US20090021346A1 - Wireless module security system and method - Google Patents

Wireless module security system and method Download PDF

Info

Publication number
US20090021346A1
US20090021346A1 US12/190,756 US19075608A US2009021346A1 US 20090021346 A1 US20090021346 A1 US 20090021346A1 US 19075608 A US19075608 A US 19075608A US 2009021346 A1 US2009021346 A1 US 2009021346A1
Authority
US
United States
Prior art keywords
wireless module
security
peripheral device
data
recited
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/190,756
Inventor
Akihiko Toyoshima
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Sony Electronics Inc
Original Assignee
Sony Corp
Sony Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp, Sony Electronics Inc filed Critical Sony Corp
Priority to US12/190,756 priority Critical patent/US20090021346A1/en
Assigned to SONY ELECTRONICS INC., SONY CORPORATION reassignment SONY ELECTRONICS INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TOYOSHIMA, AKIHIKO
Publication of US20090021346A1 publication Critical patent/US20090021346A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3816Mechanical arrangements for accommodating identification devices, e.g. cards or chips; with connectors for programming identification devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72445User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting Internet browser applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • This invention relates generally to the field of removable data storage devices. More particularly, this invention relates to a security system and method for a data storage and wireless transmission module.
  • Memory StickTM is a removable data storage device made by Sony Corporation and is a recordable integrated circuit (IC) digital storage device having a storage capacity greater than a standard 3.5 inch floppy disk. Most importantly, Memory StickTM is smaller than a stick of gum, very lightweight, and therefore ultra-portable. However, the need for accessability to people, information, and data has also increased and spurred the creation of an ultra-portable accessability device.
  • IC integrated circuit
  • a wireless module which provides accessability and portability to peripheral devices without increasing their cost or exceeding their related space limitations is so provided in a co-pending patent application Ser. No. ______ (Sony IPD 50R4257.01) entitled SYSTEM AND METHOD FOR ACTIVATION OF A WIRELESS MODULE; and U.S. patent application Ser. No. 09/928,582, of Baranowski, et al.; for WIRELESS MODULE, filed Aug. 13, 2001 (Sony IPD 50N3390).
  • the wireless module described can be shared with any type of peripheral device which supports such an interface. If the wireless module described is lost or stolen, it could be easily used for illegal purposes and for the perpetration of any crime.
  • a security system for a wireless module is provided to prevent the unauthorized and illegal use of the wireless module.
  • the wireless module in one embodiment is provided with security data.
  • the security data is stored to the wireless module and is provided to the user of the wireless module during initialization and establishment of a wireless module account with an activation center.
  • the security data is provided to any number of peripheral devices which utilize the removable wireless module.
  • the security data along with a complete electronic serial number (ESN) is provided to any number of peripheral devices which utilize the wireless module for a further security measure.
  • the wireless module obtains and stores peripheral device data from the peripheral devices which are provided with the security data.
  • FIG. 1 is a block diagram of one embodiment of a wireless module.
  • FIG. 2 is a flow diagram illustrating the steps of one embodiment, of a method for providing security to the wireless module.
  • FIG. 3 is a flow diagram illustrating the steps of one embodiment of a method for providing security to the wireless module by matching security data.
  • FIG. 4 is a flow diagram illustrating the steps of another embodiment of a method for providing security to the wireless module by matching some combination of security data.
  • FIG. 1 depicts one embodiment of a wireless module 100 which includes an antenna 10 connected to a transceiver circuit 20 .
  • Transceiver circuit 20 includes a duplexer 30 , a transmitter 40 , and a receiver 50 .
  • Transmitter 40 and receiver 50 of transceiver circuit 20 are connected to a baseband signal processor circuit 60 .
  • Baseband signal processor circuit 60 is connected to a microprocessor 70 .
  • Memories 80 and an interface input/output (I/O) 90 are also connected to microprocessor 70 .
  • a host or peripheral unit/device 150 is connected to wireless module 200 through interface I/O 90 .
  • wireless module 100 receives a signal(s) containing data packets through antenna 10 and forwards the received signals and data packets to duplexer 30 , through receiver 50 , and to baseband signal processor circuit 60 .
  • the data packets/received signals will then be forwarded to microprocessor 70 and through interface I/O 90 to peripheral device/host 150 .
  • host/peripheral device 150 may be a PC, laptop, PDA, wireless telephone, or any other type of device or unit which can handle the data packets/received signals.
  • Wireless module 100 receives and transmits data packets/received signals utilizing at least one wireless format selected from the group consisting of CDMA ONE, CDMA 2000 1X, CDMA 2000 3X, CDMA 1X EV, Wideband CDMA, GSM, GPRS and EDGE.
  • duplexer 30 and memories 80 are utilized.
  • FIG. 2 shows a flow diagram 200 illustrating the steps of one embodiment of a method for providing security to wireless module 100 (shown in FIG. 1 ).
  • the first step of the method for providing security to wireless module 100 includes an activation process 210 after which security data (not shown) is provided to wireless module 100 .
  • the security data includes a security code (not shown).
  • Step 220 illustrates the issuing of the security code after wireless module 100 has been activated.
  • Flow diagram 200 further illustrates the encrypting of the security code in step 230 prior to issuing the security code through wireless transmission to wireless module 100 and decrypting the security code in step 240 prior to storing the security code.
  • Step 250 illustrates one embodiment of the method for providing security to wireless module 100 by storing the security code inside wireless module 100 .
  • Flow diagram 200 illustrates the conclusion to one embodiment of the method for providing security to wireless module 100 by step 260 where the security code is notified to a user (not shown).
  • the method for providing security to wireless module 100 provides that the security code is also stored inside/to a peripheral device (not shown). When the security code is also stored inside the peripheral device, step 260 may be eliminated.
  • FIG. 3 shows a flow diagram 300 illustrating the steps of one embodiment of a method for providing security to wireless module 100 (shown in FIG. 1 ) by matching security data.
  • step 310 requires the user to input the security code into the peripheral device in order to have authorized access for the utilization of wireless module 100 . If the security code input by the user into the peripheral device matches the security code stored in wireless module 100 then step 320 illustrates that authorized access for the utilization of wireless module 100 is granted. If the security code input by the user into the peripheral device does not match the security code stored in wireless module 100 then step 330 illustrates that the process for authorized access for the utilization of wireless module 100 fails and access is not granted.
  • the security code is also stored inside the peripheral device so that once the wireless module 100 is in electronic data communication with the peripheral device the separately stored security codes may be automatically compared and the user's input not required, as a further option.
  • FIG. 4 shows a flow diagram 400 illustrating the steps of another embodiment of a method for providing security to wireless module 100 (shown in FIG. 1 ) by matching some combination of security data.
  • wireless module 100 is provided with a complete electronic serial number (not shown) which is stored inside the peripheral device as a security measure.
  • step 410 requires the user to input the security code into the peripheral device in order to have authorized access for the utilization of wireless module 100 . If the security code input by the user into the peripheral device matches the security code stored in wireless module 100 then step 420 illustrates that a further security combination process is performed.
  • step 430 illustrates that the process for authorized access for the utilization of wireless module 100 is granted.
  • step 440 illustrates that the process for authorized access for the utilization of wireless module 100 fails and no further step is taken.
  • Flow diagram 400 illustrates the conclusion to another embodiment of the method for providing security to wireless module 100 by step 450 where the electronic serial number stored in the peripheral device does not match the electronic serial number of wireless module 100 , then the process for authorized access for the utilization of wireless module 100 fails and access is not granted.
  • the method for providing security to wireless module 100 by matching some combination of security data provides the peripheral device with peripheral. device data (not shown) and stores the peripheral device data to wireless module 100 .
  • step 420 may be further extended such that once the electronic serial number stored in the peripheral device matches the electronic serial number of wireless module 100 and the peripheral device data stored in wireless module 100 matches the peripheral device data of the peripheral device, then step 430 illustrates that the process for authorized access for the utilization of wireless module 100 is granted.
  • the security code is also stored inside the peripheral device so that once the wireless module 100 is in electronic data communication with the peripheral device the separately stored security codes may be automatically compared and the user's input not required which eliminates step 410 and triggers automatic security combination process as illustrated by step 420 , as a further option which may be specified by the user.
  • a wireless module activation server includes at least one user activation web site (not shown) utilized to transmit security data during the activation process (not shown).
  • the Wireless module activation server may also be utilized to automatically and/or remotely activate and deactivate wireless module 100 in the event of a loss, theft, or a failure of any one of the methods for providing security to wireless module 100 .
  • the user activation web site is in electronic data communication with wireless module 100 and the peripheral device, and may also store the security data in connection to a wireless module account (not shown).
  • Wireless module 100 may store any embodiment of the security data to any number of user authorized peripheral devices.

Abstract

A wireless module security system and method is provided which includes, in one embodiment providing security data to a wireless module. The security data including a security code provided to the wireless module after the wireless module has been activated. The method for providing the security code. includes encrypting the security code after establishing a wireless module account, issuing the security code through wireless transmission to the wireless module, and decrypting and storing the security code inside the wireless module. The security system and method also utilizes user authorized associated peripheral devices which may be connected to the wireless module to provide further combinations of security data. In one embodiment, the wireless module is provided with an electronic serial number and that electronic serial number is stored to the peripheral device for a security measure. In another embodiment, the peripheral device is provided with peripheral device data and that peripheral device data is stored inside the wireless module for a further security measure. The wireless module is removably connected to any number of user authorized peripheral devices, and thus the wireless module security system and method is provided upon wireless module and peripheral device initialization.

Description

  • This application incorporates herein by reference U.S. patent application Ser. No. 09/______, of Akihiko Toyoshima, for SYSTEM AND METHOD FOR ACTIVATION OF A WIRELESS MODULE, filed concurrent herewith (Sony IPD 50R4257.01); U.S. patent application Ser. No. 09/______, of Akhiko Toyoshima, for HOME NETWORK USING WIRELESS MODULE, filed ______, 2001 (Sony IPD 50P4257.02); U.S. patent application Ser. No. 09/______, of Akhiko Toyoshima, for MULTIPLE WIRELESS FORMAT PHONE SYSTEM AND METHOD, filed concurrent herewith (Sony IPD No. 50P4257.03); U.S. patent application Ser. No. 09/______, of Akhiko Toyoshima, for WIRELESS MODEM MODULE SERVER SYSTEM, filed ______, 2001 (Sony IPD No. 50P4257.04); U.S. patent application Ser. No. 09/______, of Akihiko Toyoshima, for A DEFAULT PORTAL SITE ACCESS WITH WIRELESS MODULE, filed ______, 2001 (Sony IPD 50R4257.06); and U.S. patent application Ser. No. 09/______, of Akihiko Toyoshima, for SYSTEM, METHOD AND APPARATUS FOR EBEDDED FIRMWARE CODE UPDATE, filed concurrent herewith. (Sony IPD 50R4257.07); and U.S. patent application Ser. No. 09/928,582, of Baranowski, et al.; for WIRELESS MODULE, filed Aug. 13, 2001 (Sony IPD 50N3390); and Provisional Patent Application Ser. No. 60/240,001; of Juan, et al, for PORTABLE WIRELESS MODEM, filed Oct. 13, 2000 (Sony IPD 50P4257), the benefit whose priority date is hereby claimed.
  • COPYRIGHT NOTICE
  • A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
  • FIELD OF THE INVENTION
  • This invention relates generally to the field of removable data storage devices. More particularly, this invention relates to a security system and method for a data storage and wireless transmission module.
  • BACKGROUND OF THE INVENTION
  • The need for portability of data has increased over the years, and has spurred the development of removable memory devices. For example, Memory Stick™ is a removable data storage device made by Sony Corporation and is a recordable integrated circuit (IC) digital storage device having a storage capacity greater than a standard 3.5 inch floppy disk. Most importantly, Memory Stick™ is smaller than a stick of gum, very lightweight, and therefore ultra-portable. However, the need for accessability to people, information, and data has also increased and spurred the creation of an ultra-portable accessability device.
  • A wireless module which provides accessability and portability to peripheral devices without increasing their cost or exceeding their related space limitations is so provided in a co-pending patent application Ser. No. ______ (Sony IPD 50R4257.01) entitled SYSTEM AND METHOD FOR ACTIVATION OF A WIRELESS MODULE; and U.S. patent application Ser. No. 09/928,582, of Baranowski, et al.; for WIRELESS MODULE, filed Aug. 13, 2001 (Sony IPD 50N3390). In these co-pending patent applications, the wireless module described can be shared with any type of peripheral device which supports such an interface. If the wireless module described is lost or stolen, it could be easily used for illegal purposes and for the perpetration of any crime.
  • SUMMARY OF THE INVENTION
  • In view of the foregoing, a security system for a wireless module is provided to prevent the unauthorized and illegal use of the wireless module.
  • In particular, the wireless module, in one embodiment is provided with security data. In one embodiment, the security data is stored to the wireless module and is provided to the user of the wireless module during initialization and establishment of a wireless module account with an activation center. In another embodiment, the security data is provided to any number of peripheral devices which utilize the removable wireless module. In a further embodiment, the security data along with a complete electronic serial number (ESN) is provided to any number of peripheral devices which utilize the wireless module for a further security measure. In yet another embodiment, the wireless module obtains and stores peripheral device data from the peripheral devices which are provided with the security data.
  • These and other features and advantages of the invention will be understood upon the consideration of the following detailed description of the invention and accompanying drawings. The features of the invention believed to be novel are set forth with particularity in the appended claims. The invention itself however, both as to organization and method of operation, together with further objects and advantages thereof, may be best understood by reference to the following description taken in conjunction with the accompanying drawing.
  • BRIEF DESCRIPTION OF THE DRAWING
  • The following detailed description, given by way of example, and not intended to limit the present invention solely thereto, will best be understood in conjunction with the accompanying drawings in which:
  • FIG. 1 is a block diagram of one embodiment of a wireless module.
  • FIG. 2 is a flow diagram illustrating the steps of one embodiment, of a method for providing security to the wireless module.
  • FIG. 3 is a flow diagram illustrating the steps of one embodiment of a method for providing security to the wireless module by matching security data.
  • FIG. 4 is a flow diagram illustrating the steps of another embodiment of a method for providing security to the wireless module by matching some combination of security data.
  • DETAILED DESCRIPTION OF THE INVENTION
  • While the present invention has been particularly shown and described with reference to an embodiment(s), it will be understood that various changes and modifications may be made without departing from the spirit and scope of this invention. It is intended that the appended claims be interpreted to cover the embodiments described herein and all equivalents thereto.
  • FIG. 1 depicts one embodiment of a wireless module 100 which includes an antenna 10 connected to a transceiver circuit 20. Transceiver circuit 20 includes a duplexer 30, a transmitter 40, and a receiver 50. Transmitter 40 and receiver 50 of transceiver circuit 20 are connected to a baseband signal processor circuit 60. Baseband signal processor circuit 60 is connected to a microprocessor 70. Memories 80 and an interface input/output (I/O) 90 are also connected to microprocessor 70. A host or peripheral unit/device 150 is connected to wireless module 200 through interface I/O 90.
  • In operation, wireless module 100 receives a signal(s) containing data packets through antenna 10 and forwards the received signals and data packets to duplexer 30, through receiver 50, and to baseband signal processor circuit 60. The data packets/received signals will then be forwarded to microprocessor 70 and through interface I/O 90 to peripheral device/host 150. For example, host/peripheral device 150 may be a PC, laptop, PDA, wireless telephone, or any other type of device or unit which can handle the data packets/received signals. Wireless module 100 receives and transmits data packets/received signals utilizing at least one wireless format selected from the group consisting of CDMA ONE, CDMA 2000 1X, CDMA 2000 3X, CDMA 1X EV, Wideband CDMA, GSM, GPRS and EDGE. In case peripheral device/host 150 engages in simultaneous transmission and reception of data packets, duplexer 30 and memories 80 are utilized.
  • FIG. 2 shows a flow diagram 200 illustrating the steps of one embodiment of a method for providing security to wireless module 100 (shown in FIG. 1). The first step of the method for providing security to wireless module 100 includes an activation process 210 after which security data (not shown) is provided to wireless module 100. In one embodiment, the security data includes a security code (not shown). Step 220 illustrates the issuing of the security code after wireless module 100 has been activated. Flow diagram 200 further illustrates the encrypting of the security code in step 230 prior to issuing the security code through wireless transmission to wireless module 100 and decrypting the security code in step 240 prior to storing the security code.
  • Step 250 illustrates one embodiment of the method for providing security to wireless module 100 by storing the security code inside wireless module 100. Flow diagram 200 illustrates the conclusion to one embodiment of the method for providing security to wireless module 100 by step 260 where the security code is notified to a user (not shown). In another embodiment, the method for providing security to wireless module 100 provides that the security code is also stored inside/to a peripheral device (not shown). When the security code is also stored inside the peripheral device, step 260 may be eliminated.
  • FIG. 3 shows a flow diagram 300 illustrating the steps of one embodiment of a method for providing security to wireless module 100 (shown in FIG. 1) by matching security data. Once the user of the peripheral device is notified of the security code, step 310 requires the user to input the security code into the peripheral device in order to have authorized access for the utilization of wireless module 100. If the security code input by the user into the peripheral device matches the security code stored in wireless module 100 then step 320 illustrates that authorized access for the utilization of wireless module 100 is granted. If the security code input by the user into the peripheral device does not match the security code stored in wireless module 100 then step 330 illustrates that the process for authorized access for the utilization of wireless module 100 fails and access is not granted. In another embodiment, the security code is also stored inside the peripheral device so that once the wireless module 100 is in electronic data communication with the peripheral device the separately stored security codes may be automatically compared and the user's input not required, as a further option.
  • FIG. 4 shows a flow diagram 400 illustrating the steps of another embodiment of a method for providing security to wireless module 100 (shown in FIG. 1) by matching some combination of security data. In another embodiment, wireless module 100 is provided with a complete electronic serial number (not shown) which is stored inside the peripheral device as a security measure. Once the user of the peripheral device is notified of the security code, step 410 requires the user to input the security code into the peripheral device in order to have authorized access for the utilization of wireless module 100. If the security code input by the user into the peripheral device matches the security code stored in wireless module 100 then step 420 illustrates that a further security combination process is performed. If the electronic serial number stored in the peripheral device matches the electronic serial number of wireless module 100 then step 430 illustrates that the process for authorized access for the utilization of wireless module 100 is granted. However, if the security code input by the user into the peripheral device does not match the security code stored in wireless module 100 then step 440 illustrates that the process for authorized access for the utilization of wireless module 100 fails and no further step is taken.
  • Flow diagram 400 illustrates the conclusion to another embodiment of the method for providing security to wireless module 100 by step 450 where the electronic serial number stored in the peripheral device does not match the electronic serial number of wireless module 100, then the process for authorized access for the utilization of wireless module 100 fails and access is not granted. In a further embodiment, the method for providing security to wireless module 100 by matching some combination of security data provides the peripheral device with peripheral. device data (not shown) and stores the peripheral device data to wireless module 100. When the peripheral device data is also stored inside wireless module 100, step 420 may be further extended such that once the electronic serial number stored in the peripheral device matches the electronic serial number of wireless module 100 and the peripheral device data stored in wireless module 100 matches the peripheral device data of the peripheral device, then step 430 illustrates that the process for authorized access for the utilization of wireless module 100 is granted.
  • In yet another embodiment, the security code is also stored inside the peripheral device so that once the wireless module 100 is in electronic data communication with the peripheral device the separately stored security codes may be automatically compared and the user's input not required which eliminates step 410 and triggers automatic security combination process as illustrated by step 420, as a further option which may be specified by the user.
  • In order to provide security to wireless module 100, a wireless module activation server (not shown) includes at least one user activation web site (not shown) utilized to transmit security data during the activation process (not shown). The Wireless module activation server may also be utilized to automatically and/or remotely activate and deactivate wireless module 100 in the event of a loss, theft, or a failure of any one of the methods for providing security to wireless module 100. The user activation web site is in electronic data communication with wireless module 100 and the peripheral device, and may also store the security data in connection to a wireless module account (not shown).
  • Wireless module 100 may store any embodiment of the security data to any number of user authorized peripheral devices.
  • Thus it is apparent that in accordance with the present invention, an apparatus that fully satisfies the objectives, aims and advantages is set forth above. While the invention has been described in conjunction with specific embodiments, it is evident that many alternatives, modifications, permutations and variations will become apparent to those skilled in the art in light of the foregoing description. Accordingly, it is intended that the present invention embrace all such alternatives., modifications and variations as fall within the scope of the appended claims.

