CN100352301C - Method of permitting to use cipher protection function and wireless phone - Google Patents

Method of permitting to use cipher protection function and wireless phone Download PDF

Info

Publication number
CN100352301C
CN100352301C CNB2004100621997A CN200410062199A CN100352301C CN 100352301 C CN100352301 C CN 100352301C CN B2004100621997 A CNB2004100621997 A CN B2004100621997A CN 200410062199 A CN200410062199 A CN 200410062199A CN 100352301 C CN100352301 C CN 100352301C
Authority
CN
China
Prior art keywords
sim
radio telephone
password
current
current insertion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB2004100621997A
Other languages
Chinese (zh)
Other versions
CN1719920A (en
Inventor
药建峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motorola Mobility LLC
Google Technology Holdings LLC
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc filed Critical Motorola Inc
Priority to CNB2004100621997A priority Critical patent/CN100352301C/en
Priority to PCT/US2005/023247 priority patent/WO2006014305A1/en
Publication of CN1719920A publication Critical patent/CN1719920A/en
Application granted granted Critical
Publication of CN100352301C publication Critical patent/CN100352301C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/675Preventing unauthorised calls from a telephone set by electronic means the user being required to insert a coded card, e.g. a smart card carrying an integrated circuit chip

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a radio telephone (100) and a method (200) thereof. The method allows a password protection function to be used on the radio telephone (100). The method (100) has the function that a current SIM identification code (220) is read, and the code exclusively identifies a current inserted SIM. Then, a judgment test (225) is executed, and the current SIM identification code is used for judging whether the current inserted SIM is the same as a previous inserted SIM or not. The method subsequently executes a scanning step (230) so as to identify an effective network associated with a current inserted SIM module. Finally, the method executes an allowing step (260) without radio telephone passwords, namely that the method allows the password protection function to be used on the radiotelephone. Therefore, when the current inserted SIM is the same as the previous inserted SIM, and an effective network is associated with the current inserted SIM, the method can automatically allow the password protection function to be used on the radiotelephone.

