GB2355892A - Method for putting a mobile telephone into service - Google Patents

Method for putting a mobile telephone into service Download PDF

Info

Publication number
GB2355892A
GB2355892A GB0018673A GB0018673A GB2355892A GB 2355892 A GB2355892 A GB 2355892A GB 0018673 A GB0018673 A GB 0018673A GB 0018673 A GB0018673 A GB 0018673A GB 2355892 A GB2355892 A GB 2355892A
Authority
GB
United Kingdom
Prior art keywords
mobile telephone
code
utilisation
service
removable circuit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0018673A
Other versions
GB0018673D0 (en
GB2355892B (en
Inventor
Yves Portalier
Christine Licen
Jean-Marc Dimech
Frederic Dupas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sagem SA
Original Assignee
Sagem SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sagem SA filed Critical Sagem SA
Publication of GB0018673D0 publication Critical patent/GB0018673D0/en
Publication of GB2355892A publication Critical patent/GB2355892A/en
Application granted granted Critical
Publication of GB2355892B publication Critical patent/GB2355892B/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • H04W8/265Network addressing or numbering for mobility support for initial activation of new user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A mobile telephone 1 has a first SIM (subscriber identity module) 13 which stores an IMSI code. The IMSI code is also stored in the memory of the phone in encrypted form. The mobile phone can only be put into service when a comparison of the two codes is successful. A PIN code may also need to be keyed in. To allow a genuine owner to use a second SIM, he can key in a secret unit code when the comparison of IMSI codes fails. This secret unit code is compared to a unit code stored in the mobile and if successful, the IMSI code of the second SIM replaces that of the first SIM in the memory of the mobile phone. For first time operation the IMSI code in the mobile phone is pre-recorded as binary 1's before it is personalised to the IMSI of the SIM.. If the owner forgets his secret unit code, a special removable circuit 37 replacing the SIM can be used by the network operator to reveal the unit code on the mobile phone display.

Description

2355892 METHOD FOR PUTTING A MOBILE TELEPHONE INTO SERVICE An object of
the present invention is a method for putting a mobile telephone into service. The aim of the invention is to prevent theft or, at least, to prevent thieves from feeling any temptation whatsoever to steal a mobile telephone.
In mobile telephony, it is known, especially in the field of GSM applications, that a mobile telephone is associated with a removable security circuit known as a SIM (Secure Identification Module). A secure identification circuit of this kind has two main functions. Firstly, and essentially for an operator who places a circuit of this kind at the disposal of the mobile telephone owner, this circuit contains information on this operator. This information is represented by an IMSI (International Mobile Subscriber Identity) code stored in a SIM. This information pertains to a subscription contract, consisting in practice of frequency bands allocated by a regulating authority to this operator, and a telephone number given to the user so that he can receive calls from outside.
Secondly, by way of additional functions, it has been proposed that this use of the subscription should itself be secured through the keying in, on the keypad of the mobile telephone, of a code known as a PIN or Personal Identification Number. This keying-in operation is designed to enable a processing operation, preferably inside the SIM circuit, of the PIN code keyed in by the user and the comparison of this PIN code thus processed with a secret code contained in the secured SIM circuit. Thus, the secured SIM circuit also has an undetectable, inviolable, secret code and a processing algorithm to compare the keyed-in PIN code with this inviolable code. This keyed-in PIN code and the secret code of the SIM circuit should not be mistaken for the subscriber information which too is present in the form of the IMSI code.
In practice, a system of this kind works well. Indeed, since the removable SIM circuit is placed permanently inside the mobile telephone, anyone who steals a mobile telephone must key in the PIN code, which he does not know, when he tries to put this telephone into service. Thus, he cannot use the mobile telephone whose true owner can soon cancel his subscription.
However, a device of this kind has the drawback wherein it is the 2 subscription that is protected far more than the mobile telephone itself. Indeed, since the sums corresponding to the use of the telephone generated in a subscription may be very high and may exceed the cost of the mobile telephone itself, it is above all this use of the telephone that has been protected. This approach means, however, that anyone taking out a subscription with a mobile telephony operator only has to ask this operator for a SIM circuit that is specific to this operator and gives concrete form to his subscription. With a new SIM circuit of this kind replacing a previous SIM card, a thief can use a stolen mobile telephone.
In theory, this should not happen since mobile telephones themselves have an identification, an IMEI - International Mobile Equipment Identity code. This IMEI code is not a secret. A sequence of keys on the mobile telephone reveals this code on the screen of the telephone. Whenever any calls are exchanged with a mobile telephone of this kind, this IMEI code is normally transmitted to an operator. Therefore it should be possible, since the IMEI code of a stolen mobile telephone is known, to warn every operator that this telephone should no longer be used. In practice, the diversity of the operators, even in one and the same national region, means that this data which provides information on the user of a stolen telephone is not managed in such a way as to obtain the restitution of the mobile telephone, or at least in such a way as to prevent theft.
The aim of the invention is to provide an efficient remedy to this problem of theft. In the invention, the aim has been to ensure that when a mobile telephone is stolen, it is not only the subscription but also the mobile telephone that is no longer usable. Therefore it is proposed to duplicate all or part of the IMSI code (or even another code) of the SIM security circuit in the memory of the mobile telephone, in the form of a copy but preferably in an encrypted way. Consequently, the IMSI code will be present twice, each time in clear or non-encrypted form and in an encrypted form. It will be present in the SIM circuit, as in the prior art, and it will be present in the memory of the mobile telephone. When the mobile telephone is put into service, a comparison is then prompted in a starting algorithm of the mobile telephone to ascertain that these two IMSI codes are identical or correspond with each other. Either they correspond with each other and then the rest of the operation for starting the mobile telephone is permitted (preferably with the 3 keying in and verification of the PIN code), or these two codes do not correspond with each other and, in this case, the starting operation is not permitted.
However, to allow a genuine possessor of a mobile telephone to change his mobile telephone operator and receive another SIM circuit as a replacement for a previous one, it is preferably planned that if a failure in the comparison of the IMSI codes is observed, then the owner is allowed the possibility of proving that he owns the mobile telephone. This is done simply by then asking him to key in an unit code that is preferably secret. This unit code is preferably different from the IMEI code of the mobile telephone. The keyed-in unit code is then compared with a unit code that is normally stored also in the mobile telephone. If the comparison is successful (indicating that the user is a genuine owner), then the former duplicated IMS1 code is modified in the memory of the mobile telephone and replaced by a duplicated IMSI code corresponding to the new SIM card. It is then possible to carry out automatic starting operations as above.
If the comparison is not successful, either the mobile telephone is turned off or, preferably, it is accepted that another attempt can be made to present the unit code, but with a waiting period that increases after each failed attempt.
As an improvement, it is proposed that the duplicated code recorded in the memory of the mobile telephone, especially when this mobile telephone is first put into operation with a new removable SIM circuit, should result from a coupling, in particular by means of an encryption algorithm, between the IMSO subscriber identity code of the SIM card and the IMEI identity code of the mobile telephone, or their equivalent. Preferably, a produced code resulting from this coupling is stored in a non-volatile, rewritable memory of the mobile telephone, for example in an EEPROM or electrically erasable programmable memory. Furthermore, although the invention will be described by taking the IMSI code as the identity code of the removable SIM circuit and the randomly produced IMEI code as the unit code, it could be implemented through the use of other codes, provided that one of them is present both in the removable circuit and in the mobile telephone, even in different forms, and provided that the comparison is made before the mobile telephone is started up.
4 The invention therefore relates to a method for putting a mobile telephone into service wherein:
- a recording is made, in a removable circuit, connected to the mobile telephone, of a removable circuit identification code, - a utilisation security code is produced in the mobile telephone, - this utilisation security code of this mobile telephone is recorded in a memory of the mobile telephone, - when the mobile telephone is put into service, the utilisation security code of this mobile telephone is compared with this removable circuit identification code, and - the putting into service of the mobile telephone is authorised if this comparison is successful.
characterised in that - the value of the utilisation security code is compared with a basic code,and - a new utilisation security code is produced as a function of the removable circuit identification code if this comparison is successful.
The invention will be understood more clearly from the following description and from the appended figures. These figures are given purely by way of an indication and in no way restrict the scope of the invention. Of these figures:
- Figure 1 gives a schematic view of a mobile telephone and its improvement used to implement the method of the invention; - Figure 2 shows a flow chart that presents the essential steps of the method of the invention.
Figure I shows a mobile telephone 1 that can be used to implement the method of the invention. The mobile telephone 1, in a known way, comprises an arithmetic and logic unit 2 connected by a bus 3 to transmission/reception circuits 4. For example, the transmission/reception circuits that can be used in telephony are connected to a loudspeaker 5 and to a microphone 6 and also to a transmission/reception line 7. In order that it may function, the mobile telephone, in a programme memory 8, has a programme 9 as well as a data memory 10. The memory 10 may be the same as the memory 8. Preferably, the memory 10 will be a non-volatile memory, for example of the EEPROM type. Through the bus 3, the unit 2 is still linked with a connector 11, to which a corresponding connector 12 of a SIM security circuit 13 is connected. The SIM circuit 13 also has an arithmetic and logic unit 14 connected by a bus 15 to a programme memory 16 and to a data memory 17. The data memory 15, in the case of the SIM circuit 13, has the particular feature of being protected against any form of aggression, even against a depassivation of the integrated circuit. The mobile telephone 1 can enter into an RIF link 18 with a base station 19 and with central switching circuits 20 of a mobile telephony operator. The central circuits 20 may furthermore be connected to a general switched telephony network 21.
In the prior art, with a keyboard 22 of the mobile telephone 1 connected to the bus 3, a PIN code is keyed in when the telephone 1 is put into service. This PIN code is transmitted by the bus 3 to the SIM circuit 13, in executing an agreed programme in the memory 8 for putting the mobile telephone into service. The arithmetic and logic unit 14 of this SIM circuit 13 then brings about the execution of a programme 23 contained in the memory 16 through which the keyed-in PIN code is compared with a sedret code SECRET 24 contained in the memory 17. Should the comparison be successful, the putting into service of the mobile telephone is permitted. This is done especially through the transmission, by means of the connectors 11 and 12, of a piece of IMS1 subscriber identity information, herein 25, also contained in the circuits 17 in such a way that this identity information is transmitted by the antenna 7 to the base station 19. After this subscriber information has been processed, the base station 19 allows the mobile telephone to be put into service. More exactly, it incorporates it into its network as a mobile telephone capable, beyond this connection, of entering into communication with another party.
In a known way, as shown schematically in Figure 1, and in a manner comparable to the recording 25 of the IMSI code in the memory 17 of the removable circuit 13, an IMEI code 26 representing the identity of the mobile telephone is recorded in the memory 6 of the mobile telephone 1.
For the codes 25 and 26, it is naturally not obligatory to choose these IMSI and IMEI codes. For example, the circuits of the SIM circuit 13 may comprise serial numbers. These serial numbers may be used especially by the operators, when they wish to incorporate IMS1 numbers therein during the 6 personalising operation, in order to parameterise an encryption machine used to encrypt this IMSI code therein. In every case, whether it is a serial number or an IMSI code itself, it is really an identification code of the removable circuit 13. Similarly the IMEI mobile telephony identification number may be replaced by a serial number produced in one of the integrated circuits connected to the bus 3 and furthermore placed by the manufacturer in the mobile telephone 1.
In the invention, by using at least one of these codes (hereinafter, to simplify the explanation, the IMSI code of the circuit 13 will be chosen) a code called SecretE is produced. This code SecretE is a function of this identification code of the removable circuit. Preferably, a code SecretE is produced by an encryption that is parameterised, for example, by the IME1 identification code of the mobile telephone and possibly other parameters so as to resist systematic unlocking moves. Then, this code SecretE is recorded at a pre-arranged location 27 in the memory 10.
Thus, when the mobile telephone is put into service, the IMSI code stored in the circuit 13 is compared with the code SecretE stored at' the location 27. In the event of a successful comparison of course, the mobile telephone is put into service. This comparison is done during a main secrecy sub-programme 28 contained in the memory 8. This secrecy sub-program 28 essentially compares the contents of the zone 25, possibly encrypted by the contents of the zone 26, with those of the zone 27. In the event of success, this main secrecy sub-programme leads to a main utilisation subprogramme 29 that is comparable in all points to the utilisation programmes known in the prior art. The main sub-programme 29 may comprise especially the request for the keying in of the PIN code by the user.
Since the mobile telephones are provided with the programmes 28 and 29 at the outset when they come off the production line, whereas the circuit 13 is not yet associated with them, it is necessary to produce the code SecretE and store it in the zone 27 when this circuit 13 is effectively associated therewith (without necessarily being connected to it). Figure 2 shows, to this effect, the way in which this marriage operation is preferably conducted by connecting the circuit 13 to the mobile telephone 1. The main secrecy sub-programme 28 gets implemented after an operation of putting the mobile telephone into service: this is typically the switching of a physical 7 selector switch. It starts with a test 30 to ascertain it is a first-time operation of putting the mobile telephone into service. In the test 30, a comparison is made, for example, between the contents of the zone 27 of the memory 10 and the contents of another zone 31 of the memory 10, which has the same size as the zone 27 and is, for example, contiguous to it. If these two zones 27 and 31 are identical, especially because they have been programmed in the EEPROM 10 identically when the mobile telephone was personalised by the manufacturer, it will be detected that this is a first4ime operation for putting the mobile telephone into service. In practice, it is sought to find out if the pre-recorded secret code SecretE is a special code, for example comprising only binary "ones".
If this is the case, the sub-programme 28 is made to perform an instruction 32 in which the SecretE is computed as being a function of the IMSI identification number seen above as well as, if necessary, other numbers such as the serial number of the SIM circuit 13 and/or the mobile telephone 1 and/or the balance of the counter. Once the instruction 32 has been executed and the code SecretE has been produced, an instruction 33 is executed. This instruction 33 essentially comprises the recording of the result of the function, SecretE, in the mobile telephone at the position of the zone 27.
During a first-time operation for putting the telephone into service and executing the instruction 33, it is possible to have this instruction 33 executed either in the circuit 13, in which case the programme 16 of this circuit will have to be arranged accordingly, or preferably in the circuit 2 under the control of the programme 28. It is also possible to obtain the execution of the instruction 33 entirely or partly in the external reader in relation with the circuit 13 and with the mobile telephone 1. Then, once these codes have been delivered, either the telephone is stopped or it is possible to have direct access to the main utilisation sub-program 29.
If this is not a first-time operation for putting the mobile telephone into service, then the contents of the zone 27 are different from those of the zone 31. In the invention, the operation then goes to a test 34 during which the code SecretE recorded in the zone 27 is compared with the IMSI code contained in the zone 25 of the SIM circuit 13. In practice, the verification during a subsequent starting operation comprises the implementation of the 8 instruction 32 and the comparison of the code produced with the code stored in the zone 27. This comparison is done either by the unit 2 or by the microprocessor 14. Should the test 34 be successful, the use 29 of the mobile telephone is permitted. If the test 34 fails, the user is made to key in the unit code (supposed to represent the IMEI code) and a test 35 is used to ascertain that the keyed-in unit code truly corresponds to the real unit code recorded in the zone 26 of the memory 10. In the event of a failure of the test 35, the possibility of another attempt may be prompted by means of an instruction 36. The instruction 36 may include a count of the attempts, a cut- off of the SIM circuit, and/or the setting up of a direct connection of the mobile telephone with a maintenance service of the operator of the circuit 20. It preferably comprises an increasing time lag between each attempt.
A method of this kind works very well since, if the mobile telephone 1 has been stolen, naturally the thief is able to remove only the removable circuit 13, take out a subscription with a mobile telephony operator, replace this removable circuit 13 with another circuit, and try to restart the mobile telephone 1. In this case, the unit code that he launches is a PIN code corresponding to the new circuit 13 that has been communicated to him with his subscription. However, since the programme 28 comprises no test of the PIN code at this stage, there is no likelihood that the keying in of this PIN code will replace the unit code stored in the zone 26. The code that he keys is either a random code, or in the process of being routinely modified. In this case, the increasingly lengthy waiting periods are a discouragement.
However, several situations may arise in this context. Either the legal user may wish to change his operator or he may have lost or forgotten his unit code. When he wishes to change his subscription, he can select an option in the menu to make this change. As an alternative, the proposal to change a subscription leads to a request 36 for keying in the unit code.
If the test 35 is positive, the instructions 32 and 33 are implemented with the production of a new secret code SecretE.
In the other possible situation, if the user has lost his unit code, and especially if he can also prove that he is the legal owner of the mobile telephone, then it can be planned to restore the integrity of this telephone. In this case, the removable circuit 13 is replaced, for example in the services of the mobile telephony operator, by a special removable circuit 37. The circuit 9 37 is special in that, instead of the information IMSI, its memory 17 comprises a piece of ICCID - Integrated Circuit Card Identification information that is pre-arranged. Thus, during a test 38, placed for example in the programme 28 before the test 30 and the instruction 32, it will be sought to find out if the subscription number stored in the circuit 13 is a special pre-arranged ICCID subscription number.
For example, the special pre-arranged ICCID subscription number may be furthermore stored in a memory 39 or in an additional zone of the memory 10. In normal times, the test 38 is not successful and the operation goes directly to the test 30. However, if the removable circuit 37 has been positioned in the place of the removable circuit 13, then an instruction 39 is executed, during which the contents of the zone 27 are replaced to make them equal to the contents of the zone 31. The mobile telephone is thus placed again in a state comparable to the one it had when leaving the factory. In this case, it is also possible to launch an instruction 40 during which the unit code is revealed by a screen of the mobile telephone. It is then possible to make the mobile telephone stop. When it is next put into service again, and after a new original removable circuit 13 has been put in, the test 30 then makes the programme jump to the instruction 32 giving rise to the execution of the instruction 33.
Through this procedure, the thief is immediately made to identify himself to the operator and will have to furnish an explanation. Indeed, the ICCID number stored in the memory 39 of the mobile telephone, made available to an operator so that he can sell them to his customers, comprising words of different types, for example ICCID1, whereas those made available to another operator are ICCID2 type words. A first operator will then receive passes 37 comprising special identifications ICCID1 in the memory 17. The other operator will receive passes 37 with another identification ICCID2. In these circumstances, a genuine user will naturally return to his mobile telephone operator to whom he will furnish proof of his subscription (for example with invoices). This operator will naturally introduce the circuit 37 that is suited to the mobile telephone. On the other hand, a thief would go to a wrong operator, will not be furnish the necessary proofs, and will prompt the rejection of the test 38: the operator will be unable to release the stolen mobile telephone for him.
Thus, a theft becomes useless.
11

Claims (8)

1. Method for putting a mobile telephone into service wherein - a removable circuit identification code (IMSI) is recorded in a removable circuit (SIM) connected to the mobile telephone, - a utilisation security code (SecretE) is produced (32) in the mobile telephone, - this utilisation security code of this mobile telephone is recorded in a memory of the mobile telephone, - when the mobile telephone is put into service, the utilisation security code of this mobile telephone is compared with this removable circuit identification code, and - the putting into service of the mobile telephone is authorised (29) if this comparison is successful.
characterised in that - the value of the utilisation security code is compared with a basic code (11111111), and - a new utilisation security code is produced as a function of the removable circuit identification code if this comparison is successful.
2. Method for putting a mobile telephone into service wherein - a removable circuit identification code (IMSI) is recorded in a removable circuit (SIM) connected to the mobile telephone, - a utilisation security code (SecretE) is produced (32) in the mobile telephone, - this utilisation security code of the mobile telephone is recorded in a memory of this mobile telephone, - when the mobile telephone is put into service, the utilisation security code of this mobile telephone is compared with this removable circuit identification code, and - the putting into service of the mobile telephone is authorised (29) if this comparison is successful.
characterised in that - the value of the identification code of the removable circuit is compared with a code listed in a list of codes listed and recorded in the mobile telephone, and in the event of success, - the value of the utilisation security code recorded in the mobile 12 telephone is made to be equal to a basic value (11111111), or - the putting into service of the mobile telephone is authorised, or - a code is communicated for unlocking the use of the mobile telephone.
3. Method for putting a mobile telephone into service wherein - a removable circuit identification code (IMSI) is recorded in a removable circuit (SIM) connected to the mobile telephone, - a utilisation security code (SecretE) is produced (32) in the mobile telephone, - this utilisation security code of this mobile telephone is recorded in a memory of the mobile telephone, - when the mobile telephone is put into service, the utilisation security code of this mobile telephone is compared with this removable circuit identification code, and - the putting into service of the mobile telephone is authorised (29) if this comparison is successful, characterised in that - in the event of failure of the comparison, when the telephone is being put into service, between the utilisation security code of this mobile telephone and this removable circuit identification code, - a request is made for the keying in of an unlocking code, and - a new utilisation security code (SecretE) of this mobile telephone is recorded in the memory of the mobile telephone, this new utilisation security code corresponding to the identification code of the removable circuit present at this time in the mobile telephone.
4. Method according to one of the claims 1 to 3, characterised in that the utilisation security code is encrypted before it is recorded, in encrypted form, in the memory of the mobile telephone.
5. Method according to one of the claims 1 to 4, characterised in that as a removable circuit identification code, a subscriber code to a mobile telephony service is used.
6. Method according to one of the claims 1 to 5, characterised in that an unlocking key is produced at the time of producing the security code (SecretE) as a function of the identification code of the mobile telephone and of the identification code of the removable circuit, and 13 - this unlocking key is presented.
7. Method according to one of the claims 1 to 6, characterised in that the utilisation security code is a function of the identification code of the removable circuit and of a mobile telephone identification code (IMEI).
8. Method for puffing a mobile telephone into service substantially as hereinbefore described with reference to the drawings.
GB0018673A 1999-07-30 2000-07-31 Method for putting a mobile telephone into service Expired - Lifetime GB2355892B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR9909966A FR2797138B1 (en) 1999-07-30 1999-07-30 METHOD FOR COMMISSIONING A MOBILE TELEPHONE

Publications (3)

Publication Number Publication Date
GB0018673D0 GB0018673D0 (en) 2000-09-20
GB2355892A true GB2355892A (en) 2001-05-02
GB2355892B GB2355892B (en) 2004-04-21

Family

ID=9548744

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0018673A Expired - Lifetime GB2355892B (en) 1999-07-30 2000-07-31 Method for putting a mobile telephone into service

Country Status (3)

Country Link
DE (1) DE10036414B4 (en)
FR (1) FR2797138B1 (en)
GB (1) GB2355892B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1562394A2 (en) * 2004-02-04 2005-08-10 Lg Electronics Inc. Apparatus and method for setting use restriction of mobile communication terminal
CN100433906C (en) * 2004-08-06 2008-11-12 乐金电子(中国)研究开发中心有限公司 Function limit method for mobile terminal
US8121580B2 (en) * 2003-12-19 2012-02-21 Gemalto Sa Method of securing a mobile telephone identifier and corresponding mobile telephone
CN102387498A (en) * 2010-08-27 2012-03-21 苏州安可信通信技术有限公司 Anti-theft system and method for mobile telephone
CN104540123A (en) * 2015-01-07 2015-04-22 福州北卡信息科技有限公司 Encryption backup and security deletion method and system for important data of mobile terminal

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7153679B2 (en) 2000-07-26 2006-12-26 Aventis Behring Gmbh Marburg I mutant of factor VII activating protease (FSAP) as risk factor for arterial thrombosis
US7054613B2 (en) 2002-05-03 2006-05-30 Telefonaktiebolaget Lm Ericsson (Publ) SIM card to mobile device interface protection method and system
FR2842060B1 (en) 2002-07-04 2004-12-31 Cit Alcatel METHOD FOR SECURING A MOBILE TELECOMMUNICATION TERMINAL
CN102869004A (en) * 2011-07-05 2013-01-09 中兴通讯股份有限公司 Mobile terminal recovery and information protection method and device
CN106375982A (en) * 2016-08-29 2017-02-01 广东欧珀移动通信有限公司 Terminal locking method and device and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0607767A1 (en) * 1992-11-09 1994-07-27 Ericsson Inc. Access controlled device for rendering services
GB2285559A (en) * 1993-07-01 1995-07-12 Motorola Inc Method of controlling access to a radiotelephone system
WO1997043866A2 (en) * 1996-05-13 1997-11-20 Telefonaktiebolaget Lm Ericsson (Publ) A method and a device for identifying a user of a mobile telephone
GB2335568A (en) * 1998-03-18 1999-09-22 Nec Technologies Method for enabling the locking of a mobile phone hand set to a specified network by the network operator

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2287855B (en) * 1994-03-22 1998-11-04 Vodafone Ltd Telephone apparatus
US5864757A (en) * 1995-12-12 1999-01-26 Bellsouth Corporation Methods and apparatus for locking communications devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0607767A1 (en) * 1992-11-09 1994-07-27 Ericsson Inc. Access controlled device for rendering services
GB2285559A (en) * 1993-07-01 1995-07-12 Motorola Inc Method of controlling access to a radiotelephone system
WO1997043866A2 (en) * 1996-05-13 1997-11-20 Telefonaktiebolaget Lm Ericsson (Publ) A method and a device for identifying a user of a mobile telephone
GB2335568A (en) * 1998-03-18 1999-09-22 Nec Technologies Method for enabling the locking of a mobile phone hand set to a specified network by the network operator

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8121580B2 (en) * 2003-12-19 2012-02-21 Gemalto Sa Method of securing a mobile telephone identifier and corresponding mobile telephone
EP1562394A2 (en) * 2004-02-04 2005-08-10 Lg Electronics Inc. Apparatus and method for setting use restriction of mobile communication terminal
EP1562394A3 (en) * 2004-02-04 2006-09-27 Lg Electronics Inc. Apparatus and method for setting use restriction of mobile communication terminal
CN100370884C (en) * 2004-02-04 2008-02-20 Lg电子株式会社 Apparatus and method for setting use restriction of mobile communication terminal
US7505758B2 (en) 2004-02-04 2009-03-17 Lg Electronics Inc. Apparatus and method for setting use restriction of mobile communication terminal
CN100433906C (en) * 2004-08-06 2008-11-12 乐金电子(中国)研究开发中心有限公司 Function limit method for mobile terminal
CN102387498A (en) * 2010-08-27 2012-03-21 苏州安可信通信技术有限公司 Anti-theft system and method for mobile telephone
CN104540123A (en) * 2015-01-07 2015-04-22 福州北卡信息科技有限公司 Encryption backup and security deletion method and system for important data of mobile terminal

Also Published As

Publication number Publication date
FR2797138B1 (en) 2001-09-21
DE10036414A1 (en) 2001-03-08
FR2797138A1 (en) 2001-02-02
GB0018673D0 (en) 2000-09-20
DE10036414B4 (en) 2011-06-22
GB2355892B (en) 2004-04-21

Similar Documents

Publication Publication Date Title
EP0652681B1 (en) Method of mobile radio unit registration and IC card registration for a mobile radio communication system
JP3080409B2 (en) Method and apparatus for locking a communication device
KR101063076B1 (en) Software update security methods
US6026293A (en) System for preventing electronic memory tampering
US7236598B2 (en) Systems and methods for communication protection
US5457737A (en) Methods and apparatus to verify the identity of a cellular mobile phone
AU716887B2 (en) Method of protecting cellular radio terminal against fraudulent use
CN101416223B (en) Method for the protection of a movable object, especially a vehicle, against unauthorized use
CN1227938C (en) Management of authentication and encryption user information in digital user terminals
US20030061488A1 (en) Cloning protection for electronic equipment
US5887250A (en) Mobile station having lock code based on secure value
JPH08186869A (en) Radio telephone set with illegal use preventing function
JPH04257031A (en) Method for controlling application program loaded in medium having microcircuit
JPH0818656A (en) Mobile machine and dial lock setting method for the mobile machine
GB2355892A (en) Method for putting a mobile telephone into service
CN1656784B (en) Mobile equipment theft deterrent system and method
JPH05503816A (en) Method for authenticating and protecting subscribers in telephone communication systems
CN107750470A (en) Replace the method for at least one parameters for authentication for certification safety element and corresponding safety element
RU2241317C2 (en) Device for protecting sim used for the first time
CN105245526B (en) Call the method and apparatus of SIM card application
RU2440683C2 (en) Terminal activation method
JPH11252248A (en) Radio telephone handset
EP1744574B1 (en) A method for logically binding and verifying devices in an apparatus
GB2414140A (en) Electronic Device Security
WO2005050910A1 (en) A method for authenticating the device’s self-validity

Legal Events

Date Code Title Description
AT Applications terminated before publication under section 16(1)
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20120426 AND 20120502

732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20120503 AND 20120509

732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20180920 AND 20180926

PE20 Patent expired after termination of 20 years

Expiry date: 20200730