted without involving a third party, and can be conducted in a speedy and sure manner. Moreover, there is little danger of the encryption key falling into other hands upon registration thereof, since the encryption key does not pass through a third party such as a dealer.
Third Embodiment Description of a third embodiment according to the present invention will be made with reference to Figs. 9 through 12. Fig. 9 is a block diagram illustrating the configuration of the third embodiment according to the present invention. Fig. 10 is a diagram illustrating the operation sequence of the third embodiment according to the present invention. Fig. 11 and Fig. 12 are flowcharts illustrating the operation of the third embodiment according to the present invention.
In Fig. 9, the wireless communication system comprises an information terminal 1C, a computer 2A, and base station equipment 3. The information terminal 1C and computer 2A are connected by a public wire line 4. The computer 2A and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1C comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, battery-backed-up RAM, or the like, and stores an old wireless communication control program 119 and the like.
Further, in the Figure, the aforementioned computer 2A is a computer of a company which performs maintenance of the wireless communication terminal, or a computer of a wireless telephone office. The computer 2A comprises a control device 21 including a CPU and the like, and a new communication control program 26.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33.
First, there are cases where the old wireless communication control program 119 within the information terminal 1C requires alteration. Cases where alterations are necessary include: cases where problems are discovered in the terminal software; cases where the software needs to be changed to correspond with the functions of a new wireless communications system; cases where the version of the communications software installed in the wireless communications device 13 is to be upgraded; cases where the encryption algorithm has been deciphered by another party and must be changed; and the like.
The control device 11 of the information terminal 1C controls the wire communication device 14 so as to connect to the computer 2A of the maintenance company or the like via public wire line 4, and issues a line connection request (Steps 150 through 151). Subsequently, the control device 11 of the information terminal 1C sends a new wireless communications control program request (Step 152).
On the other hand, upon receiving the line connection request and new wireless communications control program request from the information terminal 1C, the computer 2A sends the new wireless communications control program stored within itself to the information terminal 1C (Steps 220 through 222). Further, after the line connection request, the computer 2A performs any other requests that may be made (Steps 223 through 224).
Next, upon reception of the new wireless communications control program via the public wire line 4, the information terminal 1C stores this in the information storage device 115 within the control device 11, i.e., conducts over-writing of the wireless communications control program, and subsequently conducts wireless communication using the aforementioned new wireless communications control program 26 (Steps 153 through 154).
According to the information terminal 1C relating to the third embodiment, the new control program 26 relating to wireless communication is obtained directly from the user data management equipment 2 via the public wire line 4, and this new control program 26 is stored in the information storage device 115, so that alteration of the wireless communications control program can be conducted easily and in a sure manner.
Fourth Embodiment Description of the fourth embodiment according to the present invention will be made with reference to Figs.
13 through 17. Fig. 13 is a block diagram illustrating the configuration of the fourth embodiment according to the present invention. Fig. 14 is a diagram illustrating the operation sequence of the fourth embodiment according to the present invention. Fig. 15 is a diagram for describing the code generating algorithm of the fourth embodiment according to the present invention. Fig. 16 and Fig. 17 are flowcharts illustrating the operation of the fourth embodiment according to the present invention.
In Fig. 13, the wireless communication system comprises an information terminal 1D, user data management equipment 2, and base station equipment 3. The information terminal 1D and user data management equipment 2 are connected by a public wire line 4. The user data management equipment 2 and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1D comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN -A121 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, batterybacked-up RAM, or the like, and stores a telephone number A122 and an encryption key -A123. The ESN -A121 which serves as a serial number unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU and the like, an ESN data table 22 which is terminal data of a plurality of users, a telephone number table 23, and encryption key table 24, and controls each of the tables. Also, the aforementioned tables are ;ituated on a large-capacity hard disk device (HDD). Also, he user data management equipment 2 is equipment which manages the ESN and telephone number of wireless telephone Isers, and judges whether requests for outgoing or incoming rallys made by the information terminal 1D are connection requests by a legitimate user or not.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33.
In Figs. 13 and 14, the ESN, telephone number, and jncryption key registered within the information terminal 1D ire denoted by ESN -A121, telephone number -A122, and ncryption key -A123, respectively. Also, the ESN, telephone number, and encryption key registered within the iser data management equipment 2 are denoted by ESN -B27, telephone number -B28, and encryption key -B29, respectively. In the Figures, the information terminal 1D is in a state where wireless telephone communication is available.
In this state, when the user judges that the ESN t121, telephone number -A122, or encryption key -A123 of his I her own terminal may be being used unauthorized by another party, the user uses the control device 11 of the information terminal 1D to control the wire communication device 14 so as to connect to the user data management equipment 2 via public wire line 4, and issue a line onnection request (Steps 160 through 161). Subsequently, a rode A120 is generated using a certain algorithm, based on the ESN -B121, telephone number -B122, and encryption key B123 (Step 162).
Now, description of the certain algorithm for generating the code A120 will be described with reference to Fig. 15. Fig. 15 is a diagram for describing the code generating algorithm of the fourth embodiment according to the present invention.
Fig. 15 shows an example of generating an 8-byte code in the case where the ESN is 4 bytes long, the telephone number is 3 bytes long, and the encryption key is 8 bytes long. i.e., as shown in the Figure, the 4 bytes of the ESN are first used as the higher 4 bytes, then the next 3 bytes are comprised of the telephone number , and the lowest byte is comprised of a "0", thus creating an 8-byte intermediate code.
Next, the exclusive logical sum (EX-OR) of this 8byte intermediate code and the 8-byte encryption key is obtained, thus generating an 8-byte code.
An encryption key alteration request is then sent, and the ESN -B121, telephone number -B122, and generated code A are sent to the user data management equipment 2 (Steps 163 through 164) . The old encryption key -A123 itself is not sent.
On the other hand, upon receiving the line connection request and encryption key alteration request from the information terminal lD, the user data management equipment 2 waits for reception of the ESN -B121, telephone number -B122, and generated code A, and upon reception of such, conducts generation of a code B (Steps 230 through 233). Further, after the line connection request, the user data management equipment 2 performs any other requests that may be made (Steps 237 through 238).
In other words, the user data management equipment 2 searches the ESN data table 22 and telephone number table 23 stored within for the ESN -B27 and telephone number -B28 corresponding to the ESN -A121 and telephone number -A122 that have been sent, and also searches the encryption key table 24 for the encryption key -B29 stored therein, and thus generates a code B30 using the same algorithm as the information terminal 1D based on the ESN -B27, telephone number -B28, and encryption key -B29.
Next, the user data management equipment 2 compares the code A120 sent from the information terminal 1D with the internally generated code B30. If the codes match, judgment is made that the encryption key alteration request is from a legitimate user (Step 234). On the other hand, if the codes do not match, access from the information terminal 1D is denied.
If the user data management equipment 2 judges that the encryption key alteration request is from a legitimate user, the user data management equipment 2 generates a new encryption key from the ESN, stores the new encryption key in the encryption key table 24 within itself, and sends the new encryption key (Step 235 through 236) i.e., the user data management equipment 2 replaces the old encryption key -B29 with the new encryption key, and sends the information terminal 1D the new encryption key via public wire line 4.
Next, upon reception of the new encryption key via the public wire line 4, the information terminal 1D stores this in the information storage device 115 within the control device 11, i.e., conducts replacement of the old encryption key -A123 with the new encryption key, and subsequently conducts wireless communication using the aforementioned new encryption key (Steps 165 through 166).
According to the information terminal 1D relating to the fourth embodiment, the encryption key used for wireless line connection is obtained via the public wire line 4, this encryption key is stored in the information storage device 115, and wireless line connection confirmation (authorization) is made using this stored encryption key, as well as wire line connection confirmation (authorization) being made using this stored encryption key, thus performing altering of the encryption key, via public wire line 4, so that alteration of the encryption key can be conducted easily.
Fifth Embodiment Description of the fifth embodiment according to the present invention will be made with reference to Figs.
18 through 21. Fig. 18 is a block diagram illustrating the configuration of the fifth embodiment according to the present invention. Fig. 19 is a diagram illustrating the operation sequence of the fifth embodiment according to the present invention. Fig. 20 and Fig. 21 are flowcharts illustrating the operation of the fifth embodiment according to the present invention.
In Fig. 18, the wireless communication system comprises an information terminal 1E, user data management equipment 2B, and base station equipment 3. The information terminal 1E and user data management equipment 2B are connected by a public wire line 4. The user data management equipment 2B and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1E comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN 113 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, batterybacked-up RAM, or the like, and stores a NAM (telephone number) 116, an encryption key 117, communication hysteresis B124, and the like. The ESN 113 which serves as a serial number unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2B comprises a control device 21 which includes a CPU and the like, and a communication hysteresis table 40 stored on a hard disk device (HDD) or the like.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment.33.
In Figs. 18 and 19, in the event that a connection request from the information terminal 1E to the base station equipment 3 (outgoing call) or a connection request from the base station equipment 3 to the information terminal 1E (incoming call) occurs, the communication hysteresis thereof is stored in the communication hysteresis A41 within the communication hysteresis table 40 in the user data management equipment 2B.
This aforementioned communication hysteresis A is comprised of the telephone number of the other party (regardless of whether the call was made from the information device to the other party or vice versa), the date and time of the call, the duration of the call, etc.
This communication hysteresis A is managed by ESN or telephone number. The information terminal 1E also stores a wireless communication hysteresis in the information storage device 115 within the information terminal 1E in the form of communication hysteresis B124. The contents of this communication hysteresis B are the same as those of the aforementioned communication hysteresis A.
The control device 11 within the information terminal 1E accesses the user data management equipment 2B via the public wire line 4 either periodically or on demand by the user, and obtains the communication hysteresis A compiled by the base station equipment 3 and user data management equipment 2B.
More specifically, the control device 11 of the information terminal 1E controls the wire communication device 14 so as to connect to the user data management equipment 2B via public wire line 4, and issues a line onnection request (Steps 170 through 171). Subsequently, the control device 11 of the information terminal 1E reads ,ut the ESN information 113 from the ROM 112 within the control device 11, and sends the ESN information of the terminal to which it belongs, and at the same time, also sends a communication hysteresis request (Steps 172 through 174). In the event that the ESN information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal 1E has no other function, sending of the ESN information means requesting of communication hysteresis, snd there is no need to conduct a separate operation of sending a communication hysteresis request.
On the other hand, upon receiving the line onnection request and communication hysteresis request from the information terminal 1E, the user data management equipment 2B waits for reception of the ESN, and upon reception of such, conducts searching of the corresponding ommunication hysteresis (Steps 240 through 243). Further, after the line connection request, the user data management equipment 2B performs any other requests that may be made (Steps 245 through 246).
In other words, the user data management equipment 2B searches the communication hysteresis A (telephone number of other party, date and time of call, duration of call, etc.) 41 corresponding with the sent ESN from the communication hysteresis table 40, and sends the communication hysteresis A to the information terminal 1E via the public wire line 4 (Steps 243 through 244).
Next, upon reception of the communication hysteresis A41 sent via public wire line 4, the control device 11 within the information terminal 1E compares this communication hysteresis A41 with the communication hysteresis B124 stored within the information storage device 115 (Steps 175 through 176). If these match, one can thus know that the ESN, telephone number (NAM) , or encryption key of one's information terminal have not been stolen and used unauthorized on another information terminal. On the other hand, if the comparison shows that the communication hysteresis A41 contains a call which is not in the communication hysteresis B124, there is the possibility that another party may have stolen and be using the ESN, telephone number (NAM) , or encryption key thereof. The local telephone number (NAM) may be sent to the user data management equipment 2B via the public wire line 4 instead of sending the ESN, so as to obtain the communication hysteresis A41.
According to this fifth embodiment, a wireless communication hysteresis A unique to the terminal which has been compiled by the base station is obtained via public wire line 4, a wireless communication hysteresis B compiled within the terminal itself is stored therein, and comparison is made between the wireless communication hysteresis A unique to the terminal which has been compiled by the base station and wireless communication hysteresis B compiled within the terminal itself, thus allowing for discovery of whether or not the one's terminal number or ESN is being used unauthorized by another party.
Sixth Embodiment Description of the sixth embodiment according to the present invention will be made with reference to Figs.
22 through 25. Fig. 22 is a block diagram illustrating the configuration of the sixth embodiment according to the present invention. Fig. 23 is a diagram illustrating the operation sequence of the sixth embodiment according to the present invention. Fig. 24 and Fig. 25 are flowcharts illustrating the operation of the sixth embodiment according to the present invention.
In Fig. 22, the wireless communication system comprises an information terminal 1F, user data management equipment 2C, and base station equipment 3. The information terminal 1F and user data management equipment 2C are connected by a public wire line 4. The user data management equipment 2C and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1F comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN 113 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, batterybacked-up RAM, or the like, and stores a NAM (telephone number) 116, an encryption key 117, wireless call charges B125, and the like. The ESN 113 which serves as a serial number unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2C comprises a control device 21 which includes a CPU and the like, and a wireless call charges table 42 stored on a large-capacity hard disk device (HDD) or the like.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33.
In Figs. 22 and 23, in the event that a connection request from the information terminal 1F to the base station equipment 3 (outgoing call) or a connection request from the base station equipment 3 to the information terminal 1F (incoming call) occurs, the wireless call charges thereof are stored in the wireless call charges A43 within the wireless call charges table 42 in the user data management equipment 2C. The information terminal 1F also stores wireless call charges in the information storage device 115 within the information terminal 1F in the form of wireless call charges B125 each time a call is made.
The control device 1 within the information terminal 1F accesses the user data management equipment 2C via the public wire line 4 either periodically or on demand by the user, and obtains the wireless call charges A43 compiled by the base station equipment 3 and user data management equipment 2C.
More specifically, the control device 11 of the information terminal 1F controls the wire communication device 14 so as to connect to the user data management equipment 2C via public wire line 4, and issues a line connection request (Steps 180 through 181). Subsequently, the control device 11 of the information terminal 1F reads out the ESN information 113 from the ROM 112 within the control device 11, and sends the ESN information of the terminal to which it belongs, and at the same time, also sends a wireless call charges request (Steps 182 through 184). In the event that the ESN information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal 1F has no other function, sending of the ESN information means requesting of wireless call charges, and there is no need to conduct a separate operation of sending a wireless call charges request.
On the other hand, upon receiving the line connection request and wireless call charges request from the information terminal 1F, the user data management equipment 2C waits for reception of the ESN, and upon reception of such, conducts searching of the corresponding wireless call charges (Steps 250 through 253) . Further, after the line connection request, the user data management equipment 2C performs any other requests that may be made (Steps 255 through 256).
In other words, the user data management equipment 2C searches the wireless call charges A43 corresponding with the sent ESN from the wireless call charges table 42, and sends the wireless call charges A43 to the information terminal 1F via the public wire line 4 (Steps 253 through 254) Next, upon reception of the wireless call charges A43 sent via public wire line 4, the control device 11 within the information terminal 1F compares the wireless call charges A43 with the wireless call charges B125 stored within the information storage device 115 (Steps 185 through 186). If these match approximately, one can thus know that the ESN, telephone number (NAM) , or encryption key of one's information terminal have not been stolen and used unauthorized on another information terminal. On the other hand, if the comparison shows that the wireless call charges A43 are considerably higher than the wireless call charges B125, there is the possibility that another party may have stolen and be using the ESN, telephone number (NAM) , or encryption key thereof. The local telephone number (NAM) may be sent to the user data management equipment 2C via the public wire line 4 instead of sending the ESN, so as to obtain the wireless call charges A43.
According to this sixth embodiment, wireless call charges A unique to the terminal which has been compiled by the base station are obtained via public wire line 4, wireless call charges B compiled within the terminal itself are stored therein, and comparison is made between the wireless call charges A unique to the terminal which has been compiled by the base station and wireless call charges B compiled within the terminal itself, thus allowing for discovery of whether or not the one's terminal number or ESN is being used unauthorized by another party.

Claims (14)

Claims:
1.An information terminal comprising: a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users; a control device which stores said information pertaining to wireless communication; and a wireless communication device which conducts wireless communication using said information pertaining to wireless communication.
2.An information terminal according to Claim 1; wherein said information pertaining to wireless communication comprises a telephone number.
3.An information terminal according to Claim 2; wherein said control device controls said wire communication device so as to notify said management equipment of ESN via said wire line, and so as to obtain a telephone number for wireless telephone assigned by said management equipment, and further to store said obtained telephone number for wireless telephone in an information storage device within said control device; and wherein said wireless communication device conducts wireless communication using said stored telephone number for wireless communication.
4.An information terminal according to Claim 1; wherein said information pertaining to wireless communication comprises an IP address.
5.An information terminal according to Claim 4; wherein said control device controls said wire communication device so as to notify said management equipment of ESN via said wire line, and so as to obtain an IP address assigned by said management equipment, and further to store said obtained IP address in an information storage device within said control device; and wherein said wireless communication device inducts wireless communication using said stored IP 3address.
6.An information terminal according to Claim 1; wherein said information pertaining to wireless ommunication comprises a wireless communication control program.
7.An information terminal according to Claim 6; wherein said control device controls said wire ommunication device so as to notify said management equipment of new wireless communication control program request via said wire line, and so as to obtain a new wireless communication control program from said management equipment, said wireless communication control program being stored therein, and further to store said obtained new wireless communication control program in an information storage device within said control device; and wherein said wireless communication device conducts wireless communication using said stored new wireless communication control program.
8.An information terminal according to Claim 1; wherein said information pertaining to wireless communication comprises an encryption key.
9.An information terminal according to Claim 8; wherein said control device conducts changing of encryption key by using a certain algorithm for generating a first code based on a first ESN, a first telephone number and a first encryption key stored within an information storage device within said control device, and controls said wire communication device so as to notify said management equipment of encryption key change request and to send said first ESN, said first telephone number and said first code via said wire line, said management equipment using an algorithm which is the same as said certain algorithm for generating a second code based on a second ESN, a second telephone number and a second encryption key, said second numbers corresponding to said first ESN and said first telephone number, following which said second code and said first code are compared, and in the event that said codes correspond, said control device obtains from said management equipment via said wire line the new encryption key generated based on said second ESN; and wherein said wireless communication device conducts wireless communication using said obtained new encryption key.
10.An information terminal comprising: a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users; a control device which stores and processes said information pertaining to wireless communication; and a wireless communication device which conducts wireless communication.
11.An information terminal according to Claim 10; wherein said information pertaining to wireless rommunication comprises communication hysteresis.
12.An information terminal according to Claim 11; wherein said control device controls said wire ommunication device upon inspecting communication hysteresis so as to notify said management equipment of parameters unique to said terminal via said wire line, and so as to obtain a first communication hysteresis fiorresponding with said parameters unique to said terminal from said management equipment via said wire line, and further to compare said a communication hysteresis stored in an information storage device within said control device 4ith said first communication hysteresis.
13.An information terminal according to Claim 10; wherein said information pertaining to wireless communication comprises wireless call charges.
14.An information terminal according to Claim 13; wherein said control device controls said wire communication device upon inspecting wireless call charges so as to notify said management equipment of parameters unique to said terminal via said wire line, and so as to obtain a first wireless call charges corresponding with said parameters unique to said terminal from said management equipment via said wire line, and further to compare second wireless call charges stored in an information storage device within said control device with said first wireless call charges.
GB9710483A 1996-07-12 1997-05-22 Information terminal Expired - Fee Related GB2315390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9908695A GB2333935A (en) 1996-07-12 1997-05-22 Remote programming of wireless communication unit via wireline connection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP8183660A JPH1028293A (en) 1996-07-12 1996-07-12 Information terminal

Publications (3)

Publication Number Publication Date
GB9710483D0 GB9710483D0 (en) 1997-07-16
GB2315390A true GB2315390A (en) 1998-01-28
GB2315390B GB2315390B (en) 2000-01-12

Family

ID=16139706

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9710483A Expired - Fee Related GB2315390B (en) 1996-07-12 1997-05-22 Information terminal

Country Status (5)

Country Link
JP (1) JPH1028293A (en)
CN (1) CN1092878C (en)
AU (1) AU693403B2 (en)
CA (1) CA2207651A1 (en)
GB (1) GB2315390B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2375261A (en) * 2001-04-30 2002-11-06 Nokia Corp Transfer of SIM data between mobile computing devices
FR2857537A1 (en) * 2003-07-11 2005-01-14 Canon Kk Communication network access control process for e.g. portable computer, involves communicating network access control local table and unique identifiers of equipments to equipment, and wirelessly communicating table to another equipment
US9143484B2 (en) 2000-03-03 2015-09-22 Qualcomm Incorporated System for collecting billable information in a group communication network

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3338777B2 (en) 1998-04-22 2002-10-28 日本電気株式会社 Mobile terminal and screen display method thereof
JP4491847B2 (en) * 1998-11-05 2010-06-30 ソニー株式会社 Mail system, mail client, mail server, and mail transmission / reception method
JP3755530B2 (en) * 2004-01-29 2006-03-15 セイコーエプソン株式会社 Electronic equipment
JP3952022B2 (en) * 2004-01-26 2007-08-01 セイコーエプソン株式会社 Information transmission method in electronic equipment and electronic equipment
US20050162338A1 (en) * 2004-01-26 2005-07-28 Masayuki Ikeda Information transmitting method, electronic apparatus, and wireless communication terminal
JP2006060392A (en) * 2004-08-18 2006-03-02 Nec Corp Unauthorized-use preventive system and identification method for information terminal device
CN100459792C (en) * 2005-03-16 2009-02-04 华为技术有限公司 Method of recording user's electronic sequence numbers
JP4624322B2 (en) * 2006-08-04 2011-02-02 シャープ株式会社 Terminal authentication system and server

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5046082A (en) * 1990-05-02 1991-09-03 Gte Mobile Communications Service Corporation Remote accessing system for cellular telephones
GB2249459A (en) * 1990-07-12 1992-05-06 Motorola Inc Remote programming of a radiotelephone
WO1992008311A1 (en) * 1990-10-31 1992-05-14 Mccaw Cellular Communications, Inc. Location registration system for a personal communicator
WO1992020167A1 (en) * 1991-04-30 1992-11-12 Motorola, Inc. A personal communications device having remote control capability
US5414751A (en) * 1991-05-23 1995-05-09 Sony Corporation Portable telephone apparatus responsive to control signals obtained through a connector and through a wired telephone line for a mending the operational program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5046082A (en) * 1990-05-02 1991-09-03 Gte Mobile Communications Service Corporation Remote accessing system for cellular telephones
GB2249459A (en) * 1990-07-12 1992-05-06 Motorola Inc Remote programming of a radiotelephone
WO1992008311A1 (en) * 1990-10-31 1992-05-14 Mccaw Cellular Communications, Inc. Location registration system for a personal communicator
WO1992020167A1 (en) * 1991-04-30 1992-11-12 Motorola, Inc. A personal communications device having remote control capability
US5414751A (en) * 1991-05-23 1995-05-09 Sony Corporation Portable telephone apparatus responsive to control signals obtained through a connector and through a wired telephone line for a mending the operational program

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9143484B2 (en) 2000-03-03 2015-09-22 Qualcomm Incorporated System for collecting billable information in a group communication network
GB2375261A (en) * 2001-04-30 2002-11-06 Nokia Corp Transfer of SIM data between mobile computing devices
GB2375261B (en) * 2001-04-30 2004-10-13 Nokia Corp Radiotelephone system
US7603107B2 (en) 2001-04-30 2009-10-13 Nokia Corporation Radio telephone system allowing exchange of call setup parameters between associated or commonly owned mobile devices
FR2857537A1 (en) * 2003-07-11 2005-01-14 Canon Kk Communication network access control process for e.g. portable computer, involves communicating network access control local table and unique identifiers of equipments to equipment, and wirelessly communicating table to another equipment

Also Published As

Publication number Publication date
CN1175138A (en) 1998-03-04
AU693403B2 (en) 1998-06-25
CN1092878C (en) 2002-10-16
AU2496497A (en) 1998-01-22
JPH1028293A (en) 1998-01-27
CA2207651A1 (en) 1998-01-12
GB2315390B (en) 2000-01-12
GB9710483D0 (en) 1997-07-16

Similar Documents

Publication Publication Date Title
CN100536465C (en) Configuration of enterprise gateways
US7774503B2 (en) Universal address recognition for text-capable communication devices
EP1864523B1 (en) System and method for personal identification number messaging
US9177012B2 (en) Maintenance of subscriber history for service support applications in an IP-based telecommunications system
CN101656668B (en) Method and device for using core based nodes for state transfer
US8732852B2 (en) Method, system and apparatus for protecting service account
CN1135888C (en) System and method for authenticating cellular subscriber at registration
CN101248640A (en) Method for selecting an access point name (APN) for a mobileterminal in a packet switched telecommunications network
GB2315390A (en) Remote programming of wireless communication unit via wireline connection
CN1795656B (en) Method of safety initialization users and data privacy
CN1711785B (en) System and method for managing access of communication network to mobile terminal
US20040203372A1 (en) Personal digital assistant, wireless communication system and method of link establishment
US7957726B2 (en) System and method for porting a personalized indicium assigned to a mobile communications device
GB2333935A (en) Remote programming of wireless communication unit via wireline connection
EP1521429B1 (en) Delivering additional information needed in connection setup
CA2527744C (en) System and method for porting a personalized indicium assigned to a mobile communications device
CN117580035A (en) Random MAC wireless access method, equipment and storage medium
EP1843541A1 (en) A method of securing communication between an access network and a core network
KR101212131B1 (en) Method And System for Providing Address Modification Service by Using Short Message Service
JPH104586A (en) Mobile terminal identification system
Berger et al. Integration of DECT and OSI to support mobile computing applications
KR20060077936A (en) System and method for authentification using sms
KR20030019836A (en) Indexing Method of Subscriber Information in Home Location Registor

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20010522