Method for protecting electronic device, and electronic device
First Claim
1. A method for protecting, an electronic communication device having an operational unit and a user-specific module, comprisingstoring, at a time prior to a first use of the electronic communication device by a user associated with the user-specific module, a checking program for checking the user-specific module in the operational unit, the checking program being used to check compatibility of the user-specific module with the operational unit;
- protecting, at the time prior to the first use of the device, the checking program with a key of an encryption method for use by a protection performer; and
storing, at the time prior to the first use of the device, in the operational unit, a verification key of the encryption method used by the protection performer for verifying the authenticity of the checking program so that the authenticity of the checking program can be verified before being used for checking the compatibility of the user-specific module with the operational unit making altering of the checking program and unauthorized use of the electronic communication device more difficult.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to an electronic device, which comprises an operational unit and a user-specific module. Data in the device, necessary for checking the user-specific module, is protected with a key of the encryption method employed by the device manufacturer. A verification key of the encryption method employed by the electronic device manufacturer is stored in the operational unit, by means of which verification key the data necessary for checking the user-specific module is verified.
31 Citations
37 Claims
-
1. A method for protecting, an electronic communication device having an operational unit and a user-specific module, comprising
storing, at a time prior to a first use of the electronic communication device by a user associated with the user-specific module, a checking program for checking the user-specific module in the operational unit, the checking program being used to check compatibility of the user-specific module with the operational unit; -
protecting, at the time prior to the first use of the device, the checking program with a key of an encryption method for use by a protection performer; and storing, at the time prior to the first use of the device, in the operational unit, a verification key of the encryption method used by the protection performer for verifying the authenticity of the checking program so that the authenticity of the checking program can be verified before being used for checking the compatibility of the user-specific module with the operational unit making altering of the checking program and unauthorized use of the electronic communication device more difficult. - View Dependent Claims (2, 3, 4, 5, 6, 20, 37)
-
-
7. A method for checking an electronic communication device having an operational unit and a user-specific module wherein a checking program is stored in the operational unit for checking the user-specific module, the checking program being stored in the operational unit at a time prior to a first use of the electronic communication device by a user associated with the user-specific module, the checking program being used to check compatibility of the user-specific module with the operational unit and wherein the checking program is encrypted, at the time prior to the first use of the electronic communication device, with a key of an encryption method for use by a protection performer, and further wherein a verification key of the encryption method is stored in the operational unit for use by the protection performer for verifying the checking program, the verification key being stored in the operational unit at the time prior to the first use of the electronic communication device;
- the method further comprising;
verifying the correctness of the checking program by using the verification key of the encryption method so that the authenticity of the checking program can be verified before being used for checking the compatibility of the user-specific module with the operational unit making altering of the checking program and unauthorized use of the electronic communication device more difficult, and if the verification fails, at least preventing the electronic communication device from being connected to a radio network; if the verification is successful, checking the user-specific module by means of the checking program; and if the user-specific module check succeeds, starting the electronic communication device or if the user-specific module check fails at least preventing the electronic communication device from being connected to the radio network. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
- the method further comprising;
-
21. An electronic communication device, having an operational unit and a user-specific module comprising:
-
a checking program adapted to cause the operational unit to check the user-specific module, the checking program being stored in the operational unit at a time prior to a first use of the electronic communication device by a user associated with the user-specific module, the checking program being used to check compatibility of the user-specific module with the operational unit, wherein the checking program is protected, at the time prior to the first use of the electronic communication device, with a key of an encryption method employed by a protection performer, and wherein a verification key of the encryption method is stored in the operational unit for verifying the checking program, the verification key being stored in the operational unit at the time prior to the first use of the electronic communication device, and wherein the operational unit is further caused; to verify the correctness of the checking program by using the verification key of the encryption method so that the authenticity of the checking program can be verified before being used for checking the compatibility of the user-specific module with the operational unit making altering of the checking program and unauthorized use of the electronic communication device more difficult, and if the verification fails, to restrict its operation at least by not connecting to the radio network; and if the verification is successful, to check the user-specific module by means of the checking program; and
start the electronic communication device, if the user-specific module check succeeds, or to restrict its operation at least by not connecting to the radio network, if the user-specific module check fails. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. An apparatus comprising:
-
an operational unit and a user-specific module, configured to communicate with a radio network; and
wherein data used to check compatibility of the user-specific module with the operational unit is stored in the operational unit at a time prior to the first use of the apparatus by a user associated with the user-specific module, the data being protected, at the time prior to the first use of the apparatus, with a key of an encryption method employed by a protection performer;a verification key of the encryption method employed by the protection performer is stored in the operational unit of the user equipment for verifying the correctness of the data in the operational unit necessary for checking the user-specific module, the verification key being stored in the operational unit at the time prior to the first use of the apparatus; the apparatus is configured to verify the data necessary for checking the user-specific module by using the verification key of the encryption method so that the authenticity of the checking program can be verified before being used for checking the compatibility of the user-specific module with the operational unit making altering of the checking program and unauthorized use of the apparatus more difficult; if the verification fails, to restrict operation of the apparatus, at least by not connecting to the radio network; if the verification is successful, to check the user-specific module by means of the data necessary for checking the user-specific module; and to start the apparatus, if the user-specific module check succeeds, or to restrict its operation at least by not connecting to the radio network if the user-specific module check fails. - View Dependent Claims (36)
-
Specification