METHODS AND APPARATUS OF OVER-THE-AIR PROGRAMMING OF A WIRELESS UNIT
First Claim
1. A unit comprising:
- memory for storing an unlock code with the unlock code being generated from an algorithm using a multiuse secret code for a particular network and an identifier of the unit;
a control for receipt of an input code; and
a processor being functionally connected to the control and to the memory to effect a comparison of the input code to the unlock code, and to effect an unlocking of the unit if the comparison results in a finding that the input code is substantially equal to the unlock code.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for secure over-the-air (OTA) programming, and particularly, activation, of a wireless unit in a particular communications system. The unit stores a stored key having been generated by using a key algorithm (K-algorithm) with an identifier associated with the unit as an input to the K-algorithm. The unit may receive information such as parameters and a verification number from a communications system for the purpose of programming the unit. The verification number is generated by using an authorization algorithm (A-algorithm) having the parameters and a key as A-algorithm inputs. They key is generated by the K-algorithm having the identifier associated with the K-algorithm input. In response to the receipt of the parameters and the verification number, the wireless unit generates a trial verification number by using the A-algorithm with the parameters and the stored key as trial inputs. The unit compares the verification number to the trial verification number for a match. When finding the match, the unit uses the parameters for programming of the unit in the particular communications system. When failing to find the match, the unit fails to use the parameters for the programming.
-
Citations
50 Claims
-
1. A unit comprising:
-
memory for storing an unlock code with the unlock code being generated from an algorithm using a multiuse secret code for a particular network and an identifier of the unit; a control for receipt of an input code; and a processor being functionally connected to the control and to the memory to effect a comparison of the input code to the unlock code, and to effect an unlocking of the unit if the comparison results in a finding that the input code is substantially equal to the unlock code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
generating an unlock code by using an algorithm with a multi-use secret code for a particular network and an identifier; storing the unlock code in the unit; and configuring the unit to be unlocked through input into the unit of an input code substantially equal to the unlock code, whereby the unit is unlocked with the input of the input code substantially equal to the unlock code. - View Dependent Claims (10, 11, 12)
-
-
13. A method comprising:
-
generating an unlock code using an algorithm with a multi-use secret code for a particular network and an identifier; receiving an input code; comparing the input code to the unlock code; and unlocking a unit if the input code is substantially equal to the unlock code. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computer-readable medium on which is stored a computer program, which when executed by a computer perform:
-
obtaining a multi-use secret code for a particular network; using the secret code with an identifier in an algorithm to generate an unlock code; loading a unit with the unlock code; and configuring the unit so that the unit can be unlocked through input into the unit of an input code substantially equal to the unlock code. - View Dependent Claims (20, 21)
-
-
22. A method comprising:
-
configuring a communication unit to be lockable; configuring a communication unit to be unlockable; and generating an unlock code for the communication unit using a multi-use secret code for a particular network and at least an identifier, wherein the unlock code is generated from an algorithm and is used to change the state of the communication unit from locked to unlocked. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A lockable/unlockable communication unit, the communication unit comprising:
-
a memory having unlock code stored therein, the unlock code generated from an algorithm, which uses at least a multi-use secret code for a particular network and an identifier; a control adapted to receive an input code; and a processor in communication with the control and the memory, the processor adapted to compare the unlock code with the input code, and responsive to the input code being substantially equal to the unlock code, the processor effects a change of state from locked to unlocked. - View Dependent Claims (32, 33, 34)
-
-
35. A system comprising:
-
means for configuring a communication unit to be lockable; means for configuring a communication unit to be unlockable; and means for generating an unlock code for the communication unit using at least a multi-use secret code for a particular network and an identifier, wherein the unlock code is generated from an algorithm and is used to change the state of the communication unit from locked to unlocked. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A computer-readable medium on which is stored a computer program, the computer program comprising instructions, which when executed by a computer perform:
-
configuring a communication unit to be lockable; configuring a communication unit to be unlockable; and generating an unlock code for the communication unit using at least a multi-use secret code for a particular network and an identifier, wherein the unlock code is generated from an algorithm and is used to change the state of the communication unit from locked to unlocked. - View Dependent Claims (45, 46, 47, 48, 49, 50)
-
Specification