Security system and method
First Claim
1. A method of message management for use with a mobile communications device having a core memory and a protected memory, the mobile communications device in communication with a radio telecommunications system comprised of an authorized radio telecommunications system operator and an unauthorized radio telecommunications system operator, the authorized and unauthorized radio telecommunications system operators each having a unique identification code which is associated with messages communicated therefrom, the method comprising the steps of:
- storing the identification code of the authorized radio telecommunications system operator in the core memory of the mobile communications device;
receiving at the mobile communications device a first message to be stored in the protected memory of the mobile communications device with an identification code associated therewith from the radio telecommunications system;
comparing at the mobile communications device the identification code of the first message with the identification code of the authorized radio telecommunications system operator stored in the core memory of the mobile communications device if the first message is to be stored in the protected memory; and
storing the first message in the protected memory of the mobile communications device only if the identification code of the first message matches the identification code of the authorized radio telecommunications system operator.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of message management is provided for use with a mobile communications device having core and protected memories. The mobile communications device is in communication with a radio telecommunications system comprised of authorized and unauthorized radio telecommunications system operators, each operator have a unique identification code which is associated with messages communicated therefrom. The method of message management includes the step of storing the identification code of the authorized system operator in the core memory, receiving a message with an identification code associated therewith from the radio telecommunications system, and comparing the identification code of the message with the identification code of the authorized system operator. The method further includes the step of storing the message in the protected memory only if the identification code of the message matches the identification code of the authorized system operator. An apparatus is also provided for practicing the above mentioned method.
-
Citations
17 Claims
-
1. A method of message management for use with a mobile communications device having a core memory and a protected memory, the mobile communications device in communication with a radio telecommunications system comprised of an authorized radio telecommunications system operator and an unauthorized radio telecommunications system operator, the authorized and unauthorized radio telecommunications system operators each having a unique identification code which is associated with messages communicated therefrom, the method comprising the steps of:
-
storing the identification code of the authorized radio telecommunications system operator in the core memory of the mobile communications device;
receiving at the mobile communications device a first message to be stored in the protected memory of the mobile communications device with an identification code associated therewith from the radio telecommunications system;
comparing at the mobile communications device the identification code of the first message with the identification code of the authorized radio telecommunications system operator stored in the core memory of the mobile communications device if the first message is to be stored in the protected memory; and
storing the first message in the protected memory of the mobile communications device only if the identification code of the first message matches the identification code of the authorized radio telecommunications system operator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
determining if a received message is a first message to be stored in the protected memory or a second message to be stored in the unprotected memory;
storing the received message in the unprotected memory if the received message is said second message to be stored in the unprotected memory.
-
-
4. The method according to claim 3, further comprising the step of transmitting an accept-message signal to the radio telecommunications network if the received message is stored in either the protected memory or the unprotected memory.
-
5. The method according to claim 1, wherein the first message is an over-the-air-activation message and the identification code associated with the first message is a system operator code identifying either an authorized or an unauthorized radio telecommunications system operator.
-
6. The method according to claim 1, wherein the first message is an over-the-air-programming message having information regarding the bands of authorized and unauthorized radio telecommunications service providers and the identification code associated with the first message are the values of a predetermined sequence of bands representative of an authorized or an unauthorized radio telecommunications system operator.
-
7. The method according to claim 1, wherein the mobile communications device further comprises a temporary memory and wherein the step of receiving further comprises storing the first message in the temporary memory.
-
8. The method according to claim 7, further comprising the step of:
discarding the first message if the identification code of the first message does not match the identification code of the authorized radio telecommunications system operator.
-
9. The method according to claim 7, wherein the first message remains in the temporary memory if the identification code of the first message does not match the identification code of the authorized radio telecommunications system operator until the first message is overwritten or the mobile communications device is turned off.
-
10. A mobile communications device for use with a radio telecommunications system, the radio telecommunications system comprised of an authorized radio telecommunications system operator and an unauthorized radio telecommunications system operator, the authorized and unauthorized radio telecommunications system operators each having a unique identification code which is associated with messages communicated therefrom, the mobile communications device comprising:
-
a receiver to receive messages from a radio telecommunications network;
a core memory with an identification code stored therein, the identification code associated with an authorized radio telecommunications system operator;
a protected memory for storing first messages;
a programmable computational apparatus coupled to the receiver and the core memory; and
a message management program operating in the programmable computational apparatus, wherein the message management program controls the programmable computational apparatus to compare an identification code of a message received by the receiver with the identification code of the authorized radio telecommunications system operator stored in the core memory if the message is to be stored in the protected memory and to store the message in the protected memory only if the identification code of the message matches the identification code of the authorized radio telecommunications system operator stored in the core memory. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification