MOBILE TERMINAL THEFT DETECTION SYSTEM
11 Assignments
0 Petitions
Accused Products
Abstract
To detect the theft of a mobile terminal (TM) connected to a radiocommunication network (RR), a device (DA) capable of communicating with a location register (HLR) initially stores an IMSI identity and an IMEI number for the mobile terminal (TM) together with secret data (DonS) provided by the owner of the mobile terminal. After authentication of the mobile terminal by a network entity, the device retrieves the IMSI identity and IMEI number for the mobile terminal, compares the retrieved IMSI identity and IMEI number with the initially stored IMSI identity and IMEI number, queries the mobile terminal (TM) by asking the user of the mobile terminal to provide the secret data if either the retrieved IMSI identity or IMEI number are different from the initially stored IMSI identity or IMEI number, and detects a theft of the mobile terminal if the secret data provided are different from the initially stored secret data (DonS).
17 Citations
30 Claims
-
1-10. -10. (canceled)
-
11. A method to detect the theft of a mobile terminal connected to a radiocommunication network, comprising the steps of:
-
initially storing an IMSI identity and an IMEI number related to the mobile terminal, and a secret data associated with an owner of the mobile terminal to create a stored IMSI identity, a stored IMEI number and a stored secret data; after authentication of the mobile terminal, obtaining a retrieved IMSI identity and a retrieved IMEI number; comparing the retrieved IMSI identity and the retrieved IMEI number with the stored IMSI identity and the stored IMEI number; if either the retrieved IMSI identity or the retrieved IMEI number are different from the stored IMSI identity or the stored IMEI number, obtaining entered secret data by sending a query to the mobile terminal requesting entry of secret data; if the entered secret data is different from the stored secret data, detecting a theft of the mobile terminal. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An apparatus to detect the theft of a mobile terminal connected to a radiocommunication network, comprising:
-
storage means to initially storing an IMSI identity and an IMEI number related to the mobile terminal, and a secret data associated with an owner of the mobile terminal to create a stored IMSI identity, a stored IMEI number and a stored secret data; means to obtain a retrieved IMSI identity and a retrieved IMEI number from a network entity capable of communicating with a location register, after authentication of the mobile terminal; means to compare the retrieved IMSI identity and the retrieved IMEI number with the stored IMSI identity and the stored IMEI number; means to query the mobile terminal to obtain entered secret data by requesting entry of secret data, if either the retrieved IMSI identity or the retrieved IMEI number are different from the stored IMSI identity or the stored IMEI number; means to communicate an alert message, if the entered secret data is different from the stored secret data. - View Dependent Claims (21, 22)
-
-
23. A program comprising executable instructions for a method of detecting the theft of a mobile terminal connected to a radiocommunication network when the program is run on a programmable device, the method comprising the steps of:
-
initially storing an IMSI identity and an IMEI number related to the mobile terminal, and a secret data associated with an owner of the mobile terminal to create a stored IMSI identity, a stored IMEI number and a stored secret data; after authentication of the mobile terminal, obtaining a retrieved IMSI identity and a retrieved IMEI number; comparing the retrieved IMSI identity and the retrieved IMEI number with the stored IMSI identity and the stored IMEI number; if either the retrieved IMSI identity or the retrieved IMEI number are different from the stored IMSI identity or the stored IMEI number, obtaining entered secret data by sending a query to the mobile terminal requesting entry of secret data; if the entered secret data is different from the stored secret data, detecting a theft of the mobile terminal. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
Specification