WO2020202216A1 - System and method to determine the authenticity of a wireless communication device - Google Patents

System and method to determine the authenticity of a wireless communication device Download PDF

Info

Publication number
WO2020202216A1
WO2020202216A1 PCT/IN2020/050324 IN2020050324W WO2020202216A1 WO 2020202216 A1 WO2020202216 A1 WO 2020202216A1 IN 2020050324 W IN2020050324 W IN 2020050324W WO 2020202216 A1 WO2020202216 A1 WO 2020202216A1
Authority
WO
WIPO (PCT)
Prior art keywords
status
wireless communication
communication device
verification
security code
Prior art date
Application number
PCT/IN2020/050324
Other languages
French (fr)
Inventor
Ritaben SOLANKI
Original Assignee
Ritaben SOLANKI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ritaben SOLANKI filed Critical Ritaben SOLANKI
Publication of WO2020202216A1 publication Critical patent/WO2020202216A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Definitions

  • the present disclosure relates generally to security systems and methods for electronic devices, particularly to a system and method to determine the authenticity of at least one wireless communication device.
  • counterfeit products are now easily available in the market, thereby making the brand owners suffer huge losses.
  • the counterfeit products industry is driven by the principle that a product, such as electronic devices, is priced disproportionately less than the cost of its original manufacturer. This may causes the consumers to buy counterfeit products, which may be priced at a much lower rate. Therefore, manufacturers of proprietary products lose billions of dollars each year, because of ease of availability of counterfeits. Further, with the advertent of technology, the counterfeit goods may be produced of almost identical quality to the original. Hence, a manufacturer may suffers from a continuous loss of sales as counterfeiting continues unchecked, because detection is difficult or impossible.
  • the counterfeit products may often sold with the same tags of the brand owners making them very hard to distinguish from the original goods.
  • Some mechanisms exist, which verify the authenticity of the electronic device which involve checking the International Mobile Equipment Identity (IMEI) number.
  • IMEI International Mobile Equipment Identity
  • Some currently known mechanisms provide for the provider of the mobile communication program to obtain a public key generated on the basis of a terminal identification number (IMEI) unique to a mobile communication program.
  • the generated public key is then stored in a key registration server.
  • the key is used to encrypt a mobile communication program with the public key and transmit the encrypted program.
  • IMEI terminal identification number
  • An SDR terminal generates the private key on the basis of the unique terminal identification number (IMEI) and decrypts the encrypted program with the generated private key and installs and operates the decrypted program. Since the mobile communication program is encrypted, when an unauthorized entity tries to install an illegal copy of the program in the SDR terminal, the decryption cannot be performed, and the installation becomes impossible, thereby preventing ill-intentioned corruption and illegal use of the SDR terminal.
  • IMEI unique terminal identification number
  • the mechanism provides for generating a public key KECOB for a COB device corresponding to a common secret key KDCOB determined through consultation among communications carriers. The key is then stored into a ROM in an unalterable form.
  • an object of the present invention is to provide a system and method to authenticate-at least one wireless communication device. It is another object of the present invention to provide for a system and method for disabling at least one wireless communication device. It is another object of the present invention is to provide a system and method of enhanced reliability and accuracy in determining the originality and genuineness of a wireless communication device.
  • It is yet another object of the present invention is to provide a system and method to verify the operating system of a wireless communication device with use of at least one security code.
  • It is yet another object of the present invention is to provide a system and method to authenticate and validate a wireless communication device, when the device connects to the internet.
  • It is yet another object of the present invention is to provide a system and method to provide a mechanism to prevent duplication of wireless communication devices.
  • a first aspect of the present invention relates to a method to determine the authenticity of at least one wireless communication device.
  • the method commences when at least an Original Equipment Manufacturer (OEM) verification server receives a first security code from the at least one wireless communication device.
  • OEM verification server determines a first verification status.
  • the first verification status is one of a successful status and an unsuccessful status.
  • the OEM verification server transmits a second security code to the wireless communication device and to at least a software verification server.
  • the software verification server receives the second security code from the OEM verification server and a third security code from the wireless communication device.
  • OEM Original Equipment Manufacturer
  • the software verification server determines a second verification status.
  • the second verification status is one of a successful status and an unsuccessful status.
  • the wireless communication device is authenticated and at least one data packet is transmitted by the software verification server to the wireless communication device.
  • the wireless communication device generates a reference security code upon receipt of the at least one data packet.
  • the reference security code is based on at least one identification number of the wireless communication device.
  • a reference verification status is then determined by mapping the reference security code with at least one of identification number of wireless communication device.
  • the reference verification status is one of a successful status and an unsuccessful status.
  • the wireless communication device is disabled.
  • Another aspect of the present invention relates to a method for disabling at least a wireless communication device authenticated in accordance with the working of the present invention.
  • the method commences when the wireless communication device receives at least one data packet from a software verification server upon authentication. Thereafter, the wireless communication device generates a reference security code upon receipt of the at least one data packet.
  • the reference security code is based on at least one identification number of the wireless communication device.
  • a reference verification status is then determined by mapping the reference security code with at least one of identification number of wireless communication device.
  • the reference verification status is one of a successful status and an unsuccessful status.
  • the reference verification status is determined at a pre-determined frequency or user defined frequency. Finally, in an event the reference verification status is an unsuccessful status, the wireless communication device is disabled.
  • the system comprises at least one wireless communication device, at least one OEM verification server and at least one software verification server.
  • the OEM verification server is configured to receive a first security code from the wireless communication device.
  • the OEM verification server Upon receipt of the code, the OEM verification server is configured to determine a first verification status.
  • the first verification status is one of a successful status and an unsuccessful status.
  • the OEM verification server is configured to transmit a second security code to the wireless communication device and a software verification server.
  • the software verification server is configured to receive the second security code from the OEM verification server and a third security code from the wireless communication device.
  • the software verification server Upon receipt of the codes, the software verification server is configured to determine a second verification status. The second verification status is one of a successful status and an unsuccessful status. Finally, in an event the second verification status is a successful status, the software verification server is configured to authenticate the wireless communication device and transmit at least one data packet to the wireless communication device. Thereafter, the wireless communication device is configured to generate a reference security code upon receipt of the at least one data packet. The reference security code is based on at least one identification number of the wireless communication device. A reference verification status is then determined by mapping the reference security code with at least one identification number of wireless communication device. The reference verification status is one of a successful status and an unsuccessful status. Finally, in an event the reference verification status is an unsuccessful status, the wireless communication device is configured to be disabled.
  • the wireless communication device is configured to receive at least one data packet from a software verification server upon authentication. Thereafter, the wireless communication device is configured to generate a reference security code upon receipt of the at least one data packet. The reference security code is based on at least one identification number of the wireless communication device. A reference verification status is then determined by mapping the reference security code with at least one identification number of wireless communication device. The reference verification status is one of a successful status and an unsuccessful status. The reference verification status is determined at a pre-determined frequency or user defined frequency. Finally, in an event the reference verification status is an unsuccessful status, the wireless communication device is configured to be disabled.
  • Figures 1 illustrates an overview of an exemplary architecture of a system to determine the authenticity of at least one wireless communication device, in accordance with exemplary embodiments of the present invention.
  • Figures 2 illustrates an overview of an exemplary architecture of a wireless communication device for disabling the wireless communication device authenticated in accordance with the present invention, in accordance with exemplary embodiments of the present invention.
  • Figure 3 illustrates a flow chart of an exemplary method to determine the authenticity of at least one wireless communication device, in accordance with exemplary embodiments of the present invention.
  • Figure 4 illustrates a flow chart of an exemplary method for disabling a wireless communication device authenticated in accordance with the present invention, in accordance with exemplary embodiments of the present invention.
  • the present invention provides a system and method to determine the authenticity of at least one wireless communication device.
  • the invention commences when at least one OEM verification server receives a first security code from the at least one wireless communication device. Upon receipt of the code, the OEM verification server determines a first verification status for the first security code. The invention encompasses that the first verification status is one of a successful status and an unsuccessful status. In an event the first verification status is a successful status, the OEM verification server transmits a second security code to the wireless communication device and at least one software verification server. Thereafter, the software verification server receives the second security code from said at least one OEM verification server and a third security code from the wireless communication device. Upon receipt of the codes, the software verification server determines a second verification status to determine the authenticity of the wireless communication device.
  • the invention encompasses that the second verification status is one of a successful status and an unsuccessful status.
  • the second verification status is a successful status
  • at least one data packet is transmitted by the software verification server to the wireless communication device.
  • the wireless communication device generates a reference security code upon receipt of the at least one data packet.
  • the reference security code is based on at least one identification number of the wireless communication device.
  • a reference verification status is then determined by mapping the reference security code with at least one of identification number of wireless communication device.
  • the reference verification status is one of a successful status and an unsuccessful status.
  • the wireless communication device is disabled.
  • the present invention also provides a system and method for disabling at least a wireless communication device.
  • the wireless communication device is an authenticated wireless communication device in accordance with the working of the present invention.
  • the invention encompasses that the wireless communication device receives at least one data packet from a software verification server upon authentication. Thereafter, the wireless communication device generates a reference security code upon receipt of the at least one data packet.
  • the invention encompasses that the reference security code is based on at least one of the identification number of the wireless communication device.
  • a reference verification status is then determined by the wireless communication device.
  • the reference verification status is then determined by mapping the reference security code with at least one of identification number of wireless communication device.
  • the reference verification status is one of a successful status and an unsuccessful status.
  • the invention encompasses that the reference verification status is determined at a pre-determined frequency or user defined frequency. Finally, in an event the reference verification status is an unsuccessful status, the wireless communication device is disabled.
  • connect may include a physical connection (such as a wired/wireless connection), a logical connection (such as through logical gates of semiconducting device), other suitable connections, or a combination of such connections, as may be obvious to a skilled person.
  • send include sending or transporting data or information from one unit or component to another unit or component, wherein the data or information may or may not be modified before or after sending, transferring, transmitting.
  • FIG. 1 illustrates an overview of an exemplary architecture of a system to determine the authenticity of at least one wireless communication device, in accordance with exemplary embodiments of the present invention.
  • the system [100] comprises of at least one wireless communication device [102], at least one OEM verification server [104], at least one software verification server [106] and a wireless communication network [108]
  • the at least one wireless communication device [102] refers to any electrical, electronic, electromechanical and computing device.
  • the at least one wireless communication device [102] may include, but not be limited to, a mobile phone, a tablet, a smartphone, a laptop, a wearable device, a personal digital assistant and any such device obvious to a person skilled in the art. Although only a limited number of wireless communication device [102] are shown with reference to Fig.
  • system [100] or user device [102] may also include more or less components than those illustrated in Figure 1 or have a different configuration than that illustrated in this Figure 1.
  • the wireless communication device [102] is configured to store a first security code and a third security code.
  • the first security code and the third security code may be stored in an encrypted format.
  • the invention encompasses that the first security code and the third security code may be pre-stored in the wireless communication device [102] by the manufacturer of the wireless communication device [102]
  • a first security code comprising of the IMEI number and a hardware specific number, such as the model number
  • a third security code comprising of the authenticated software specific number and a authenticated hardware specific number, such as a particular number of an authentic device of a particular model, may be stored in the wireless communication device [102] by the manufacturer of the wireless communication device [102]
  • a first security code refers to any numeric, character, alphanumeric or binary code that is associated with the hardware of the wireless communication device [102] and is based on at least one identification number of the wireless communication device [102]
  • the first security code may be of any length and format, without departing from the scope of the present invention.
  • a third security code refers to any numeric, character, alphanumeric or binary code that is associated with the software or operating system of the wireless communication device [102] and is based on at least one identification number of the wireless communication device [102]
  • the third security code may be of any length and format, without departing from the scope of the present invention.
  • the third security code may represent a command or instruction to receive at least one data packet from the software verification server [106] when the hardware is authenticated by the OEM verification server [104]
  • the third security code may comprise of any detail, serial number, identification number or any other identification parameter that can be used to identify at least one software or operating system or data packet that is already stored on the wireless communication device
  • At least one identification number of the wireless communication device [102] refers to any of the international mobile equipment identity (IMEI) number, ESN (Electronic Serial Number) number, MEID (Mobile Equipment Identifier) number or any other number that can be used to identify the wireless communication device [102]
  • IMEI international mobile equipment identity
  • ESN Electronic Serial Number
  • MEID Mobile Equipment Identifier
  • the wireless communication device [102] is also configured to transmit the first security code to at least one OEM verification server [104]
  • the first security code is transmitted to at least one OEM verification server [104] in an encrypted format.
  • the first security code is transmitted using the wireless communication network [108]
  • the wireless communication device [102] is configured to receive a second security code from at least one OEM verification server [104]
  • the invention encompasses that the second security code is received from at least one OEM verification server [104] in an event a first verification status is a successful status.
  • the wireless communication device [102] is configured to transmit the third security code to at least one software verification server [106]
  • the third security code is transmitted to at least one software verification server [106] in an encrypted format.
  • the third security code is transmitted using the wireless communication network [108]
  • the invention encompasses that the third security code is transmitted to the at least one software verification server [106] in an event the first verification status is a successful status.
  • the wireless communication device [102] is configured to receive at least one data packet from the software verification server [106]
  • the invention encompasses that the at least one data packet is received in an event the first verification status and the second verification status is a successful status.
  • at least one data packet refers to any software code, signal, software programs, modules, applications, or any other software instruction, program or command that can be stored or executed on the wireless communication device [102]
  • the wireless communication device [102] is further configured to generate a reference security code.
  • the reference security code is generated only on receipt of at least one data packet from the software verification server [106]
  • the invention encompasses that the reference security code is based on at least one of an identification number of the wireless communication device [102] In an embodiment, the reference security code is based on at least one of the first security code and the third security code.
  • a reference security code may be stored in the wireless communication device [102] In an embodiment, the reference security code may be generated for a one-time only.
  • a reference security code refers to any numeric, character, alphanumeric or binary code that is associated with the authenticity of the wireless communication device [102] and is based on at least one identification number of the wireless communication device [102]
  • the reference security code may be of any length and format, without departing from the scope of the present invention.
  • the wireless communication device [102] is further configured to determine a reference verification status.
  • the reference verification status is based on the reference security code.
  • the reference verification status is one of a successful status and an unsuccessful status.
  • the invention encompasses that the wireless communication device [102] is configured to determine a reference verification status by mapping the reference security code with at least one identification number of said wireless communication device [102] For example, a reference security code may be mapped with IMEI number of the wireless communication device [102] In an event the reference security code matches with at least one identification number, the reference verification status is determined to be a successful status. In an event the reference security code does not match with at least one identification number, the reference verification status is determined to be an unsuccessful status.
  • the reference security code may matches with the IMEI number of the wireless communication device [102], a successful status is determined.
  • the invention encompasses that the wireless communication device [102] is configured to determine the reference verification status at a pre-determined frequency or user defined frequency.
  • the invention encompasses that the successful status of the reference verification status indicates the authenticity of the wireless communication device [102] and an unsuccessful status of the reference verification status indicates that the wireless communication device [102] has been modified or has been tampered.
  • the OEM verification server [104] is configured to receive the first security code from at least one wireless communication device [102] In a preferred embodiment, the first security code is received in an encrypted format.
  • the first security code is received using the wireless communication network [108]
  • the OEM verification server [104] is further configured to determine a first verification status.
  • the first verification status is based on the first security code.
  • the first verification status is one of a successful status and an unsuccessful status.
  • the invention encompasses that the OEM verification server [104] is configured to determine the first verification status by verifying the first security code with a pre-set code stored in the OEM verification server [104]
  • a pre-set code is any numeric, character, alphanumeric or binary code that is associated with the hardware of the wireless communication device [102] and can be used to determine the authenticity of the hardware of the wireless communication device [102]
  • the first security code may be of any length and format, without departing from the scope of the present invention.
  • the invention encompasses that the pre-set code may be stored in the OEM verification server [104] by the manufacturer of the wireless communication device [102] In an event the first security code matches with a pre-set code, the first verification status is determined to be a successful status.
  • the first verification status is determined to be an unsuccessful status.
  • the OEM verification server [104] is configured to determine the first verification status, when the first security code is received from the wireless communication device [102]
  • a successful status of the first verification status is indicative of authenticity of the wireless communication device [102] and an unsuccessful status of the first verification status indicatives that the wireless communication device [102] is unauthentic or fake.
  • a successful status of the first verification status is indicative of authenticity of the hardware of the wireless communication device [102] and an unsuccessful status of the first verification status is indicative that the hardware wireless communication device [102] is unauthentic.
  • the invention encompasses that the OEM verification server [104] is configured to transmit a second security code to at least one wireless communication device [102] and at least one software verification server [106]
  • the second security code is transmitted only in an event first verification status is a successful status.
  • a second security code refers to any numeric, character, alphanumeric or binary code that is associated with an authentic hardware of the wireless communication device [102] and is based on at least one identification number of the wireless communication device [102]
  • the second security code may be of any length and format, without departing from the scope of the present invention.
  • the software verification server [106] is configured to receive the second security code from the OEM verification server [104]
  • the software verification server [106] is also configured to receive the third security code from the wireless communication device [102]
  • the invention encompasses that the software verification server [106] is configured to receive the second security code and the third security code in an event the first verification status is a successful status.
  • the software verification server [106] is configured to determine a second verification status.
  • the second verification status is based on the second security code and the third security code.
  • the second verification status is one of a successful status and an unsuccessful status.
  • the invention encompasses that the software verification server [106] is configured to determine the second verification status by mapping the received second security code and the received third security code.
  • the software verification server [106] is configured to determine the second verification status by mapping the second security code with the third security code.
  • the software verification server [106] is configured to determine the second verification status by mapping the received second security code and the received third security code with a pre-set code. In an event the second security code and the third security code match, the second verification status is determined to be a successful status.
  • the second verification status is determined to be an unsuccessful status.
  • the invention encompasses that the software verification server [106] is configured to determine the second verification status only when the second security code and the third security code are received.
  • the successful status of the second verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the second verification status indicates that the wireless communication device [102] is unauthentic or fake.
  • the software verification server [106] is configured to transmit at least one data packet to the wireless communication device [102] The at least one data packet is transmitted only in an event the second verification status is determined to be a successful status by the software verification server [106]
  • the OEM verification server [104] and the software verification server [106] includes one or more processors, wherein processor refers to any logic circuitry for processing instructions.
  • the OEM verification server [104] and the software verification server [106] may include a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc.
  • the OEM verification server [104] and the software verification server [106] may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure.
  • the wireless communication network [108] is configured to connect the wireless communication device [102], the at least one OEM verification server [104] and the at least one software verification server [106]
  • the wireless communication network [108] may be any wireless communication network capable to transfer data between entities of that network such as a carrier network including circuit switched network, a public switched network, a CDN network, a LTE network, GSM network and UMTS network, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • At least one wireless communication device [102] comprises of a verification module [102a], a disabling module [102b], a processor [102c], a memory [102d] and a transceiver [102e]
  • the wireless communication device [102] may also include more or less components than those illustrated in Figure 2 or have a different configuration than that illustrated in this Figure 2.
  • the verification module [102a] is configured to generate a reference security code.
  • the reference security code is generated only on receipt of at least one data packet from the software verification server [106]
  • the invention encompasses that the reference security code generated by the verification module [102a] is based on at least one of an identification number of the wireless communication device [102]
  • the reference security code is based on at least one of the first security code and the third security code.
  • the reference security code may comprise of the ESN number of the wireless communication device [102]
  • the verification module [102a] is further configured to determine a reference verification status.
  • the reference verification status is based on the generated reference security code.
  • the reference verification status is one of a successful status and an unsuccessful status.
  • the invention encompasses that the verification module [102a] is configured to determine a reference verification status by mapping the reference security code with at least one identification number of said wireless communication device [102] For example, a reference security code may be mapped with the IMEI number of the wireless communication device [102] In an event the reference security code matches with at least one identification number, the reference verification status is determined to be a successful status. In an event the reference security code does not match with at least one identification number, the reference verification status is determined to be an unsuccessful status.
  • the verification module [102a] is configured to determine the reference verification status at a pre-determined frequency or user defined frequency.
  • a successful status of the reference verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the reference verification status indicates that the wireless communication device [102] has been modified or has been tampered.
  • the verification module [102a] is configured to send the determined reference security status to the disabling module [102b] and the processor [102c]
  • the disabling module [102b] is configured to receive the determined reference security status from the verification module [102a] Upon receipt of the determined reference security status, the disabling module [102b] is configured to disable the wireless communication device [102]
  • the invention encompasses that the disabling module [102b] is configured to disable the wireless communication device [102] only in an event the reference verification status is an unsuccessful status.
  • to disable the wireless communication device [102] refers to complete disablement or locking of the operation and functioning of the wireless communication device [102] in an event an unsuccessful status is determined by the verification module [102a]
  • the disabling module [102b] is configured to disable the wireless communication device [102] using the processor [102c]
  • the processor [102c] is configured to control the overall working of the wireless communication device [102]
  • the processor [102c] is further configured to receive the determined reference security status from the verification module [102a] Upon receipt of the determined reference security status, the processor [102c] is configured to disable all operations and functions of the wireless communication device [102] In a preferred embodiment, the processor [102c] is configured to lock the wireless communication device [102]
