GB2333935A - Remote programming of wireless communication unit via wireline connection - Google Patents
Remote programming of wireless communication unit via wireline connection Download PDFInfo
- Publication number
- GB2333935A GB2333935A GB9908695A GB9908695A GB2333935A GB 2333935 A GB2333935 A GB 2333935A GB 9908695 A GB9908695 A GB 9908695A GB 9908695 A GB9908695 A GB 9908695A GB 2333935 A GB2333935 A GB 2333935A
- Authority
- GB
- United Kingdom
- Prior art keywords
- wireless communication
- management equipment
- information terminal
- control device
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
- H04W8/265—Network addressing or numbering for mobility support for initial activation of new user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/10—Metering calls from calling party, i.e. A-party charged for the communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/24—Accounting or billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/18—Service support devices; Network management devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A wireless communication terminal 1A includes a wire communication device 14 which obtains a telephone number (NAM), for wireless telephone communication, via wire lines from management equipment 2 which manages wireless users, a control device 11 which stores the aforementioned NAM, and a wireless communication device 13 which conducts wireless communication using the NAM, wherein registration of information such as telephone number, encryption key, and the like can be conducted in a speedy and sure manner without necessitating human intervention. Also, there is little danger of the encryption key falling into other hands upon registration thereof, since the encryption key does not pass through a third party such as a dealer.
Description
INFORMATION TERMINAL
BACKGROUND OF THE INVENTION 1.Field of the Invention
The present invention relates to an information terminal which comprises wire communication functions, and wireless communication functions such as cellular telephone, mobile telephone, wireless packet communication, or the like, within a single terminal.
2.Description of the Related Art
Description of a known information terminal will now be made with reference to Fig. 26. In the Figure, the wireless communication system comprises an information terminal 1, user data management equipment 2, base station equipment 3, wireless telephone office 6, and dealer 7. The user data management equipment 2 and multiple base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1 comprises a control device 11, a terminal antenna 12, and a wireless communication device 13 complying with cellular telephone standards or CDPD (Cellular Digital Packet Data) standards.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN (Electronic
Serial Number) 113 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as
EEPROM, flash ROM, battery-backed-up RAM, or the like. With cellular telephones such as AMPS (Advanced Mobil Phone
Service), the aforementioned information storage device 115 stores a NAM (Number Assignment Module, telephone number) 116, an encryption key 117, and the like.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU and the like, an ESN data table 22 which is terminal data of a plurality of users, a telephone number table 23, and encryption key table 24, and controls each of the tables. Also, the aforementioned tables are situated on a large-capacity hard disk device (HDD).
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33.
With the known information terminal (including cellular telephones and mobile telephones) 1, application to the wireless telephone office (operator) 6 and registration must be conducted at the time of purchase in order to make the information terminal actually usable. First, the serial number ESN 113 which is unique to the user terminal is reported to the wireless telephone office 6, following which the wireless telephone office 6 assigns a NAM (telephone number) to that terminal and notifies the user thereof, as well as registering the ESN and telephone number to the user data management equipment 2. The user inputs the NAM (telephone number) to his / her own terminal, and only then does the terminal becomes usable-.
In other words, registration of the ESN and telephone number must be conducted by the two parties: the wireless telephone office 6; and the user. Also, registration of an encryption key becomes necessary as well, in the event that the user desires such. This key is used in wireless communication to determine whether the connection request is from a legitimate user or not. In practice, a dealer 7 often performs the user-side registration.
With known cellular telephones and mobile telephones, there are two ways by which the NAM (telephone number) is registered to the user's terminal: the user inputting directly from a keyboard on the terminal; and the dealer 7 using a specialized writing jig for writing. While the method of inputting directly from a keyboard on the terminal does not require a specialized jig, there are problems with this method such as input errors occurring easily and the process of inputting all items taking time.
Particularly, the encryption key 117 for AMPD and D-AMPS (Dual AMPS) systems has up to 26 digits, and is not suitable for input from a keyboard.
In the event that the user has a dealer 7 to conduct the writing, a specialized writing jig is often employed for this, but this means that the dealer 7 needs a computer for writing and a specialized adapter, resulting in substantial facility investment in order to install such equipment in all dealer 7 locations. Also, in this case, a third party becomes involved in the encryption key writing process, thus creating the possibility that the information of the encryption key may fall into other hands.
Although it is preferable that the encryption key be changed periodically, considering the consequences of the encryption key falling in other hands, it is not very practical for a user to input an encryption key up to 26 digits in length from a keyboard on the terminal. Also, when changing the encryption key with the known system, alteration registration must be made with the wireless telephone office (operator) 6 again.
Further, with the known system, in order to confirm whether the telephone number, ESN, or encryption key of one's information terminal 1 have not been stolen and used unauthorized, one would have the wireless telephone office 6 send communications records compiled by the wireless telephone office 6 such as communication hysteresis, wireless communication bills, or the like, and the user would then compare these records one with another to confirm the contents thereof and thus judge whether or not the telephone number, ESN, or encryption key is being used unauthorized. However, there are limits to the what extent all of the communication records can be checked by human means, and thus unauthorized usage of stolen ESNs and telephone numbers for communication is a perpetual problem.
Further, in cases where alterations need to be made in the control program in the wireless information terminal, such as cases where the control program in the wireless information terminal is faulty and the program must be corrected, or in cases where the user desires to upgrade the program to a higher version to correspond with new functions, the known system necessitated temporary collection of the terminal for-writing to be conducted by means of a specialized jig. This has resulted in increased costs for collection, investment costs for the writing jig, and labor costs for writing.
While the method of inputting directly from a keyboard on an information terminal such as described above does not require a specialized jig, there are problems with this method such as input errors occurring easily and the process of inputting all items taking time.
In the event that the user has a dealer to conduct the writing of the telephone number, etc., a specialized writing jig is often employed for this, but there are problems with this, such as that the dealer needs a computer for writing and a specialized adapter, resulting insubstantial facility investment in order to install such equipment in all dealer locations. Also, in this case, a third party becomes involved in the encryption key writing process, thus creating the possibility that the information of the encryption key may fall into other hands.
Also, there are problems when changing the encryption key with the known system, in that alteration registration must be made with the wireless telephone office (operator) again.
Further, there are problems with the known system, in that in order to confirm whether the telephone number,
ESN, or encryption key of one's information terminal have not been stolen and used unauthorized, one would have the wireless telephone office send communications lists compiled by the wireless telephone office (operator), and the user would then compare these lists one with another to confirm the contents thereof and thus judge whether or not the telephone number, ESN, or encryption key is being used unauthorized. However, there are limits to the extent all of the communication records can be checked by human means, and thus unauthorized usage of stolen ESNs and telephone numbers for communication has been a perpetual problem.
Further, in cases where alterations need to be made in the control program in the wireless information terminal, the known system has necessitated temporary collection of the terminal for writing to be conducted by means of a specialized t ., There are problems with this system, in that increased costs for collection, investment costs for the writing e ,! and labor costs for writing, result thereby.
SUMMARY OF THE INVENTION
Accordingly, the present invention has been made in view of the above-described problems, and it is an object thereof to provide an information terminal wherein registration of the ESN to the telephone office and registration of the telephone number, NAM, and encryption key to the terminal can be conducted in a speedy and sure manner without necessitating human intervention.
Also, the present invention has been made in view of the above-described problems, and it is another object thereof to provide an information terminal wherein the encryption key does not fall into other hands upon conducting the process of registration of the encryption key.
Further, the present invention has been made in view of the above-described problems, and it is another object thereof to provide an information terminal wherein alteration of the control program thereof and upgrading the control program thereof to a higher version can be conducted easily without human intervention.
Further yet, the present invention has been made in view of the above-described problems, and it is another object thereof to provide an information terminal wherein the encryption key can be changed in an easy and sure manner so that unauthorized use thereof can be prevented even in the event that the encryption key does fall into other hands.
Moreover, the present invention has been made in view of the above-described problems, and it is another object thereof to provide an information terminal wherein the user can discover whether or not one's terminal number or ESN is being used by another individual.
The information terminal relating to the present invention comprises: a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users; a control device which stores the aforementioned information pertaining to wireless communication; and a wireless communication device which conducts wireless communication using the aforementioned information pertaining to wireless communication.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises a telephone number.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device so as to notify the aforementioned management equipment of
ESN via the aforementioned wire line, and so as to obtain a telephone number for wireless telephone assigned by the aforementioned management equipment, and further to store the aforementioned obtained telephone number for wireless telephone in an information storage device within the aforementioned control device, and wherein the aforementioned wireless communication device conducts wireless communication using the aforementioned stored telephone number for wireless communication.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises an IP address.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device so as to notify the aforementioned management equipment of
ESN via the aforementioned wire line, and so as to obtain an
IP address assigned by the aforementioned management equipment, and further to store the aforementioned obtained
IP address in an information storage device within the aforementioned control device, and wherein the aforementioned wireless communication device conducts wireless communication using the aforementioned stored IP address.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises a wireless communication control program.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device so as to notify the aforementioned management equipment of new wireless communication control program request via the aforementioned wire line, and so as to obtain a new wireless communication control program from the aforementioned management equipment, the aforementioned wireless communication control program being stored therein, and further to store the aforementioned obtained new wireless communication control program in an information storage device within the aforementioned control device, and wherein the aforementioned wireless communication device conducts wireless communication using the aforementioned stored new wireless communication control program
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises an encryption key.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device conducts changing of encryption key by using a certain algorithm for generating a first code based on a first ESN, a first telephone number and a first encryption key stored within an information storage device within the aforementioned control device, and controls the aforementioned wire communication device so as to notify the aforementioned management equipment of encryption key change request and to send the aforementioned first ESN, the aforementioned first telephone number and the aforementioned first code via the aforementioned wire line, the aforementioned management equipment using an algorithm which is the same as the aforementioned certain algorithm for generating a second code based on a second ESN, a second telephone number and a second encryption key, the aforementioned second numbers corresponding to the aforementioned first ESN and the aforementioned first telephone number, following which the aforementioned second code and the aforementioned first code are compared, and in the event that the aforementioned codes correspond, the aforementioned control device obtains from the aforementioned management equipment via the aforementioned wire line the new encryption key generated based on the aforementioned second ESN, and wherein the aforementioned wireless communication device conducts wireless communication using the aforementioned obtained new encryption key.
Moreover, the information terminal relating to the present invention comprises: a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users; a control device which stores and processes the aforementioned information pertaining to wireless communication; and a wireless communication device which conducts wireless communication.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises communication hysteresis.
Also, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device upon inspecting communication hysteresis so as to notify the aforementioned management equipment of parameters unique to the aforementioned terminal via the aforementioned wire line, and so as to obtain a first communication hysteresis corresponding with the aforementioned parameters unique to the aforementioned terminal from the aforementioned management equipment via the aforementioned wire line, and further to compare a second communication hysteresis stored in an information storage device within the aforementioned control device with the aforementioned first communication hysteresis.
Also, the information terminal relating to the present invention is such wherein the aforementioned information pertaining to wireless communication comprises wireless call charges.
Further, the information terminal relating to the present invention is such wherein the aforementioned control device controls the aforementioned wire communication device upon inspecting wireless call charges so as to notify the aforementioned management equipment of parameters unique to the aforementioned terminal via the aforementioned wire line, and so as to obtain a first wireless call charges corresponding with the aforementioned parameters unique to the aforementioned terminal from the aforementioned management equipment via the aforementioned wire line, and further to compare second wireless call charges stored in an information storage device within the aforementioned control device with the aforementioned first wireless call charges.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a block diagram illustrating the configuration of a first embodiment according to the present invention;
Fig. 2 is a diagram illustrating the operation sequence of a first embodiment according to the present invention;
Fig. 3 is a flowchart illustrating the operation of a first embodiment according to the present invention;
Fig. 4 is a flowchart illustrating the operation of user data management equipment relating to a first embodiment according to the present invention;
Fig. 5 is a block diagram illustrating the configuration of a second embodiment according to the present invention;
Fig. 6 is a diagram illustrating the operation sequence of a second embodiment according to the present invention;
Fig. 7 is a flowchart illustrating the operation of a second embodiment according to the present invention;
Fig. 8 is a flowchart illustrating the operation of user data management equipment relating to a second embodiment according to the present invention;
Fig. 9 is a block diagram illustrating the configuration of a third embodiment according to the present invention;
Fig. 10 is a diagram illustrating the operation sequence of a third embodiment according to the present invention;
Fig. 11 is a flowchart illustrating the operation of a third embodiment according to the present invention;
Fig. 12 is a flowchart illustrating the operation of user data management equipment relating to a third embodiment according to the present invention;
Fig. 13 is a block diagram illustrating the configuration of a fourth embodiment according to the present invention;
Fig. 14 is a diagram illustrating the operation sequence of a fourth embodiment according to the present invention;
Fig. 15 is a diagram for describing the code generating algorithm of a fourth embodiment according to-the present invention;
Fig. 16 is a flowchart illustrating the operation of a fourth embodiment according to the present invention;
Fig. 17 is a flowchart illustrating the operation of user data management equipment relating to a fourth embodiment according to the present invention;
Fig. 18 is a block diagram illustrating the configuration of a fifth embodiment according to the present invention;
Fig. 19 is a diagram illustrating the operation sequence of a fifth embodiment according to the present invention;
Fig. 20 is a flowchart illustrating the operation of a fifth embodiment according to the present invention;
Fig. 21 is a flowchart illustrating the operation of user data management equipment relating to a fifth embodiment according to the present invention;
Fig. 22 is a block diagram illustrating the configuration of a sixth embodiment according to the present invention;
Fig. 23 is a diagram illustrating the operation sequence of a sixth embodiment according to the present invention;
Fig. 24 is a flowchart illustrating the operation of a sixth embodiment according to the present invention;
Fig. 25 is a flowchart illustrating the operation of user data management equipment relating to a sixth embodiment according to the present invention; and
Fig. 26 is a block diagram illustrating the configuration of a wireless communication system including a privately known but unpublished information terminal.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
First Embodiment
Description of the first embodiment according to the present invention will be made with reference to Figs. 1 through 4. Fig. 1 is a block diagram illustrating the configuration of the first embodiment according to the present invention. Fig. 2 is a diagram illustrating the operation sequence of the first embodiment according to the present invention. Fig. 3 a-nd Fig. 4 are flowcharts illustrating the operation of the first embodiment according to the present invention. In the Figures, identical reference numerals or reference characters represent identical or equivalent items.
In Fig. 1, the wireless communication system comprises an information terminal 1A, user data management equipment 2, and base station equipment 3. The information terminal 1A and user data management equipment 2 are connected by a public wire line 4. The user data management equipment 2 and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1A comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS (Advanced Mobil Phone Service), D-AMPS (Dual AMPS) , CDMA (Code Division Multiple Access), PDC (Personal Digital
Cellular), or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN (Electronic
Serial Number) 113 which is a serial number unique to the terminal is stored within the ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as
EEPROM, flash ROM, battery-backed-up RAM, or the like. With cellular telephones such as AMPS, the aforementioned information storage device 115 stores a NAM (Number
Assignment Module, telephone number) 116, and an encryption key 117 which is used for wireless line connection confirmation. The ESN 113 which serves as a serial number unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU and the like, an ESN data table 22 which is terminal data of a plurality of users, a telephone number table 23, and encryption key table 24, and controls each of the tables. Also, the aforementioned tables are situated on a large-capacity hard disk device (HDD). Also, the user data management equipment 2 is equipment which manages the ESN and telephone number of wireless telephone users, and judges whether requests for outgoing or incoming calls made by the information terminal 1A are connection requests by a legitimate user or not.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33. The aforementioned base station equipment 3 is base station equipment for cellular telephone, such as AMPS, D-AMPS, CDMA, or the like.
The aforementioned NAM 116 is part of the parameters unique to the terminal which are necessary for wireless communication, such as a telephone number, and the like. The telephone number for wireless telephone of the
AMPS system is equivalent to this NAM 116.
First, at the time of purchase of the information terminal 1A by the user, the NAM (telephone number) is not registered in the information storage device 115 within the information terminal 1A. Wireless communication can not be made in this state, since the telephone number for wireless telephone (NAM) is not registered within the terminal. The following is a description of the registration procedures of the NAM (telephone number) according to this first embodiment.
In this state, the control device 11 of the information terminal 1A controls the wire communication device 14 so as to connect to the user data management equipment 2 via public wire line 4, and issues a line connection request (Steps 130 through 131). Subsequently, the control device 11 of the information terminal 1A reads out the ESN information from the ROM 112 within the control device 11, and sends the ESN information of the terminal to which it belongs, and at the same time, also sends a telephone number assignment request (Steps 132 through 134).
In the event that the ESN information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal 1A has no other function, sending of the ESN information means requesting of telephone number assignment, and there is no need to conduct a separate operation of sending a telephone number assignment request.
On the other hand, upon receiving the line connection request and telephone number assignment request from the information terminal 1A, the user data management equipment 2 waits for reception of the ESN, and upon reception of such, conducts telephone number assignment (Steps 200 through 203). The user data management equipment 2 also adds the sent ESN data to the ESN data table 22.
Further, after the line connection request, the user data management equipment 2 performs any other requests that may be made (Steps 207 through 208).
In other words, the user data management equipment 2 assigns a NAM (telephone number for wireless telephone) for the information terminal corresponding with the ESN thereof, and adds the NAM to the telephone number table 23.
The user data management equipment 2 also generates an encryption key which is stored to the encryption key table 24, and sends the encryption key along with the assigned telephone number for wireless telephone to the information terminal 1A via the public wire line 4 (Steps 204 through 206) In the event that the user desires that an information terminal which does not have encryption keyrelated functions be handled, the above-described encryption key process is unnecessary. Thus, the registration of the information terminal 1A at the user data management equipment 2 is completed.
Next, upon reception of the NAM (telephone number for wireless telephone) 116 and encryption key 117 via the public wire line 4, the information terminal 1A stores these in the information storage device 115 within the control device 11, and subsequently conducts wireless telephone communication using the aforementioned telephone number for wireless telephone and encryption key (Steps 135 through 136). In the case of an information terminal which does not have encryption key-related functions, wireless telephone communication are conducted using only the telephone number for wireless telephone without an encryption key.
According to the information terminal 1A relating to the first embodiment, registration of the NAM (telephone number ) 116 and encryption key 117 are conducted directly with the user data management equipment 2 via the public wire line 4, so that there is no need for the user to conduct registration of the NAM (telephone number for wireless telephone) via a terminal keyboard, and specialized writing jigs are also thus made unnecessary. Moreover, there is little danger of the encryption key falling into other hands upon registration thereof, since the encryption key does not pass through a third party.
Second Embodiment
Description of a second embodiment according to the present invention will be made with reference to Figs. 5 through 8. Fig. 5 is a block diagram illustrating the configuration of the second embodiment according to the present invention. Fig. 6 is a diagram illustrating the operation sequence of the second embodiment according to the present invention. Fig. 7 and Fig. 8 are flowcharts illustrating the operation of the second embodiment according to the present invention.
In Fig. 5, the wireless communication system comprises an information terminal 1B, user data management equipment 2, and a CDPD base station 3A. The information terminal 1B and user data management equipment 2 are connected by a public wire line 4. The user data management equipment 2 and multiple CDPD base stations 3A are connected by a dedicated line 5, although the Figure only shows one
CDPD base station 3A.
Also, in the Figure, the aforementioned information terminal 1B comprises a control device 11, a terminal antenna 12, a CDPD standards packet communication device 13A, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN 113 which is a serial number unique to the terminal is stored within the
ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, batterybacked-up RAM, or the like. The aforementioned information storage device 115 stores an NEI (Network Entity Identifier,
IP (Internet Protocol) address ) 118, and an encryption key 117 which is used for wireless line connection confirmation.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU and the like, an ESN data table 22 which is terminal data of a plurality of users, an IP address table 25, and encryption key table 24. The aforementioned tables are situated on a large-capacity hard disk device (HDD) . Moreover, the user data management equipment 2 is equipment which manages the ESN and IP address of wireless telephone users, and judges whether requests for outgoing or incoming calls made by the information terminal 1B are connection requests by a legitimate user or not, as well as managing usage charges according to the sending and receiving of packets to and from this information terminal 1B, and also managing the ESN and NEI (IP address) of the information terminal 1B of the user.
Moreover, in the Figure, the aforementioned CDPD base station 3A comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33.
First, at the time of purchase of the information terminal 1B by the user, the NEI (IP address) 118 is not registered in the information storage device 115 within the information terminal 1B, and CDPD wireless communication can not be made in such a state.
In this state, the control device 11 of the information terminal 1B controls the wire communication device 14 so as to connect to the user data management equipment 2 via public wire line 4, and issues a line connection request (Steps 140 through 141). Subsequently, the control device 11 of the information terminal 1B reads out the ESN information from the ROM 112 within the control device 11, and sends the ESN information of the terminal to which it belongs, and at the same time, also sends an IP address assignment request (Steps 142 through 144). In the event that the ESN information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal 7B has no other function, sending of the ESN information means requesting of
IP address assignment, and there is no need to conduct a separate operation of sending an IP address assignment request.
On the other hand, upon receiving the line connection request and IP address assignment request from the information terminal 1B, the user data management equipment 2 waits for reception of the ESN, and upon reception of such, conducts IP address assignment (Steps 210 through 213) . The user data management equipment 2 also adds the sent ESN data to the ESN data table 22. Further, after the line connection request, the user data management equipment 2 performs any other requests that may be made (Steps 217 through 218).
In other words, the user data management equipment 2 assigns an NEI (IP address) for the information terminal corresponding with the ESN thereof, and adds the IP address to the IP address table 25. The user data management equipment 2 also generates an encryption key which is stored to the encryption key table 24, and sends the encryption key along with the assigned IP address to the information terminal 1B via the public wire line 4 (Steps 214 through 216).
In the event that the user desires that an information terminal which does not have encryption keyrelated functions be handled, the above-described encryption key process is unnecessary. Thus, the registration of the information terminal 1B at the user data management equipment 2 is completed.
Next, upon reception of the NEI (IP address) and encryption key via the public wire line 4, the information terminal 7B stores these in the information storage device 115 within the control device 11, and subsequently conducts
CDPD communication using the aforementioned NEl (IP address) and encryption key (Steps 145 through 146). In the case of an information terminal which does not have encryption keyrelated functions, CDPD communication is conducted using only the NEI (IP address) without an encryption key.
According to the information terminal 1B relating to the second embodiment, the IP address, which is a parameter relating to wireless communication and which is unique to the terminal, is obtained directly from the user data management equipment 2 via the public wire line 4, and this information is stored in the information storage device 115 of the control device 11 within the information terminal 1B, so that registration of the ESN to the user data management equipment 2 and registration of the NEI (IP address) and encryption key to the information terminal 1B is conducted without involving a third party, and can be conducted in a speedy and sure manner. Moreover, there is little danger of the encryption key falling into other hands upon registration thereof, since the encryption key does not pass through a third party such as a dealer.
Third Embodiment
Description of a third embodiment according to the present invention will be made with reference to Figs. 9 through 12. - Fig. 9 is a block diagram illustrating the configuration of the third embodiment according to the present invention. Fig. 10 is a diagram illustrating the operation sequence of the third embodiment according to the present invention. Fig. 11 and Fig. 12 are flowcharts illustrating the operation of the third embodiment according to the present invention.
