Coding method of mobile user equipment
First Claim
1. An equipment identity coding method of a mobile user equipment comprising:
- receiving an input command comprising an equipment identity;
generating a security code when the input command is received; and
coding and storing the equipment identity by using the generated security code.
1 Assignment
0 Petitions
Accused Products
Abstract
An International Mobile Equipment Identification (IMEI) is coded and then stored in a user equipment (UE), wherein an authorized user is allowed to change the existing IMEI. When an IMEI is inputted, the UE generates a security code and stores the IMEI and the generated security code in a memory. Thereafter, if a second security code and IMEI is inputted, the UE determines whether the inputted security code is identical with the pre-stored security code. If the two security codes are identical with each other, the UE generates a third security code and stores the IMEI and the generated third security code. Thus, unauthorized IMEI storage is prevented. Accordingly, the IMEI coding method of the mobile UE can prevent unauthorized use of the UE while allowing the IMEI to be re-coded without hardware alteration.
-
Citations
25 Claims
-
1. An equipment identity coding method of a mobile user equipment comprising:
-
receiving an input command comprising an equipment identity;
generating a security code when the input command is received; and
coding and storing the equipment identity by using the generated security code. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An equipment identity coding method of a mobile user equipment comprising:
-
receiving a first input command comprising a first equipment identity;
generating a first security code when the first input command is received;
coding and storing the first equipment identity by using the first security code;
receiving a second input command comprising a second equipment identity;
comparing a pre-stored first security code with a second security code when the second input command is received, wherein the second security code is contained in the second input command;
generating a third security code when the first and second security codes are identical with each other; and
coding and storing the second equipment identity by using the third security code. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An equipment identity coding method of a mobile user equipment, comprising:
-
receiving, at a user equipment, an input command of a second equipment identity containing a second security code;
checking whether a first security code is stored in the user equipment when the input command is an equipment identity write command;
determining whether the first and second security codes are identical with each other when the first security code is stored in the user equipment; and
generating a third security code if the first and second security codes are identical with each other; and
coding and storing the second equipment identity in the user equipment by using the generated third security code. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A software program to allow a processor to read and execute an equipment identity coding method of a mobile user equipment, the method comprising:
-
receiving, at a user equipment, an input command of a second equipment identity containing a second security code;
checking whether a first security code is stored in the user equipment when the input command is an equipment identity write command;
determining whether the first and second security codes are identical with each other when the first security code is stored in the user equipment; and
generating a third security code if the first and second security codes are identical with each other; and
coding and storing the second equipment identity in the user equipment by using the generated third security code.
-
-
25. A processor-readable storage media storing a software program to allow a processor to read and execute a coding method of a mobile user equipment, the method comprising:
-
receiving, at a user equipment, an input command of a second equipment identity containing a second security code;
checking whether a first security code is stored in the user equipment when the input command is an equipment identity write command;
determining whether the first and second security codes are identical with each other when the first security code is stored in the user equipment; and
generating a third security code if the first and second security codes are identical with each other; and
coding and storing the second equipment identity in the user equipment by using the generated third security code.
-
Specification