Cell phone feature for downloading information via a telecommunications network

ABSTRACT

The present invention permits safeguarding of private data entered into a memory chip of a cell phone by permitting the cell phone owner to erase the data in a lost or stolen phone, using an preset erase code and erase command in the cell phone or the network base station, and disabling or erasing circuitry on the memory chip, preferably an EEPROM chip. Further, a user of the cell phone may obtain information of a person or entity, via a cellular communications network, by dialing a directory assistance number and requesting information associated with the name of the person or entity the user has requested information of. The information may be provided to the user in the form of a vcard and may include, among other information, telephone and facsimile numbers, mailing addresses, instant messaging addresses, maps or directions, digital photos or videos, and the like.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of U.S. patent applicationSer. No. 10/405,348, filed Apr. 1, 2003 now U.S. Pat. No. 7,054,624,which claims the benefit of U.S. Provisional Patent Application No.60/369,431, filed Apr. 2, 2002.

FIELD OF THE INVENTION

The present invention is directed to cell phones with memory, and to amethod and apparatus for safeguarding the private, owner informationentered into the cell phone memory, and to the use of atelecommunications network to remotely erase cell phone memory. Thepresent invention is also directed at obtaining information (e.g. e-mailaddress, instant messaging address, mailing address, etc.) associatedwith the name of a person or entity, by dialing a directory assistancenumber on a cellular communications network.

BACKGROUND OF THE INVENTION

Modern telecommunications networks include mobile stations, such as cellphones, which utilize a SMARTCARD which includes a SIM (subscriberidentity module). The SIM's have a memory chip that contains data suchas the identity of the card holder (i.e., the service subscriber),billing information, and home location. When a cell phone user places acall, the SIM communicates the unique SIM code to the network. Thenetwork checks to see if the SIM code owner is a current subscriber tothe network service, often by matching the SIM code with a list ofauthorized SIM codes. This authentication, or matching of SIM codesgenerally precedes all other network communication with the cell phone.

SMARTCARDS were developed to allow cell phone activities other thansimple telephone calls. The SMARTCARD can contain microprocessors for,e.g., transaction management data encryption and user authentication.The SMARTCARD or the SIM may include subscriber entered telephonenumbers and other valuable information. Theft of the phone places thisvaluable information in the hands of others. In fact, the loss of thephone is probably less important than the loss of the valuableinformation contained therein. This is especially true for the new cellphones which now access the Internet, and for cell phones coupled withhandheld computing devices which browse the Internet, store Power Pointpresentations, and do rudimentary word processing, as well as schedulingappointments and maintaining expense accounts.

Many security features have been developed for cell phones. Most ofthese are related to prevention of theft of communication services bypermanently disabling a stolen phone, temporarily disabling a phone forwhich the subscriber is in arrears, or blocking calls to geographicalregions which are not part of the subscriber's contract.

U.S. Pat. No. 5,898,783 discloses a telecommunications network withdisabling circuitry which can disable the SMARTCARD of the cell phone ofa particular subscriber. The disable command can permanentlyincapacitate the SMARTCARD by destroying the power connection for thelogic circuitry, or temporarily incapacitate the logic circuitry byerasing the memory within the card. According to this patent, thenumbers of stolen phones can be reported to the network and entered intoa database which is searched when any cell phone requests service, and adisable command or signal returned to the cell phone if its number is inthe disable database. In the present invention, the subscriber erasesthe memory containing the private information without the additionalsteps and involvement of the network, giving the subscriber greaterfreedom and opportunity to safeguard their private information.

U.S. Pat. No. 5,734,978 describes a telecommunications system having amanufacturer preset destruct code stored in each cell phone. When asubscriber reports a phone stolen, the network's base station controllerinitiates a destruct program, using the destruct code. The destruct codedestroys the data necessary for performing the telephone functions, butnot the private data.

U.S. Pat. No. 6,259,908 describes a cellular phone system in which alocking code on a particular cell phone may be erased by means of amessage transmitted through the cell phone system, but may not be erasedor changed using the keyboard features of that phone. This arrangementhas particular usefulness in a designated cellular system with manyunits, such as a communications network for the fire department of alarge city. To set up or reconfigure the network, the entire networkmust be activated and the individual units (cell phones) assigned aparticular number. According to the patent, all phones on the systemhave a locking code to prevent theft communications on the network untilall units are assigned. This is a subscriber system approach topreventing theft of service of the communications system, and does notrelate to the privacy of data of individual subscribers.

SUMMARY OF THE INVENTION

It is an object of the present invention to safeguard the private dataentered into a cell phone by its owner, by permitting the owner to eraseor destroy that data using an on-air signal. According to the presentinvention the memory chip of a cellular phone on which private data isrecorded may be provided with an erase means. This erase means couldcomprise a fuse, switch, or similar device in a disable, or erase,circuit. The erase means executes an erase command on receiving anon-air erase code which matches the erase code preset by the owner. Ifthe mobile phone is lost or stolen, the owner need only call thetelephone number of the lost or stolen phone and enter the erase code.The private data will be erased. Thus, the owner can protect the phonenumbers and the addresses of family, friends and associates If the ownerbelieves the phone has been misplaced, he can destroy the privateinformation without disabling the telephone features, should the missingphone be found.

It is also an object of the present invention to maintain the privacyand integrity of the cell phone owner's data, as well as to facilitateits transfer to a new cell phone. The integrity of the private data canbe maintained with a novel recharging cradle or station. According tothe present invention, the cell phone recharging cradle or station mayincorporate a slot for a memory device, such as a PCMCIA card, whichcommunicates with a phone docked in the cradle. Every time the phone isplaced in the cradle for recharging the PCMCIA card does a check sum ofthe phone's memory. If numbers or other data have been entered into thephone, the card downloads that information so that the card is alwaysupdated. When a new phone is charged in the base station, the check sumis started, and all private data entered into the previous phone isautomatically uploaded into your new phone. Using this system, if theuser does not want anyone else to have access to their numbers they maysimply remove the PCMCIA card from the phone. Also, a backup card can beeasily carried in a wallet, when traveling.

It is also an object of the present invention to provide a method ofobtaining information associated with the name of a person or entity viaa cellular network. According to this aspect of the invention, a user ofa mobile telecommunications apparatus dials a directory assistancetelephone number and requests information associated with a name of aperson or entity from a wireless network operating center. Uponreceiving the request for information, an operator at the wirelessnetwork operating center uses the name of the person or entity toretrieve information associated with the person or entity from aninformation database. As explained in more detail, the informationretrieved from the information database may include one or more of thefollowing: telephone and/or facsimile numbers, mailing addresses,instant messaging addresses, maps and/or directions, digital photos,digital video, etc. After retrieving the information from theinformation database, the wireless network operating center transmits adata message (e.g. a text message) containing the retrieved informationto the mobile communications device. The information received by themobile telecommunications apparatus is then allowed to permanently storethe information, e.g., in the form of a virtual business card (“vcard”).

These objects, as well as other objects which will become apparent fromthe discussion that follows are achieved, in accordance with the presentinvention which comprises a cell phone programmable memory chip witherase means; a recharging cradle with slot for, e.g., a PCMCIA card,which can upload data from, or download data into, a cell phone dockedtherein; and a cell phone apparatus with a) first memory for storing theunique identification numbers of the apparatus b) transmitting/receptionmeans for transmitting and receiving a call in accordance with saididentification numbers, c) an EEPROM with a programmable data base fordata, and a predetermined address (or memory location) for an erasecode, d) means for entering erase code at the predetermined location,and e) erasing means for erasing said database on receipt of the erasecode.

These objects are also achieved by the method of the present invention,for safeguarding private data stored in a selected cell phone on amobile telecommunications system which comprises a plurality ofindividual mobile cell phone apparatus and a mobile telephone switchingoffice, said at least one selected apparatus having a PROM for storingprivate data including an erase code, and a unique telephone number,said method comprising receiving at the selected mobile phone apparatusfrom the switching network, a message containing the erase code from theswitching network, and erasing the private data.

For a full understanding of the present invention, reference should flowbe made to the following detailed description of the preferredembodiments of the invention as illustrated in the accompanyingdrawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a cell phone, or mobile telecommunications apparatus,and the SMARTCARD that is received therein, which cooperates with thecell phone to effect communication with a telecommunications network.

FIG. 2 illustrates a block diagram of a SMARTCARD according to theprinciples of the present invention.

FIG. 3 illustrates a block diagram of a telecommunications networkcapable of communicating with a plurality of cell phones that cooperatewith a SMARTCARD to effect communication with the telecommunicationsnetwork.

FIG. 4 illustrates a block diagram of a cell phone recharging cradleaccording to one embodiment of the invention.

FIG. 5 is a block diagram illustrating obtaining information of a personor entity, via a cellular communications network, by dialing a directoryassistance number and requesting information associated with the name ofthe person or entity the user has requested information of.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

The preferred embodiments of the present invention will now be describedwith reference to FIGS. 1-4 of the drawings. Identical elements in thevarious figures are designated with the same reference numerals.

As shown in FIG. 1, the cell phone 10 receives the SMARTCARD 11 whichcooperates with the cell phone to effect communication with atelecommunications network, such as that illustrated in FIG. 3. TheSMARTCARD, includes a SIM (subscriber identity module). The SMARTCARDidentifies the user of the telecommunications system, and serves toauthenticate the user as one permitted on the network. The SMARTCARD mayalso encrypt communications between the cell phone 10 and thetelecommunications network. The alphanumeric keys, 12 of the cell phonemay be used to enter information into the cell phone memory, and are thepreferred means for entering the erase code.

The elements of the SMARTCARD illustrated in FIG. 2, include a datacommunications circuitry, a logic circuitry and a disabling, or erasing,circuitry. The data communications circuitry 20, transmits a codeuniquely identifying the SMARTCARD. The logic circuitry, 21, in thepresent embodiment includes data processing and storage circuitry andinterconnecting circuitry including, without limitation, a processor,memory, support circuitry, and any address, data and control buses (notshown). In one embodiment of the present invention the logic circuitryencrypts communication between the cell phone and the telecommunicationsnetwork. As cell phones develop, the logic circuitry may be used toperform more and more functions, without effecting the features of thelogic circuitry essential to the present invention.

The card is provided with disabling circuitry, 22, which can e.g.,permanently erase the memory of the card. The disabling circuitry maycomprise either a fuse or a switch, which operates to e.g. decouple theelectrical power from the memory in card. Other means of effectivelyerasing the memory are known to those in the art, as by providing anexcessive voltage that causes the memory to malfunction, even if it isstill receiving power, or permanently incapacitating the logic circuitryby cutting it off from its source of power.

A block diagram of the telecommunications network is illustrated in FIG.3. The telecommunications network, 30 is capable of communication with aPlurality of cell phones 10 with cards, 11, having a subscriber identitymodule. Each card has a unique SIM code. Upon initiation of access tothe network, the SIM code is transmitted to the network. The network, 30has data communications circuitry, 31, to receive the SIM code. In oneembodiment of the invention, the network may also include a PROM or anEEPROM for receiving and storing an erase code associated with a UniqueSIM code. In another embodiment of the invention, the data communicationcircuitry, 31, may also include an erase command.

The operation of the method and apparatus of the present invention willnow be described. The user of SMARTCARD may use the alphanumeric keys,12 to enter into, and store in the memory, an erase code to permiterasure of private data in the phone. According to a preferredembodiment of the present invention, the erase code for any selectedcell phone may only be directly entered into the phone, using the keypadfor that phone. The erase code may be stored in memory on the SMARTCARDor may be transferred to, and stored on, the network. The erase code fora particular SMARTCARD or SIM may not be preset or changed by an on-airsignal from a cell phone with a different SIM. The erase command maybeincluded in the data communications circuitry of the card or on thenetwork.

If the cell phone is stolen or lost, the user may, using another cellphone or a land line, call the telephone number of the stolen or lostcell phone, and enter the erase code. The data communications circuitryof the network and the lost phone “matches” the erase code of the on-aircommunication with the preset stored erase code. The “matching” mayinvolve an exact matching of characters, or an exact mapping, requiringa specific relationship, between the preset erase code and the receivederase code. If there is a match, an erase command is issued, and theprivate data in the stolen or lost cell phone is erased. The circuitryfor executing the erase command is in the cell phone.

The present invention does not require a network database of erasecodes, permitting great individual privacy. In addition, the user doesnot need to access disable commands on the network. No database ofdisabled numbers needs to be assembled and maintained by and at thenetwork in order for the user to disable the memory for his privatedata. When the erase code is stored in the cell phone, it is instantlyoperable. In addition it may be instantly changed. The privacy of dataentered into cell phones is of increasing importance. New phonesincorporate Internet text messaging, e-mail, and web surfing anddownloading. Elaborate negotiations may now be conducted via a cellphone. In addition, cell phones are being combined with handheldcomputers and organizers, which contain word processing. Entirecontracts may be recorded, transmitted, or received on a handheldapparatus including a cell phone on a telecommunications network.

FIG. 4 illustrates a preferred embodiment of a recharging cradle, 42,according to the present invention. The cradle includes rechargingcircuitry, 43, which connects to the phone, 10, when the phone is in thedock, as shown in FIG. 4. Also included in the cradle is cell phoneinterface circuitry, 44, which comprises an upload/download cell phonememory device, comprising a micro-controller, 45, which comprises a CPU,a memory, 10 (input output) and the program or application. The programcompares the memory in the phone memory, as shown here as the erasableFLASH/EEPROM/SRAM storage memory, 46, which is part of the presentinvention, with the memory in the cradle, as with a check sum operation;and downloading to the cradle memory any numbers which have been addedto the phone, and uploading to the phone any numbers in the cradlememory which are not in the phone.

As shown in FIG. 4, the recharging cradle may further comprise anupload/download slot, 47, for a back-up cell phone memory device, 48.The slot comprises a micro-controller and interface circuitry incommunication with either the memory in a docked cell phone, or, asshown, with the memory in the cradle. The back-up memory device may beany device suitable for insertion into a new phone, such as a PCMCIAcard. As shown in FIG. 4, this PCMCIA card is provided with an erasablememory.

These back-up devices provide a very convenient means for maintainingthe integrity of private data for the cell phone. If the cell phone isstolen or lost, no time need be taken in an attempt to recover thestored private data, but the private data immediately erased, as aduplicate copy exists in the cradle, and optionally on the back-upPCMCIA. The back-up PCMCIA is easily stored in a wallet, whiletraveling, and may be placed into a new cell phone, or the PCMCIA cardkept in the cradle, and data therein transferred to a new cell phonedocked in the cradle. If the new cell phone has to be initially charged,charging in the cradle with PCMCIA card slot will enter all the privatedata into the new cell phone.

In another aspect of the present invention, a novel recharging cradlefor the cell phone may be provided with an upload/download slot forreceiving an additional memory device or card, such as a PCMCIA card,for maintaining the integrity of private data for the cell phone. Theslot comprises a micro-controller, crystal and interface circuitry,connecting the memory device in the slot and the memory device in thephone. Once placed in the slot, the e.g. PCMCIA card is in communicationwith any cell phone docked in the cradle. On docking the cell phone inthe cradle a check sum may be initiated, and any new data from the cellphone added to the PCMCIA card. Then, should the cell phone be stolen orlost, no time for recovery of the stored private data need be allotted,but the private data immediately erased, as a duplicate copy exists onthe spare PCMCIA. The spare PCMCIA is easily stored in a wallet, whiletraveling, and may be placed into a new cell phone, or the PCMCIA cardkept in the cradle, and data therein transferred to a new cell phonedocked in the cradle. If the new cell phone has to be initially charged,charging in the cradle with PCMCIA card slot will enter all the privatedata into the new cell phone.

According to an embodiment of the present invention, the private datadescribed above and/or other data, e.g., information associated with aperson or entity (e.g. business, organization, or other operation), maycomprise data downloaded from a cellular network service provider, inresponse to a 411, 1-800, or other directory assistance request from themobile telecommunications apparatus 10. According to this embodiment ofthe invention, and as illustrated in FIG. 5, a user of the mobiletelecommunications apparatus 10 calls a directory assistance numberavailable on the cellular network. An operator (human or computerimplemented) answers the call and asks the user for the name of theperson or entity the user desires information of. In response to thename provided, the operator instructs data communications circuitry(and/or software) 50 of the cellular network service provider to accessan information database 52, to retrieve information associated with theperson or entity the mobile telecommunications apparatus user hasrequested information of. The information database 52 may be a databasethat is controlled by the cellular network service provider, or may beany other database controlled by a third party of which the cellularnetwork service provider has been granted access. The retrievedinformation may include, without limitation, the mailing address, e-mailaddress, work address, telephone numbers, facsimile number, instantmessaging address, maps and/or directions (particularly for GPS-equippedmobile telecommunications devices), digital photos, digital video, etc.of the person or entity the user has requested information of.

Once retrieved, the cellular network service provider transmits theinformation, e.g., in the form of a text message (e.g., an short messageservice (SMS) message) to the mobile telecommunications apparatus user.For large amounts of data, e.g., as is commonly encountered with digitalphotos or video, alternative means of transmission, i.e., other thantext messaging may be utilized. For example, Multimedia MessagingService (MMS) or similar transmission standard could be used to transmitsuch types of information.

The information retrieved from the database 52 may then be formatted(e.g., in the form of a virtual business card (“vcard”), as is nowcommonly used to store contact information in e-mail and wirelesscommunication applications) prior to being transmitted to the user.Alternatively, the information may be processed and formatted by anapplication program running on the mobile telecommunications apparatus10, after being received from the provider.

Upon receiving the information contained in the text message, the mobiletelecommunications apparatus 10 causes a prompt to be displayed, theprompt asking the user whether he or she would like to save theinformation permanently. If the user responds “yes”, then theinformation is stored in the FLASH/EEPROM/SRAM 46 or other memory of themobile telecommunications apparatus 10. If the user responds “no”, theinformation is only temporarily stored. Further, the information may bestored in the cradle memory and/or the FLASH/EEPROM storage memory 48 ofa backup memory card 47, similar to that previously described.

Those skilled in the art should understand that while the presentinvention may be embodied in hardware that alternative embodiments mayinclude software or firmware, or combinations thereof. Such embodimentsmay include implementations using conventional processing circuitry suchas, without limitation, programmable array logic (“PAL”), digital signalprocessors (“DPSs”), field programmable gate array (“FPGA”), applicationspecific integrated circuits (“ASICs”), large scale integrated circuits(“LSIs”). Moreover, the present embodiment is introduced forillustrative purposes only and other embodiments that provide a systemfor and method of disabling a SIM card are well within the broad scopeof the present invention. Conventional computer, and processing, systemarchitecture is more fully discussed in Computer Organization andArchitecture, by William Stallings, MacMillan Publishing Co. (3rd ed.1993). Conventional processing system network design is more fullydiscussed in Data Network Design, by Darren L. Spohn, McGraw-Hill, Inc.(1993). Conventional voice and data communications are more fullydiscussed in Data Communications Principles, by R. D. Gitlin, J. F.Hayes and S. B. Weinstein, Plenum Press (1992), The Irwin Handbook ofTelecommunications, by James Harry Green, Irwin Professional Publishing(2nd ed. 1992) and Voice & Data Communications Handbook, by Regis J.Bates, Jr. and Donald Gregory, McGraw-Hill (1996). Conventionalelectronic circuit design is more fully discussed in The Art ofElectronics, by Paul Horowitz and Winfield Hill, Cambridge UniversityPress, (2nd ed. 1989). Conventional control systems and architecturesare discussed in Modern Control Engineering by Katsuhiko Ogata, PrenticeHall 1990. Each of the foregoing publications is incorporated herein byreference.

There has thus been shown and described a novel method and apparatus forboth safeguarding and maintaining the integrity of the private data in acell phone memory, which fulfills all the objects and advantages soughttherefor. Many changes, modifications, variations and other uses andapplications of the subject invention will, however, become apparent tothose skilled in the art after considering this specification and theaccompanying drawings which disclose the preferred embodiments thereof.All such changes, modifications, variations and other uses andapplications which do not depart from the spirit and scope of theinvention are deemed to be covered by the invention, which is to belimited only by the claims which follow.

1. A method of obtaining information associated with the name of aperson or entity over a wireless communications network, comprising:transmitting a request for information associated with a name of aperson or entity to a wireless network operating center, from a mobilecommunications device; receiving a data message transmitted from thewireless network operating center, the data message containinginformation associated with the name of the person or entity, theinformation associated with the name of the person or entity retrievedfrom a database at the wireless network operating center; and formattingthe retrieved information in the form of a virtual business card at themobile communications device, wherein the mobile communications devicecontains circuitry configured to receive a radio frequency signalcontaining an erase code, the erase code originating from acommunications device different from the mobile communications device,and circuitry operable to prevent access to the retrieved information ifthe erase code contained in the received radio frequency signal matchesa preset erase code stored in a memory of the mobile communicationsdevice.
 2. The method according to claim 1, further comprising promptinga user of the mobile communications device as to whether to permanentlystore the formatted retrieved information.
 3. The method according toclaim 1 wherein said data message comprises a text message.
 4. Themethod according to claim 3 wherein said text message is transmittedaccording to the short message service (SMS) standard.
 5. The methodaccording to claim 1 wherein said data message is transmitted accordingto the multimedia message service (MMS) standard.
 6. The methodaccording to claim 1 wherein said retrieved information is informationselected from the group consisting of a mailing address, an e-mailaddress, a work address, one or more telephone numbers, a facsimilenumber, an instant messaging address, a map, a set of directions, one ormore digital photos, a digital video, and combinations thereof.
 7. Anapparatus comprising: a mobile telecommunications device including aprocessor and a memory coupled to the processor, the memory havingstored thereon an application which when executed by the processorcauses the processor to format information associated with a name of aperson or entity as a virtual business card, wherein the mobilecommunications device contains circuitry configured to receive a radiofrequency signal containing an erase code, the erase code originatingfrom a communications device different from the mobile communicationsdevice, and circuitry operable to prevent access to the informationassociated with the name of the person or entity if the erase codecontained in the received radio frequency signal matches a preset erasecode stored in a memory of the mobile communications device.
 8. Theapparatus of claim 7 wherein the information associated with the name ofthe person or entity is retrieved from a database at the wirelessnetwork operating center upon a request from the mobiletelecommunications device.
 9. The apparatus of claim 7 wherein saidinformation is information selected from the group consisting of amailing address, an e-mail address, a work address, one or moretelephone numbers, a facsimile number, an instant messaging address, amap, a set of directions, one or more digital photos, a digital video,and combinations thereof.