In Fig. 9, the wireless communication system comprises an information terminal 1C, a computer 2A, and base station equipment 3. The information terminal 1C and computer 2A are connected by a public wire line 4. The computer 2A and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1C comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D
AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, battery-backed-up RAM, or the like, and stores an old wireless communication control program 119 and the like.
Further, in the Figure, the aforementioned computer 2A is a computer of a company which performs maintenance of the wireless communication terminal, or a computer of a wireless telephone office. The computer 2A comprises a control device 21 including a CPU and the like, and a new communication control program 26.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33.
First, there are cases where the old wireless communication control program 119 within the information terminal 1C requires alteration. Cases where alterations are necessary include: cases where problems are discovered in the terminal software; cases where the software needs to be changed to correspond with the functions of a new wireless communications system; cases where the version of the communications software installed in the wireless communications device 13 is to be upgraded; cases where the encryption algorithm has been deciphered by another party and must be changed; and the like.
The control device 11 of the information terminal 1C controls the wire communication device 14 so as to connect to the computer 2A of the maintenance company or the like via public wire line 4, and issues a line connection request (Steps 150 through 151). Subsequently, the control device 11 of the information terminal 1C sends a new wireless communications control program request (Step 152).
On the other hand, upon receiving the line connection request and new wireless communications control program request from the information terminal 1C, the computer 2A sends the new wireless communications control program stored within itself to the information terminal 1C (Steps 220 through 222). Further, after the line connection request, the computer 2A performs any other requests that may be made (Steps 223 through 224).
Next, upon reception of the new wireless communications control program via the public wire line 4, the information terminal 1C stores this in the information storage device 115 within the control device 11, i.e., conducts over-writing of the wireless communications control program, and subsequently conducts wireless communication using the aforementioned new wireless communications control program 26 (Steps 153 through 154).
According to the information terminal 1C relating to the third embodiment, the new control program 26 relating to wireless communication is obtained directly from the user data management equipment 2 via the public wire line 4, and this new control program 26 is stored in the information storage device 115, so that alteration of the wireless communications control program can be conducted easily and in a sure manner.
Fourth Embodiment
Description of the fourth embodiment according to the present invention will be made with reference to Figs.
13 through 17. Fig. 13 is a block diagram illustrating the configuration of the fourth embodiment according to the present invention. Fig. 14 is a diagram illustrating the operation sequence of the fourth embodiment according to the present invention. Fig. 15 is a diagram for describing the code generating algorithm of the fourth embodiment according to the present invention. Fig. 16 and Fig. 17 are flowcharts illustrating the operation of the fourth embodiment according to the present invention.
In Fig. 13, the wireless communication system comprises an information terminal 1D, user data management equipment 2, and base station equipment 3. The information terminal 1D and user data management equipment 2 are connected by a public wire line 4. The user data management equipment 2 and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1D comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D
AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN -A121 which is a serial number unique to the terminal is stored within the
ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, batterybacked-up RAM, or the like, and stores a telephone number
A122 and an encryption key -A123. The ESN -A121 which serves as a serial number unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2 comprises a control device 21 which includes a CPU and the like, an ESN data table 22 which is terminal data of a plurality of users, a telephone number table 23, and encryption key table 24, and controls each of the tables. Also, the aforementioned tables are situated on a large-capacity hard disk device (HDD). Also, the user data management equipment 2 is equipment which manages the ESN and telephone number of wireless telephone users, and judges whether requests for outgoing or incoming calls made by the information terminal ID are connection requests by a legitimate user or not.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33.
In Figs. 13 and 14, the ESN, telephone number, and encryption key registered within the information terminal 1D are denoted by ESN -A121, telephone number -A122, and encryption key -A123, respectively. Also, the ESN, telephone number, and encryption key registered within the user data management equipment 2 are denoted by ESN -B27, telephone number -B28, and encryption key -B29, respectively. In the Figures, the information terminal 1D is in a state where wireless telephone communication is available.
In this state, when the user judges that the ESN
A121, telephone number -A122, or encryption key -A123 of his / her own terminal may be being used unauthorized by another party, the user uses the control device 11 of the information terminal 1D to control the wire communication device 14 so as to connect to the user data management equipment 2 via public wire line 4, and issue a line connection request (Steps 160 through 161). Subsequently, a code A120 is generated using a certain algorithm, based on the ESN -B121, telephone number -B122, and encryption key
B123 (Step 162)
Now, description of the certain algorithm for generating the code A120 will be described with reference to
Fig. 15. Fig. 15 is a diagram for describing the code generating algorithm of the fourth embodiment according to the present invention.
Fig. 15 shows an example of generating an 8-byte code in the case where the ESN is 4 bytes long, the telephone number is 3 bytes long, and the encryption key is 8 bytes long. i.e., as shown in the Figure, the 4 bytes of the ESN are first used as the higher 4 bytes, then the next 3 bytes are comprised of the telephone number , and the lowest byte is comprised of a "0", thus creating an 8-byte intermediate code.
Next, the exclusive logical sum (EX-OR) of this 8byte intermediate code and the 8-byte encryption key is obtained, thus generating an 8-byte code.
An encryption key alteration request is then sent, and the ESN -B121, telephone number -B122, and generated code A are sent to the user data management equipment 2 (Steps 163 through 164). The old encryption key -A123 itself is not sent.
On the other hand, upon receiving the line connection request and encryption key alteration request from the information terminal 1D, the user data management equipment 2 waits for reception of the ESN -B121, telephone number -B122, and generated code A, and upon reception of such, conducts generation of a code B (Steps 230 through 233). Further, after the line connection request, the user data management equipment 2 performs any other requests that may be made (Steps 237 through 238).
In other words, the user data management equipment 2 searches the ESN data table 22 and telephone number table 23 stored within for the ESN -B27 and telephone number -B28 corresponding to the ESN -A121 and telephone number -A122 that have been sent, and also searches the encryption key table 24 for the encryption key -B29 stored therein, and thus generates a code B30 using the same algorithm as the information terminal 1D based on the ESN -B27, telephone number -B28, and encryption key -B29.
