Method of preventing the unauthorized use of a user identification module
First Claim
1. A method of preventing unauthorized use of a removable user identification module (UIM), the method comprising:
- attaching a removable UIM previously used with a first communication terminal to a second communication terminal, wherein the UIM has first and second card holder verification (CHV) states; and
determining whether the second communication terminal is attached to the UIM for a first time when the second communication terminal is powered on; and
changing the CHV state to require user authentication of the UIM if the second communication terminal is attached to the UIM for the first time,wherein determining whether the second communication terminal is attached to the UIM for the first time comprises;
the UIM examining an electronic serial number (ESN) of the second communication terminal when the UIM is attached to the second communication terminal;
comparing the ESN of the second communication terminal with a stored ESN in the UIM; and
determining that the second communication terminal is attached to the UIM for the first time if the ESN of the second communication terminal does not match the stored ESN in the UIM.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of preventing unauthorized use of a user Identification module (UIM) is provided. The method comprises attaching a UIM previously used with a first communication terminal to a second communication terminal, wherein the UIM is configured to have first and second card holder verification (CHV) states; authenticating the second communication terminal and the UIM regardless of whether the UIM is in the first or the second verification states. The authenticating step may comprise determining an electronic serial number (ESN) of the second communication terminal; and comparing the ESN of the second communication terminal with an ESN of the first communication terminal.
41 Citations
15 Claims
-
1. A method of preventing unauthorized use of a removable user identification module (UIM), the method comprising:
-
attaching a removable UIM previously used with a first communication terminal to a second communication terminal, wherein the UIM has first and second card holder verification (CHV) states; and determining whether the second communication terminal is attached to the UIM for a first time when the second communication terminal is powered on; and changing the CHV state to require user authentication of the UIM if the second communication terminal is attached to the UIM for the first time, wherein determining whether the second communication terminal is attached to the UIM for the first time comprises; the UIM examining an electronic serial number (ESN) of the second communication terminal when the UIM is attached to the second communication terminal; comparing the ESN of the second communication terminal with a stored ESN in the UIM; and determining that the second communication terminal is attached to the UIM for the first time if the ESN of the second communication terminal does not match the stored ESN in the UIM.
-
-
2. A method of preventing unauthorized use of a user identification module (UIM), the method comprising:
-
attaching the UIM, having first and second card holder verification (CHV) states, to a mobile communication terminal; determining whether the mobile communication terminal is attached to the UIM for a first time when the mobile communication terminal is powered on, wherein determining whether the mobile communication terminal is attached to the UIM for the first time comprises; determining an electronic serial number (ESN) of the mobile communication terminal when the UIM is attached to the mobile communication terminal; comparing, in the UIM, the ESN of the mobile communication terminal with a stored ESN in the UIM, wherein the comparison of the ESN of the communication terminal with a stored ESN in the UIM occurs in the UIM; determining that the mobile communication terminal is attached to the UIM for the first time if the ESN of the mobile communication terminal does not match the stored ESN in the UIM; and changing the first CHV state to the second CHV state if the mobile communication terminal is attached to the UIM for the first time. - View Dependent Claims (3, 4, 5)
-
-
6. A method of preventing unauthorized use of a personalized user identification module (UIM) for use with a communication terminal, the method comprising:
-
attaching a removable UIM previously used with a first communication terminal including first identifying information to a second communication terminal having second identifying information, wherein the UIM can be configured in a first card holder verification (CHV) state requiring user authentication before the second communication terminal can be used or a second CHV state not requiring user authentication before the communication terminal can be used, the first identifying information comprising a first electronic serial number (ESN) stored in the UIM and the second identifying information comprising a second ESN associated with the second communication terminal; determining whether the second communication terminal is attached to the UIM for a first time by comparing the first ESN stored in the UIM and second ESN of the second communication terminal when the second communication terminal is powered on; and changing the UIM to the first CHV state if the first ESN stored in the UIM does not match the ESN of the second communication terminal.
-
-
7. A user identification module (UIM) for use with a communication terminal, the UIM comprising:
-
a first memory for storing a first electronic serial number (ESN) of a first communication terminal; and a second memory for storing information indicating a first card holder verification (CHV) state, wherein the first CHV state requires the entry of authentication information before a second communication terminal with a second ESN can be used in association with the UIM if the second communication terminal has been attached to the UIM for the first time, wherein the first ESN is compared to a second ESN to determine if the second communication terminal has been attached to the UIM for the first time, and wherein the first state is set to a second CHV state stored in the second memory if the first ESN is not the same as the second ESN. - View Dependent Claims (8, 9)
-
-
10. A communication terminal for use with a user identification module (UIM), the communication terminal comprising:
-
a processing unit; and logic code executed by the processing unit to perform; detecting attachment of the UIM; determining if the VIM is previously used with the communication terminal, wherein the VIM is configured to have first and second card holder verification (CHV) states; determining an electronic serial number (ESN) of the communication terminal; and comparing the ESN of the communication terminal with a stored ESN of the UIM to determine if the UIM is previously used with the communication terminal; and changing the CHV state to require user authentication of the UIM if the ESN of the communication terminal does not match the stored ESN in the UIM.
-
-
11. A user identification module (UIM) for use with a mobile communication terminal, the UIM comprising:
-
a data recording medium; and logic code stored in the data recording medium capable of execution by a processing unit, wherein execution of the logic code causes the processing unit to perform; determining attachment of the UIM, having first and second card holder verification (CHV) states, to the mobile communication terminal; determining whether it is a first time the mobile communication terminal is attached to the UIM when the mobile communication terminal is powered on; determining an electronic serial number (ESN) of the mobile communication terminal when the UIM is attached to the mobile communication terminal; comparing the ESN of the mobile communication terminal with a stored ESN in the UIM; determining that the mobile communication terminal is attached to the UIM for the first time if the ESN of the mobile communication terminal does not match the stored ESN in the UIM; and changing the first CHV state to the second CHV state if it is determined that the mobile communication terminal is attached to the UIM for the first time. - View Dependent Claims (12, 13, 14)
-
-
15. A method of preventing unauthorized use of a removable user identification module (UIM) removed from a first communication terminal and inserted into a second communication terminal, wherein the removable UIM is configured to have first and second verification states, the method comprising:
-
determining authenticity of the removable UIM in relation to the second communication terminal, requiring user authentication of the UIM, if the second communication terminal is attached to the UIM for the first time regardless of whether the UIM is in the first or the second verification state by determining an input provided to the second communication terminal, wherein determining whether the second communication terminal is attached to the UIM for the first time comprises; determining an electronic serial number (ESN) of the second communication terminal when the UIM is attached to the second communication terminal; comparing the ESN of the second communication terminal with a stored ESN in the UIM; and determining that the second communication terminal is attached to the UIM for the first time if the ESN of the second communication terminal does not match the stored ESN in the UIM; and comparing the input to the second communication terminal with an input provided to the first communication terminal.
-
Specification