Method of preventing the unauthorized use of a user identification module
First Claim
1. A method of preventing unauthorized use of a user identification module (UIM), the method comprising the steps of:
- attaching the UIM previously used with a first communication terminal to a second communication terminal, wherein the UIM is configured to have first and second card holder verification (CHV) states; and
authenticating the second communication terminal and the UIM regardless of whether the UIM is in the first or the second CHV states.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of preventing unauthorized use of a user Identification module (UIM) is provided. The method comprises attaching a UIM previously used with a first communication terminal to a second communication terminal, wherein the UIM is configured to have first and second card holder verification (CHV) states; authenticating the second communication terminal and the UIM regardless of whether the UIM is in the first or the second verification states. The authenticating step may comprise determining an electronic serial number (ESN) of the second communication terminal; and comparing the ESN of the second communication terminal with an ESN of the first communication terminal.
-
Citations
20 Claims
-
1. A method of preventing unauthorized use of a user identification module (UIM), the method comprising the steps of:
-
attaching the UIM previously used with a first communication terminal to a second communication terminal, wherein the UIM is configured to have first and second card holder verification (CHV) states; and
authenticating the second communication terminal and the UIM regardless of whether the UIM is in the first or the second CHV states. - View Dependent Claims (2)
-
-
3. A method of preventing unauthorized use of a user identification module (UIM) for a mobile communication terminal, comprising the steps of:
-
attaching the UIM, having first and second card holder verification (CHV) states, to a communication terminal;
determining whether the communication terminal is attached to the UIM for a first time, when the communication terminal is powered on; and
changing the first CHV state to the second CHV state, if the communication terminal is attached to the UIM for the first time. - View Dependent Claims (4, 5, 6, 7)
-
-
8. A method of preventing unauthorized use of a personalized UIM for use with a communication terminal, the method comprising:
-
attaching a UIM including first identifying information to a communication terminal having second identifying information, wherein the UIM can be configured in a first state to require user authentication and a second state not to require user authentication before the communication terminal can be used;
determining if the first and second identifying information are different; and
configuring the UIM in the first CHV state, if the first and second identifying information are different, wherein a user is prompted to enter authentication information before the communication terminal is used. - View Dependent Claims (9, 10)
-
-
11. A UIM for use with a communication terminal, the UIM comprising:
-
a first memory for storing an ESN of a first communication terminal; and
a second memory for storing information indicating a first state, wherein the first state requires the entry of authentication information before a second communication terminal with a second ESN can be used in association with the UIM, and wherein the first state is stored in the second memory if the first ESN is not the same as the second ESN. - View Dependent Claims (12, 13)
-
-
14. A communication terminal for use with a user identification module (UIM), the communication terminal comprising:
-
a processing unit; and
logic code executed by the processing unit to perform;
detecting attachment of the UIM;
determining if the UIM is previously used with a first communication terminal, wherein the UIM is configured to have first and second card holder verification (CHV) states; and
requiring for authentication of the UIM regardless of whether the UIM is in the first or the second verification state. - View Dependent Claims (15)
-
-
16. A user identification module (UIM) for use with a mobile communication terminal, the UIM comprising:
-
a data recording medium; and
logic code stored in the data recording medium capable of execution by a processing unit, wherein execution of the logic code causes the processing unit to perform;
determining attachment of the UIM, having first and second card holder verification (CHV) states, to the mobile communication terminal;
determining whether it is a first time the mobile communication terminal is attached to the UIM, when the mobile communication terminal is powered on; and
changing the first CHV state to the second CHV state, if it is determined that the mobile communication terminal is attached to the UIM for the first time. - View Dependent Claims (17, 18, 19, 20)
-
Specification