Browse Prior Art Database

Cell Phone Security

IP.com Disclosure Number: IPCOM000168271D
Original Publication Date: 2008-Mar-26
Included in the Prior Art Database: 2008-Mar-26
Document File: 5 page(s) / 278K

Publishing Venue

Siemens

Related People

Juergen Carstens: CONTACT

Abstract

Cell phone theft and its re-use is becoming a major problem in all countries. Most people have important data stored on the cell phone which is irrecoverably lost if it is stolen. Moreover, the stolen cell phone may be used for calls leading to a large cell phone bill for the legal owner. Currently, cell phones are usually protected by the cell phone PIN (Personal Identification Number). If the PIN protection is enabled on the cell phone, the PIN code has to be entered each time the cell phone is switched on. More sophisticated solutions are also provided with biometric authentication control such as print recognition or voice recognition. Furthermore, the service provider has to be informed immediately about the cell phone theft or loss so that no unauthorized calls can be made from the cell phone.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 5

Cell Phone Security

Idea: M Mahesh, IN-Bangalore

Cell phone theft and its re-use is becoming a major problem in all countries. Most people have important data stored on the cell phone which is irrecoverably lost if it is stolen. Moreover, the stolen cell phone may be used for calls leading to a large cell phone bill for the legal owner.

Currently, cell phones are usually protected by the cell phone PIN (Personal Identification Number). If the PIN protection is enabled on the cell phone, the PIN code has to be entered each time the cell phone is switched on. More sophisticated solutions are also provided with biometric authentication control such as print recognition or voice recognition. Furthermore, the service provider has to be informed immediately about the cell phone theft or loss so that no unauthorized calls can be made from the cell phone.

It is proposed to protect the cell phone using a password which is stored in an EPROM (Erasable Programmable Read Only Memory) chip and not in the user memory of the cell phone. Initially, the EPROM chip contains a cipher text which is derived from the components in the cell phone. Thus, the cipher text can be clearly allocated to a cell phone. The password field, SIM (Subscriber Identification Module) field, and present number field are initially empty (refer to Figure 1).

When the SIM card is inserted into the cell phone for the first time, the user has to enter a password. Then the user has to specify two preset numbers. One of these numbers can be that of the cell phone provider. The preset numbers help to track the cell phone. The password, the preset numbers and the SIM card number are stored in the EPROM chip in an encrypted form. Only after this procedure, the user is able to access the application programs in the cell phone (refer to Figure 2).

Each time the cell phone is switched on, the EPROM chip is activated and checks whether the SIM card number is consistent with the stored SIM card number. If this is the case, the user is forwarded to the cell phone applications. If the numbers are different, the user has to enter the password. If the password matches the password on the EPROM chip, the user is forwarded to the cell phone applications. Elsewise, the user is prompted to re-enter the password. The applications are not started until the correct password is entered (refer to Figure 3). This procedure ensures that an unauthorized user is not able to use a stolen phone with a new SIM card since this user does not know the EPROM password.

Additionally, the proposed solution can be used to provide for low level software a data backup und an reduction of unauthori...