Anti-theft protection for a radiotelephony device

ABSTRACT

The invention proposes a method of protecting a mobile radiotelephony device intended for accommodating a user identification module to be able to operate. The invention has for its object to protect such a device against theft.  
     For this purpose, a device in accordance with the invention comprises means for:  
     preventing the use of the device with an identification module other than the user&#39;s,  
     asking the user for a deblocking code after a short time that the device has been inactive and preventing the use of the device if this code has not been supplied.

DESCRIPTION

[0001] 1. Field of the Invention

[0002] The invention relates to a mobile radiotelephony device intended for accommodating a user identification module, said device comprising:

[0003] connecting means for establishing a link between the device and the identification module mounted inside the device,

[0004] blocking means for preventing the normal operation of the device,

[0005] test means for activating the blocking means when the identification module mounted inside the device is not the one that is linked to the device.

[0006] The invention also relates to a method of protecting such a device, and a computer program for implementing such a method.

[0007] The invention notably has applications in the field of portable radiotelephony. Portable radiotelephony devices are intended to accompany their users when they move around. It happens that these devices are lost or stolen.

[0008] 2. Prior Art of the Invention

[0009] U.S. Pat. No. 5,913,175, published Jun. 15, 1999 describes a method of protecting a radiotelephone which permits to avoid that the lost or stolen telephone can be used by a third party with another user identification module. This method comprises establishing a link between the device and a specific user identification module and blocking the normal operation of the device when the user identification module that is placed inside the device is not the one that is linked to the device.

[0010] When the device is lost or stolen with the identification module to which it is linked, the user is to warn the operator so that the use of his identification module is blocked at network level.

[0011] This means that the device can be freely used until the identification module to which it is linked is blocked via the network. This may take a certain period of time.

SUMMARY OF THE INVENTION

[0012] It is notably an object of the invention to resolve this problem. For this purpose, a device in accordance with the invention and as described in the opening paragraph is characterized in that it comprises:

[0013] timing means for activating the blocking means after the device has been inactive for a defined period of time,

[0014] and deblocking means for permitting normal operation of the device when the identification module placed inside the device is the one that is linked to the device and when a deblocking code is supplied by the user.

[0015] Thus, when the device falls into the hands of a third party together with the identification module to which it is linked, it has most probably been inactive for a period of time that is sufficiently long for its normal operation to be blocked (advantageously, the inactive time after which the blocking means are activated is of the order of several minutes). The device cannot thus be used without the deblocking code being supplied.

[0016] Thanks to the invention the lost or stolen device becomes totally unusable. A fraudulent person cannot send communications at the cost of the owner of the device. But neither can he use the device with another identification module. The theft of the device becomes totally useless. The invention thus forms a protection against theft.

[0017] In a particularly simple embodiment, the connecting means comprise reading means and storage means of a data stored in the identification module, and the test means compare the thus stored data with the data stored in the identification module which is places inside the device. The data stored is formed, for example, by the international identification number IMSI which is contained in the identification module (compare standards relating to the GSM radiotelephony systems). Thus, the identification module is automatically linked to the device without the intervention of the user, more particularly without the fact that a specific code has to be entered.

[0018] Advantageously the deblocking code, which is to be supplied to return to the normal operating mode, is formed by the pin code (Personal Identity Number) which is contained in the identification module (compare standards relating to the GSM radiotelephony systems). Thus the user need not store an additional code to ensure the protection of his device.

BRIEF DESCRIPTION OF THE DRAWINGS

[0019] These and other aspects of the invention are apparent from and will be elucidated, by way of non-limitative example, with reference to the embodiment(s) described hereinafter.

[0020] In the drawings:

[0021]FIG. 1 represents a device in accordance with the invention,

[0022]FIG. 2 represents an overall electric diagram of the device of FIG. 1, and

[0023]FIG. 3 represents a flow chart explaining the operation of the device of FIG. 1.

DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION

[0024] In FIG. 1 is represented an electronic device in accordance with the invention. In the example described here this device is a portable radiotelephone of the type used in cellular systems. It notably comprises a microphone 5, a loudspeaker 6, a screen 8, a keypad 9 and an antenna 11. The device 1 also comprises a housing 12 intended for accommodating a user identification module 13. In the example of embodiment described here, this identification module 13 is a portable card of an integrated circuit in which information is stored, notably an international identification number currently called IMSI number, and a Personal Identification Number currently called PIN code.

[0025]FIG. 2 shows the overall electrical diagram of this device. The operation of the device is, in essence, controlled by a microprocessor assembly 20 which comprises a microprocessor 22 to which are associated a random access memory 24 and a read-only memory 26. This assembly is connected to a man-machine interface 30 via a common line 32. This man-machine interface 32 controls the screen 8 and the keypad 9. The common line 32 also connects the microprocessor assembly 20 to a transceiver assembly 35 via an interface circuit 38. The transceiver assembly is connected to the antenna 11. Finally, the common line 32 also connects the microprocessor assembly 20 to a card reader 39.

[0026] In FIG. 3 is represented a function flow chart of a device in accordance with the invention. This flow chart starts at box K1. In box K1 the device is in a state of availability, that is to say that the user has access to all the functions of the device. The user has the choice of either or not locking his device. This locking (L)/unlocking (UL) is done by accessing a configuration menu of the device. When the user locks his device (box K2), the identification module that is inside the device is automatically linked to the device. For this purpose, the device starts reading a data D1 in the identification module (for example, the international identification number IMSI) and he stores it in the random-access memory 24. Once locked, the device remains in the state of availability indicated in box K1. When the device is in the state of availability, one looks whether it is locked (box K3). If it is not locked (arrow N3), the device remains in the state of availability indicated in box K1. If it is locked (arrow Y3), one looks whether the identification module which is placed inside the device is the one that is linked to the device (box K4).

[0027] If the identification module, which is placed inside the device, is not the one that is linked to the device (arrow N4), the device goes to a first blocking state indicated in box K5. In this first blocking state, the device is disconnected from the network. Thus it can no longer receive an incoming call nor transmit an outgoing call (possibly with the exception of emergency numbers). In the blocking state K5, the screen shows a message inviting the user to insert the proper module into the device. And when the user inserts a new module, one looks whether this new identification module is the one that is connected to the device (box K7). If this is the case (arrow Y7), the device is reconnected to the network in accordance with the normal procedure (box K8) and then the device returns to the state of availability indicated in box K1. If not (arrow N7), the operation is resumed in box K5. The only way of leaving this first blocking state is thus to place the identification module that is linked to the device inside the device.

[0028] If the identification module that is placed inside the device is linked to the device (arrow Y4), one looks whether the device has remained in the state of availability for a certain period of time T of the order of several minutes, for example (box K10). If this is not the case (arrow N10), the device remains in the state of availability indicated in box K1. If this is the case (arrow Y10), the device passes on to a second blocking state indicated in box K11 by passing through an initialization step K12 which permits to initialize a variable A which represents the number of attempts made at supplying a deblocking code (for example, the Personal Identification Number) PIN.

[0029] In this second blocking state the device only processes incoming calls (box K13) and, possibly, the outgoing calls that correspond to emergency numbers (box K14). Once these calls have been processed, the device goes back to the second blocking state indicated in box K11. In the second blocking state K11 a message inviting the user to supply a deblocking code is displayed on the screen. If the code taken by the user is recognized (arrow Y11), the device goes back to the state of availability indicated in box K1. If it is not recognized (arrow N11), the value of the variable A is tested (box K15). If this value is lower than a certain figure (for example 3), the value of A is augmented by unity (box K16) and a message is displayed on the screen to indicate the user that the code is not valid (box K17). Then the device goes back to the second blocking state indicated in box K11. If the variable A is higher than or equal to said figure, the test of box K15 causes the total blocking of the device indicated in box K30. To leave this third blocking state it is necessary to contact the organization that provides the identification module. One is then again in the state of availability K1.

[0030] In another embodiment of the invention, when the user locks the telephone, the device asks for the user's name. The name given by the user is stored in the random access memory 24 of the device. When the identification module that is inside the device is not the one that is linked to the device, the device displays the name of the user before asking him to insert his identification module as indicated in box K5. The device also displays the name of the user before asking him to supply his personal code as indicated in box K11.

[0031] The embodiment that has just been described is particularly effective, because it provides two separate blocking modes depending on whether the identification module that is placed inside the device is either or not linked to the device. The first blocking mode is applied in the case where the device has been lost or stolen. The object is then to prevent the device being usable with another identification module. It thus advantageously blocks the incoming and outgoing calls at the same time. The second blocking mode is applied in the case where the identification module that is linked to the device is in its place inside the device and the device is in a state of availability. The object is to prevent a third party being able to send outgoing calls with this device if it is lost, stolen or left without attendance for some time. In that case, it is desirable for the user to be able to continue to directly receive his incoming calls.

[0032] In another embodiment the same blocking means are used as the identification module which is placed inside the device either or not linked to the device, for example, the second blocking means. In that case it is possible for receiving incoming calls intended for the identification module that is inside the device, even when this identification module placed inside the device is not linked to the device. 

1. A mobile radiotelephony device intended for accommodating a user identification module, said device comprising: connecting means for establishing a link between the device and the identification module mounted inside the device, blocking means for preventing the normal operation of the device, test means for activating the blocking means when the identification module mounted inside the device is not the one that is linked to the device, characterized in that it comprises: timing means for activating the blocking means after the device has been inactive for a defined period of time, and deblocking means for permitting normal operation of the device when the identification module placed inside the device is the one that is linked to the device and when a deblocking code is supplied by the user.
 2. A device as claimed in claim 1 , characterized in that said blocking means comprise first blocking means for preventing the transmission and reception of calls when the identification module placed inside the device is not the one that is linked to the device, and second blocking means for preventing the sending of calls after a defined period of time during which the device has been inactive, with the exception of one or various emergency numbers.
 3. A device as claimed in claim 1 , characterized in that it comprises locking/unlocking means for locking/unlocking the device, while said blocking means can only be activated when the device is locked, and said link is established while the device is being locked.
 4. A device as claimed in claim 1 , characterized in that said connecting means comprise means for reading and storing a data stored in the identification module, and in that said test means compare this data thus stored with the data stored in the identification module that is placed inside the device.
 5. A device as claimed in claim 3 , characterized in that said data is formed by the international identification number stored in the user identification module.
 6. A device as claimed in claim 1 , characterized in that said deblocking code is formed by the personal identification number stored in the identification module.
 7. A method of protecting a mobile radiotelephony device intended for accommodating a user identification module, said method comprising the following steps: setting up a link between the device and the identification module placed inside the device, testing to verify whether the identification module placed inside the device is the one that is linked to the device, blocking the normal operation of the device when the identification module placed inside the device is not the one that is linked to the device, characterized in that it comprises the following steps: detection of a period of inactivity of the device, blocking of the normal operation of the device when said period of inactivity has been detected, deblocking which permits the normal operation of the device when the identification module placed inside the device is the one that is linked to the device and when a deblocking code has been supplied by the user.
 8. A method as claimed in claim 6 of protecting a mobile radiotelephony device, characterized in that it comprises a step of locking the device, while the blocking steps can only be executed when the device is locked, and the step of establishing a link between the device and the identification module placed inside the device is executed when the device is locked.
 9. A method as claimed in claim 6 of protecting a mobile radiotelephony device, characterized in that the step of establishing a link between the device and the identification module placed inside the device comprises a step of reading and storing a data stored in said identification module, and in that the test step comprises comparing the data thus stored with the data stored in the identification module that is placed inside the device.
 10. A computer program comprising means for implementing a method as claimed in claim 7 of protecting a mobile radiotelephony device. 