(12) United States Patent

Similar documents
software, and perform automatic dialing according to the /*~102

(12) United States Patent Mine et al.

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2002/ A1 Fukuzato (43) Pub. Date: Jun.

\ \ \ connection connection connection interface interface interface

(12) United States Patent

(12) United States Patent (16) Patent N6.= US 6,198,814 B1 Gill (45) Date of Patent: Mar. 6, 2001

US B1 (12) United States Patent. (10) Patent N0.: US 6,282,278 B1 D0ganata et al. (45) Date 0f Patent: Aug. 28, 2001

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 Wu et al. (43) Pub. Date: Feb. 20, 2003

60 REDIRECTING THE PRINT PATH MANAGER 1

US 7,742,946 B2 Jun. 22,2010

(12) United States Patent (10) Patent N0.: US 8,282,471 B1 Korner (45) Date of Patent: Oct. 9, 2012

(12) United States Patent Halonen

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2007/ A1 Ollis et al. HOME PROCESSOR /\ J\ NETWORK

Back up information data by blocks, and generate backup data of each block

US Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2007/ A1 Voight et al. SUBSCRIBER DATABASE.

(12> Ulllted States Patent (16) Patent N6.= US 6,320,621 B1 Fu (45) Date of Patent: Nov. 20, 2001

I SEARCH DATABASE l/ VISIT WEBSITE k ( UPDATE RECORDS Y (54) (75) (73) (21) (22) (63) (60) (US); Gary Stephen Shuster, Oakland, SELECT SUB-DOMAIN NAME

(12) United States Patent (10) Patent N0.: US 7,068,424 B1 Jennings et al. (45) Date of Patent: Jun. 27, 2006

(71) Applicant: SPEAKWRITE, LLC,Austin, TX (US)

United States Patent [191

ENCODED $30 CERT'F'CATE -+ DECODE CERTIFICATE

(12) United States Patent (10) Patent N0.: US 8,326,445 B2 Baak et al. (45) Date of Patent: Dec. 4, 2012

(12) United States Patent Kasamatsu et al.

(12) United States Patent (10) Patent No.: US 8,229,231 B2 Cho et a1. (45) Date of Patent: Jul. 24, 2012

(54) SYSTEM AND METHOD FOR HEDGING W0 WO 00/30053 * 5/2000 AGAINST FOREIGN EXCHANGE RISK. Nusbam, David Trading the Wide World of foreign

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2013/ A1 Chen (57)

(12) United States Patent Armenio et a].

(12) United States Patent Edelen

(12) United States Patent

Lookup CNAM / other database for calllng

(12) Patent Application Publication (10) Pub. No.: US 2013/ A1 Kim et al. (43) Pub. Date: Dec. 5, 2013

(12) United States Patent (10) Patent N0.: US 8,695,377 B2 Bachelier et a]. (45) Date of Patent: Apr. 15, 2014

TEPZZ 9 Z5A_T EP A1 (19) (11) EP A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

(54) (71) (72) Vedelago (TV) (IT) (73) (21) (22) (30) Chirignago (VE) (IT); Alberto Al?er, Foreign Application Priority Data

Ulllted States Patent [19] [11] Patent Number: 6,141,545

(12) (10) Patent N0.: US 7,069,466 B2 Trimmer et a]. (45) Date of Patent: Jun. 27, 2006

US Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2013/ A1 Weng et al. (43) Pub. Date: Sep.

(IP Connection) Miami (54) (76) (21) (22) (51) (52) Application

/ \33 40 \ / \\ \ \ M / f 1. (19) United States (12) Patent Application Publication Lawser et al. NETWORK \ 36. SERVlCE 'NTERNET SERVICE

17 Claims, 19 Drawing Sheets EG4 SD4 {8L4 ( I; DLI Q P A. \! v,zcll. RG1 7 / l. a U ' 14 A I 1) ~ $ _. _. _. T. _. _. _. /,.

llllllllllllllillllllllllllllllllllllllllllllllllllllllllllllllllllllllllll

TEPZZ 68575_A_T EP A1 (19) (11) EP A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

(Us) (73) Assignee: Avaya Technology Corp. Je?' McElroy, Columbia, SC (US); (21) Appl. No.: 10/413,024. (22) Filed: Apr. 14, 2003 (57) ABSTRACT

Ml CRO- MICRO PLEASE

(12) United States Patent (10) Patent N0.2 US 8,566,608 B2 Pemmaraju (45) Date of Patent: Oct. 22, 2013

7714 Evaluation 7 logic

(30) Foreign Application Priority Data

l / Normal End, client 1 granted access to " System 1

(12> Ulllted States Patent (10) Patent N0.: US 6,591,288 B1 Edwards et al. (45) Date of Patent: Jul. 8, 2003

TEPZZ 6_Z76 A_T EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.:

(12) United States Patent (16) Patent N6.= US 6,611,861 B1 Schairer et al. (45) Date of Patent: Aug. 26, 2003

i Load balancer relays request to selected node

(12) United States Patent D0dd et al.

(12) United States Patent

US A1 (19) United States (12) Patent Application Publication (10) Pub. N0.: US 2013/ A1 Simburg (43) Pub. Date: Dec.

(12) United States Patent (10) Patent No.: US 8,253,226 B2 Oguri (45) Date of Patent: Aug. 28, 2012

Hay (43) Pub. Date: Oct. 17, 2002

US Al (19) United States (12) Patent Application Publication (10) Pub. N0.: US 2012/ A1 Lundstrom (43) Pub. Date: NOV.

(54) SYSTEM AND METHOD FOR PROXYING Publication Classi?cation FEDERATED AUTHENTICATION PROTOCOLS (51) Int. Cl.

(54) METHODS AND SYSTEMS FOR FINDING Publication Classi?cation CONNECTIONS AMONG SUBSCRIBERS TO AN CAMPAIGN (51) Int- Cl

i Sampling Results 1 Batch (12) United States Patent Ravid et a]. US 8,706,742 B1 Apr. 22, 2014 (60) /20 Consistency 60 Validation /

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2013/ A1 Fan et al.

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2002/ A1 STRANDBERG (43) Pub. Date: Oct.

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2012/ A1 Lee (43) Pub. Date: Mar.

(54) LOTTERY METHOD Publication Classi?cation

: 2R5 ML OR 2. United States Patent [191. Fig-A3 [111 3,909,553. [451 Sept. 30, 1975 C54 ( T : Marshall. Laboratories Incorporated, Northlake, Ill.

EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: Bulletin 2012/21

US Al (19) United States (12) Patent Application Publication (10) Pub. N0.: US 201 1/ A1 Mostelac (43) Pub. Date: Oct.

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2014/ A1 FAN et al. (43) Pub. Date: Feb.

(12) United States Patent (10) Patent N0.: US 8,721,047 B2 Sakurai et a]. (45) Date of Patent: May 13, 2014

United States Patent [19] [11] Patent Number: 5,671,124

Cunneciiun to credit cards dltabase. The system analyzes all credit cards aeecums.

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2011/ A1 Yen et al. (43) Pub. Date: Sep.

United States Patent [191 Brugliera et al.

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2007/ A1. Operating System. 106 q f 108.

(12) United States Patent Petralia

4,670,900 Jun. 2, 1987

US B1 (12) United States Patent. (10) Patent N0.: US 6,424,627 B1 Snrhaug et al. (45) Date of Patent: Jul. 23, 2002

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2002/ A1 Boyer et al. (43) Pub. Date: Aug.

NETWORK BOUNDARY PRIVATE NETWORK PUBLIC _1 NETWORK

(54) (75) ( ) (73) (21) (22) (63) Peschel, Schoengeising (DE); (30) Foreign Application Priority Data. Robert Trimpe, Wessling (DE)

(12) United States Patent Okazaki et al.

(12) Ulllted States Patent (10) Patent N0.: US 8,389,837 B1 Leguia (45) Date of Patent: Mar. 5, 2013

US A1 (19) United States (12) Patent Application Publication (10) Pub. N0.: US 2002/ A1. Mannarsamy (43) Pub. Date: NOV.

US A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2007/ A1 Du et al. (43) Pub. Date: Aug.

(12) United States Patent Thrift

US A United States Patent [19] [ill Patent Number: 5,847,562 Fulton et al. [45] Date of Patent: Dec. 8, Experimental data

(12) (10) Patent N0.: US 6,614,314 B2 d Haene et al. 45 Date 0f Patent: Se (54) NON-LINEAR PHASE DETECTOR FOREIGN PATENT DOCUMENTS

V User Interface 26. Operating System 34. Storage Memory Workmg Memory 22. Keyboard 16. Application 32. Translation Engine 36.

United States Patent [191 [11] Patent Number: 4,732,385

Europaisches Patentamt European Patent Office Office europeen des brevets (11) EP A2 EUROPEAN PATENT APPLICATION

(12) United States Patent Segawa et al.

Please find below and/or attached an Office communication concerning this application or proceeding.

CANADIAN PATENT AGENT QUALIFYING EXAMINATION GUIDE TO WRITING THE PATENT AGENT EXAM PAPER A PATENT DRAFTING

Content Provider Artist?zgiputer Rgcord L1a4t6e

User Guide. BES12 Self-Service

(51) Int Cl.: G06F 11/14 ( )

(12) United States Patent Munshi et al.

/12 [-16. U CIUUU Cl UUCIEI U CICIUU. (12) Patent Application Publication (10) Pub. No.: US 2002/ A1 Lawless et al.

TEPZZ 87_546A T EP A2 (19) (11) EP A2 (12) EUROPEAN PATENT APPLICATION. (51) Int Cl.: G05B 19/05 ( )

Transcription:

US008706158B2 (12) United States Patent Zheng et al. (54) MOBILE PHONE FOR AUTHENTICATING SIM CARD AND METHOD THEREOF (75) Inventors: Zhang-Yong Zheng, Shenzhen (CN); Bi-Qing Luo, Shenzhen (CN); Huan-Huan Zhang, Shenzhen (CN); Xin Lu, Shenzhen (CN) (73) Assignees: Fu Tai Hua Industry (Shenzhen) Co., Ltd., Shenzhen (CN); Hon Hai Precision Industry Co., Ltd., New Taipei (TW) (*) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 U.S.C. 154(b) by 84 days. (21) Appl. No.: 13/340,714 (22) Filed: Dec. 30, 2011 (65) Prior Publication Data US 2013/0157715 A1 Jun. 20, 2013 (30) Foreign Application Priority Data Dec. 15, 2011 (CN)... 2011 1 0420814 (51) Int. Cl. H04M I/O{} (2006.01) (52) U.S. CI. USPC... 455/551; 455/411; 455/558; 455/414.1; 455/418; 455/566 (10) Patent No.: US 8,706,158 B2 (45) Date of Patent: Apr. 22, 2014 (58) Field of Classification Search USPC... 455/551, 411, 558,414.1, 418, 566 See application file for complete search history. (56) References Cited U.S. PATENT DOCUMENTS 6,141,563 A * 10/2000 Miller et al.... 455/558 8,229,505 B2 * 7/2012 Wong...... 455/558 2008/01 13651 A1* 5/2008 Choi... 455/411 2009/019 1846 A1* 7/2009 Shi...... 4554ii 2009/0328144 A1* 12/2009 Sherlock et al......., 726/2 * cited by examiner Primary Examiner Sanh Phu (74) Attorney, Agent, or Firm Novak Druce Connolly Bove + Quigg LLP (57) ABSTRACT The present invention provides a mobile phone for authenti cating Subscriber Identification Module (SIM) card and a SIM card authentication method adapted for the mobile phone. Once a SIM card is inserted into the mobile phone, the mobile phone acquires a phone number associated with the inserted SIM card and identifies whether the acquired phone number has been stored in the non-erasable programmable memory of the mobile phone. If yes, the user is legal and can use the mobile phone, if no, then the user is illegal and cannot use the mobile phone. Therefore, the mobile phone protects and hides stored information from the user. 12 Claims, 3 Drawing Sheets f}isplay a user interface and define at least one phone number in the user interface in response to user inputs Encrypt the user interface Store the at least one phone number in a non-erasable programmable memory y $345) Acquire a phone number of a SIM card inserted to the mobile phone when the mobile phone is powered on Has the non-erasabie rogrammable memory stored the phone number of the SHAM card? )isplay information which prompts autheatication fail 2T yes Bisplay information which prompts at thentication success

U.S. Patent Apr. 22, 2014 Sheet 1 of 3 US 8,706,158 B2 Input unit ~ : 0 Storage unit Non-erasable programmable memory Control unit i)isplay unit FiG. 1

U.S. Patent Apr. 22, 2014 Sheet 2 of 3 US 8,706,158 B2 Çontrol unit Defining module Encrypting module Storage control module Number acquiring module Determining module Output control module - 4 (? 42(? - 43(3 44ö - 45% 46) F}{}. 2

U.S. Patent Apr. 22, 2014 Sheet 3 of 3 US 8,706,158 B2 {}isplay a user interface and define at least one phone number in the user interface in response to user inputs Encrypt the user interface Store the at least one phone number in a non-erasable programmable memory S330 - S34% Acquire a phone number of a SIM card inserted to the mobile phone when the mobile phone is powered on Has the non-erasable rogrammable memory stored the phone number of the SiNA card? c }}{} S360 Display information which prompts authentication faii Display information which prompts authentication success c S370 FIG. 3

3 number has been stored in the non-erasable programmable memory 21 of the mobile phone. If yes, the user is legal and can use the mobile phone, or the user is illegal and cannot use the mobile phone. Therefore, the mobile phone 1 protects and hides stored information from the user. Although the present disclosure has been specifically described on the basis of the exemplary embodiment thereof. the disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the embodiment without departing from the scope and spirit of the disclosure. What is claimed is: 1. A mobile phone comprising: an input unit for generating input signals in response to user inputs; a non-erasable programmable memory for storing at least one phone number, wherein each of the at least one phone number corresponds to a SIM card; a display unit for displaying information; and a control unit, further comprising: a number acquiring module for acquiring a phone number of a SIM card inserted to the mobile phone when the mobile phone is powered on; a determining module for comparing the acquired phone number with the at least one phone number in the non-erasable programmable memory and determining whether the non-erasable program mable memory has stored the phone number of the inserted SIM card; and an output control module for controlling the display unit to display information which prompts authen tication success and authorizingause of the mobile phone when the determining module determines that the non-erasable programmable memory has stored the phone number of the inserted SIM card, and for controlling the display unit to display infor mation which prompts authentication fail and not authorizing a use of the mobile phone when the determining module determines that the phone number of the inserted SIM card does not exist in the non-erasable programmable memory. 2. The mobile phone as recited in claim 1, wherein the control unit further comprises a defining module for control ling the display unit to display a user interface and defining the at least one phone number in the user interface in response to user inputs from the input unit. 3. The mobile phone as recited in claim 2, wherein the defining operation from the defining module can be per formed when the user starts to use the mobile phone the first time or in the course of using the mobile phone. 4. The mobile phone as recited in claim 2, wherein the control unit further comprises an encrypting module for encrypting the user interface after the defining module defines the at least one phone number in the user interface. US 8,706,158 B2 10 15 20 25 30 35 40 45 50 4 5. The mobile phone as recited in claim 4, wherein the encrypting module sets a password for the user interface in response to user inputs, if a user enters the right password for the user interface, the user can look at, change, or delete the at least one phone number of the user interface. 6. The mobile phone as recited in claim 2, wherein the control unit further comprises a storage control module for storing the at least one phone number defined the defining module in the non-erasable programmable memory. 7. A SIM card authentication method adapted for a mobile phone, wherein the mobile phone comprises a non-erasable programmable memory for storing at least one phone num ber, and each of the at least one phone number corresponds to a SIM card, the method comprising: acquiring a phone number of a SIM card inserted to the mobile phone when the mobile phone is powered on; comparing the acquired phone number with the at least one phone number in the non-erasable programmable memory and determining whether the non-erasable pro grammable memory has stored the phone number of the inserted SIM card; and displaying information which prompts authentication suc cess and authorizing a use of the mobile phone if the non-erasable programmable memory has stored the phone number of the inserted SIM card, and displaying information which prompts authentication fail and not authorizing a use of the mobile phone if the phone num ber of the inserted SIM card does not exist in the non erasable programmable memory. 8. The SIM card authentication method as recited in claim 7, further comprising: displaying a user interface and defining the at least one phone number in the user interface in response to user inputs. 9. The SIM card authentication method as recited in claim 8, wherein the defining step can be performed when the user starts to use the mobile phone the first time or in the course of using the mobile phone. 10. The SIM card authentication method as recited in claim 8, further comprising: encrypting the user interface after defining the at least one phone number. 11. The SIM card authentication method as recited in claim 10, wherein the encrypting step is setting a password for the user interface in response to user inputs, if a user enters the right password for the user interface, the user can look at, change, or delete the at least one phone number of the user interface. 12. The SIM card authentication method as recited in claim 8, further comprising: storing the defined at least one phone number in the non erasable programmable memory.