Publishing Venue
Motorola
Related People
Authors:
Leonid Krasnoposky
•
Danny Zadok
Abstract
Many mobile phones in the market (like GSM phones) use SIM (Subscriber Identity Module) card to store user identity information. These cards, has a special password called PIN (Personal Identity Number) that is used for security authentication during power on. This feature can be switched off. When unauthenticated person, switch on mobile with PIN enabled verification, it will be prompted to input PIN number (usually 4 digits code). Without this input, user can initiate emergency call only, all other calls and features are disabled until successful PIN verification. After 3 unsuccessful PIN verifications SIM is blocked, and can’t be used. This mechanism used to protect stolen equipment from unauthenticated access and sometimes it is called as CHV – Card Holder Verification.
_________________________________________________________________________________
|
Leonid Krasnoposky
Danny Zadok
|
New lock feature for the mobile phones with SIM card to prevent working
with it when it was stolen and was switched on.
Overview
Many
mobile phones in the market (like GSM phones) use SIM (Subscriber Identity
Module) card to store user identity information.� These cards, has a special password called PIN (Personal Identity
Number) that is used for security authentication during power on. This feature
can be switched off. When unauthenticated person, switch on mobile with PIN
enabled verification, it will be prompted to input PIN number (usually 4 digits
code). Without this input, user can initiate emergency call only, all other
calls and features are disabled until successful PIN verification. After 3
unsuccessful PIN verifications SIM is blocked, and can’t be used. This
mechanism used to protect stolen equipment from unauthenticated access and
sometimes it is called as CHV – Card Holder Verification.
Problem
When
the mobile owner finds that the phone has been stolen, he/she should call the
service provider to block usage of this mobile in the system.�
In
practice it takes a while to detect that the phone has been stolen. He/She
needs to check bags, pockets, working places, etc. If the stolen phone was left
ON, the unauthenticated person can continue using the phone. He can use it
until the service provider blocks it in the system or until the phone is
powered off.
Problem decision
New
proposed feature in Mobile Equipment can help to bar all outgoing calls from
unauthenticated access, that is mostly enough in many countries...