Description

The method and the radio telephone of defencive function allow to access to your password
Technical field
The field that the present invention relates to is the radio telephone that has the Subscriber Identity Module interface that often is called as the SIM card card reader.For those radio telephones with cryptoguard ability, the present invention is particularly useful.
Technical background
In radio telephone system (for example global mobile communication (GSM) radio telephone system),, Subscriber Identity Module (SIM) card need be inserted in the radio telephone for user ID, account information and other information relevant with wireless telephonic operation are provided.The chip card that is called as Subscriber Identity Module (SIM) as usual is the critical component of GSM, and it can be inserted in the gsm wireless phone, thereby allows phone to register in the GSM network, and communicates by the GSM network.
In typical mobile phone communication system, be each subscriber unit or a SIM distribution international mobile subscriber identification number sign indicating number (UMSI), it can identify subscriber unit uniquely, differentiates with other subscriber unit.
In existing telecommunication environment, the effect of SIM card is to make the SIM card holder can insert any telecommunication installation, for example can admit the cell phone of SIM card.The basic role of SIM card provides consumer's basic condition, and the consumer can use the bill of communication network by its record.Therefore, the purposes of SIM card is to differentiate or the authorised user.
The hand-held electronic communicator that can move expediently (for example radio telephone (cell phone)) is just popularized day by day.This class radio telephone occurs with multiple different form, can support numerous characteristics and function.
For the ease of using, the development trend of the hand-held radio phone of many types is miniaturizations.Total says, miniaturization makes that electronic installation is easier and be carried, and comprises that wireless telephonic size is suitable for packing in pocket/wallet of user, perhaps hangs over device on user's the waistband.Yet this miniaturization also makes radio telephone be easily misplaced the place or loses (being stolen or alternate manner by the thief).Therefore, give back the owner of lost property, be used for the SIM card network registry and use wireless telephonic cipher protection function of great use in order to prevent the radio telephone that the thief steals and encouragement will be lost.But this cipher protection function may be very inconvenient.
In this specification and claims, term " comprises ", exclusive the comprising of implication right and wrong of " comprising " or other similar term indications, for example, the method or the device that comprise an element tabulation are not closely to comprise those elements, also may comprise the element that other is unlisted.
Summary of the invention
According to an aspect of the present invention, the method that provides permission on radio telephone, to access to your password defencive function, this method comprises:
Read current SIM identification code, this number identifies the SIM of current insertion uniquely, and this SIM just is being inserted in the wireless telephonic SIM interface;
Whether the SIM that judges current insertion from current SIM identification code is identical with the SIM that inserts before this, and this SIM is inserted in the wireless telephonic SIM interface and allows the defencive function that accesses to your password before this;
Search for the active block related with the sim module of current insertion; With
Need not the radio telephone password; the permission defencive function that on radio telephone, accesses to your password; wherein, identical with the SIM that inserts before this and when existing the SIM of an effective network and current insertion related as the SIM of current insertion, then automatically allow the defencive function that on radio telephone, accesses to your password.
This method is preferably by the routine call that powers up on the mobile phone.Also have a kind of suitable situation, this method can be called when SIM card inserted the SIM interface detecting.
Suitable situation is that before radio telephone accessed to your password defencive function, this method further comprised the step of requirement input radio telephone password, does not require process when the SIM of current insertion does not call this simultaneously with the SIM that inserts before this.
The described step that requires preferably further has following feature: when not having active block related with the SIM of current insertion, call this step.
Suitable situation is to require step preferably further to have following feature: when not having the SIM of current insertion, to call this step.
Preferably, the international mobile subscriber identification number sign indicating number (IMSI) from the SIM that is stored in current insertion obtains current SIM identification code.
According to another aspect of the present invention, provide radio telephone, it comprises:
Processor;
Operationally with the static memory of processor coupling;
Operationally with the SIM interface of processor coupling; wherein; the effect of described processor is: need not the radio telephone password; the permission defencive function that on radio telephone, accesses to your password; wherein; identical with the SIM that inserts before this in being inserted in the SIM interface before this and when existing the SIM of an effective network and current insertion related as the SIM of the current insertion in the current SIM of the being inserted in interface, then automatically allow the defencive function that on radio telephone, accesses to your password.
Best situation is, powers up the result of program as radio telephone, and processor provides described permission.Suitable situation is, as detecting SIM is inserted into result in the SIM interface, and processor provides described permission.
Suitable situation is that radio telephone can be realized above-mentioned any step.
Description of drawings
For the present invention being more readily understood and being committed to practical application, below with reference to the accompanying drawings preferred embodiment is described, wherein:
Fig. 1 is the calcspar of expression according to radiotelephone circuit figure of the present invention; With
Fig. 2 bit representation allow on radio telephone shown in Figure 1, to access to your password flow chart of method of defencive function.
Specifying of preferred embodiment
In the accompanying drawings, in all different figure, with identical numeral components identical.Referring to Fig. 1, illustrated that radio communication device, its form are radio telephones 100, comprising radio frequency communications unit 102, with processor 103 couplings and communicate.Also comprise keypad 106 and display screen 105 in the radio telephone 100, they and processor 103 are coupled and communicate.It is evident that for those skilled in the art screen 105 can be a touch-screen, so keypad 106 is optional.
Comprise encoder/decoder 111 in the processor 103, have the code read-only memory (ROM) 112 that data are stored in relevant being used to, effect is that voice or other signal that radio telephone 100 sends or receives are encoded and decoded.Also comprise microprocessor 113 in the processor 103, be coupled on encoder/decoder 111, character read-only memory (ROM) 114, random-access memory (ram) 104, static memory 116 and the SIM interface 118 by common data and address bus 117.Static programmable memory 116 operationally is coupled with SIM interface 118 with SIM (being commonly called SIM card), in them each can be stored selected input of text messages and telephone number database TND (phone directory), comprising the number field of telephone number and the name field of identifier, in name field, described identifier is related with a number.For example, an inlet that enters into telephone number database TND can be 91999111111 (importing in number field), its relevant identifier " Steven C at work " in name field.SIM card and static memory 116 can also be stored password, and effect is to allow to access to your password on radio telephone 100 defencive function.
Have port on the microprocessor 113, the coupling with keypad 106, screen 105 and siren 115 is provided, comprise alert speaker, vibration motor and relevant driver in the typical siren 115.The port that provides with the coupling of microphone 135 and communications speaker 140 also is provided on the microprocessor 113.Stored code in the character read-only memory 114, be used for the word message that communication unit 102 receives is decoded or encoded.In the present embodiment, also stored operation code (OC) in the code read-only memory 114, also stored the code that is used to carry out with radio telephone 100 function associated for microprocessor 113.
Radio frequency communications unit 102 is combinations of receiver and transmitter, has community antenna 107.Have transceiver 108 in the communication unit 102, by radio frequency amplifier 109 and antenna 107 couplings.Transceiver 108 also is coupled with the modulator/demodulator 110 that makes up, and it is coupled to processor 103 with communication unit 102.
Referring to Fig. 2, illustrated to be used to allow radio telephone 100 method 200 of defencive function that accesses to your password, method 200 is by processor 103 and comprise that the relevant module of radio telephone 100 carries out.Can be in step 210 by following process startup method 200:(a) add the program of carrying out in the electric process that powers up at radio telephone 100; Or (b) detect SIM is inserted in the SIM interface in the radio telephone 100.In this manual, SIM has general implication, represents any subscriber or Subscriber Identity Module, and it can exchange with following module and comprise: user's service identifiers module (USIM) or movably Subscriber Identity Module (RUIM) and other.
After step 210, in testing procedure 215, whether method 200 detects the user and radio telephone 100 is set to: before allowing function of use, always need (for example) to input password on keypad 106.If the user always need not to be set to password with radio telephone 100, then the method execution in step 275: allow to use non-cipher protection function.Yet, if the user always need to be set to password with radio telephone 100, execution in step 220: read current SIM identification code.Current SIM identification code identifies the SIM of the current insertion on the SIM interface 118 that is inserted in radio telephone 100 uniquely.For those skilled in the art, it is evident that current SIM identification code is to obtain in the international mobile subscriber identification number sign indicating number of storing (IMSI) from the SIM that is stored in current insertion.
After step 220, the step of carrying out is: judge whether identical test 225, effect be from current SIM identification code, judge the SIM of the current insertion on the current SIM of the being inserted in interface 118 whether be inserted in SIM interface 118 before this on, and allow the SIM of the insertion before this of function of use on radio telephone 100 identical.If it is different with the SIM that inserts before this that test (step) 225 judged the SIM of current insertion, then execution in step 250: reading requirement input and request password.Perhaps, to judge the SIM of current insertion identical with the SIM that inserts before this if test 225, then carries out scanning step 230, and effect is the scanning active block related with the SIM of current insertion.In the process of carrying out scanning step 230,102 pairs of different available networks of radio frequency communications unit scan, and it allows the SIM of current insertion to register in network, and makes the radio communication of carrying out with radio telephone 100 effective.
After scanning step, active block can detect with test 235, determines whether SIM is available.In other words, utilize detecting step examines the SIM of current insertion whether (a) is disabled; (b) invalid; Or (c) in current overlay area, can't register.Determine that the SIM of current insertion is disabled or invalidly maybe can't register if detect step 235, then produce invalid network result, execution in step 250: require also request password of input.Perhaps, if the detection step determines that the SIM of current insertion is effective and registers that then execution in step 240: allow to use in active block.
Allow to use the effect of step 240 to be: need not the radio telephone password, defencive function just can access to your password on radio telephone 100.Therefore, when the SIM of current insertion is identical with the SIM that inserts before this, and during the existence active block related with the SIM of current insertion, this permission uses step automatically to provide the defencive function that accesses to your password as radio telephone 100.Such function comprises: visit is stored in phone directory or the telephone number database TND on the static memory 116; Send or receive telephone relation; Cryptoguard (using in testing procedure 215 and step 250) is set; Change password; Individual daily record and the personal information in the storage static memory 116 used in visit.
After step 240 or 275 was performed, the effect of storing step 245 was: storage current identification code (IMSI) in static memory 116.Therefore; when call method 100 next time; this stored current SIM identification code will become the SIM identification code (IMSI) of previous permission; should the previous SIM identification code that allows with the SIM of a plurality of previous insertions in one relevant, the SIM of described a plurality of previous insertions allows to visit previous cryptoguard or the unprotected function of use.
As previously mentioned, according to consistent test 225 or active block can be with test 235 judged result execution in step 250: require also request password of input.This step 250 shows a request message on screen 105, require the user to input required password.Behind input password string on the keypad 106, method 200 is carried out password validity and is detected 255 the user, by with its password in being stored in static memory 116 relatively, judges whether the password of being inputed is effective.If, then cause not allowing to use step 270, therefore do not allow the defencive function that accesses to your password through three unmatched trials (user inputs password three times) unsuccessfully.Therefore, require the effect of step 250 to be: before being provided at the defencive function that accesses to your password on the radio telephone 100, to require the wireless telephonic password of input.Different with the SIM that inserts before this or when not existing as the SIM of current insertion with the related active block of the SIM of current insertion, call this and require step 250.When not having the SIM of current insertion, step 220 will produce empty or invalid identity code, and therefore the SIM of current insertion is different with the SIM that inserts before this, then also can be called by testing procedure 225 and require step 250.
If detect coupling, then method 200 execution in step 260 in 255 in password validity: password allows by the back, after confirming wireless telephonic password, allow on radio telephone 100, to access to your password defencive function.After this, carry out storing step 245, current SIM identification code is stored in the static memory 116.
At storing step 245 or after not allowing to use step 270, method 200 stops in end step 280.Advantage of the present invention is, cryptoguard easily is provided, and utilizes it can allow the defencive function that accesses to your password, and when the SIM of current insertion is identical with the SIM that inserts before this, and during the existence network related with the SIM of current insertion, need not to input password.Yet,, forbid cipher protection function immediately if the user loses and makes SIM lose efficacy (being to lose with radio telephone in typical case) to network provider report SIM.
Describe the example that has only provided preferred embodiment in detail, do not wish scope of the present invention, application or structure are made restriction.In addition, detailed description of preferred embodiments provides the mandate that realizes the preferred embodiment of the present invention for those skilled in the art.It will be appreciated that, or else deviate under the situation of the spirit of the present invention and claims and scope, can carry out different changes with element arrangements function of the present invention.

Claims (10)

1. the permission method of defencive function that on radio telephone, accesses to your password, this method comprises:
Read current SIM identification code, this identification code identifies the SIM of current insertion uniquely, and this SIM just is being inserted in the wireless telephonic SIM interface;
Whether the SIM that judges current insertion from current SIM identification code is identical with the SIM that inserts before this, and the described SIM that inserts before this is inserted in the wireless telephonic SIM interface and allows the defencive function that accesses to your password;
Search for the active block related with the sim module of current insertion; With
Permission accesses to your password defencive function and need not the radio telephone password on radio telephone; wherein; identical with the SIM that inserts before this and when existing the SIM of an effective network and current insertion related as the SIM of current insertion, then automatically allow the defencive function that on radio telephone, accesses to your password.
2. method according to claim 1, wherein, described method is by the routine call that powers up on the radio telephone.
3. method according to claim 1, wherein, described method is called when SIM card inserted the SIM interface detecting.
4. method according to claim 1; wherein; described method further comprises step: before the defencive function that accesses to your password on the radio telephone, require input radio telephone password, do not require step when the SIM of current insertion does not call this simultaneously with the SIM that inserts before this.
5. method according to claim 4, wherein, the described step that requires further has following feature: when not having active block related with the SIM of current insertion, call this step.
6. method according to claim 4, wherein, the described step that requires further has following feature: when not having the SIM of current insertion, call this step.
7. method according to claim 1, wherein, the international mobile subscriber identification number sign indicating number IMSI from the SIM that is stored in current insertion obtains current SIM identification code.
8. radio telephone, it comprises:
Processor;
Operationally with the static memory of processor coupling;
Operationally with the SIM interface of processor coupling; wherein; the effect of described processor is: need not the radio telephone password; the permission defencive function that on radio telephone, accesses to your password; wherein; identical with the SIM that inserts before this in being inserted in the SIM interface before this and when existing the SIM of an effective network and current insertion related as the SIM of the current insertion in the current SIM of the being inserted in interface, then automatically allow the defencive function that on radio telephone, accesses to your password.
9. radio telephone according to claim 8 wherein, powers up the result of program as radio telephone, and processor provides described permission.
10. radio telephone according to claim 8 wherein, is inserted into result in the SIM interface as detecting with SIM, and processor provides described permission.
CNB2004100621997A 2004-07-05 2004-07-05 Method of permitting to use cipher protection function and wireless phone Expired - Lifetime CN100352301C (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNB2004100621997A CN100352301C (en) 2004-07-05 2004-07-05 Method of permitting to use cipher protection function and wireless phone
PCT/US2005/023247 WO2006014305A1 (en) 2004-07-05 2005-06-29 Method and radio telephone allowing accessibility of password protected functions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100621997A CN100352301C (en) 2004-07-05 2004-07-05 Method of permitting to use cipher protection function and wireless phone

Publications (2)

Publication Number Publication Date
CN1719920A CN1719920A (en) 2006-01-11
CN100352301C true CN100352301C (en) 2007-11-28

Family

ID=35787398

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100621997A Expired - Lifetime CN100352301C (en) 2004-07-05 2004-07-05 Method of permitting to use cipher protection function and wireless phone

Country Status (2)

Country Link
CN (1) CN100352301C (en)
WO (1) WO2006014305A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105898011A (en) * 2015-10-26 2016-08-24 乐视致新电子科技(天津)有限公司 Hardware cipher-based mobile phone data protection method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119020A (en) * 1997-12-16 2000-09-12 Motorola, Inc. Multiple user SIM card secured subscriber unit
EP1170969A1 (en) * 2000-07-06 2002-01-09 Nokia Mobile Phones Ltd. Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
CN1395407A (en) * 2001-07-05 2003-02-05 致福股份有限公司 Mobile telephone burglary-resisting design and its operation method
CN1434626A (en) * 2002-01-25 2003-08-06 英业达集团(上海)电子技术有限公司 Theft-proof device and method for mobile telephone

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI88842C (en) * 1990-03-22 1993-07-12 Nokia Mobile Phones Ltd Checking the card connection
CN1112076C (en) * 1996-09-19 2003-06-18 Ntt移动通信网株式会社 Method of activation of mobile station
JP3283848B2 (en) * 1999-04-20 2002-05-20 エヌイーシーモバイリング株式会社 Mobile radio communication device and communication permission method
EP1113683A1 (en) * 1999-12-21 2001-07-04 Koninklijke Philips Electronics N.V. Protection of a radiotelephone apparatus against theft
KR100557132B1 (en) * 2003-10-07 2006-03-03 삼성전자주식회사 Mobile equipment for protection of private information and method therein

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119020A (en) * 1997-12-16 2000-09-12 Motorola, Inc. Multiple user SIM card secured subscriber unit
EP1170969A1 (en) * 2000-07-06 2002-01-09 Nokia Mobile Phones Ltd. Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
CN1395407A (en) * 2001-07-05 2003-02-05 致福股份有限公司 Mobile telephone burglary-resisting design and its operation method
CN1434626A (en) * 2002-01-25 2003-08-06 英业达集团(上海)电子技术有限公司 Theft-proof device and method for mobile telephone

Also Published As

Publication number Publication date
CN1719920A (en) 2006-01-11
WO2006014305A1 (en) 2006-02-09

Similar Documents

Publication Publication Date Title
US7505758B2 (en) Apparatus and method for setting use restriction of mobile communication terminal
US20040192386A1 (en) Method and apparatus for multiple subscriber identities in a mobile communication device
US7627767B2 (en) Methods and systems for remotely securing data in a wireless device in a communications network
US8260355B2 (en) Portable communication terminal, program executed by portable communication terminal
US7783281B1 (en) Method and system for securing a mobile device
US20080014990A1 (en) Method of locating a mobile communication system for providing anti theft and data protection during successive boot-up procedure
US20060116169A1 (en) Apparatus and method for initialization of mobile communication terminal
CN1469674A (en) Method for locking mobile telecommunication terminal
US20080090548A1 (en) Method for tracking mobile communication terminal
US20030181219A1 (en) Method of indicating unauthorized use of a mobile terminal
CN103037062A (en) Method and terminal and server used for intercepting crank calls
EP2064907A2 (en) Fraud detection system
EP1571859B1 (en) Equipment identity coding method of a mobile user equipment
CN1980459A (en) Method for realizing information destroying at network side
EP2193676B1 (en) Mobile phone data security
US20100035577A1 (en) Using network authentication to counter subscriber identity module card man-in-the-middle subsidy lock attack
US20080016557A1 (en) Mobile communication terminal and method for authenticating data registration
CN1767680A (en) Mobile communication terminal using intelligent card to implement user certification and certification method thereof
CN100352301C (en) Method of permitting to use cipher protection function and wireless phone
EP1478196B1 (en) Module and method for detecting at least one event in a cellular mobile telephony subscriber equipment, a computer program to carry out the method and a card and terminal with the module.
US20050288043A1 (en) Method for preventing PHS mobile phones from being stolen by using remote control function of short message service
WO1998057514B1 (en) System and method for detecting unauthorized use of a cellular telephone
KR101151891B1 (en) Method For General Searching Between Two or More Mobile Phone
KR20080034644A (en) Method for reading a phonebook data in subscriber identity module card, and terminal thereof
TWI417816B (en) System and method for determining location of a lost communication device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: MOTOROLA MOBILE CO., LTD

Free format text: FORMER OWNER: MOTOROLA INC.

Effective date: 20110120

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20110120

Address after: Illinois State

Patentee after: MOTOROLA MOBILITY, Inc.

Address before: Illinois, USA

Patentee before: Motorola, Inc.

C41 Transfer of patent application or patent right or utility model
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: Illinois State

Patentee after: MOTOROLA MOBILITY LLC

Address before: Illinois State

Patentee before: MOTOROLA MOBILITY, Inc.

TR01 Transfer of patent right

Effective date of registration: 20160309

Address after: California, USA

Patentee after: Google Technology Holdings LLC

Address before: Illinois State

Patentee before: MOTOROLA MOBILITY LLC

CX01 Expiry of patent term

Granted publication date: 20071128