Method for protecting electronic device, and electronic device
First Claim
1. A method for protecting an electronic device, which comprises an operational unit and a user-specific module and which is intended to communicate with a radio network, the method comprising protecting data necessary for checking the user-specific module with a key of an encryption method used by the protection performer;
- and storing in the operational unit of the electronic device a verification key of the encryption method used by the protection performer for verifying the data necessary for checking the user-specific module.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to an electronic device, which comprises an operational unit and a user-specific module. Data in the device, necessary for checking the user-specific module, is protected with a key of the encryption method employed by the device manufacturer. A verification key of the encryption method employed by the electronic device manufacturer is stored in the operational unit, by means of which verification key the data necessary for checking the user-specific module is verified.
-
Citations
36 Claims
-
1. A method for protecting an electronic device, which comprises an operational unit and a user-specific module and which is intended to communicate with a radio network, the method comprising
protecting data necessary for checking the user-specific module with a key of an encryption method used by the protection performer; - and
storing in the operational unit of the electronic device a verification key of the encryption method used by the protection performer for verifying the data necessary for checking the user-specific module. - View Dependent Claims (2, 3, 4, 5, 6, 10, 21)
- and
-
7. A method for protecting an electronic device, which comprises an operational unit and a user-specific module and which is intended to communicate with a radio network, wherein
the data in the electronic device, necessary for checking the user-specific module, is encrypted with a key of the encryption method employed by the protection performer, and for verifying the data necessary for checking the user-specific module a verification key of the encryption method employed by the protection performer is stored in the operational unit of the electronic device, the method comprising verifying the data necessary for checking the user-specific module by using the verification key of the encryption method, and if the verification fails, at least preventing the electronic device from being connected to a radio network; -
checking the user-specific module by means of the data necessary for checking the user-specific module; and
starting the electronic device if the user-specific module check succeeds, or at least preventing the electronic device from being connected to the radio network if the user-specific module check fails. - View Dependent Claims (8, 9, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
22. An electronic device, which comprises an operational unit and a user-specific module and which is arranged to communicate with a radio network, wherein
data in the electronic device, necessary for checking the user-specific module, is protected with a key of the encryption method employed by the protection performer, and a verification key of the encryption method employed by the protection performer is stored in the operational unit of the electronic device for verifying the data necessary for checking the user-specific module, and the electronic device is arranged to verify the data necessary for checking the user-specific module by using the verification key of the encryption method, and if the verification fails, to restrict its operation at least by not connecting to the radio network; -
to check the user-specific module by means of the data necessary for checking the user-specific module; and
to start if the user-specific module check succeeds, or to restrict its operation at least by not connecting to the radio network if the user-specific module check fails. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification