The present invention generally relates to portable communication devices, and more particularly relates to a method and apparatus for authenticating modules of a modular portable communication device.
Over the course of a product's life cycle, a device is subject to many changes in the product's features. In addition, a product family may offer many different features to distinguish high-cost models from low-cost models. Portable communication devices, such as cellular phones, are experiencing this pressure to provide distinguishable models in product families as well as to provide different and more features in some or all models.
Having different models with different functionalities makes it difficult to offer low cost models because each different model may require a different design and different manufacturing. Offering a number of low cost models with different functionalities and features is also difficult because of the scalability issue. For example, today's portable communication devices may require differing user interfaces and/or differing displays and display drivers. In addition, higher functionality portable communication devices, such as many portable communication devices, may require increased signaling computationability, while lower functionality portable communication devices require less signaling computationability. Having many different model portable communication devices is less scalable in that changing out displays or user interfaces may require printed circuit board modifications. In addition, while signaling computation can be facilitated by, for example, baseband memory and the least expensive solution is a read-only memory (ROM) baseband memory, expensive memory, such as flash memory, is required to facilitate firmware changes. One solution is to provide a plurality of modules, which together make up the portable communication device, where each module is manufactured separately.
The benefit of modular portable communication devices is also a drawbackâone module may work with a number of other modules. The manufacturer wants to maintain control over modular interoperability to limit the time-to-market burden and expense of obtaining regulatory approvals for all combinations of modules. Another reason for the manufacturer to maintain control over interoperability is to prevent end users from purchasing a low cost device and upgrading it by replacing modules. For example, one method of achieving low cost for the end-user is for the manufacturer to enter into a subsidy lock agreement with a network operator. In a subsidy lock agreement, the network operator discounts the price of an electronic device to the end user in exchange for agreement to a limitation that the device is exclusively operable with a SIM card from the subsidizing operator. Thus, it is important that a modular device employing subsidy lock will continue to be exclusively operable with a SIM card from the subsidizing operator after modules have been replaced.
Thus, what is needed is a method and apparatus for authenticating one module with another prior to allowing interoperability therebetween. Furthermore, other desirable features and characteristics of the present invention will become apparent from the subsequent detailed description of the invention and the appended claims, taken in conjunction with the accompanying drawings and this background of the invention.
The present invention will hereinafter be described in conjunction with the following drawing figures, wherein like numerals denote like elements.
A method and apparatus for modular authentication of a wireless communication device including a portable communication device and a wireless communication module coupleable thereto is disclosed. When the wireless communication module receives information from the portable communication device, it determines whether the information received therefrom is authentic information. The wireless communication module operates together with the portable communication device as a wireless communication device in a communication system in response to the information received being authentic information. In addition, a method and apparatus is disclosed for checking subsidy lock in a wireless communication device capable of operating in a communication system, the wireless communication device comprising a first module, a second module and a subscriber identity module coupled to the first and second modules. The first and second modules independently determine whether subsidy lock information stored in the subscriber identity module corresponds to correct subsidy lock information, and set a state of the wireless communication device as operable in the communication system in response to the first module and the second module both determining that the subsidy lock information stored in the subscriber identity module corresponds to the correct subsidy lock information.
The following detailed description of the invention is merely exemplary in nature and is not intended to limit the invention or the application and uses of the invention. Furthermore, there is no intention to be bound by any theory presented in the preceding background of the invention or the following detailed description of the invention.
Referring to
Referring to
A subscriber identity module (SIM) 230 couples to the wireless communication modem 220 for permitting operation of the wireless communication device 120 in the communication system 100 as described hereinbelow. After the portable communication handset 210 and the wireless communication modem 220 are coupled together, the rear case 240 is connected to complete manufacturer's assembly for enclosing both modules together into one wireless communication device 120.
The side planar view of
Referring to
The coupler 312, which physically and electrically couples the portable communication handset 210 to the wireless communication modem 220, is coupled to the controller 410 for receiving signals therefrom and providing signals thereto. The speaker 340, while physically mounted in the portable communication handset 210, is coupled to the coupler 312 for receiving operational signals from the wireless communication modem 220 for alerting the user such as ringing tones. The battery 350 also is coupled to the coupler 312 for providing power to the wireless communication device 120. While in the embodiment described herein, the user interface devices 420 are coupled to the user interface controller 410, one or more of the user interface devices 420 (e.g., the keypad 330, the display 335, or the switches 424, 426) could be resident in the handset yet coupled to the coupler 312 for providing signals directly to or receiving operational signals directly from the wireless communication modem 220. Alternatively, either of the switches 424, 426 or the keypad 330 could be on the wireless communication modem 220.
Referring to
A codec 514 provides signals to power control circuitry 516 on the power management IC 504 which provides power from the battery 350 coupled through the coupler 310 to the circuits and devices of the portable communication handset 210 and the wireless communication module 220 for operation of the wireless communication device 120. For communication on the wireless communication device 110, the codec 514 receives signals from a microphone 518 amplified by a power amplifier 520 and provides signals to a power amplifier 522 for powering a speaker 524. In addition, the codec 514 provides alert signals to a power amplifier 526 which is coupled to the speaker 340 through the coupler 310. Though depicted in the present embodiment as part of the transceiver baseband controller 502, the codec 514 could alternatively reside in the portable communication handset 210 for operation of the speaker 340 therein.
The subscriber identity module (SIM card) 230 includes a SIM controller 538 and a SIM non-volatile memory (NVM) 540. The SIM controller 538 is connected to a SIM coupler 542 for physically and electrically coupling the SIM card 230 to the wireless communication module 220. The SIM card 230 could, on the other hand, be coupled to the portable communication handset 210 through coupler 542. As is known to those skilled in the art, the SIM NVM stores subsidy lock information which includes an International Mobile Subscriber Identity (IMSI) and optionally group identifier 1 and 2 information (GID1 and GID2). Contained within the IMSI value is the home public land mobile network (HPLMN) information designating the PLMN communication system 100 to which the user has subscribed for service. The wireless communication device 110 is authorized to operate in this. HPLMN as well as in any other PLMN with which the HPLMN has roaming agreements.
As is also known to those skilled in the art, the transceiver baseband controller includes a read only memory (ROM) 528, a random access memory (RAM) 530, a DSP 532 and a microcontroller unit (MCU) 524. A SIM universal asynchronous receiver/transmitter (SIM UART) 544 coupled to the SIM controller 540 through the SIM coupler 542, a serial I/F device 546 coupled to the user interface controller 410 through the coupler 310 and the module coupler 312, and a on_off/general purpose input_output (GPIO) 548 also coupled to the user interface controller 410 through the coupler 310 and the module coupler 312 (alternatively, the on_off block could be directly coupled to the on_off switch 426). A memory 550 is coupled to the transceiver baseband IC 502 for storing information used for the operation of the wireless communication device 120.
Thus it can be seen that the present invention allows a single wireless communication module 220 to provide RF and audio modem functions over a range of products having differing transducer capabilities. This is achieved by separation of the audio and RF functions into the wireless communication module 220 and the user interface functions into the portable communication handset 210. In another embodiment of the present invention, the wireless communication module 220 could be designed only for RF modem functions, with some or all of the audio apparati on the portable communication handset 210 side of the couplers 312, 310.
Referring to
When the operable state of the wireless communication device 120 has been detected 602, the portable communication handset 210 authenticates 604 the wireless communication modem 220. If the modem 220 is authenticated 606, the modem 220 then authenticates 608 the handset 210. If the handset 210 is authenticated processing continues to perform independent subsidy lock checks by the handset 210 and the modem 220. It will be apparent to those skilled in the art that the order of following pairs of steps: 604 and 606; 608 and 610; 612 and 614; and 616 and 618; could be changed or the pairs of steps could occur simultaneously without departing from the spirit of the invention.
When the handset 210 is authenticated, the handset 210 checks the subsidy lock 612. If the subsidy lock information retrieved from the memory 538 of the SIM card 230 is the correct subsidy lock information 614 (i.e., the HPLMN information and optionally GID1/GID2 information stored in the memory 538 is equivalent to an allowed PLMN and GID1/GID2 information stored in the memory 413), then the modem checks the subsidy lock 616. If the subsidy lock information retrieved by the modem 210 is also correct subsidy lock information 618 (i.e., the HPLMN information and optionally GID1/GID2 information stored in the memory 538 is equivalent to an allowed PLMN and GID1/GID2 information stored in the memory 550), then the portable communication handset 210 operates 620 together with the wireless communication module 220 as a wireless communication device 120 in the communication system 100.
Referring to the flowchart of
In accordance with one aspect of the present invention, the information is determined to be authentic 710 in response to the information received from the modem and the challenge information sent to the modem. For example, in user interface controllers 410 with limited code and random access memory requirements, a first key could be stored in the memory 413 of the handset 210. The first key is universally the same to all of a set of handsets 210. A second key is stored in the memory 550 of the modem 220. This second key is a random key stored in the memory 550. Also stored in memory 550 is the value of the second key encrypted using the first key. The step of sending challenge information 704 includes the controller 410 retrieving the second key from the memory 550 by requesting the value of the second key encrypted by the first key from the controller 502. The controller 410 also generates a random number challenge which is sent to the controller 502. The MCU 534 of the modem 220 performs a known secure hash algorithm (SHA-1) on the random number, the second key and a fixed pattern and returns the hash digest to the controller 410. The controller 410 then determines if the hash digest (i.e., the information received from the modem 220) is authentic information by using the first key stored in memory 413 to decrypt the encrypted second key received, computing the same hash digest using the random number generated by the controller 410 and provided to the modem 220 as challenge information, the decrypted second key and the same fixed pattern. The hash digest thus created is compared to the hash digest received. If they are equivalent, information received from the modem 220 is authentic information 710.
After determining that the information received from the modem is authentic information 710, the controller 410 requests subsidy lock information 712 from the memory 538 of the subscriber identity module (SIM) 230. Processing next checks to see whether subsidy lock information has been received 714 from the SIM card 230 or timeout has occurred 716 without receiving any subsidy lock information 714. When subsidy lock information is received 714, the subsidy lock information is examined to determine if it is the correct subsidy lock information 718 for the communication system 100 by comparing it with the subsidy lock information stored in memory 413. If the subsidy lock information received from the SIM card 230 is found to be equivalent to the subsidy lock information stored in memory 413, then that information is found to be correct subsidy lock information 718 and the SIM card will be accepted by controller 410. The wireless communication device will then become operable 720 in accordance with the full processing of
Referring next to the flowchart of
After determining that the information received from the handset 210 is authentic information 810 and generating the authentication signal 811, the MCU 534 requests subsidy lock information 812 from the memory 538 of the subscriber identity module (SIM) 230. Processing next checks to see whether subsidy lock information has been received 814 from the SIM card 230 or timeout has occurred 816 without receiving any subsidy lock information 814. When subsidy lock information is received 814, the subsidy lock information is examined to determine if it is correct subsidy lock information 818 by comparing it against subsidy lock information stored in memory 550. If the subsidy lock information from the SIM card 230 is equivalent to the subsidy lock information stored in memory 550, then the subsidy lock information is correct subsidy lock information 818 and the MCU 534 generates a subsidy lock success signal 819 and provides that signal to the handset 210. The wireless communication device 120 will then become operable 820 in accordance with the full processing of
Thus, it can be seen that the present invention provides a modular assembly providing the flexibility to quickly adapt to shifting market requirements and offering a number of scalable wireless communication devices 120 without creating an opportunity for cloned devices to be created with mismatched modules. The modules mutually authenticate each other for both regulatory compliance and manufacturer's compliance. In addition, the modules independently check subsidy lock to verify that the wireless communication device 120 is authorized to use a SIM card 230 issued by the communication system 100. The embodiment described herein has control of the authentication routine residing in the user interface controller 410. While authentication of one module by the other and/or a single subsidy lock check may be sufficient to assure authorized operation of the wireless communication device 120, combination of requiring successful mutual authentication and independent subsidy lock achieves a greater degree of security.
While at least one exemplary embodiment has been presented in the foregoing detailed description of the invention, it should be appreciated that a vast number of variations exist. It should also be appreciated that the exemplary embodiment or exemplary embodiments are only examples, and are not intended to limit the scope, applicability, or configuration of the invention in any way. Rather, the foregoing detailed description will provide those skilled in the art with a convenient road map for implementing an exemplary embodiment of the invention, it being understood that various changes may be made in the function and arrangement of elements described in an exemplary embodiment without departing from the scope of the invention as set forth in the appended claims.