  • the wireless communication device [102] is then non-functional.
  • the verification module [102a], the disabling module [102b] and processor [102c] includes one or more processors, wherein processor [102c] refers to any logic circuitry for processing instructions.
  • the verification module [102a], the disabling module [102b] and processor [102c] may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc.
  • the verification module [102a], the disabling module [102b] and processor [102c] may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the verification module [102a], the disabling module [102b] and processor [102c] is a hardware processor.
  • the memory [102d] is configured to store the first security code, the third security code and the reference security code.
  • the first security code, the third security code and the reference security code may be stored in an encrypted format.
  • the invention encompasses that the first security code and the third security code may be pre-stored in the memory [102d] by the manufacturer of the wireless communication device [102]
  • the reference security code may be generated for a one-time only.
  • the memory [102d] is further configured to send and receive the first security code, the third security code and the reference security code to the transceiver [102e]
  • the memory [102d] is also configured to store software programs and modules.
  • the memory [102d] is further also configured to allow the verification module [102a], the disabling module [102b] and processor [102c] to execute various functional disclosures and data processing by running software programs and modules stored in the memory [102d]
  • the memory [102d] may include, but is not limited to, a volatile memory, non-volatile memory, a remote storage, a cloud storage, high-speed random-access memory and/or non-volatile memory, such as one or more magnetic disk storage devices, one or more optical storage devices, and/or flash memory (e.g., NAND, NOR) or a combination thereof.
  • memory [102d] may further include memory remotely configured relative to processor [102c] which may be connected to the wireless communication network [102], the OEM verification server [104] and the software verification server [106] via the wireless communication network [108]
  • the transceiver [102e] is configured to transmit to and receive from the OEM verification server [104] and the software verification server [106]
  • the transceiver [102e] is configured to transmit and receive using the wireless communication network [108]
  • the transceiver [102e] is configured to transmit the first security code to at least one OEM verification server [104]
  • the first security code is transmitted to at least one OEM verification server [104] in an encrypted format by the transceiver [102e]
  • the transceiver [102e] is configured to receive a second security code from at least one OEM verification server [104]
  • the invention encompasses that the second security code is received from at least one OEM verification server [104] by the transceiver [102e] in an event a first verification status is determined to be a successful status by the OEM verification server [104]
  • the transceiver [102e] is configured to transmit the third security code to at least one software verification server [106]
  • the transceiver [102e] is configured to transmit the third security code to at least one software verification server [106] in an encrypted format.
  • the invention encompasses that the third security code is transmitted to the at least one software verification server [106] by the transceiver [102e] only in an event the first verification status is determined to be a successful status by the OEM verification server [104]
  • the transceiver [102e] is also configured to store and receive the first security code, the third security code and the reference security code from the memory [102d]
  • the transceiver [102e] is further configured to receive at least one data packet from the software verification server [106]
  • the invention encompasses that the at least one data packet is received by the transceiver [102e] only in an event the first verification status is determined to be a successful status by the OEM verification server [104] and the second verification status is determined to be a successful status by the software verification server [106]
  • Figure 3 depicts a flow chart depicting an exemplary method [300] to determine the authenticity of at least one wireless communication device [102] in accordance with exemplary embodiments of the present invention.
  • the method commences when a first security code is received by an OEM verification server [104] from the at least one wireless communication device [102]
  • the first security code is received in an encrypted format.
  • the first security code is received by the OEM verification server [104] from the at least one wireless communication device [102] using the wireless communication network [108]
  • a first verification status is determined by the at least one OEM verification server [104] The first verification status is based on the first security code. The first verification status is one of a successful status and an unsuccessful status.
  • the invention encompasses that the first verification status is determined by the OEM verification server [104] by verifying the first security code with a pre-set code stored in the OEM verification server [104] In an event the first security code matches with pre-set code, the first verification status is determined to be a successful status. In an event the first security code does not match with pre-set code, the first verification status is determined to be an unsuccessful status.
  • the invention encompasses that first verification status is determined by the OEM verification server [104] only when the first security code is received from the wireless communication device [102]
  • a successful status of the first verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the first verification status indicates that the wireless communication device [102] is unauthentic or fake.
  • a successful status of the first verification status indicates that the hardware of the wireless communication device [102] is authentic and an unsuccessful status of the first verification status indicates that the hardware of the wireless communication device [102] is unauthentic or fake.
  • step 306 a second security code is transmitted to the wireless communication device [102] and a software verification server [106], by the OEM verification server [104] The second security code is only transmitted in an event first verification status is a successful status.
  • the second security code is received by the wireless communication device [102] and the software verification server [106] Thereafter, at step 308, upon receipt of the second security code, a third security code is transmitted by the at least one wireless communication device [102] to the software verification server [106]
  • the third security code is transmitted to at least one software verification server [106] in an encrypted format.
  • the third security code is transmitted using the wireless communication network [108]
  • the invention encompasses that the third security code is transmitted to the at least one software verification server [106] only in an event the first verification status is a successful status.
  • the second security code is then received by the software verification server [106] from the OEM verification server [104]
  • the third security code is also received by the software verification server [106] from the wireless communication device [102]
  • the invention encompasses that the second security code and the third security code is received by the software verification server [106] only in an event the first verification status is a successful status.
  • the second security code and the third security code is received using the wireless communication network [108]
  • a second verification status is then determined by the software verification server [106]
  • the second verification status is based on the second security code and the third security code.
  • the second verification status is one of a successful status and an unsuccessful status.
  • the invention encompasses that the second verification status is determined by the software verification server [106] by mapping the second security code and the third security code.
  • the second verification status is determined by mapping the second security code with the third security code.
  • the second verification status is determined by mapping the second security code and the third security code with a pre-set code. In an event the second security code and the third security code match, the second verification status is determined to be a successful status.
  • the second verification status is determined to be an unsuccessful status.
  • the invention encompasses that the second verification status is determined only when the second security code and the third security code are received.
  • a successful status of the second verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the second verification status indicates that the wireless communication device [102] is unauthentic or fake.
  • the method moves to step 314, else, the method ends.
  • the invention encompasses that the at least one data packet is transmitted only in an event the first verification status and the second verification status are a successful status.
  • the at least one data packet is transmitted using the wireless communication network [108]
  • a reference security code is generated by the wireless communication device [102]
  • the reference security code is generated only on receipt of at least one data packet from the software verification server [106]
  • the invention encompasses that the reference security code is based on at least one of an identification number of the wireless communication device [102]
  • the reference security code may be based on the IMEI of the wireless communication device [102]
  • the reference security code is based on at least one of the first security code and the third security code.
  • a reference verification status is then determined by the wireless communication device [102]
  • the reference verification status is based on the reference security code.
  • the reference verification status is one of a successful status and an unsuccessful status.
  • the invention encompasses that reference verification status is determined by mapping the reference security code with at least one identification number of said wireless communication device [102] For example, the reference security code may be mapped to the IMEI of the wireless communication device [102]
  • the reference security code matches with at least one identification number, the reference verification status is determined to be a successful status. In an event the reference security code does not match with at least one identification number, the reference verification status is determined to be an unsuccessful status. For example, if the reference security code matches the IMEI of the wireless communication device [102], a successful status is determined, else an unsuccessful status. In an embodiment, the reference security code may be generated for a one-time only.
  • the invention further encompasses that the reference verification status may be determined at a pre-determined frequency or user defined frequency.
  • the successful status of the reference verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the reference verification status indicates that the wireless communication device [102] has been modified or has been tampered.
  • Figure 4 depicts a flow chart depicting an exemplary method [400] for disabling at least a wireless communication device [102] authenticated in accordance with exemplary embodiments of the present invention.
  • the method commences when a reference security code is generated by the verification module [102a] of the wireless communication device [102]
  • the wireless communication device [102] is an authenticated device in accordance with the present invention.
  • the invention encompasses that the reference security code is generated only when at least one data packet is received from a software verification server [106]
  • the reference security code is based on at least one of an identification number of the wireless communication device [102]
  • the reference security code may be based on the IMEI of the wireless communication device [102]
  • the reference security code may be based on the ESN number of the wireless communication device [102]
  • the reference security code is based on at least one of a first security code and a third security code.
  • a reference verification status is then determined by a verification module [102a] of the wireless communication device [102]
  • the reference verification status is based on the generated reference security code.
  • the invention encompasses that reference verification status is determined by mapping the reference security code with at least one identification number of the wireless communication device [102] For example, the reference security code may be mapped to the IMEI of the wireless communication device [102]
  • the reference verification status is one of a successful status and an unsuccessful status.
  • the reference verification status is determined to be a successful status. In an event the reference security code does not match with at least one identification number, the reference verification status is determined to be an unsuccessful status. For example, if the reference security code matches the IMEI of the wireless communication device [102], a successful status is determined, else an unsuccessful status.
  • the invention further encompasses that the reference verification status may be determined at a pre-determined frequency or user defined frequency by the verification module [102a] of the wireless communication device [102]
  • the successful status of the reference verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the reference verification status indicates that the wireless communication device [102] has been modified or has been tampered.
  • the method ends. In an event the reference verification status is determined to be an unsuccessful status, the method moves to step 406.
  • the wireless communication device [102] is disabled.
  • the wireless communication device [102] is disabled by a disabling module [102b]
  • the wireless communication device [102] may also disabled by the processor [102c]
  • the wireless communication device [102] may be disabled by deactivating all operations and functions of the wireless communication device [102]
  • the wireless communication device [102] may be disabled by locking of the operation and functioning of the wireless communication device [102]
  • the units, interfaces, modules, and/or components depicted in the figures and described herein may be present in the form of a hardware, a software and a combination thereof.
  • Connection/s shown between these units/components/modules/interfaces in the exemplary system architecture may interact with each other through various wired links, wireless links, logical links and/or physical links. Further, the units/components/modules/interfaces may be connected in other possible ways.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides for determining the authenticity of a wireless communication device (102). An OEM verification server (104) determines a first verification status upon receiving a first security code from a wireless communication device (102). In case the first verification status is a successful status, the OEM verification server (104) transmits a second security code to the wireless communication device (102) and a software verification server (106). The software verification server (106) then determines a second verification status upon receiving a second security code from the OEM verification server (104) and a third security code from the wireless communication device(102). In an event the second verification status is a successful status, the wireless communication device (102) is authenticated. The present invention also provides for disabling a wireless communication device (102) in case a reference verification status is unsuccessful for a reference security code.

Description

SYSTEM AND METHOD TO DETERMINE THE AUTHENTICITY OF A WIRELESS COMMUNICATION
DEVICE
FIELD OF INVENTION
The present disclosure relates generally to security systems and methods for electronic devices, particularly to a system and method to determine the authenticity of at least one wireless communication device.
BACKGROUND
The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the overall field of the invention, and not as admissions of prior art.
It is a well-known fact that counterfeit products are now easily available in the market, thereby making the brand owners suffer huge losses. The counterfeit products industry is driven by the principle that a product, such as electronic devices, is priced disproportionately less than the cost of its original manufacturer. This may causes the consumers to buy counterfeit products, which may be priced at a much lower rate. Therefore, manufacturers of proprietary products lose billions of dollars each year, because of ease of availability of counterfeits. Further, with the advertent of technology, the counterfeit goods may be produced of almost identical quality to the original. Hence, a manufacturer may suffers from a continuous loss of sales as counterfeiting continues unchecked, because detection is difficult or impossible.
Further, the counterfeit products may often sold with the same tags of the brand owners making them very hard to distinguish from the original goods. Some mechanisms exist, which verify the authenticity of the electronic device, which involve checking the International Mobile Equipment Identity (IMEI) number. However, such verification of the IMEI number may very hard to ascertain as duplicate or fake phones may also be incorporated with an IMEI number of an original device, which may be a cloned IMEI number. Some currently known mechanisms provide for the provider of the mobile communication program to obtain a public key generated on the basis of a terminal identification number (IMEI) unique to a mobile communication program. The generated public key is then stored in a key registration server. The key is used to encrypt a mobile communication program with the public key and transmit the encrypted program. An SDR terminal generates the private key on the basis of the unique terminal identification number (IMEI) and decrypts the encrypted program with the generated private key and installs and operates the decrypted program. Since the mobile communication program is encrypted, when an unauthorized entity tries to install an illegal copy of the program in the SDR terminal, the decryption cannot be performed, and the installation becomes impossible, thereby preventing ill-intentioned corruption and illegal use of the SDR terminal.
Further, another mechanism to prevent illegal duplication of an ID containing mobile unit, and illegal duplication of an 1C card for a mobile unit. The mechanism provides for generating a public key KECOB for a COB device corresponding to a common secret key KDCOB determined through consultation among communications carriers. The key is then stored into a ROM in an unalterable form.
However, there is currently no mechanism that provides a multi-layer security system for authenticating a wireless communication device. There is also no system that authenticates the hardware and software of the wireless communication device. Further, there is also no security system that prevents duplication of wireless communication device at the initial stage, that is when the wireless communication device is powered ON for the first time for use.
Therefore, in view of the above, there is a need in the art to introduce quantitative, accurate and reproducible system and method to authenticate a wireless communication device. Particularly, there is a need to determine the genuineness and originality of the wireless communication device, when the device is powered on. Further, there is no mechanism that authenticates the hardware and software of the wireless communication device. Further, there is also no security system that prevents duplication of wireless communication device at the initial stage, that is when the wireless communication device is powered ON for the first time for use. SUMMARY OF THE INVENTION
This section is provided to introduce certain objects and aspects of the present invention in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter. In order to overcome at least a few problems associated with the known solutions as provided in the background section, an object of the present invention is to provide a system and method to authenticate-at least one wireless communication device. It is another object of the present invention to provide for a system and method for disabling at least one wireless communication device. It is another object of the present invention is to provide a system and method of enhanced reliability and accuracy in determining the originality and genuineness of a wireless communication device.
It is yet another object of the present invention is to provide a system and method for deactivating a wireless communication device in case of any unauthorized usage. It is yet another object of the present invention is to provide a system and method to verify the originality of a wireless communication device using a verification code.
It is yet another object of the present invention is to provide a system and method to verify the operating system of a wireless communication device with use of at least one security code.
It is yet another object of the present invention is to provide a system and method to authenticate and validate a wireless communication device, when the device connects to the internet.
It is yet another object of the present invention is to provide a system and method to provide a mechanism to prevent duplication of wireless communication devices.
It is yet another object of the present invention is to provide a system and method to provide a mechanism to disable the wireless communication device in case the authentication fails. It is yet another object of the present invention is to provide a system and method to provide a mechanism that prevents duplication of wireless communication device at the initial stage, that is when the wireless communication device is powered ON for the first time for use.
In view of the aforesaid objects of the present invention, a first aspect of the present invention relates to a method to determine the authenticity of at least one wireless communication device. The method commences when at least an Original Equipment Manufacturer (OEM) verification server receives a first security code from the at least one wireless communication device. Upon receipt of the code, the OEM verification server determines a first verification status. The first verification status is one of a successful status and an unsuccessful status. In case the first verification status is a successful status, the OEM verification server transmits a second security code to the wireless communication device and to at least a software verification server. Thereafter, the software verification server receives the second security code from the OEM verification server and a third security code from the wireless communication device. Upon receipt of the codes, the software verification server determines a second verification status. The second verification status is one of a successful status and an unsuccessful status. Finally, in case the second verification status is a successful status, the wireless communication device is authenticated and at least one data packet is transmitted by the software verification server to the wireless communication device. Thereafter, the wireless communication device generates a reference security code upon receipt of the at least one data packet. The reference security code is based on at least one identification number of the wireless communication device. A reference verification status is then determined by mapping the reference security code with at least one of identification number of wireless communication device. The reference verification status is one of a successful status and an unsuccessful status. Finally, in an event the reference verification status is an unsuccessful status, the wireless communication device is disabled.
Another aspect of the present invention relates to a method for disabling at least a wireless communication device authenticated in accordance with the working of the present invention. The method commences when the wireless communication device receives at least one data packet from a software verification server upon authentication. Thereafter, the wireless communication device generates a reference security code upon receipt of the at least one data packet. The reference security code is based on at least one identification number of the wireless communication device. A reference verification status is then determined by mapping the reference security code with at least one of identification number of wireless communication device. The reference verification status is one of a successful status and an unsuccessful status. The reference verification status is determined at a pre-determined frequency or user defined frequency. Finally, in an event the reference verification status is an unsuccessful status, the wireless communication device is disabled.
Yet another aspect of the invention relates to a system to determine the authenticity of at least one wireless communication device. The system comprises at least one wireless communication device, at least one OEM verification server and at least one software verification server. The OEM verification server is configured to receive a first security code from the wireless communication device. Upon receipt of the code, the OEM verification server is configured to determine a first verification status. The first verification status is one of a successful status and an unsuccessful status. In an event the first verification status is a successful status, the OEM verification server is configured to transmit a second security code to the wireless communication device and a software verification server. Thereafter, the software verification server is configured to receive the second security code from the OEM verification server and a third security code from the wireless communication device. Upon receipt of the codes, the software verification server is configured to determine a second verification status. The second verification status is one of a successful status and an unsuccessful status. Finally, in an event the second verification status is a successful status, the software verification server is configured to authenticate the wireless communication device and transmit at least one data packet to the wireless communication device. Thereafter, the wireless communication device is configured to generate a reference security code upon receipt of the at least one data packet. The reference security code is based on at least one identification number of the wireless communication device. A reference verification status is then determined by mapping the reference security code with at least one identification number of wireless communication device. The reference verification status is one of a successful status and an unsuccessful status. Finally, in an event the reference verification status is an unsuccessful status, the wireless communication device is configured to be disabled. Yet another aspect of the invention relates to a system for disabling at least a wireless communication device authenticated in accordance with the working of the present invention. The wireless communication device is configured to receive at least one data packet from a software verification server upon authentication. Thereafter, the wireless communication device is configured to generate a reference security code upon receipt of the at least one data packet. The reference security code is based on at least one identification number of the wireless communication device. A reference verification status is then determined by mapping the reference security code with at least one identification number of wireless communication device. The reference verification status is one of a successful status and an unsuccessful status. The reference verification status is determined at a pre-determined frequency or user defined frequency. Finally, in an event the reference verification status is an unsuccessful status, the wireless communication device is configured to be disabled.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS
The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components or circuitry commonly used to implement such components. Although exemplary connections between sub-components have been shown in the accompanying drawings, it will be appreciated by those skilled in the art, that other connections may also be possible, without departing from the scope of the invention. All sub- components within a component may be connected to each other, unless otherwise indicated.
Figures 1 illustrates an overview of an exemplary architecture of a system to determine the authenticity of at least one wireless communication device, in accordance with exemplary embodiments of the present invention. Figures 2 illustrates an overview of an exemplary architecture of a wireless communication device for disabling the wireless communication device authenticated in accordance with the present invention, in accordance with exemplary embodiments of the present invention.
Figure 3 illustrates a flow chart of an exemplary method to determine the authenticity of at least one wireless communication device, in accordance with exemplary embodiments of the present invention.
Figure 4 illustrates a flow chart of an exemplary method for disabling a wireless communication device authenticated in accordance with the present invention, in accordance with exemplary embodiments of the present invention. DETAILED DESCRIPTION OF THE INVENTION
In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of the embodiments of the present invention. It will be apparent, however, that embodiments of the present invention may be practiced without these specific details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above. Some of the problems discussed above might not be fully addressed by any of the features described herein. Example embodiments of the present invention are described below, as illustrated in various drawings. Those skilled in the art will be aware that the invention described herein is subject to variations and modifications other than those specifically described herein. It is to be understood that the invention described herein includes all such variations and modifications. The invention also includes all such steps, features, systems and methods referred to or indicated in this specification, individually or collectively, and any and all combinations of any two or more of said steps or features.
The present invention provides a system and method to determine the authenticity of at least one wireless communication device. The invention commences when at least one OEM verification server receives a first security code from the at least one wireless communication device. Upon receipt of the code, the OEM verification server determines a first verification status for the first security code. The invention encompasses that the first verification status is one of a successful status and an unsuccessful status. In an event the first verification status is a successful status, the OEM verification server transmits a second security code to the wireless communication device and at least one software verification server. Thereafter, the software verification server receives the second security code from said at least one OEM verification server and a third security code from the wireless communication device. Upon receipt of the codes, the software verification server determines a second verification status to determine the authenticity of the wireless communication device. The invention encompasses that the second verification status is one of a successful status and an unsuccessful status. Finally, in an event the second verification status is a successful status, at least one data packet is transmitted by the software verification server to the wireless communication device. Thereafter, the wireless communication device generates a reference security code upon receipt of the at least one data packet. The reference security code is based on at least one identification number of the wireless communication device. A reference verification status is then determined by mapping the reference security code with at least one of identification number of wireless communication device. The reference verification status is one of a successful status and an unsuccessful status. Finally, in an event the reference verification status is an unsuccessful status, the wireless communication device is disabled.
The present invention also provides a system and method for disabling at least a wireless communication device. The wireless communication device is an authenticated wireless communication device in accordance with the working of the present invention. The invention encompasses that the wireless communication device receives at least one data packet from a software verification server upon authentication. Thereafter, the wireless communication device generates a reference security code upon receipt of the at least one data packet. The invention encompasses that the reference security code is based on at least one of the identification number of the wireless communication device. A reference verification status is then determined by the wireless communication device. The reference verification status is then determined by mapping the reference security code with at least one of identification number of wireless communication device. The reference verification status is one of a successful status and an unsuccessful status. The invention encompasses that the reference verification status is determined at a pre-determined frequency or user defined frequency. Finally, in an event the reference verification status is an unsuccessful status, the wireless communication device is disabled.
As used herein, "connect", "configure", "couple" and its cognate terms, such as "connects", "connected", "configured", "linked" and "coupled" may include a physical connection (such as a wired/wireless connection), a logical connection (such as through logical gates of semiconducting device), other suitable connections, or a combination of such connections, as may be obvious to a skilled person.
As used herein, "send", "transfer", "transmit", and their cognate terms like "sending", "sent", "transferring", "transmitting", "transferred", "transmitted", "communicating", "communicated" etc. include sending or transporting data or information from one unit or component to another unit or component, wherein the data or information may or may not be modified before or after sending, transferring, transmitting.
Figures 1 illustrates an overview of an exemplary architecture of a system to determine the authenticity of at least one wireless communication device, in accordance with exemplary embodiments of the present invention. The system [100] comprises of at least one wireless communication device [102], at least one OEM verification server [104], at least one software verification server [106] and a wireless communication network [108]
As used herein, the at least one wireless communication device [102] refers to any electrical, electronic, electromechanical and computing device. The at least one wireless communication device [102] may include, but not be limited to, a mobile phone, a tablet, a smartphone, a laptop, a wearable device, a personal digital assistant and any such device obvious to a person skilled in the art. Although only a limited number of wireless communication device [102] are shown with reference to Fig. 1, however, it will be understood by those of ordinary skill in the art that the structure shown is merely illustrative and does not limit the number of the wireless communication device [102] in the system [100] Similarly, although only one OEM verification server [104] and software verification server [106] has been shown in Fig.l, multiple such server components and multiple servers are encompassed by the present disclosure. Also, there may be one or more subunits of said units and modules of the system [100], wireless communication device [102], OEM verification server [104] and software verification server [106] and the same is not shown in the Fig. 1 for the purpose of clarity. It will be understood by those of ordinary skill in the art that the structure shown is merely illustrative and does not limit the structure of the system [100] The system [100] or user device [102] may also include more or less components than those illustrated in Figure 1 or have a different configuration than that illustrated in this Figure 1.
The wireless communication device [102] is configured to store a first security code and a third security code. In a preferred embodiment, the first security code and the third security code may be stored in an encrypted format. The invention encompasses that the first security code and the third security code may be pre-stored in the wireless communication device [102] by the manufacturer of the wireless communication device [102] For example, a first security code comprising of the IMEI number and a hardware specific number, such as the model number, may be stored in the wireless communication device [102] by the manufacturer of the wireless communication device [102] In another example, a third security code comprising of the authenticated software specific number and a authenticated hardware specific number, such as a particular number of an authentic device of a particular model, may be stored in the wireless communication device [102] by the manufacturer of the wireless communication device [102]
As used herein in this disclosure, a first security code refers to any numeric, character, alphanumeric or binary code that is associated with the hardware of the wireless communication device [102] and is based on at least one identification number of the wireless communication device [102] The first security code may be of any length and format, without departing from the scope of the present invention.
As used herein in this disclosure, a third security code refers to any numeric, character, alphanumeric or binary code that is associated with the software or operating system of the wireless communication device [102] and is based on at least one identification number of the wireless communication device [102] The third security code may be of any length and format, without departing from the scope of the present invention. The third security code may represent a command or instruction to receive at least one data packet from the software verification server [106] when the hardware is authenticated by the OEM verification server [104] The third security code may comprise of any detail, serial number, identification number or any other identification parameter that can be used to identify at least one software or operating system or data packet that is already stored on the wireless communication device
[102],
As used herein in this disclosure, at least one identification number of the wireless communication device [102] refers to any of the international mobile equipment identity (IMEI) number, ESN (Electronic Serial Number) number, MEID (Mobile Equipment Identifier) number or any other number that can be used to identify the wireless communication device [102]
The wireless communication device [102] is also configured to transmit the first security code to at least one OEM verification server [104] In a preferred embodiment, the first security code is transmitted to at least one OEM verification server [104] in an encrypted format. The first security code is transmitted using the wireless communication network [108]
The wireless communication device [102] is configured to receive a second security code from at least one OEM verification server [104] The invention encompasses that the second security code is received from at least one OEM verification server [104] in an event a first verification status is a successful status. Further, the wireless communication device [102] is configured to transmit the third security code to at least one software verification server [106] In a preferred embodiment, the third security code is transmitted to at least one software verification server [106] in an encrypted format. The third security code is transmitted using the wireless communication network [108] The invention encompasses that the third security code is transmitted to the at least one software verification server [106] in an event the first verification status is a successful status.
The wireless communication device [102] is configured to receive at least one data packet from the software verification server [106] The invention encompasses that the at least one data packet is received in an event the first verification status and the second verification status is a successful status. As used herein in this disclosure, at least one data packet refers to any software code, signal, software programs, modules, applications, or any other software instruction, program or command that can be stored or executed on the wireless communication device [102]
The wireless communication device [102] is further configured to generate a reference security code. The reference security code is generated only on receipt of at least one data packet from the software verification server [106] The invention encompasses that the reference security code is based on at least one of an identification number of the wireless communication device [102] In an embodiment, the reference security code is based on at least one of the first security code and the third security code. For example, a reference security code may be stored in the wireless communication device [102] In an embodiment, the reference security code may be generated for a one-time only.
As used herein in this disclosure, a reference security code refers to any numeric, character, alphanumeric or binary code that is associated with the authenticity of the wireless communication device [102] and is based on at least one identification number of the wireless communication device [102] The reference security code may be of any length and format, without departing from the scope of the present invention.
The wireless communication device [102] is further configured to determine a reference verification status. The reference verification status is based on the reference security code. The reference verification status is one of a successful status and an unsuccessful status. The invention encompasses that the wireless communication device [102] is configured to determine a reference verification status by mapping the reference security code with at least one identification number of said wireless communication device [102] For example, a reference security code may be mapped with IMEI number of the wireless communication device [102] In an event the reference security code matches with at least one identification number, the reference verification status is determined to be a successful status. In an event the reference security code does not match with at least one identification number, the reference verification status is determined to be an unsuccessful status. For example, if the reference security code may matches with the IMEI number of the wireless communication device [102], a successful status is determined. The invention encompasses that the wireless communication device [102] is configured to determine the reference verification status at a pre-determined frequency or user defined frequency. The invention encompasses that the successful status of the reference verification status indicates the authenticity of the wireless communication device [102] and an unsuccessful status of the reference verification status indicates that the wireless communication device [102] has been modified or has been tampered. The OEM verification server [104] is configured to receive the first security code from at least one wireless communication device [102] In a preferred embodiment, the first security code is received in an encrypted format. The first security code is received using the wireless communication network [108]
The OEM verification server [104] is further configured to determine a first verification status. The first verification status is based on the first security code. The first verification status is one of a successful status and an unsuccessful status.
The invention encompasses that the OEM verification server [104] is configured to determine the first verification status by verifying the first security code with a pre-set code stored in the OEM verification server [104] As used herein, a pre-set code is any numeric, character, alphanumeric or binary code that is associated with the hardware of the wireless communication device [102] and can be used to determine the authenticity of the hardware of the wireless communication device [102] The first security code may be of any length and format, without departing from the scope of the present invention. The invention encompasses that the pre-set code may be stored in the OEM verification server [104] by the manufacturer of the wireless communication device [102] In an event the first security code matches with a pre-set code, the first verification status is determined to be a successful status. In an event the first security code does not match with pre-set code, the first verification status is determined to be an unsuccessful status. The invention encompasses that the OEM verification server [104] is configured to determine the first verification status, when the first security code is received from the wireless communication device [102] A successful status of the first verification status is indicative of authenticity of the wireless communication device [102] and an unsuccessful status of the first verification status indicatives that the wireless communication device [102] is unauthentic or fake. In a preferred embodiment, a successful status of the first verification status is indicative of authenticity of the hardware of the wireless communication device [102] and an unsuccessful status of the first verification status is indicative that the hardware wireless communication device [102] is unauthentic.
The invention encompasses that the OEM verification server [104] is configured to transmit a second security code to at least one wireless communication device [102] and at least one software verification server [106] The second security code is transmitted only in an event first verification status is a successful status. As used herein in this disclosure, a second security code refers to any numeric, character, alphanumeric or binary code that is associated with an authentic hardware of the wireless communication device [102] and is based on at least one identification number of the wireless communication device [102] The second security code may be of any length and format, without departing from the scope of the present invention.
The software verification server [106] is configured to receive the second security code from the OEM verification server [104] The software verification server [106] is also configured to receive the third security code from the wireless communication device [102] The invention encompasses that the software verification server [106] is configured to receive the second security code and the third security code in an event the first verification status is a successful status.
The software verification server [106] is configured to determine a second verification status. The second verification status is based on the second security code and the third security code. The second verification status is one of a successful status and an unsuccessful status. The invention encompasses that the software verification server [106] is configured to determine the second verification status by mapping the received second security code and the received third security code. In a preferred embodiment, the software verification server [106] is configured to determine the second verification status by mapping the second security code with the third security code. In another embodiment, the software verification server [106] is configured to determine the second verification status by mapping the received second security code and the received third security code with a pre-set code. In an event the second security code and the third security code match, the second verification status is determined to be a successful status. In an event the second security code and the third security code do not match, the second verification status is determined to be an unsuccessful status. The invention encompasses that the software verification server [106] is configured to determine the second verification status only when the second security code and the third security code are received. The successful status of the second verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the second verification status indicates that the wireless communication device [102] is unauthentic or fake. The software verification server [106] is configured to transmit at least one data packet to the wireless communication device [102] The at least one data packet is transmitted only in an event the second verification status is determined to be a successful status by the software verification server [106]
As used herein, the OEM verification server [104] and the software verification server [106] includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. The OEM verification server [104] and the software verification server [106] may include a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The OEM verification server [104] and the software verification server [106] may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure.
The wireless communication network [108] is configured to connect the wireless communication device [102], the at least one OEM verification server [104] and the at least one software verification server [106] The wireless communication network [108] may be any wireless communication network capable to transfer data between entities of that network such as a carrier network including circuit switched network, a public switched network, a CDN network, a LTE network, GSM network and UMTS network, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
Referring to Figure 2, an exemplary architecture [200] of at least one wireless communication device [102] is depicted. According to the figure, at least one wireless communication device [102] comprises of a verification module [102a], a disabling module [102b], a processor [102c], a memory [102d] and a transceiver [102e] The wireless communication device [102] may also include more or less components than those illustrated in Figure 2 or have a different configuration than that illustrated in this Figure 2.
The verification module [102a] is configured to generate a reference security code. The reference security code is generated only on receipt of at least one data packet from the software verification server [106] The invention encompasses that the reference security code generated by the verification module [102a] is based on at least one of an identification number of the wireless communication device [102] In an embodiment, the reference security code is based on at least one of the first security code and the third security code. For example, the reference security code may comprise of the ESN number of the wireless communication device [102]
The verification module [102a] is further configured to determine a reference verification status. The reference verification status is based on the generated reference security code. The reference verification status is one of a successful status and an unsuccessful status. The invention encompasses that the verification module [102a] is configured to determine a reference verification status by mapping the reference security code with at least one identification number of said wireless communication device [102] For example, a reference security code may be mapped with the IMEI number of the wireless communication device [102] In an event the reference security code matches with at least one identification number, the reference verification status is determined to be a successful status. In an event the reference security code does not match with at least one identification number, the reference verification status is determined to be an unsuccessful status. For example, if the reference security code matches with the IMEI number of the wireless communication device [102] a successful status is determined else, an unsuccessful status. The invention encompasses that the verification module [102a] is configured to determine the reference verification status at a pre-determined frequency or user defined frequency. A successful status of the reference verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the reference verification status indicates that the wireless communication device [102] has been modified or has been tampered.
The verification module [102a] is configured to send the determined reference security status to the disabling module [102b] and the processor [102c]
The disabling module [102b] is configured to receive the determined reference security status from the verification module [102a] Upon receipt of the determined reference security status, the disabling module [102b] is configured to disable the wireless communication device [102] The invention encompasses that the disabling module [102b] is configured to disable the wireless communication device [102] only in an event the reference verification status is an unsuccessful status. As used herein, "to disable the wireless communication device [102]" refers to complete disablement or locking of the operation and functioning of the wireless communication device [102] in an event an unsuccessful status is determined by the verification module [102a] The disabling module [102b] is configured to disable the wireless communication device [102] using the processor [102c] The processor [102c] is configured to control the overall working of the wireless communication device [102] The processor [102c] is further configured to receive the determined reference security status from the verification module [102a] Upon receipt of the determined reference security status, the processor [102c] is configured to disable all operations and functions of the wireless communication device [102] In a preferred embodiment, the processor [102c] is configured to lock the wireless communication device [102] The wireless communication device [102] is then non-functional.
As used herein, the verification module [102a], the disabling module [102b] and processor [102c] includes one or more processors, wherein processor [102c] refers to any logic circuitry for processing instructions. The verification module [102a], the disabling module [102b] and processor [102c] may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The verification module [102a], the disabling module [102b] and processor [102c] may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the verification module [102a], the disabling module [102b] and processor [102c] is a hardware processor.
The memory [102d] is configured to store the first security code, the third security code and the reference security code. In a preferred embodiment, the first security code, the third security code and the reference security code may be stored in an encrypted format. The invention encompasses that the first security code and the third security code may be pre-stored in the memory [102d] by the manufacturer of the wireless communication device [102] In an embodiment, the reference security code may be generated for a one-time only. The memory [102d] is further configured to send and receive the first security code, the third security code and the reference security code to the transceiver [102e]
The memory [102d] is also configured to store software programs and modules. The memory [102d] is further also configured to allow the verification module [102a], the disabling module [102b] and processor [102c] to execute various functional disclosures and data processing by running software programs and modules stored in the memory [102d] The memory [102d] may include, but is not limited to, a volatile memory, non-volatile memory, a remote storage, a cloud storage, high-speed random-access memory and/or non-volatile memory, such as one or more magnetic disk storage devices, one or more optical storage devices, and/or flash memory (e.g., NAND, NOR) or a combination thereof. In some embodiments, memory [102d] may further include memory remotely configured relative to processor [102c] which may be connected to the wireless communication network [102], the OEM verification server [104] and the software verification server [106] via the wireless communication network [108]
The transceiver [102e] is configured to transmit to and receive from the OEM verification server [104] and the software verification server [106] The transceiver [102e] is configured to transmit and receive using the wireless communication network [108] Particularly, the transceiver [102e] is configured to transmit the first security code to at least one OEM verification server [104] In a preferred embodiment, the first security code is transmitted to at least one OEM verification server [104] in an encrypted format by the transceiver [102e]
The transceiver [102e] is configured to receive a second security code from at least one OEM verification server [104] The invention encompasses that the second security code is received from at least one OEM verification server [104] by the transceiver [102e] in an event a first verification status is determined to be a successful status by the OEM verification server [104]
Further, the transceiver [102e] is configured to transmit the third security code to at least one software verification server [106] In a preferred embodiment, the transceiver [102e] is configured to transmit the third security code to at least one software verification server [106] in an encrypted format. The invention encompasses that the third security code is transmitted to the at least one software verification server [106] by the transceiver [102e] only in an event the first verification status is determined to be a successful status by the OEM verification server [104] The transceiver [102e] is also configured to store and receive the first security code, the third security code and the reference security code from the memory [102d]
The transceiver [102e] is further configured to receive at least one data packet from the software verification server [106] The invention encompasses that the at least one data packet is received by the transceiver [102e] only in an event the first verification status is determined to be a successful status by the OEM verification server [104] and the second verification status is determined to be a successful status by the software verification server [106]
Figure 3 depicts a flow chart depicting an exemplary method [300] to determine the authenticity of at least one wireless communication device [102] in accordance with exemplary embodiments of the present invention.
At step 302, the method commences when a first security code is received by an OEM verification server [104] from the at least one wireless communication device [102] In a preferred embodiment, the first security code is received in an encrypted format. The first security code is received by the OEM verification server [104] from the at least one wireless communication device [102] using the wireless communication network [108]
At step 304, a first verification status is determined by the at least one OEM verification server [104] The first verification status is based on the first security code. The first verification status is one of a successful status and an unsuccessful status.
The invention encompasses that the first verification status is determined by the OEM verification server [104] by verifying the first security code with a pre-set code stored in the OEM verification server [104] In an event the first security code matches with pre-set code, the first verification status is determined to be a successful status. In an event the first security code does not match with pre-set code, the first verification status is determined to be an unsuccessful status. The invention encompasses that first verification status is determined by the OEM verification server [104] only when the first security code is received from the wireless communication device [102] A successful status of the first verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the first verification status indicates that the wireless communication device [102] is unauthentic or fake. In a preferred embodiment, a successful status of the first verification status indicates that the hardware of the wireless communication device [102] is authentic and an unsuccessful status of the first verification status indicates that the hardware of the wireless communication device [102] is unauthentic or fake.
In an event the first verification status is determined to be a successful status, the method moves to step 306, else, the method ends. At step 306, a second security code is transmitted to the wireless communication device [102] and a software verification server [106], by the OEM verification server [104] The second security code is only transmitted in an event first verification status is a successful status.
The second security code is received by the wireless communication device [102] and the software verification server [106] Thereafter, at step 308, upon receipt of the second security code, a third security code is transmitted by the at least one wireless communication device [102] to the software verification server [106] In a preferred embodiment, the third security code is transmitted to at least one software verification server [106] in an encrypted format. The third security code is transmitted using the wireless communication network [108] The invention encompasses that the third security code is transmitted to the at least one software verification server [106] only in an event the first verification status is a successful status.
At step 310, the second security code is then received by the software verification server [106] from the OEM verification server [104] The third security code is also received by the software verification server [106] from the wireless communication device [102] The invention encompasses that the second security code and the third security code is received by the software verification server [106] only in an event the first verification status is a successful status. The second security code and the third security code is received using the wireless communication network [108]
At step 312, upon receipt of the second security code and the third security code, a second verification status is then determined by the software verification server [106] The second verification status is based on the second security code and the third security code. The second verification status is one of a successful status and an unsuccessful status. The invention encompasses that the second verification status is determined by the software verification server [106] by mapping the second security code and the third security code. In a preferred embodiment, the second verification status is determined by mapping the second security code with the third security code. In another embodiment, the second verification status is determined by mapping the second security code and the third security code with a pre-set code. In an event the second security code and the third security code match, the second verification status is determined to be a successful status. In an event the second security code and the third security code do not match, the second verification status is determined to be an unsuccessful status. The invention encompasses that the second verification status is determined only when the second security code and the third security code are received. A successful status of the second verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the second verification status indicates that the wireless communication device [102] is unauthentic or fake. In an event the second verification status is determined to be a successful status, the method moves to step 314, else, the method ends.
At step 314, in an event the second verification status is a successful status, at least one data packet is transmitted by the software verification server [106] to the wireless communication device [102] The invention encompasses that the at least one data packet is transmitted only in an event the first verification status and the second verification status are a successful status. The at least one data packet is transmitted using the wireless communication network [108]
Thereafter, at step 316, upon receipt of at least one data packet from the software verification server [106], a reference security code is generated by the wireless communication device [102] The reference security code is generated only on receipt of at least one data packet from the software verification server [106] The invention encompasses that the reference security code is based on at least one of an identification number of the wireless communication device [102] For example, the reference security code may be based on the IMEI of the wireless communication device [102] In an embodiment, the reference security code is based on at least one of the first security code and the third security code. At step 318, a reference verification status is then determined by the wireless communication device [102] The reference verification status is based on the reference security code. The reference verification status is one of a successful status and an unsuccessful status. The invention encompasses that reference verification status is determined by mapping the reference security code with at least one identification number of said wireless communication device [102] For example, the reference security code may be mapped to the IMEI of the wireless communication device [102]
In an event the reference security code matches with at least one identification number, the reference verification status is determined to be a successful status. In an event the reference security code does not match with at least one identification number, the reference verification status is determined to be an unsuccessful status. For example, if the reference security code matches the IMEI of the wireless communication device [102], a successful status is determined, else an unsuccessful status. In an embodiment, the reference security code may be generated for a one-time only.
The invention further encompasses that the reference verification status may be determined at a pre-determined frequency or user defined frequency. The successful status of the reference verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the reference verification status indicates that the wireless communication device [102] has been modified or has been tampered.
Figure 4 depicts a flow chart depicting an exemplary method [400] for disabling at least a wireless communication device [102] authenticated in accordance with exemplary embodiments of the present invention.
At step 402, the method commences when a reference security code is generated by the verification module [102a] of the wireless communication device [102] The wireless communication device [102] is an authenticated device in accordance with the present invention. The invention encompasses that the reference security code is generated only when at least one data packet is received from a software verification server [106] The reference security code is based on at least one of an identification number of the wireless communication device [102] For example, the reference security code may be based on the IMEI of the wireless communication device [102] In another example, the reference security code may be based on the ESN number of the wireless communication device [102] In an embodiment, the reference security code is based on at least one of a first security code and a third security code.
At step 404, a reference verification status is then determined by a verification module [102a] of the wireless communication device [102] The reference verification status is based on the generated reference security code. The invention encompasses that reference verification status is determined by mapping the reference security code with at least one identification number of the wireless communication device [102] For example, the reference security code may be mapped to the IMEI of the wireless communication device [102] The reference verification status is one of a successful status and an unsuccessful status.
In an event the reference security code matches with at least one identification number, the reference verification status is determined to be a successful status. In an event the reference security code does not match with at least one identification number, the reference verification status is determined to be an unsuccessful status. For example, if the reference security code matches the IMEI of the wireless communication device [102], a successful status is determined, else an unsuccessful status.
The invention further encompasses that the reference verification status may be determined at a pre-determined frequency or user defined frequency by the verification module [102a] of the wireless communication device [102] The successful status of the reference verification status indicates that the wireless communication device [102] is authentic and an unsuccessful status of the reference verification status indicates that the wireless communication device [102] has been modified or has been tampered.
In an event the reference verification status is determined to be a successful status, the method ends. In an event the reference verification status is determined to be an unsuccessful status, the method moves to step 406.
At step 406, in an event the reference verification status is determined to be an unsuccessful status, the wireless communication device [102] is disabled. The wireless communication device [102] is disabled by a disabling module [102b] The wireless communication device [102] may also disabled by the processor [102c] In a preferred embodiment, the wireless communication device [102] may be disabled by deactivating all operations and functions of the wireless communication device [102] In another embodiment, the wireless communication device [102] may be disabled by locking of the operation and functioning of the wireless communication device [102] The units, interfaces, modules, and/or components depicted in the figures and described herein may be present in the form of a hardware, a software and a combination thereof. Connection/s shown between these units/components/modules/interfaces in the exemplary system architecture may interact with each other through various wired links, wireless links, logical links and/or physical links. Further, the units/components/modules/interfaces may be connected in other possible ways.
While considerable emphasis has been placed herein on the disclosed embodiments, it will be appreciated by those skilled in the art that many changes can be made to the embodiments disclosed herein without departing from the principles and scope of the present invention.

Claims

We claim
1. A security system [100] to determine the authenticity of at least one wireless communication device [102], the system [100] comprising,
at least one OEM verification server [104] configured to
o receive a first security code from said at least one wireless communication device [102] and determine a first verification status for the first security code, the first verification status being one of a successful status and an unsuccessful status;
o transmit a second security code to said at least one wireless communication device [102] and at least one software verification server [106] in an event first verification status is a successful status; and
said at least one software verification server [106] configured to receive the second security code from said at least one OEM verification server [104] and a third security code from said at least one wireless communication device [102] and determine a second verification status to determine the authenticity of at least one wireless communication device [102], the second verification status being one of a successful status and an unsuccessful status, wherein the second security code and third security code is received in an event the first verification status is a successful status.
2. The security system [100] as claimed in claim 1, wherein said at least one wireless communication device [102] is further configured to transmit the third security code to the at least one software verification server [106]
3. The security system [100] as claimed in claim 1, wherein said at least one software verification server [106] is further configured to transmit at least one data packet to the wireless communication device [102] in an event the second verification status is a successful status.
4. The security system [100] as claimed in claim 3, wherein the at least one wireless communication device [102] is further configured to generate a reference security code upon receipt of at least one data packet from the software verification server [106], the reference security code being based on at least one of an identification number of the wireless communication device [102]
5. The security system [100] as claimed in claim 4, wherein the wireless communication device [102] is further configured to determine a reference verification status for the reference security code, the reference verification status being one of a successful status and an unsuccessful status.
6. The security system [100] as claimed in claim 1, wherein said at least one OEM verification server [104] is configured to verify the first security code with a pre-set code stored in the OEM verification server [104] to determine the first verification status.
7. The security system [100] as claimed in claim 4, wherein the at least one wireless communication device [102] is configured to map the reference security code with at least one identification number of said wireless communication device [102] to determine the reference verification status.
8. The security system [100] as claimed in claim 7, wherein the at least one wireless communication device [102] is configured to determine the reference verification status at a pre-determined frequency or user defined frequency.
9. The security system [100] as claimed in claim 1, wherein the at least one wireless communication device [102] is a mobile device.
10. The security system [100] as claimed in claim 1, wherein the at least one wireless communication device [102], the at least one OEM verification server [104] and the at least one software verification server [106] are connected using a wireless communication network [108]
11. The security system [100] as claimed in claim 1, wherein the successful status of at least one of the first verification status and the second verification status is indicative of authenticity of at least one wireless communication device [102]
12. The security system [100] as claimed in claim 1 and 5, wherein the successful status of the reference verification status is indicative of authenticity of at least one wireless communication device [102]
13. A system [200] for disabling at least one wireless communication device [102] authenticated by a system [100] as claimed in claims 1-12, the system [200] comprising, a wireless communication device [102] comprising,
a verification module [102a] configured to determine a reference verification status of a reference security code, the reference security code being based on at least one of an identification number of the wireless communication device [102], the reference verification status being one of a successful status and an unsuccessful status, and
a disabling module [102b] configured to disable the wireless communication device [102] in an event the reference verification status is an unsuccessful status.
14. The system [200] as claimed in claim 13, wherein the at least one wireless communication device [102] is further configured to generate the reference security code upon receipt of at least one data packet from a software verification server [106]
15. The system [200] as claimed in claim 13, wherein the verification module [102a] is configured to map the reference security code with at least one of the identification number of the wireless communication device [102] to determine the reference verification status.
16. The system [200] as claimed in claim 13 and 15, wherein the verification module [102a] is further configured to determine the reference verification status at a pre-determined frequency or user defined frequency.
17. A security method [300] to determine the authenticity of at least one wireless communication device [102], the method comprising, receiving by at least one OEM verification server [104], a first security code from the at least one wireless communication device [102],
determining by the at least one OEM verification server [104], a first verification status for the first security code, the first verification status being one of a successful and an unsuccessful status;
transmitting, by the at least one OEM verification server [104], a second security code to said at least one wireless communication device [102] and at least one software verification server [106] in an event first verification status is a successful status;
receiving by a software verification server [106], the second security code from said at least one OEM verification server [104] and a third security code from the said at least one wireless communication device [102], wherein the second security code and third security code is received in an event the first verification status is a successful status; and
determining, by the software verification server [106], a second verification status to determine the authenticity of at least one wireless communication device [102], the second verification status being one of a successful status and an unsuccessful status.
18. The security method [300] as claimed in claim 17, further comprising, transmitting, by the at least one wireless communication device [102], the third security code to the at least one software verification server [106]
19. The security method [300] as claimed in claim 17, further comprising, transmitting, by the at least one software verification server [106], at least one data packet to the wireless communication device [102] in an event the second verification status is a successful status.
20. The security method [300] as claimed in claim 17 and 19, further comprising, generating, by the wireless communication device [102], a reference security code upon receipt of at least one data packet from the software verification server [106], the reference security code being based on at least one of an identification number of the wireless communication device [102]
21. The security method [300] as claimed in claim 20, further comprising, determining, by the wireless communication device [102], a reference verification status for the reference security code, the reference verification status being one of a successful status and an unsuccessful status.
22. The security method [300] as claimed in claim 17, comprising, verifying, by the at least one OEM verification server [104], the first security code with a pre-set code stored in the OEM verification server [104] to determine the first verification status.
23. The security method [300] as claimed in claim 21, comprising, mapping, by the wireless communication device [104], the reference security code with at least one identification number of said wireless communication device [102] to determine the reference verification status.
24. The security method [300] as claimed in claim 21, wherein reference verification status is determined at a pre-determined frequency or user defined frequency.
25. The security method [300] as claimed in claim 17, wherein the successful status of at least one of the first verification status and the second verification status is indicative of authenticity of at least one wireless communication device [102]
26. The security method [300] as claimed in claim 21, wherein the successful reference verification status is indicative of authenticity of at least one wireless device [102]
27. A method [400] for disabling at least a wireless communication device [102] authenticated by a method [300] as claimed in claims 17-26, the method [400] comprising,
determining, by a verification module [102a] of the wireless communication device [102], a reference verification status of a reference security code, the reference security code being based on at least one of the identification number of the wireless communication device [102], the reference verification status being one of a successful status and an unsuccessful status, and disabling by a disabling module [102b] of the wireless communication device [102], the wireless communication device [102] in an event the reference verification status is an unsuccessful status.
28. The method [400] as claimed in claim 27, further comprising, generating, by the verification module [102a] of the wireless communication device [102], the reference security code upon receipt of at least one data packet from a software verification server [106] 29. The method [400] as claimed in claim 27 and 28, comprising, mapping, by the verification module [102a] of the wireless communication device [102] the reference security code with at least one of identification number of wireless communication device [102] to determine the reference verification status. 30. The method [400] as claimed in claim 27, comprising, determining, by the verification module [102a] of the wireless communication device [102], the reference verification status at a pre-determined frequency or user defined frequency.
PCT/IN2020/050324 2019-04-03 2020-04-03 System and method to determine the authenticity of a wireless communication device WO2020202216A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN201921013391 2019-04-03
IN201921013391 2019-04-03

Publications (1)

Publication Number Publication Date
WO2020202216A1 true WO2020202216A1 (en) 2020-10-08

Family

ID=72666152

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2020/050324 WO2020202216A1 (en) 2019-04-03 2020-04-03 System and method to determine the authenticity of a wireless communication device

Country Status (1)

Country Link
WO (1) WO2020202216A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9736144B2 (en) * 2012-06-01 2017-08-15 At&T Intellectual Property I, L.P. Apparatus and methods for activation of communication devices
US20170338962A1 (en) * 2016-05-18 2017-11-23 Apple Inc. ELECTRONIC SUBSCRIBER IDENTITY MODULE (eSIM) ELIGIBILITY CHECKING
CN107968764A (en) * 2016-10-19 2018-04-27 北京京东尚科信息技术有限公司 A kind of authentication method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9736144B2 (en) * 2012-06-01 2017-08-15 At&T Intellectual Property I, L.P. Apparatus and methods for activation of communication devices
US20170338962A1 (en) * 2016-05-18 2017-11-23 Apple Inc. ELECTRONIC SUBSCRIBER IDENTITY MODULE (eSIM) ELIGIBILITY CHECKING
CN107968764A (en) * 2016-10-19 2018-04-27 北京京东尚科信息技术有限公司 A kind of authentication method and device

Similar Documents

Publication Publication Date Title
JP5052349B2 (en) How to update configuration parameters in mobile devices
US8550336B2 (en) Systems and methods for anti-counterfeit authentication through communication networks
CN102546171B (en) Secure element authentication method
CN101166085B (en) Remote unlocking method and system
CN107395581B (en) Two-dimensional code generation and reading method, device, system, equipment and storage medium
WO2019119541A1 (en) Method and system for transferring rights and ownership of merchandise on basis of blockchain
CN101682612A (en) Controlled activation of function
WO2009127984A1 (en) Authentication of data communications
CN101416223A (en) Method for the protection of a movable object, especially a vehicle, against unauthorized use
WO2017116303A1 (en) Secure dual-mode anti-counterfeit product authentication methodology and system
CN101216915B (en) A secured mobile payment method
US20190036706A1 (en) Integrated circuit with anti-counterfeiting capabilities
JP4175386B2 (en) Information processing system, information processing apparatus, and integrated circuit chip
US20180205714A1 (en) System and Method for Authenticating Electronic Tags
US11985247B2 (en) Network device authentication
CN109522988B (en) Method and system for updating product anti-counterfeiting electronic label information
CN109360008B (en) Product anti-counterfeiting authentication updating method and system
CN104868998A (en) System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices
EP2325773B1 (en) System and method for obtaining an authorization key to use a product
US20180069693A1 (en) Cryptographic side channel resistance using permutation networks
CN109583555B (en) Product anti-counterfeiting electronic tag authentication method and system
CN111770089A (en) Authentication method for blockchain sensor and blockchain network
WO2020202216A1 (en) System and method to determine the authenticity of a wireless communication device
EP2770663A1 (en) Encryption Key-Based Product Authentication System and Method
US20110081016A1 (en) Secure data communication using elliptic curve cryptology

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20783333

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20783333

Country of ref document: EP

Kind code of ref document: A1