Next, the user data management equipment 2 compares the code A120 sent from the information terminal 1D with the internally generated code B30. If the codes match, judgment is made that the encryption key alteration request is from a legitimate user (Step 234). On the other hand, if the codes do not match, access from the information terminal 1D is denied.
If the user data management equipment 2 judges that the encryption key alteration request is from a legitimate user, the user data management equipment 2 generates a new encryption key from the ESN, stores the new encryption key in the encryption key table 24 within itself, and sends the new encryption key (Step 235 through 236). i.e., the user data management equipment 2 replaces the old encryption key -B29 with the new encryption key, and sends the information terminal 1D the new encryption key via public wire line 4.
Next, upon reception of the new encryption key via the public wire line 4, the information terminal 1D stores this in the information storage device 115 within the control device 11, i.e., conducts replacement of the old encryption key -A723 with the new encryption key, and subsequently conducts wireless communication using the aforementioned new encryption key (Steps 165 through 166).
According to the information terminal 1D relating to the fourth embodiment, the encryption key used for wireless line connection is obtained via the public wire line 4, this encryption key is stored in the information storage device 115, and wireless line connection confirmation (authorization) is made using this stored encryption key, as well as wire line connection confirmation (authorization) being made using this stored encryption key, thus performing altering of the encryption key, via public wire line 4, so that alteration of the encryption key can be conducted easily.
Fifth Embodiment
Description of the fifth embodiment according to the present invention will be made with reference to Figs.
18 through 21. Fig. 18 is a block diagram illustrating the configuration of the fifth embodiment according to the present invention. Fig. 19 is a diagram illustrating the operation sequence of the fifth embodiment according to the present invention. Fig. 20 and Fig. 21 are flowcharts illustrating the operation of the fifth embodiment according to the present invention.
In Fig. 18, the wireless communication system comprises an information terminal 1E, user data management equipment 2B, and base station equipment 3. The information terminal 1E and user data management equipment 2B are connected by a public wire line 4. The user data management equipment 2B and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1E comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D
AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN 113 which is a serial number unique to the terminal is stored within the
ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, batterybacked-up RAM, or the like, and stores a NAM (telephone number) 116, an encryption key 117, communication hysteresis B124, and the like. The ESN 113 which serves as a serial number unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2B comprises a control device 21 which includes a CPU and the like, and a communication hysteresis table 40 stored on a hard disk device (HDD) or the like.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment. 33.
In Figs. 18 and 19, in the event that a connection request from the information terminal 1E to the base station equipment 3 (outgoing call) or a connection request from the base station equipment 3 to the information terminal 1E (incoming call) occurs, the communication hysteresis thereof is stored in the communication hysteresis A41 within the communication hysteresis table 40 in the user data management equipment 213.
This aforementioned communication hysteresis A is comprised of the telephone number of the other party (regardless of whether the call was made from the information device to the other party or vice versa), the date and time of the call, the duration of the call, etc.
This communication hysteresis A is managed by ESN or telephone number. The information terminal 1E also stores a wireless communication hysteresis in the information storage device 115 within the information terminal 1E in the form of communication hysteresis B124. The contents of this communication hysteresis B are the same as those of the aforementioned communication hysteresis A.
The control device 11 within the information terminal 1E accesses the user data management equipment 2B via the public wire line 4 either periodically or on demand by the user, and obtains the communication hysteresis A compiled by - the base station equipment 3 and user data management equipment 2B.
More specifically, the control device 11 of the information terminal 1E controls the wire communication device 14 so as to connect to the user data management equipment 2B via public wire line 4, and issues a line connection request (Steps 170 through 171). Subsequently, the control device 11 of the information terminal 1E reads out the ESN information 113 from the ROM 112 within the control device 11, and sends the ESN information of the terminal to which it belongs, and at the same time, also sends a communication hysteresis request (Steps 172 through 174). In the event that the ESN information is stored in the information storage device 115, the control device 11 reads out the ESN information from the information storage device 115. Also, in the event that the information terminal 1E has no other function, sending of the ESN information means requesting of communication hysteresis, and there is no need to conduct a separate operation of sending a communication hysteresis request.
On the other hand, upon receiving the line connection request and communication hysteresis request from the information terminal 1E, the user data management equipment 2B waits for reception of the ESN, and upon reception of such, conducts searching of the corresponding communication hysteresis (Steps 240 through 243). Further, after the line connection request, the user data management equipment 2B performs any other requests that may be made (Steps 245 through 246).
In other words, the user data management equipment 2B searches the communication hysteresis A (telephone number of other party, date and time of call, duration of call, etc.) 41 corresponding with the sent ESN from the communication hysteresis table 40, and sends the communication hysteresis A to the information terminal 1E via the public wire line 4 (Steps 243 through 244).
Next, upon reception of the communication hysteresis A41 sent via public wire line 4, the control device 11 within the information terminal 1E compares this communication hysteresis A41 with the communication hysteresis B124 stored within the information storage device 115 (Steps 175 through 176). If these match, one can thus know that the ESN, telephone number (NAM), or encryption key of one's information terminal have not been stolen and used unauthorized on another information terminal. On the other hand, if the comparison shows that the communication hysteresis A41 contains a call which is not in the communication hysteresis B124, there is the possibility that another party may have stolen and be using the ESN, telephone number (NAM), or encryption key thereof. The local telephone number (NAM) may be sent to the user data management equipment 2B via the public wire line 4 instead of sending the ESN, so as to obtain the communication hysteresis A41.
According to this fifth embodiment, a wireless communication hysteresis A unique to the terminal which has been compiled by the base station is obtained via public wire line 4, a wireless communication hysteresis B compiled within the terminal itself is stored therein, and comparison is made between the wireless communication hysteresis A unique to the terminal which has been compiled by the base station and wireless communication hysteresis B compiled within the terminal itself, thus allowing for discovery of whether or not the one's terminal number or ESN is being used unauthorized by another party.
Sixth Embodiment
Description of the sixth embodiment according to the present invention will be made with reference to Figs.
22 through 25. Fig. 22 is a block diagram illustrating the configuration of the sixth embodiment according to the present invention. Fig. 23 is a diagram illustrating the operation sequence of the sixth embodiment according to the present invention. Fig. 24 and Fig. 25 are flowcharts illustrating the operation of the sixth embodiment according to the present invention.
In Fig. 22, the wireless communication system comprises an information terminal 1F, user data management equipment 2C, and base station equipment 3. The information terminal 1F and user data management equipment 2C are connected by a public wire line 4. The user data management equipment 2C and multiple locations of base station equipment 3 are connected by a dedicated line 5, although the Figure only shows one base station equipment location.
Also, in the Figure, the aforementioned information terminal 1F comprises a control device 11, a terminal antenna 12, a wireless communication device 13 complying with cellular telephone standards such as AMPS, D
AMPS, CDMA, PDC, or the like, and a wire communication device 14.
Further, in the Figure, the aforementioned control device 11 comprises a CPU 111, ROM 112, RAM 114, and an information storage device 115. Also, an ESN 113 which is a serial number unique to the terminal is stored within the
ROM 112. The information storage device 115 is a memory device which maintains memory even in the event that the power is turned off, such as EEPROM, flash ROM, batterybacked-up RAM, or the like, and stores a NAM (telephone number) 116, an encryption key 117, wireless call charges
B125, and the like. The ESN 113 which serves as a serial number unique to the terminal may also be stored in the information storage device 115.
Further yet, in the Figure, the aforementioned user data management equipment 2C comprises a control device 21 which includes a CPU and the like, and a wireless call charges table 42 stored on a large-capacity hard disk device (HDD) or the like.
Moreover, in the Figure, the aforementioned base station equipment 3 comprises a control device 31 which includes a CPU and the like, a base station antenna 32, and wireless communication equipment 33.
In Figs. 22 and 23, in the event that a connection request from the information terminal 1F to the base station equipment 3 (outgoing call) or a connection request from the base station equipment 3 to the information terminal 1F (incoming call) occurs, the wireless call charges thereof are stored in the wireless call charges A43 within the wireless call charges table 42 in the user data management equipment 2C. The information terminal 1F also stores wireless call charges in the information storage device 115 within the information terminal 1F in the form of wireless call charges B125. The conte each time a call is made.
The control device 1 within the information terminal 1F accesses the user data management equipment 2C via the public wire line 4 either periodically or on demand by the user, and obtains the wireless call charges A43 compiled by the base station equipment 3 and user data management equipment 2C.
More specifically, the control device 11 of the information terminal 1F controls the wire communication device 14 so as to connect to the user data management equipment 2C via public wire line 4, and issues a line connection request (Steps 180 through 181). Subsequently, the control device 11 of the information terminal 1F reads out the ESN information 113 from the ROM 112 within the control device 11, and sends the ESN information of the terminal to which it belongs, and at the same time, also sends a wireless call charges request (Steps 182 through 184). In the event that the ESN information is stored in the information storage device 115, the control device ii reads out the ESN information from the information storage device 115. Also, in the event that the information terminal 1F has no other function, sending of the ESN information means requesting of wireless call charges, and there is no need to conduct a separate operation of sending a wireless call charges request.
On the other hand, upon receiving the line connection request and wireless call charges request from the information terminal 1F, the user data management equipment 2C waits for reception of the ESN, and upon reception of such, conducts searching of the corresponding wireless call charges (Steps 250 through 253) . Further, after the line connection request, the user data management equipment 2C performs any other requests that may be made (Steps 255 through 256).
In other words, the user data management equipment 2C searches the wireless call charges A43 corresponding with the sent ESN from the wireless call charges table 42, and sends the wireless call charges A43 to the information terminal 1F via the public wire line 4 (Steps 253 through 254) Next, upon reception of the wireless call charges
A43 sent via public wire line 4, the control device 11 within the information terminal 1F compares the wireless call charges A43 with the wireless call charges B125 stored within the information storage device 115 (Steps 185 through 186). If these match approximately, one can thus know that the ESN, telephone number (NAM), or encryption key of one's information terminal have not been stolen and used unauthorized on another information terminal. On the other hand, if the comparison shows that the wireless call charges
A43 are considerably higher than the wireless call charges
B125, there is the possibility that another party may have stolen and be using the ESN, telephone number (NAM), or encryption key thereof. The local telephone number (NAM) may be sent to the user data management equipment 2C via the public wire line 4 instead of sending the ESN, so as to obtain the wireless call charges A43.
According to this sixth embodiment, wireless call charges A unique to the terminal which has been compiled by the base station are obtained via public wire line 4, wireless call charges B compiled within the terminal itself are stored therein, and comparison is made between the wireless call charges A unique to the terminal which has been compiled by the base station and wireless call charges
B compiled within the terminal itself, thus allowing for discovery of whether or not the one's terminal number or ESN is being used unauthorized by another party.
Claims (14)
1.An information terminal comprising:
a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users;
a control device which stores said information pertaining to wireless communication; and
a wireless communication device which conducts wireless communication using said information pertaining to wireless communication.
2.An information terminal according to Claim 1;
wherein said information pertaining to wireless communication comprises a telephone number.
3.An information terminal according to Claim 2;
wherein said control device controls said wire communication device so as to notify said management equipment of ESN via said wire line, and so as to obtain a telephone number for wireless telephone assigned by said management equipment, and further to store said obtained telephone number for wireless telephone in an information storage device within said control device;
and wherein said wireless communication device conducts wireless communication using said stored telephone number for wireless communication.
4.An information terminal according to Claim 1;
wherein said information pertaining to wireless communication comprises an IP address.
5.An information terminal according to Claim 4;
wherein said control device controls said wire communication device so as to notify said management equipment of ESN via said wire line, and so as to obtain an
IP address assigned by said management equipment, and further to store said obtained IP address in an information storage device within said control device;
and wherein said wireless communication device conducts wireless communication using said stored IP address.
6.An information terminal according to Claim 1;
wherein said information pertaining to wireless communication comprises a wireless communication control program.
7.An information terminal according to Claim 6;
wherein said control device controls said wire communication device so as to notify said management equipment of new wireless communication control program request via said wire line, and so as to obtain a new wireless communication control program from said management equipment, said wireless communication control program being stored therein, and further to store said obtained new wireless communication control program in an information storage device within said control device;
and wherein said wireless communication device conducts wireless communication using said stored new wireless communication control program.
8.An information terminal according to Claim 1;
wherein said information pertaining to wireless communication comprises an encryption key.
9.An information terminal according to Claim 8;
wherein said control device conducts changing of encryption key by using a certain algorithm for generating a first code based on a first ESN, a first telephone number and a first encryption key stored within an information storage device within said control device, and controls said wire communication device so as to notify said management equipment of encryption key change request and to send said first ESN, said first telephone number and said first code via said wire line,
said management equipment using an algorithm which is the same as said certain algorithm for generating a second code based on a second ESN, a second telephone number and a second encryption key, said second numbers corresponding to said first ESN and said first telephone number, following which said second code and said first code are compared, and in the event that said codes correspond, said control device obtains from said management equipment via said wire line the new encryption key generated based on said second ESN;
and wherein said wireless communication device conducts wireless communication using said obtained new encryption key.
1O.An information terminal comprising:
a wire communication device which obtains information pertaining to wireless communication via wire lines from management equipment which manages users;
a control device which stores and processes said information pertaining to wireless communication; and
a wireless communication device which conducts wireless communication.
11.An information terminal according to Claim 10;
wherein said information pertaining to wireless communication comprises communication hysteresis.
12.An information terminal according to Claim 11;
wherein said control device controls said wire communication device upon inspecting communication hysteresis so as to notify said management equipment of parameters unique to said terminal via said wire line, and so as to obtain a first communication hysteresis corresponding with said parameters unique to said terminal from said management equipment via said wire line, and further to compare said a communication hysteresis stored in an information storage device within said control device with said first communication hysteresis.
13.An information terminal according to Claim 10;
wherein said information pertaining to wireless communication comprises wireless call charges.
14.An information terminal according to Claim 13;
wherein said control device controls said wire communication device upon inspecting wireless call charges so as to notify said management equipment of parameters unique to said terminal via said wire line, and so as to obtain a first wireless call charges corresponding with said parameters unique to said terminal from said management equipment via said wire line, and further to compare second wireless call charges stored in an information storage device within said control device with said first wireless call charges.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP8183660A JPH1028293A (en) | 1996-07-12 | 1996-07-12 | Information terminal |
GB9710483A GB2315390B (en) | 1996-07-12 | 1997-05-22 | Information terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9908695D0 GB9908695D0 (en) | 1999-06-09 |
GB2333935A true GB2333935A (en) | 1999-08-04 |
Family
ID=26311563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9908695A Withdrawn GB2333935A (en) | 1996-07-12 | 1997-05-22 | Remote programming of wireless communication unit via wireline connection |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2333935A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2249459A (en) * | 1990-07-12 | 1992-05-06 | Motorola Inc | Remote programming of a radiotelephone |
WO1992020167A1 (en) * | 1991-04-30 | 1992-11-12 | Motorola, Inc. | A personal communications device having remote control capability |
US5414751A (en) * | 1991-05-23 | 1995-05-09 | Sony Corporation | Portable telephone apparatus responsive to control signals obtained through a connector and through a wired telephone line for a mending the operational program |
-
1997
- 1997-05-22 GB GB9908695A patent/GB2333935A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2249459A (en) * | 1990-07-12 | 1992-05-06 | Motorola Inc | Remote programming of a radiotelephone |
WO1992020167A1 (en) * | 1991-04-30 | 1992-11-12 | Motorola, Inc. | A personal communications device having remote control capability |
US5414751A (en) * | 1991-05-23 | 1995-05-09 | Sony Corporation | Portable telephone apparatus responsive to control signals obtained through a connector and through a wired telephone line for a mending the operational program |
Also Published As
Publication number | Publication date |
---|---|
GB9908695D0 (en) | 1999-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100536465C (en) | Configuration of enterprise gateways | |
US8195161B2 (en) | System and method for personal identification number messaging | |
CN103368949B (en) | A kind of method configuring communicator | |
US8407769B2 (en) | Methods and apparatus for wireless device registration | |
CN101656668B (en) | Method and device for using core based nodes for state transfer | |
CN1135888C (en) | System and method for authenticating cellular subscriber at registration | |
CN1241368C (en) | Virtual private network | |
CN1997974B (en) | Content protection ticket system and method | |
CN101310480A (en) | Methods and apparatus for the utilization of mobile nodes for state transfer | |
CN1795656B (en) | Method for safely initializing user and confidential data | |
GB2315390A (en) | Remote programming of wireless communication unit via wireline connection | |
US6201958B1 (en) | Telecommunications system, mobile terminal and method of registration of a terminal with a telecommunications network | |
CN1672364A (en) | Method and data system for connecting a wireless local network to a umts terminal station | |
CN1659558B (en) | Broker-based interworking using hierarchical certificates | |
CN1643853A (en) | Method and system for providing network services | |
JP3332221B2 (en) | Mobile terminal connection management method and method | |
US20040203372A1 (en) | Personal digital assistant, wireless communication system and method of link establishment | |
US7957726B2 (en) | System and method for porting a personalized indicium assigned to a mobile communications device | |
GB2333935A (en) | Remote programming of wireless communication unit via wireline connection | |
CN1671119A (en) | Method and system for transparently and safely interconnecting WLAN radio access network with GPRS/GSM core network | |
JP2000509568A (en) | Telecommunications system | |
JP4872128B2 (en) | Connection control system and connection control method using terminal device | |
EP1843523B1 (en) | A method of performing a location update of a mobile station to a mobile communication network, a mobile station, and a mobile communication network | |
KR101212131B1 (en) | Method And System for Providing Address Modification Service by Using Short Message Service | |
KR100912287B1 (en) | A user authentication system and method for interworking with code division multiple access mobile communication network and public wireless local area network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |