Enhanced security for electronic devices
First Claim
1. An electronic device, comprising:
- a chipset;
a secure processing unit in the chipset;
a memory in which is stored a first identifier that uniquely identifies the electronic device;
a secure read-only memory (SROM) in which is stored a second identifier that uniquely identifies the chipset; and
an operating system configured to control;
providing a pairing of the first identifier and the second identifier in a network access request to check correctness of the pairing against a registry of device identifiers; and
obtaining access to the network in response to confirming correctness of the pairing against the registry in accordance with the network access request.
3 Assignments
0 Petitions
Accused Products
Abstract
This disclosure is directed to enhanced security of electronic devices that use IMEI numbers. In addition to a first IMEI number that is created and tracked by an OEM, a manufacturer of chipsets for cell phones creates a similar, but unique second IMEI number that is burned into logic at the chip level of chipsets. The second IMEI number includes a serial number of the chipset to uniquely identify the chipset that is associated with the second IMEI. A combination of a first IMEI and a second IMEI is stored with a registrar. When a device attempts to access a network, a combination of the first IMEI and the second IMEI stored on the device are authenticated with the registrar. If the combination is valid, then the device is allowed to access the network. Otherwise, the device is deemed to be an unauthorized device and access to the network is denied.
31 Citations
19 Claims
-
1. An electronic device, comprising:
-
a chipset; a secure processing unit in the chipset; a memory in which is stored a first identifier that uniquely identifies the electronic device; a secure read-only memory (SROM) in which is stored a second identifier that uniquely identifies the chipset; and an operating system configured to control; providing a pairing of the first identifier and the second identifier in a network access request to check correctness of the pairing against a registry of device identifiers; and obtaining access to the network in response to confirming correctness of the pairing against the registry in accordance with the network access request. - View Dependent Claims (2, 3, 4, 5, 19)
-
-
6. A method, comprising:
-
receiving a request from a cellular device to access a cellular network; receiving a first identifier from the cellular device that uniquely identifies the cellular device; receiving a second identifier from the cellular device that uniquely identifies a chipset installed in the cellular device; checking whether a pairing of the first identifier and the second identifier is correct against a registry of device identifiers; determining, as a result of the checking, that the pairing of the first identifier and the second identifier is correct against the registry of device identifiers; and authorizing access to the cellular network by the cellular device in response to the determining that the pairing of the first identifier and the second identifier is correct in the registry of device identifiers. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. One or more computer-readable storage media including computer-executable instructions that, when executed by a computer, perform the following operations:
-
receiving a request from a cell phone to access a cellular network; receiving a first identifier from the cell phone that uniquely identifies the cell phone; receiving a second identifier from the cell phone that uniquely identifies a chipset installed in the cell phone; checking whether a pairing of the first identifier and the second identifier is found in a registry of device identifiers; receiving an indication from the registry as to whether the pairing of the first identifier and the second identifier was found in the registry in response to the checking; and authorizing access to the cellular network by the cell phone in response to receiving an indication from the registry that the pairing of the first identifier and the second identifier was found in the registry. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification