Method of registering identification number in personal communication terminal
First Claim
1. A method of registering an identification number in a personal communication terminal to enable it to access communications services provided by a carrier, comprising the steps of:
- a) storing a first key in a secret manner into the personal communication terminal before the communication terminal is sold to a user;
b) receiving an identification number encrypted with a second key associated with the first key from the carrier, after the personal communication terminal is sold to the user;
c) decrypting the encrypted identification number in a secret manner within the personal communication terminal by using the first key from the carrier; and
d) storing the decrypted identification number in a secret manner into the personal communication terminal, wherein the step a) includes the substeps of;
i) inputting manufacturer application information to manufacturer equipment;
ii) transmitting the input manufacturer application information from the manufacturer equipment to carrier equipment;
iii) automatically generating the first key corresponding to the manufacturer information in the carrier equipment;
iv) automatically transmitting the generated first key from the carrier equipment to the manufacturer equipment; and
v) automatically storing the first key received from the carrier equipment into the personal communication terminal, in the manufacturer equipment.
1 Assignment
0 Petitions
Accused Products
Abstract
Prior to the sale of a personal communication terminal, a secret key is generated and stored in the personal communication terminal in accordance with an application made from the manufacturer to the carrier. At this time, the communication between the manufacturer and the carrier is performed in the form of secret communication with a signature that conforms to a public key system. After the sale, an identification number encrypted with the same key as the secret key is transmitted to the personal communication terminal in accordance with an application made from the user to the carrier. Using the stored secret key, the personal communication terminal decrypts the received identification number for storage therein.
-
Citations
24 Claims
-
1. A method of registering an identification number in a personal communication terminal to enable it to access communications services provided by a carrier, comprising the steps of:
-
a) storing a first key in a secret manner into the personal communication terminal before the communication terminal is sold to a user; b) receiving an identification number encrypted with a second key associated with the first key from the carrier, after the personal communication terminal is sold to the user; c) decrypting the encrypted identification number in a secret manner within the personal communication terminal by using the first key from the carrier; and d) storing the decrypted identification number in a secret manner into the personal communication terminal, wherein the step a) includes the substeps of; i) inputting manufacturer application information to manufacturer equipment; ii) transmitting the input manufacturer application information from the manufacturer equipment to carrier equipment; iii) automatically generating the first key corresponding to the manufacturer information in the carrier equipment; iv) automatically transmitting the generated first key from the carrier equipment to the manufacturer equipment; and v) automatically storing the first key received from the carrier equipment into the personal communication terminal, in the manufacturer equipment. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of registering an identification number in a personal communication terminal to enable it to access communications services provided by a carrier, comprising the steps of:
-
a) storing a first key in a secret manner into the personal communication terminal before the communication terminal is sold to a user; b) receiving an identification number encrypted with a second key associated with the first key from the carrier, after the personal communication terminal is sold to the user; c) decrypting the encrypted identification number in a secret manner within the personal communication terminal by using the first key from the carrier; and d) storing the decrypted identification number in a secret manner into the personal communication terminal, wherein the step b) includes the substeps of; i) inputting user application information to user equipment; ii) transmitting the input user application information to carrier equipment, said user application information being encrypted with the first key in the personal communication terminal and the encrypted user application information being decrypted with the second key equipment in the carrier equipment a document including the user application information being further transmitted, and the user application information included in the document being compared with the decrypted user application information; iii) automatically transmitting the encrypted identification number to the user equipment; iv) automatically generating the identification number corresponding to the user; v) automatically encrypting the identification number with the second key; and vi) automatically transmitting the encrypted identification number to the user equipment. - View Dependent Claims (8)
-
-
9. A method of registering an identification number in a personal communication terminal to enable it to access communications services provided by a carrier, comprising the steps of:
-
a) storing a first key in a secret manner into the personal communication terminal before the communication terminal is sold to a user; b) receiving an identification number encrypted with a second key associated with the first key from the carrier, after the personal communication terminal is sold to the user; c) decrypting the encrypted identification number in a secret manner within the personal communication terminal by using the first key from the carrier; and d) storing the decrypted identification number in a secret manner into the personal communication terminals, wherein the step a) includes the substep of; i) inputting manufacturer application information to manufacturer equipment; ii) transmitting the input manufacturer application information from the manufacturer equipment to carrier equipment; iii) automatically generating a third key corresponding to the manufacturer information in the carrier equipment; iv) automatically transmitting the generated third key from the carrier equipment to the manufacturer equipment; v) automatically encrypting a number corresponding to the personal communication terminal with the third key received from the carrier equipment to generate the first key; and vi) automatically storing the generated first key into the personal communication terminal. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of storing a key into a personal communication terminal, the key being to be used for decrypting an encrypted identification number in order to store the identification number into the personal communication terminal to enable it to access communications services provided by a carrier, comprising the steps of:
-
i) inputting manufacturer application information to manufacturer equipment; ii) transmitting the input manufacture application information from the manufacturer equipment to carrier equipment; iii) automatically generating the key corresponding to the manufacturer information in the carrier equipment; iv) automatically transmitting the generated key from the carrier equipment to the manufacturer equipment; and v) automatically storing the key received from the carrier equipment into the personal communication terminal, in the manufacturer equipment. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification