Telephone device capable of preventing unauthorized...

Telephonic communications – Telephone line or system combined with diverse electrical... – Having transmission of a digital message signal over a...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C455S557000

Reexamination Certificate

active

06792088

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a telephone device capable of sending messages by a transmission operation carried out by external device, and a communication unit comprising this kind of telephone device and external device. The present invention further relates to a method of communication where a telephone device sends messages based on transmission operation in the external device.
2. Description of the Related Art
In recent years, a short distance wireless communication technology, called Bluetooth, has been developed and there are a large number of devices that utilize Bluetooth. Bluetooth is a technology where peripherals, such as a cellular phone, a terminal adapter, a personal computer, personal digital assistant (PDA), etc., located within a few meters apart from one another, can be wirelessly connected.
Features of Bluetooth are as follows. First, there is no need for a cable except a cable for a power source. Second, there is no directivity and no problem with the presence of shields. This differs from infrared data association (IrDA) where infrared rays are used, whereas radio waves are used in the Bluetooth. Third, communication within the distance of approximately 10 meters is possible. Fourth, a network can be configured without any electronic information devices represented by a personal computer that were once essential to construct the network. Besides, Bluetooth defines a profile to realize a number of applications. Some of the main applications are dial-up, object-push, headset, file transfer, etc.
The dial-up technology will be focused hereinafter. Until now, it has been necessary to connect a personal computer to a telephone circuit or a cellular phone via a cable in order to utilize the dial-up technology.
When the dial-up technology is applied using a wire-telephone circuit, a personal computer is connected to a modular jack via a cable and a message is sent from the personal computer. In this case, what is important is the location of the telephone circuit. The place where the computer can be installed depends on the location where the modular jacks connectable to any telephone circuit are disposed. That is, any area to which the cable may extend from the modular jacks will be the area where the computer can be installed.
When the dial-up technology is utilized using a wireless telephone such as a cellular phone or a personal handy-phone system (PHS), the computer is generally connected to a wireless telephone device by a modem card, a cable, etc. and a message is transmitted from the computer. In this case, the area where the computer can be installed is confined to the area from which the wireless telephone is available.
When a PHS is used, entering far into a building may sometimes result in unstable communication due to the attenuation of radio waves. In such a case, the PHS must be moved together with the computer to a position where radio waves are stable, e.g., next to a window.
Further, in a small area such as in a train, even if there is an only small enough space to spread the personal computer, the user should have placed a cellular phone within the range to which the cable can extend from the personal computer.
On the contrary, by connecting the personal computer to a cellular phone or a telephone circuit via Bluetooth, the area where the personal computer may be installed can be enlarged. For example, when a terminal adapter with built-in Bluetooth is connected to integrated service digital network (ISDN) circuit and also the personal computer corresponds to Bluetooth, the computer can be installed anywhere within the range to which a Bluetooth connection can be applied.
In the case where a cellular phone having built-in Bluetooth is used, a message can be sent from the computer picked up out of a bag while the cellular phone is put in the bag. Further, when you want to utilize the dial-up at the area where radio waves are weak, you can send a message from the computer placed in another room through the dial-up while a cellular phone or a PHS is positioned next to a window where radio reception is stable enough. When the dial-up is utilized using Bluetooth in such a manner, convenience is greatly enhanced compared to that in using the wire-telephone interface.
The general manner of utilizing the dial-up via Bluetooth will be described in the following according to the examples where used are the personal computer with built-in Bluetooth and a cellular phone with built-in Bluetooth.
The dial-up process using Bluetooth comprises two steps. A first step is connecting the personal computer to the cellular phone via Bluetooth, and a second step is processing the dial-up operation conventionally by the personal computer.
A general method of connecting the computer to the cellular phone device via the Bluetooth will be described as follows referring to the sequence chart in
FIG. 1
in view of security problems.
First, the cellular phone device is set to an Inquiry Scan state (S
501
). Here, an Inquiry Scan state means a state ready to be inquired by a Bluetooth device, which is inquiring other Bluetooth devices.
Inquiry from the personal computer is processed for a predetermined time (S
502
). Here, Inquiry means a function through which one Bluetooth device can inquire if another Bluetooth device exists or not. The cellular phone responds to the personal computer when Inquiry from the personal computer is received (S
503
).
After Inquiry is finished, the operator of the personal computer selects a desired cellular phone device out of the Bluetooth device, which has been inquired and Paging is processed (S
504
). Here, Paging means a function through which call the particular device desired to be connected. The cellular phone having received Paging from the personal computer responds to the Paging (S
505
).
After responding the Paging, the cellular phone requires the user thereof to input a PIN code (S
506
). The PIN code may be a code consisting of a few figures or a row of characters. When the PIN code is inputted, the cellular phone presents KNIT calculated using the PIN code and a random number generated to the personal computer and requires the personal computer to authorize them (S
507
).
The computer having received the demand for authorization from the cellular phone also requires the user to input his PIN code (S
508
). At this time, the user must input the same row of characters as the row of the characters of the PIN code having been inputted into the cellular phone.
Once the PIN code is inputted, the personal computer calculates KINIT through the same manner as that of the cellular phone, and further computes using the calculated KNIT and the random numbers received together with the demand for authorization from the cellular phone. The personal computer sends the computed results back to the cellular phone (S
509
).
The cellular phone computes in the same manner as that of the personal computer using the KNIT, which has been calculated by itself and the random numbers, which has been sent to the personal computer. The cellular phone compares the computed results with the computed results, which have been received from the personal computer (S
510
).
When both the computed results are equal to each other, the cellular phone calculates a link key and sends the link key to the personal computer and at the same time keeps the link key (S
511
). The personal computer, which has received the link key, keeps the link key as well (S
512
).
Thereby, the Bluetooth connection between the personal computer and the cellular phone is completed (S
513
). The process up to the step of keeping the link key is referred to Pairing and a state keeping the link key is called a State with Bonding.
The above-mentioned procedure is that for a state without bonding between the personal computer and the cellular phone, usually this procedure is that for the case where both of them are connected for the first time.
Next, a procedure for a state with boding between the personal computer and the cellular

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Telephone device capable of preventing unauthorized... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Telephone device capable of preventing unauthorized..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Telephone device capable of preventing unauthorized... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3205603

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.