Wireless module security system and method

ABSTRACT

A wireless module security system and method is provided which includes, in one embodiment providing security data to a wireless module. The security data including a security code provided to the wireless module after the wireless module has been activated. The method for providing the security code includes encrypting the security code after establishing a wireless module account, issuing the security code through wireless transmission to the wireless module, and decrypting and storing the security code inside the wireless module. The security system and method also utilizes user authorized associated peripheral devices which may be connected to the wireless module to provide further combinations of security data. In one embodiment, the wireless module is provided with an electronic serial number and that electronic serial number is stored to the peripheral device for a security measure. In another embodiment, the peripheral device is provided with peripheral device data and that peripheral device data is stored inside the wireless module for a further security measure. The wireless module is removably connected to any number of user authorized peripheral devices, and thus the wireless module security system and method is provided upon wireless module and peripheral device initialization.

[0001] This application incorporates herein by reference U.S. patentapplication Ser. No. ______, of Akihiko Toyoshima, for SYSTEM AND METHODFOR ACTIVATION OF A WIRELESS MODULE, filed concurrent herewith (Sony IPD50R4257.01); U.S. patent application Ser. No. ______, of AkhikoToyoshima, for HOME NETWORK USING WIRELESS MODULE, filed ______, 2001(Sony IPD 50P4257.02); U.S. patent application Ser. No. ______, ofAkhiko Toyoshima, for MULTIPLE WIRELESS FORMAT PHONE SYSTEM AND METHOD,filed concurrent herewith (Sony IPD No. 50P4257.03); U.S. patentapplication Ser. No. ______, of Akhiko Toyoshima, for WIRELESS MODEMMODULE SERVER SYSTEM, filed ______, 2001 (Sony IPD No. 50P4257.04); U.S.patent application Ser. No. ______, of Akihiko Toyoshima, for A DEFAULTPORTAL SITE ACCESS WITH WIRELESS MODULE, filed ______, 2001 (Sony IPD50R4257.06); and U.S. patent application Ser. No. ______, of AkihikoToyoshima, for SYSTEM, METHOD AND APPARATUS FOR EBEDDED FIRMWARE CODEUPDATE, filed concurrent herewith (Sony IPD 50R4257.07); and U.S. patentapplication Ser. No. 09/928,582, of Baranowski, et al.; for WIRELESSMODULE, filed Aug. 13, 2001 (Sony IPD 50N3390); and Provisional PatentApplication Serial No. 60/240,001; of Juan, et al, for PORTABLE WIRELESSMODEM, filed Oct. 13, 2000 (Sony IPD 50P4257), the benefit whosepriority date is hereby claimed.

COPYRIGHT NOTICE

[0002] A portion of the disclosure of this patent document containsmaterial which is subject to copyright protection. The copyright ownerhas no objection to the facsimile reproduction of the patent document orthe patent disclosure, as it appears in the Patent and Trademark Officepatent file or records, but otherwise reserves all copyright rightswhatsoever.

FIELD OF THE INVENTION

[0003] This invention relates generally to the field of removable datastorage devices. More particularly, this invention relates to a securitysystem and method for a data storage and wireless transmission module.

BACKGROUND OF THE INVENTION

[0004] The need for portability of data has increased over the years,and has spurred the development of removable memory devices. Forexample, Memory Stick™ is a removable data storage device made by SonyCorporation and is a recordable integrated circuit (IC) digital storagedevice having a storage capacity greater than a standard 3.5 inch floppydisk. Most importantly, Memory Stick™ is smaller than a stick of gum,very lightweight, and therefore ultra-portable. However, the need foraccessability to people, information, and data has also increased andspurred the creation of an ultra-portable accessability device.

[0005] A wireless module which provides accessability and portability toperipheral devices without increasing their cost or exceeding theirrelated space limitations is so provided in a co-pending patentapplication Ser. No. ______, (Sony IPD 50R4257.01) entitled SYSTEM ANDMETHOD FOR ACTIVATION OF A WIRELESS MODULE; and U.S. patent applicationSer. No. 09/928,582, of Baranowski, et al.; for WIRELESS MODULE, filedAug. 13, 2001 (Sony IPD 50N3390). In these co-pending patentapplications, the wireless module described can be shared with any typeof peripheral device which supports such an interface. If the wirelessmodule described is lost or stolen, it could be easily used for illegalpurposes and for the perpetration of any crime.

SUMMARY OF THE INVENTION

[0006] In view of the foregoing, a security system for a wireless moduleis provided to prevent the unauthorized and illegal use of the wirelessmodule.

[0007] In particular, the wireless module, in one embodiment is providedwith security data. In one embodiment, the security data is stored tothe wireless module and is provided to the user of the wireless moduleduring initialization and establishment of a wireless module accountwith an activation center. In another embodiment, the security data isprovided to any number of peripheral devices which utilize the removablewireless module. In a further embodiment, the security data along with acomplete electronic serial number (ESN) is provided to any number ofperipheral devices which utilize the wireless module for a furthersecurity measure. In yet another embodiment, the wireless module obtainsand stores peripheral device data from the peripheral devices which areprovided with the security data.

[0008] These and other features and advantages of the invention will beunderstood upon the consideration of the following detailed descriptionof the invention and accompanying drawings. The features of theinvention believed to be novel are set forth with particularity in theappended claims. The invention itself however, both as to organizationand method of operation, together with further objects and advantagesthereof, may be best understood by reference to the followingdescription taken in conjunction with the accompanying drawing.

BRIEF DESCRIPTION OF THE DRAWING

[0009] The following detailed description, given by way of example, andnot intended to limit the present invention solely thereto, will best beunderstood in conjunction with the accompanying drawings in which:

[0010]FIG. 1 is a block diagram of one embodiment of a wireless module.

[0011]FIG. 2 is a flow diagram illustrating the steps of one embodimentof a method for providing security to the wireless module.

[0012]FIG. 3 is a flow diagram illustrating the steps of one embodimentof a method for providing security to the wireless module by matchingsecurity data.

[0013]FIG. 4 is a flow diagram illustrating the steps of anotherembodiment of a method for providing security to the wireless module bymatching some combination of security data.

DETAILED DESCRIPTION OF THE INVENTION

[0014] While the present invention has been particularly shown anddescribed with reference to an embodiment(s), it will be understood thatvarious changes and modifications may be made without departing from thespirit and scope of this invention. It is intended that the appendedclaims be interpreted to cover the embodiments described herein and allequivalents thereto.

[0015]FIG. 1 depicts one embodiment of a wireless module 100 whichincludes an antenna 10 connected to a transceiver circuit 20.Transceiver circuit 20 includes a duplexer 30, a transmitter 40, and areceiver 50. Transmitter 40 and receiver 50 of transceiver circuit 20are connected to a baseband signal processor circuit 60. Baseband signalprocessor circuit 60 is connected to a microprocessor 70. Memories 80and an interface input/output (I/O) 90 are also connected tomicroprocessor 70. A host or peripheral unit/device 150 is connected towireless module 200 through interface I/O 90.

[0016] In operation, wireless module 100 receives a signal(s) containingdata packets through antenna 10 and forwards the received signals anddata packets to duplexer 30, through receiver 50, and to baseband signalprocessor circuit 60. The data packets/received signals will then beforwarded to microprocessor 70 and through interface I/O 90 toperipheral device/host 150. For example, host/peripheral device 150 maybe a PC, laptop, PDA, wireless telephone, or any other type of device orunit which can handle the data packets/received signals. Wireless module100 receives and transmits data packets/received signals utilizing atleast one wireless format selected from the group consisting of CDMAONE, CDMA 2000 1×, CDMA 2000 3×, CDMA 1× EV, Wideband CDMA, GSM, GPRSand EDGE. In case peripheral device/host 150 engages in simultaneoustransmission and reception of data packets, duplexer 30 and memories 80are utilized.

[0017]FIG. 2 shows a flow diagram 200 illustrating the steps of oneembodiment of a method for providing security to wireless module 100(shown in FIG. 1). The first step of the method for providing securityto wireless module 100 includes an activation process 210 after whichsecurity data (not shown) is provided to wireless module 100. In oneembodiment, the security data includes a security code (not shown). Step220 illustrates the issuing of the security code after wireless module100 has been activated. Flow diagram 200 further illustrates theencrypting of the security code in step 230 prior to issuing thesecurity code through wireless transmission to wireless module 100 anddecrypting the security code in step 240 prior to storing the securitycode.

[0018] Step 250 illustrates one embodiment of the method for providingsecurity to wireless module 100 by storing the security code insidewireless module 100. Flow diagram 200 illustrates the conclusion to oneembodiment of the method for providing security to wireless module 100by step 260 where the security code is notified to a user (not shown).In another embodiment, the method for providing security to wirelessmodule 100 provides that the security code is also stored inside/to aperipheral device (not shown). When the security code is also storedinside the peripheral device, step 260 may be eliminated.

[0019]FIG. 3 shows a flow diagram 300 illustrating the steps of oneembodiment of a method for providing security to wireless module 100(shown in FIG. 1) by matching security data. Once the user of theperipheral device is notified of the security code, step 310 requiresthe user to input the security code into the peripheral device in orderto have authorized access for the utilization of wireless module 100. Ifthe security code input by the user into the peripheral device matchesthe security code stored in wireless module 100 then step 320illustrates that authorized access for the utilization of wirelessmodule 100 is granted. If the security code input by the user into theperipheral device does not match the security code stored in wirelessmodule 100 then step 330 illustrates that the process for authorizedaccess for the utilization of wireless module 100 fails and access isnot granted. In another embodiment, the security code is also storedinside the peripheral device so that once the wireless module 100 is inelectronic data communication with the peripheral device the separatelystored security codes may be automatically compared and the user's inputnot required, as a further option.

[0020]FIG. 4 shows a flow diagram 400 illustrating the steps of anotherembodiment of a method for providing security to wireless module 100(shown in FIG. 1) by matching some combination of security data. Inanother embodiment, wireless module 100 is provided with a completeelectronic serial number (not shown) which is stored inside theperipheral device as a security measure. Once the user of the peripheraldevice is notified of the security code, step 410 requires the user toinput the security code into the peripheral device in order to haveauthorized access for the utilization of wireless module 100. If thesecurity code input by the user into the peripheral device matches thesecurity code stored in wireless module 100 then step 420 illustratesthat a further security combination process is performed. If theelectronic serial number stored in the peripheral device matches theelectronic serial number of wireless module 100 then step 430illustrates that the process for authorized access for the utilizationof wireless module 100 is granted. However, if the security code inputby the user into the peripheral device does not match the security codestored in wireless module 100 then step 440 illustrates that the processfor authorized access for the utilization of wireless module 100 failsand no further step is taken.

[0021] Flow diagram 400 illustrates the conclusion to another embodimentof the method for providing security to wireless module 100 by step 450where the electronic serial number stored in the peripheral device doesnot match the electronic serial number of wireless module 100, then theprocess for authorized access for the utilization of wireless module 100fails and access is not granted. In a further embodiment, the method forproviding security to wireless module 100 by matching some combinationof security data provides the peripheral device with peripheral devicedata (not shown) and stores the peripheral device data to wirelessmodule 100. When the peripheral device data is also stored insidewireless module 100, step 420 may be further extended such that once theelectronic serial number stored in the peripheral device matches theelectronic serial number of wireless module 100 and the peripheraldevice data stored in wireless module 100 matches the peripheral devicedata of the peripheral device, then step 430 illustrates that theprocess for authorized access for the utilization of wireless module 100is granted.

[0022] In yet another embodiment, the security code is also storedinside the peripheral device so that once the wireless module 100 is inelectronic data communication with the peripheral device the separatelystored security codes may be automatically compared and the user's inputnot required which eliminates step 410 and triggers automatic securitycombination process as illustrated by step 420, as a further optionwhich may be specified by the user.

[0023] In order to provide security to wireless module 100, a wirelessmodule activation server (not shown) includes at least one useractivation web site (not shown) utilized to transmit security dataduring the activation process (not shown). The wireless moduleactivation server may also be utilized to automatically and/or remotelyactivate and deactivate wireless module 100 in the event of a loss,theft, or a failure of any one of the methods for providing security towireless module 100. The user activation web site is in electronic datacommunication with wireless module 100 and the peripheral device, andmay also store the security data in connection to a wireless moduleaccount (not shown).

[0024] Wireless module 100 may store any embodiment of the security datato any number of user authorized peripheral devices.

[0025] Thus it is apparent that in accordance with the presentinvention, an apparatus that fully satisfies the objectives, aims andadvantages is set forth above. While the invention has been described inconjunction with specific embodiments, it is evident that manyalternatives, modifications, permutations and variations will becomeapparent to those skilled in the art in light of the foregoingdescription. Accordingly, it is intended that the present inventionembrace all such alternatives, modifications and variations as fallwithin the scope of the appended claims.

What is claimed is:
 1. A method for providing security to a wirelessmodule, said method comprising providing security data to the wirelessmodule.
 2. A method for providing security to a wireless module asrecited in claim 1, wherein providing security data comprises providinga security code to the wireless module after the wireless module hasbeen activated.
 3. A method for providing security to a wireless moduleas recited in claim 2, wherein providing a security code to the wirelessmodule comprises: encrypting said security code; issuing said securitycode through wireless transmission to the wireless module; anddecrypting said security code.
 4. A method for providing security to awireless module as recited in claim 3, further comprising storing saidsecurity code.
 5. A method for providing security to a wireless moduleas recited in claim 4, wherein storing said security code comprisesstoring said security code to the wireless module.
 6. A method forproviding security to a wireless module as recited in claim 4, whereinstoring said security code comprises storing said security code to aperipheral device.
 7. A method for providing security to a wirelessmodule as recited in claim 5, wherein storing said security code furthercomprises storing said security code to a peripheral device.
 8. A methodfor providing security to a wireless module as recited in claim 7,further comprising: providing the wireless module with an electronicserial number; and storing said electronic serial number to saidperipheral device.
 9. A method for providing security to a wirelessmodule as recited in claim 7, further comprising: providing saidperipheral device with peripheral device data; and storing saidperipheral device data to the wireless module.
 10. A method forproviding security to a wireless module as recited in claim 8, furthercomprising: providing said peripheral device with peripheral devicedata; and storing said peripheral device data to the wireless module.11. A method for providing security to a wireless module as recited inclaim 2, further comprising notifying a user of a peripheral device ofsaid security code.
 12. A method for providing security to a wirelessmodule as recited in claim 11, further comprising requiring at least oneinput of said security code into said peripheral device by said user.13. A security system for a wireless module, said system comprising: awireless module configured to receive security data; and at least oneperipheral device in electronic data communication with said wirelessmodule, said peripheral device configured to receive said security dataand transmit peripheral device data.
 14. A security system for awireless module as recited in claim 13, wherein said security datacomprises a security code, said wireless module configured to store saidsecurity code.
 15. A security system for a wireless module as recited inclaim 13, wherein said wireless module comprises an electronic serialnumber, said peripheral device configured to store said electronicserial number.
 16. A security system for a wireless module as recited inclaim 14, wherein said wireless module is further configured to storesaid peripheral device data.
 17. A security system for a wireless moduleas recited in claim 14, wherein said wireless module comprises anelectronic serial number, said peripheral device configured to storesaid electronic serial number and said security code.
 18. A wirelessmodule activation server comprising at least one user activation website configured to transmit security data.
 19. A wireless moduleactivation server as recited in claim 18, wherein said user activationweb site is configured to activate and deactivate a wireless module. 20.A wireless module activation server as recited in claim 18, wherein saiduser activation web site is configured to be in electronic datacommunication with a wireless module configured to store said securitydata.
 21. A wireless module activation server as recited in claim 18,wherein said user activation web site is configured to be in electronicdata communication with a peripheral device configured to store saidsecurity data.
 22. A wireless module activation server as recited inclaim 18, wherein said user activation web site is in electronic datacommunication with at least one wireless module account.
 23. A wirelessmodule comprising an electronic serial number, said wireless moduleconfigured to be in electronic data communication with at least oneperipheral device, said wireless module further configured to store saidelectronic serial number to at least one peripheral device.
 24. Awireless module as recited in claim 23, further comprising securitydata.
 25. A wireless module as recited in claim 24, wherein saidwireless module is configured to store said security data within saidperipheral device.