Browse Prior Art Database

Wireless Transport of SIM Data for Cell Phones Disclosure Number: IPCOM000028930D
Original Publication Date: 2004-Jun-08
Included in the Prior Art Database: 2004-Jun-08
Document File: 1 page(s) / 44K

Publishing Venue



Today when a customer purchases a cellular phone, they must call into a service center and follow a series of steps to activate the phone so they can use it. Additionally, if the customer buys a replacement phone, they must repeat this process and there is the added problem of migrating personal information and preferences. Since the process of setting up the phone and enabling the account can be a cumbersome, what is needed is a method and system to store cellular phone account and personal information/preferences in a persistent and transportable manner. A small wireless device can be used to store the SIM (Subscriber Indentity Model) data for the cell phone account. This small device could also store personalized information such as phone book entries, quick dial settings (number and voice if supported), ring tones, volume preferences, games, internet settings including bookmarks, IM data, and other data/prefeferences. This data could be transmitted to a compatible cellular phone via a learn/synch mode. Thus facilitating easy cell phone activation and even enabling users to temporarily program a borrowed phone using their own account instead of someone else's. The data would be encrypted on the SIM-FOB and the sync operation would be protected using PKI authentication, which would only initiated after entering a password. With this method, the key fob could be sold seperately from the phone being used.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Wireless Transport of SIM Data for Cell Phones

The SIM fob is initialized at the store or by the user at first use. If the user performs the initialization, the phone company sets a temporary password on the fob.

There are three possible modes in which the communication could occur: Learn Mode :

- The key fob has a password built in that the user programs at

          - The phone could have limited amount of retries to validate a password with the key fob, at which point the key fob would time out for 'x' seconds such that it wouldn't be conducive to a brute force attack on the password.

Temporary Mode :

          - When the user wants to use a seperate phone, the phone would have a 'temporary mode' which would allow for a one time learn for the next phone call and then revert back to the previous configuration.

Sync Mode :

          - Data can be synched between the fob and the phone.. Authentication flow:

Push button buttonPushon fob


on phone

Program phone with fob data


 Enter fob password on phone

Pwd retry with timeout



Save phone data, program with fob data for next call


Exchange PKI keys

Program fob with phone data


[This page contains 1 picture or other non-text object]