Claims (25)

1. A method for providing security to a wireless module, said method comprising providing security data to the wireless module.
2. A method for providing security to a wireless module as recited in claim 1, wherein providing security data comprises providing a security code to the wireless module after the wireless module has been activated.
3. A method for providing security to a wireless module as recited in claim 2, wherein providing a security code to the wireless module comprises:
encrypting said security code;
issuing said security code through wireless transmission to the wireless module; and
decrypting said security code.
4. A method for providing security to a wireless module as recited in claim 3, further comprising storing said security code.
5. A method for providing security to a wireless module as recited in claim 4, wherein storing said security code comprises storing said security code to the wireless module.
6. A method for providing security to a wireless module as recited in claim 4, wherein storing said security code comprises storing said security code to a peripheral device.
7. A method for providing security to a wireless module as recited in claim 5, wherein storing said security code further comprises storing said security code to a peripheral device.
8. A method for providing security to a wireless module as recited in claim 7, further comprising:
providing the wireless module with an electronic serial number; and
storing said electronic serial number to said peripheral device.
9. A method for providing security to a wireless module as recited in claim 7, further comprising:
providing said peripheral device with peripheral device data; and
storing said peripheral device data to the wireless module.
10. A method for providing security to a wireless module as recited in claim 8, further comprising:
providing said peripheral device with peripheral device data; and
storing said peripheral device data to the wireless module.
11. A method for providing security to a wireless module as recited in claim 2, further comprising notifying a user of a peripheral device of said security code.
12. A method for providing security to a wireless module as recited in claim 11, further comprising requiring at least one input of said security code into said peripheral device by said user.
13. A security system for a wireless module, said system comprising:
a wireless module configured to receive security data; and
at least one peripheral device in electronic data communication with said wireless module, said peripheral device configured to receive said security data and transmit peripheral device data.
14. A security system for a wireless module as recited in claim 13, wherein said security data comprises a security code, said wireless module configured to store said security code.
15. A security system for a wireless module as recited in claim 13, wherein said wireless module comprises an electronic serial number, said peripheral device configured to store said electronic serial number.
16. A security system for a wireless module as recited in claim 14, wherein said wireless module is further configured to store said peripheral device data.
17. A security system for a wireless module as recited in claim 14, wherein said wireless module comprises an electronic serial number, said peripheral device configured to store said electronic serial number and said security code.
18. A wireless module activation server comprising at least one user activation web site configured to transmit security data.
19. A wireless module activation server as recited in claim 18, wherein said user activation web site is configured to activate and deactivate a wireless module.
20. A wireless module activation server as recited in claim 18, wherein said user activation web site is configured to be in electronic data communication with a wireless module configured to store said security data.
21. A wireless module activation server as recited in claim 18, wherein said user activation web site is configured to be in electronic data communication with a peripheral device configured to store said security data.
22. A wireless module activation server as recited in claim 18, wherein said user activation web site is in electronic data communication with at least one wireless module account.
23. A wireless module comprising an electronic serial number, said wireless module configured to be in electronic data communication with at least one peripheral device, said wireless module further configured to store said electronic serial number to at least one peripheral device.
24. A wireless module as recited in claim 23, further comprising security data.
25. A wireless module as recited in claim 24, wherein said wireless module is configured to store said security data within said peripheral device.
US12/190,756 2000-10-12 2008-08-13 Wireless module security system and method Abandoned US20090021346A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/190,756 US20090021346A1 (en) 2000-10-12 2008-08-13 Wireless module security system and method

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US24000100P 2000-10-12 2000-10-12
US09/972,183 US7460853B2 (en) 2000-10-12 2001-10-05 Wireless module security system and method
US12/190,756 US20090021346A1 (en) 2000-10-12 2008-08-13 Wireless module security system and method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/972,183 Continuation US7460853B2 (en) 2000-10-12 2001-10-05 Wireless module security system and method

Publications (1)

Publication Number Publication Date
US20090021346A1 true US20090021346A1 (en) 2009-01-22

Family

ID=26933060

Family Applications (4)

Application Number Title Priority Date Filing Date
US09/972,183 Active 2024-09-16 US7460853B2 (en) 2000-10-12 2001-10-05 Wireless module security system and method
US09/974,724 Expired - Fee Related US8369892B2 (en) 2000-10-12 2001-10-09 Wireless modem module server system
US12/190,756 Abandoned US20090021346A1 (en) 2000-10-12 2008-08-13 Wireless module security system and method
US13/713,663 Active US8594729B2 (en) 2000-10-12 2012-12-13 Wireless modem module server system

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US09/972,183 Active 2024-09-16 US7460853B2 (en) 2000-10-12 2001-10-05 Wireless module security system and method
US09/974,724 Expired - Fee Related US8369892B2 (en) 2000-10-12 2001-10-09 Wireless modem module server system

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/713,663 Active US8594729B2 (en) 2000-10-12 2012-12-13 Wireless modem module server system

Country Status (1)

Country Link
US (4) US7460853B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110096744A1 (en) * 2006-01-24 2011-04-28 Mehta Pratik M System and Method for Managing Information Handling System Wireless Network Provisioning
US20110201298A1 (en) * 2010-02-18 2011-08-18 Jerome Gelover Substitution of a telephone land line based home alarm system with a cell phone connection based system

Families Citing this family (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8352400B2 (en) 1991-12-23 2013-01-08 Hoffberg Steven M Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
US10361802B1 (en) 1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method
US8364136B2 (en) 1999-02-01 2013-01-29 Steven M Hoffberg Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system
US7966078B2 (en) 1999-02-01 2011-06-21 Steven Hoffberg Network media appliance system and method
US7460853B2 (en) 2000-10-12 2008-12-02 Sony Corporation Wireless module security system and method
US7230939B2 (en) * 2000-10-13 2007-06-12 Sony Corporation Home network using wireless module
US20020080741A1 (en) * 2000-10-13 2002-06-27 Akihiko Toyoshima Multiple wireless format phone system and method
US9146614B2 (en) * 2000-10-13 2015-09-29 Sony Corporation Wireless modem module server system
US6907456B2 (en) 2000-10-13 2005-06-14 Sony Corporation Default portal site access with wireless module
US7890947B2 (en) * 2000-10-13 2011-02-15 Sony Corporation System, method and apparatus for embedded firmware code update
US7020118B2 (en) * 2000-10-13 2006-03-28 Sony Corporation System and method for activation of a wireless module
US10915296B2 (en) 2000-11-01 2021-02-09 Flexiworld Technologies, Inc. Information apparatus that includes a touch sensitive screen interface for managing or replying to e-mails
US7805720B2 (en) * 2003-04-11 2010-09-28 Flexiworld Technologies, Inc. Autorun for integrated circuit memory component
US10860290B2 (en) 2000-11-01 2020-12-08 Flexiworld Technologies, Inc. Mobile information apparatuses that include a digital camera, a touch sensitive screen interface, support for voice activated commands, and a wireless communication chip or chipset supporting IEEE 802.11
US20020059415A1 (en) 2000-11-01 2002-05-16 Chang William Ho Manager for device-to-device pervasive digital output
US11467856B2 (en) * 2002-12-12 2022-10-11 Flexiworld Technologies, Inc. Portable USB device for internet access service
US11204729B2 (en) 2000-11-01 2021-12-21 Flexiworld Technologies, Inc. Internet based digital content services for pervasively providing protected digital content to smart devices based on having subscribed to the digital content service
AU2002226948A1 (en) 2000-11-20 2002-06-03 Flexiworld Technologies, Inc. Tobile and pervasive output components
US20020097408A1 (en) 2001-01-19 2002-07-25 Chang William Ho Output device for universal data output
US20030037191A1 (en) * 2001-08-13 2003-02-20 Robert Baranowski Wireless module
US7440774B2 (en) * 2002-04-08 2008-10-21 Socket Mobile, Inc. Wireless enabled memory module
US7321769B2 (en) * 2002-04-12 2008-01-22 Intel Corporation Method and apparatus for managing personal cache in a wireless network
FR2841720B1 (en) * 2002-06-28 2005-02-04 Schlumberger Systems & Service METHOD FOR INDIVIDUALIZING A TERMINAL CONNECTED TO AT LEAST ONE SERVER THROUGH A NETWORK
US20040003282A1 (en) * 2002-06-28 2004-01-01 Smith Alrick Lockhart Method of storing data
JP2004090625A (en) * 2002-07-08 2004-03-25 Seiko Epson Corp Memory medium, printing method and printing apparatus
JP4168718B2 (en) * 2002-10-02 2008-10-22 日本電気株式会社 Storage capacity management system and storage capacity management method
US6990352B2 (en) * 2002-10-03 2006-01-24 Nokia Corporation GPRS signaling via SMS messages
US7139559B2 (en) 2002-12-09 2006-11-21 Qualcomm Inc. System and method for handshaking between wireless devices and servers
WO2004055638A2 (en) * 2002-12-12 2004-07-01 Flexiworld Technologies, Inc. Wireless communication between computing devices
GB0230331D0 (en) * 2002-12-31 2003-02-05 British Telecomm Method and apparatus for operating a computer network
JP4292160B2 (en) * 2003-05-21 2009-07-08 富士通株式会社 Information processing system
JP2005073145A (en) * 2003-08-27 2005-03-17 Nec Corp Television broadcast recording and reproducing system using mobile information terminal
US20050120164A1 (en) * 2003-12-01 2005-06-02 Phison Electronics Corp. Pen drive for wireless wide bandwidth local network
US7373243B2 (en) * 2004-03-31 2008-05-13 Nissan Technical Center North America, Inc. Method and system for providing traffic information
ATE539522T1 (en) * 2004-06-29 2012-01-15 Nokia Corp CONTROL OF PERIPHERAL DEVICES IN A SHORT RANGE WIRELESS COMMUNICATIONS SYSTEM
TWI271992B (en) * 2004-07-28 2007-01-21 Mediatek Inc Mobile communication apparatus having anti-theft and auto-notification functions and method of operating the same
US20070049310A1 (en) * 2005-08-29 2007-03-01 Iomega Corporation Data storage device with wireless interface for autonomous operation
US7702821B2 (en) * 2005-09-15 2010-04-20 Eye-Fi, Inc. Content-aware digital media storage device and methods of using the same
US8014529B2 (en) * 2006-08-18 2011-09-06 Eye-Fi, Inc. In-band device enrollment without access point support
US8666366B2 (en) * 2007-06-22 2014-03-04 Apple Inc. Device activation and access
US8849278B2 (en) 2007-01-07 2014-09-30 Jeffrey Bush Mobile device activation
US8855617B2 (en) 2007-01-07 2014-10-07 Patrice Gautier Method and system for mobile device activation
US8032181B2 (en) 2007-09-01 2011-10-04 Apple Inc. Service provider activation with subscriber identity module policy
US7929959B2 (en) * 2007-09-01 2011-04-19 Apple Inc. Service provider activation
US9451450B2 (en) * 2007-09-01 2016-09-20 Apple Inc. Postponed carrier configuration
US8442521B2 (en) * 2007-09-04 2013-05-14 Apple Inc. Carrier configuration at activation
US20090235977A1 (en) * 2008-03-19 2009-09-24 Hsin-Chin Lee Key module with energy storage function
TWI389542B (en) * 2009-05-07 2013-03-11 Htc Corp Portable electronic apparatus capable of simulating as a wireless communication product and method thereof
EP2257036B1 (en) * 2009-05-07 2017-04-26 HTC Corporation Portable electronic apparatus capable of operating as a wireless communication product and method thereof
FI8511U1 (en) * 2009-07-09 2009-11-07 Cyberncam Technology Ltd Oy Optional camera equipment
CN101990028B (en) * 2009-08-07 2016-08-03 宏达国际电子股份有限公司 Can the portable electron device of analog wireless communication product and correlation technique thereof
US8555067B2 (en) 2010-10-28 2013-10-08 Apple Inc. Methods and apparatus for delivering electronic identification components over a wireless network
US9450759B2 (en) 2011-04-05 2016-09-20 Apple Inc. Apparatus and methods for controlling distribution of electronic access clients
WO2012154600A1 (en) 2011-05-06 2012-11-15 Apple Inc. Methods and apparatus for providing management capabilities for access control clients
US20140317168A1 (en) * 2013-04-17 2014-10-23 Telefonaktiebolaget L M Ericsson (Publ) System, method, and device for exposing wireless module data storage
CN103327243A (en) * 2013-06-05 2013-09-25 广东欧珀移动通信有限公司 Camera control method for mobile terminal
US9503476B2 (en) * 2014-01-28 2016-11-22 Vivint, Inc. Anti-takeover systems and methods for network attached peripherals
JP6264198B2 (en) * 2014-05-30 2018-01-24 京セラドキュメントソリューションズ株式会社 Mobile device, selection processing method
TWI548282B (en) * 2014-11-28 2016-09-01 Papago Inc Driving recorder with communication module and method thereof
WO2017142339A1 (en) 2016-02-19 2017-08-24 Samsung Electronics Co., Ltd. Dongle apparatus and method of controlling the same
US20220223997A1 (en) * 2021-01-13 2022-07-14 Zebra Technologies Corporation User-Installable Wireless Communications Module

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5398285A (en) * 1993-12-30 1995-03-14 Motorola, Inc. Method for generating a password using public key cryptography
US5765027A (en) * 1994-09-26 1998-06-09 Toshiba American Information Systems, Inc. Network controller which enables the local processor to have greater access to at least one memory device than the host computer in response to a control signal
US6445914B1 (en) * 1999-09-08 2002-09-03 Ericsson, Inc. Method to perform subsidy protection for TDMA mobile stations
US6654600B1 (en) * 2000-09-15 2003-11-25 Tracfone Wireless, Inc. Method and apparatus for authorizing use of cellular telephone units
US6662023B1 (en) * 2000-07-06 2003-12-09 Nokia Mobile Phones Ltd. Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
US6804730B1 (en) * 1999-11-17 2004-10-12 Tokyo Electron Device Limited Access control device, access control method, recording medium, and computer data signal for controlling allowance of access to storage area using certification data

Family Cites Families (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4593155A (en) * 1983-12-05 1986-06-03 Motorola, Inc. Portable telephone ID code transfer system
JPS63254834A (en) * 1987-04-13 1988-10-21 Fujitsu Ltd Automobile telephone set
US5036532A (en) * 1989-08-03 1991-07-30 Motorola, Inc. Portable telephone with power source/mode change during calls
US5109403A (en) * 1990-05-11 1992-04-28 Goldstar Products Co., Limited System for programming of features of a mobile cellular telephone unit
US5297192A (en) * 1990-09-28 1994-03-22 At&T Bell Laboratories Method and apparatus for remotely programming a mobile data telephone set
US5294792A (en) * 1991-12-31 1994-03-15 Texas Instruments Incorporated Writing tip position sensing and processing apparatus
US5821523A (en) * 1992-03-12 1998-10-13 Bunte; Alan G. Combined code reader and digital camera using a common photodetector
US5243653A (en) * 1992-05-22 1993-09-07 Motorola, Inc. Method and apparatus for maintaining continuous synchronous encryption and decryption in a wireless communication system throughout a hand-off
US5426594A (en) * 1993-04-02 1995-06-20 Motorola, Inc. Electronic greeting card store and communication system
US6137473A (en) * 1994-09-02 2000-10-24 Nec Corporation System and method for switching control between a host computer and a remote interface device
JP3525353B2 (en) * 1994-09-28 2004-05-10 株式会社リコー Digital electronic still camera
US5893037A (en) * 1994-12-09 1999-04-06 Eastman Kodak Company Combined electronic/silver-halide image capture system with cellular transmission capability
FI99071C (en) * 1995-02-15 1997-09-25 Nokia Mobile Phones Ltd Procedure for use of applications in a mobile telephone as well as a mobile telephone
US5964830A (en) * 1995-08-22 1999-10-12 Durrett; Charles M. User portal device for the world wide web to communicate with a website server
AU7012396A (en) * 1995-08-31 1997-03-19 Donald Scott Mcgregor Secure interlink receiver for remote programming of wireless telephones
US5790800A (en) * 1995-10-13 1998-08-04 Digital Equipment Corporation Client application program mobilizer
US6108727A (en) * 1995-10-16 2000-08-22 Packard Bell Nec System having wireless interface device for storing compressed predetermined program files received from a remote host and communicating with the remote host via wireless link
US6279153B1 (en) * 1995-10-16 2001-08-21 Nec Corporation Multi-user flash ROM update
US6473609B1 (en) * 1995-12-11 2002-10-29 Openwave Systems Inc. Method and architecture for interactive two-way communication devices to interact with a network
US5781723A (en) * 1996-06-03 1998-07-14 Microsoft Corporation System and method for self-identifying a portable information device to a computing unit
US5825283A (en) * 1996-07-03 1998-10-20 Camhi; Elie System for the security and auditing of persons and property
KR100204342B1 (en) * 1996-08-13 1999-06-15 윤종용 Non volatile semiconductor memory device
US5850445A (en) * 1997-01-31 1998-12-15 Synacom Technology, Inc. Authentication key management system and method
US5884195A (en) * 1997-03-14 1999-03-16 Andrew Corporation Grounding assembly for programming cellular telephones
DE19718103A1 (en) * 1997-04-29 1998-06-04 Kim Schmitz Data transmission system authorise method e.g. for telebanking
US6091956A (en) * 1997-06-12 2000-07-18 Hollenberg; Dennis D. Situation information system
JP2000513916A (en) * 1997-06-25 2000-10-17 サムソン エレクトロニクス カンパニー リミテッド Method and apparatus for home network automatic tree generator
US6642959B1 (en) * 1997-06-30 2003-11-04 Casio Computer Co., Ltd. Electronic camera having picture data output function
US6078566A (en) * 1998-04-28 2000-06-20 Genesys Telecommunications Laboratories, Inc. Noise reduction techniques and apparatus for enhancing wireless data network telephony
SE514433C2 (en) * 1998-05-08 2001-02-26 Ericsson Telefon Ab L M Method and device in a wireless communication system
US6684084B1 (en) * 1998-06-30 2004-01-27 Ericsson Inc. Apparatus for providing operational power to a radiotelephone card connected to a PCMCIA interface
US6304753B1 (en) * 1998-07-16 2001-10-16 Openwave Technologies Inc. Integration of voice and data services provided to a mobile wireless device
US6212194B1 (en) * 1998-08-05 2001-04-03 I-Cube, Inc. Network routing switch with non-blocking arbitration system
US6373507B1 (en) * 1998-09-14 2002-04-16 Microsoft Corporation Computer-implemented image acquistion system
US6393470B1 (en) * 1998-11-13 2002-05-21 International Business Machines Corp. Non intrusive automatic remote support for freeing overloaded storage in portable devices
KR100308214B1 (en) * 1998-12-30 2001-12-17 윤종용 Dual chip semiconductor integrated circuit device
US6694430B1 (en) * 1999-03-05 2004-02-17 Symbol Technologies, Inc. Data encryption integrated circuit with on-board dual-use memory
EP1181809B1 (en) * 1999-06-02 2004-03-24 Eastman Kodak Company Customizing digital image transfer
DE19934098A1 (en) * 1999-07-21 2001-01-25 Nokia Mobile Phones Ltd Starting device with PIN protection without input involves encoding PIN using unique identity number, comparing user code, unique identity, decoding PIN using unique identity number
US6728531B1 (en) * 1999-09-22 2004-04-27 Motorola, Inc. Method and apparatus for remotely configuring a wireless communication device
US6532370B1 (en) * 1999-09-30 2003-03-11 Skyworks Solutions, Inc. Cellular handset with adjustable analog to digital conversion
US6788332B1 (en) * 1999-12-29 2004-09-07 Qwest Communications International Inc. Wireless imaging device and system
WO2001050715A2 (en) * 2000-01-03 2001-07-12 Tranz-Send Broadcasting Network, Inc. Portable apparatus for providing wireless media access and storage and method thereof
US20020012329A1 (en) 2000-06-02 2002-01-31 Timothy Atkinson Communications apparatus interface and method for discovery of remote devices
US6871063B1 (en) * 2000-06-30 2005-03-22 Intel Corporation Method and apparatus for controlling access to a computer system
US7460853B2 (en) 2000-10-12 2008-12-02 Sony Corporation Wireless module security system and method
US20020080741A1 (en) * 2000-10-13 2002-06-27 Akihiko Toyoshima Multiple wireless format phone system and method
US7020118B2 (en) * 2000-10-13 2006-03-28 Sony Corporation System and method for activation of a wireless module
US7890947B2 (en) * 2000-10-13 2011-02-15 Sony Corporation System, method and apparatus for embedded firmware code update
US6907456B2 (en) * 2000-10-13 2005-06-14 Sony Corporation Default portal site access with wireless module
US6628934B2 (en) * 2001-07-12 2003-09-30 Earthlink, Inc. Systems and methods for automatically provisioning wireless services on a wireless device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5398285A (en) * 1993-12-30 1995-03-14 Motorola, Inc. Method for generating a password using public key cryptography
US5765027A (en) * 1994-09-26 1998-06-09 Toshiba American Information Systems, Inc. Network controller which enables the local processor to have greater access to at least one memory device than the host computer in response to a control signal
US6445914B1 (en) * 1999-09-08 2002-09-03 Ericsson, Inc. Method to perform subsidy protection for TDMA mobile stations
US6804730B1 (en) * 1999-11-17 2004-10-12 Tokyo Electron Device Limited Access control device, access control method, recording medium, and computer data signal for controlling allowance of access to storage area using certification data
US6662023B1 (en) * 2000-07-06 2003-12-09 Nokia Mobile Phones Ltd. Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
US6654600B1 (en) * 2000-09-15 2003-11-25 Tracfone Wireless, Inc. Method and apparatus for authorizing use of cellular telephone units

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110096744A1 (en) * 2006-01-24 2011-04-28 Mehta Pratik M System and Method for Managing Information Handling System Wireless Network Provisioning
US20110201298A1 (en) * 2010-02-18 2011-08-18 Jerome Gelover Substitution of a telephone land line based home alarm system with a cell phone connection based system

Also Published As

Publication number Publication date
US20020082048A1 (en) 2002-06-27
US20020081993A1 (en) 2002-06-27
US20130100317A1 (en) 2013-04-25
US7460853B2 (en) 2008-12-02
US8594729B2 (en) 2013-11-26
US8369892B2 (en) 2013-02-05

Similar Documents

Publication Publication Date Title
US20090021346A1 (en) Wireless module security system and method
US7151922B2 (en) Mobile telephone using subscriber card
US6138005A (en) Method for verifying personalization in mobile radio terminal
JP3627986B2 (en) Telecommunications system
US6928299B1 (en) Method for transmitting user identification data to a wireless communication device
US6480096B1 (en) Method and apparatus for theft deterrence and secure data retrieval in a communication device
CA2041248C (en) Security module for radio telephone
US8897831B2 (en) Wireless device content information theft protection system
US20110087830A1 (en) System, method and apparatus for embedded firmware code update
US7020118B2 (en) System and method for activation of a wireless module
EP1901577B1 (en) Apparatus and method for controlling bluetooth in portable terminal
JP4218463B2 (en) Wireless communication apparatus and wireless communication system
KR100690296B1 (en) Appratus and method for changing data of rfid tag in handheld terminal
US6959349B2 (en) Wireless computer peripheral interface with the capability of identification
EP1380118A1 (en) A method and apparatus for access checking and access control
KR100745575B1 (en) Apparatus and method for having multiple electronic keys in mobile communication terminal
JP2008131157A (en) Telecommunication terminal, center, and management method of telecommunication terminal
US20090061814A1 (en) Communication device and management apparatus thereof
CN2935679Y (en) Key handset
US20100285832A1 (en) electronic apparatus and associated elements and methods
KR20070049933A (en) System and method for operating rfid information, devices for operating rfid information, recording medium and information storing medium
KR101612528B1 (en) Method for Selective Executing Program
KR101487348B1 (en) Terminal Authenticatication Method in Wireless Access Point and Wireless AP using the same
KR101213245B1 (en) Mobile Device
JP2007053817A (en) Maintenance system for portable electronic device

Legal Events

Date Code Title Description
AS Assignment

Owner name: SONY ELECTRONICS INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TOYOSHIMA, AKIHIKO;REEL/FRAME:021381/0001

Effective date: 20020110

Owner name: SONY CORPORATION, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TOYOSHIMA, AKIHIKO;REEL/FRAME:021381/0001

Effective date: 20020110

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION