Embodiment
Before describing in detail, should be noted that embodiment has mainly made up method step and the apparatus assembly that relates to wireless service provider or network registry electronic equipment according to embodiments of the invention.Correspondingly, apparatus assembly and method step are represented by the conventional symbol in the figure in appropriate circumstances, only shown those details relevant, those conspicuous details of personnel of being proficient in the technology of the advantage with the description have not here been hindered understanding of this description so that do not use with embodiments of the invention.
In this document, such as first and second, top and bottom or the like relational terms can only be used to distinguish an entity or operation and another entity or operation, and not necessarily need or hint relation that any reality between such entity or the operation is such or in proper order.Term " comprises " or its any other variant, be used to contain comprising of nonexcludability, do not include only those elements but can comprise other elements of not listing clearly or such other intrinsic elements of process, method, product or equipment so that comprise process, method, product or the equipment of element tabulation.The front has the element of " comprising " not have more multiple constraint ground, does not get rid of the existence of the other similar elements in process, method, product or the equipment that comprises this element.In addition, in whole this specification, term " key " has the implication widely of any key, button or the driver with special, variable or programing function that can be driven by the user.
Should be appreciated that, embodiments of the invention as described herein can comprise the instruction of one or more conventional processors and unique program stored, the one or more processors of these commands for controlling with some non-processor circuit realize as described herein to wireless service provider or network registry electronic equipment some, great majority or all functions.Non-processor circuit can include but not limited to, radio receiver, transmitting set, signal driver, clock circuit, power circuit, and user input device.Therefore, these functions can be interpreted as the method step to wireless service provider or network registry electronic equipment.Perhaps, some or all of functions can realize by the state machine that does not have stored program instruction, or realize that with one or more application-specific integrated circuit (ASIC)s (ASIC) wherein, certain combination of each function or some function realizes as self-defined logic.Certainly, also can use the combination of two kinds of methods.The method and apparatus of these functions has been described so, here.In addition, can expect, those skilled in the art, although may spend a large amount of effort and available time, current techniques, and many design alternatives that consideration promoted of economic aspect, when instructing, will can enough minimum experiments generate such software instruction and program and IC like a cork by notion described herein and principle.
Please referring to Fig. 1, schematic diagram has shown electronic equipment 100, and Wireless Telecom Equipment normally presents the form of mobile radio station or mobile phone, comprises radio frequency communications unit 102, can communicate with processor 103.Electronic equipment 100 also has display screen 105, and this display screen can comprise touch sensitive screen, is used for the receiving subscriber data item or from the user's of equipment functional command.Also have alert module 115, this module comprises warning loud speaker, vibrator motor and related driver usually.Display screen 105, and alert module 115 can communicate with processor 103.Electronic equipment also has keypad 106, wherein comprises many keys, can be handled by the user of equipment, so that some function of input user data or operating equipment.
Processor 103 is operably connected to various memory assemblies, and comprise and be used for the encoder/decoder 111 of code read-only memory (ROM) 112 carrying out Code And Decode by electronic equipment 100 voice or other signals transmission or that receive with the association that is used to store data.Processor 103 also comprises microprocessor 113, and this microprocessor is connected to encoder/decoder 111, radio frequency communications unit 102, character read-only memory (ROM) 114, random-access memory (ram) 104, static programmable memory 116 and safe storage 119 (being similar to based on the user's ID card in the mobile phone of subscriber card (SIM or RUIM)) by public data and address bus 117.Static programmable memory 1 16 and safe storage 119 storages, wherein, optimizing roaming list (PRL), subscriber authentication data, that selects imports text message and telephone number database (TND telephone directory) (number field that comprises telephone number, the name field of the identifier related with a number in the telephone number) into.Safe storage 119 and static memory 116 can also be stored the password that is used to allow to visit the password-protected function on the mobile phone 100.In addition, safe storage has also been stored the encryption key such as Binding key (A-key) safely, and/or other secret shared data, and the device identifier such as ESN.
Microprocessor 113 has the port that is used to be connected to display screen 105, alert module 115 and keypad 106.In addition, microprocessor 113 also have be used to be connected to microphone 135 and with equipment be the port of whole communications speaker 140.
Character read-only memory 114 has been stored the code that is used for being decoded or be encoded by the text message that communication unit 102 receives.In this embodiment, character read-only memory 114, RUIM card 119, and operation code (OC) that static memory 116 can also storage microprocessor 113 and the code that is used to carry out the function related with mobile phone 100.
Radio frequency communications unit 102 is combined reception device and the reflectors with common antenna 107.Communication unit 102 has the transceiver 108 that is connected to antenna 107 by radio frequency amplifier 109.Transceiver 108 is also connected to combined modulator/demodulator 110, and this combined modulator/demodulator 110 is connected to processor 103 with communication unit 102.
Fig. 2 has shown a kind of wireless communication system, comprises network or wireless service provider 210 and the electronic equipment such as mobile phone 100.Network 210 comprises attaching position register (HLR) 215, service centre 220, and many base stations 230, is used for communicating by aerial and electronic equipment 100, and this is known.HLR 215 contains many records 217, and each record is all related with the user of network 210 with electronic equipment 100.The user can be to network 210 registration electronic equipments 100, so that can utilize this electronic equipment to use the wireless connections service of network.After registration electronic equipment 100, by adding new clauses and subclauses or write down 217 in HLR 215, the user is related with electronic equipment on network.The user identifies with user identifier (normally IMSI-IMSI International Mobile Subscriber Identity) 275, and equipment identifies with device identifier (normally ESN-Electronic Serial Number) 255.Each can be also all related with encryption key (A-key) 260 with the electronic equipment that wireless mode and network 210 communicate, and this encryption key 260 makes network 210 can be connected 295 by standard or general network with electronic equipment 100 and communicates.
Service centre 220 comprises unregistered device databases 225 and available or unappropriated telephone number database 228.Unregistered device databases 225 has been stored the ESN 255 and related A-key 260 that does not also have to many electronic equipments of network 210 registrations.Available telephone number database 228 contains the many unappropriated telephone number that can distribute to new user; Usually the form that presents IMSI 275.The user of the network that registration process will be identified by the electronic equipment 100 of its ESN 255 signs and IMSI 275 by them is related.By these two identifiers (ESN and IMSI) are related, from their corresponding service centers database 225 and 228, deleted them, and they have been added in the new record among the HLR 215.
The device identifier of each electronic equipment 100 (ESN) 255 and encryption key (A-key) 260 are installed in safely or are stored in the corresponding apparatus in the factory 240 of production equipment 100.Factory 240 also is installed in user identity algorithm 265 in each electronic equipment 100 usually.The user identity algorithm is used for calculating user identifier (for example, IMSI) according to the user ID data such as password or personal identification number (PIN) 270.So, under the situation that provides PIN 270, can use suitable IMSI identifier algorithm 265 to determine corresponding IMSI 275.Usually, factory can produce many can be with pre-determining many electronic equipments 100 that network 210 uses, device identifier (ESN) 255 is forwarded to IMSI algorithm 265 with related encryption key (A-key) 260 and pre-determines network 210.Then, device identifier (ESN) 255 and related encryption key 260 are added to unregistered device databases 225 in the network 210.Factory 240 can produce electronic equipment 100 for different networks, and in this case, corresponding equipment identifier (ESN) 255 and encryption key (260) are forwarded to this another network.User identity algorithm 265 can be stored in the unappropriated telephone number database 228, for each network 210, can be different.
Network 210 sends the new account card 235 that contains user ID data (PIN) 270 with special or registration telephone number 272, is used for the electronic equipment 100 of registering non-registration.The new account cartoon often contains this information 270,272, can be input to print topic in the electronic equipment 100 as the user.New account card itself can be simple must as sell by retail channel the plastic clip of credit card pattern, it is also different that each retail channel of selling electronic equipment is sold.Perhaps, the new account card also can be printed on the paper simply, sends by Email, or otherwise downloads to the user.
Unregistered electronic equipment 100 can use restricted network connection 290 to communicate with network.Restricted network connects 290 corresponding to the registration telephone number 272 that can be dialed by the user of unregistered electronic equipment 100, does not need encryption key 260.This registration telephone number 272 provides on the new account card 235 that its network 210 of registering their electronic equipment 100 sends being wished by the user.
Unregistered electronic equipment 100 with the user ID data (PIN) 270 from 235 inputs of new account card, connects the device identifier (ESN) 255 of equipment 290 by restricted network and is forwarded to network 210.This makes that network can be by related with user identifier (IMSI) (this user identifier is related with the user who has bought new account card 235) with device identifier (ESN) 255.Then, network 210 can be retrieved encryption key (A-key) 260, so that normally communicate 295 with electronic equipment.Understand as those skilled in the art, standard connection 295 common communications of carrying out of passing through between electronic equipment and the network need user identifier (IMSI) and encryption key.This is the same cipher key (A-key) 260 that is stored in safely on the electronic equipment 100 of new registration.Then, can be chargeed by 210 pairs on network and user identifier (IMSI) 275 related users, this is known.Below will be than describing this registration process in greater detail.
Fig. 3 A has shown the method for production or pre-configured electronic equipment 100.The method 300 can be distributed to retail channel so that before being sold to the user with electronic equipment, carries out in factory 240 or some other point.Making electronic equipment (100) afterwards, method 300 is stored in unique device identifier and corresponding encryption key in the electronic equipment in step 305 safely.Device identifier (255) can be Electronic Serial Number (ESN), and encryption key (260) can be based on the A-key or the Binding key of the mobile phone of CDMA, understands as those skilled in the art.This information (255,260) can be stored in the safe storage (119) of electronic equipment 100.In step 310, user identity algorithm (265) can also be stored in the electronic equipment (100) safely.As previously discussed, user identity algorithm (265) can be used for according to the definite user identifier (275) such as IMSI of the user ID data (270) such as PIN.Then, in step 315, individually and safely with device identifier (255), corresponding encryption key (260), and user identity algorithm (265) is forwarded to network.This information (255,260,265) can be with the formal transformation of the table of unregistered electronic equipment.Then, in step 320, unregistered electronic equipment 100 is transferred to retail channel.Then, factory can be the other unregistered electronic equipment of different network production.
Fig. 3 B has shown pre-loaded unregistered electronic equipment particulars and has sent the method for user ID (IMSI).Method 350 can be carried out on network 210.In step 355, network receives many device identifiers (255) and corresponding to the corresponding encryption key (260) of unregistered electronic equipment.This step is transmitted step (315) corresponding to the factory of the method among Fig. 3 A 300.Network also can receive user identity algorithm (265), is used for determining user identifier (IMSI) according to user ID data (PIN).In step 360, device identifier (ESN) and corresponding encryption key (A-key) are stored in the unregistered device databases (225) as record (227).
User identity algorithm (265) can correspondingly be stored in the unregistered device databases (225) or in the available telephone number database (228).Then, in step 365, network can be corresponding to the user ID data (PIN) of the available user identity (telephone number) in the available telephone number database (228).This can realize by available telephone number (IMSI) is applied to user identity algorithm (265), so that produce corresponding PIN (270).Under the situation that user identity algorithm (265) can not convert, can provide algorithm reciprocal from factory (240), so that produce user ID data (PIN) from user identifier (IMSI).In the case, the user identity algorithm calculates user identifier (IMSI) according to user ID data (PIN).Then, in step 370, network sends these user ID data (PIN) on corresponding new account card.Can print user ID data (PIN) and registration telephone number (272) on these new account cards, can be used for communicating by unregistered electronic equipment with wireless mode and network.The new account card can comprise other information such as network title and the telephone number (IMSI) related with user ID data (PIN).
Fig. 4 has shown the method for the electronic equipment of registering non-registration.Can be in unregistered electronic equipment 100 manner of execution 400.Be distributed to retail channel from factory (240), and after having been bought by the user, in step 405, giving equipment power-on at first.Not under the situation of network (210) registration, equipment is merely able to carry out urgent call by available network usually.In step 410, after initial power-up, in electronic equipment, activate restricted network schemer.Restricted network schemer is so a kind of pattern: radio communication is limited to the restricted network that pre-determines between the network and is connected.Restricted network schemer also can allow to carry out urgent call with other networks.Pre-determine network (210) and be the wireless service provider that possible reduce at the cost of the electronic equipment of plant produced.It is wireless connections with the appointment that pre-determines network that restricted network connects, for example, and by dialing the connection that registration telephone number (272) is obtained.Restricted network connects (290) and does not need encryption key (260) or the user identifier such as IMSI (275).It can be to be connected with voice that the same mode of urgent call realizes that restricted network connects.Perhaps, understand, can use by aerial data to connect as those skilled in the art.
Then, in step 415, electronic equipment receives the user data item that connects corresponding to restricted network.This user data item can be the user at the equipment of the registration telephone number that is used for dialling (272) input.This registration telephone number (272) offers the user with new access card 235 usually.Yet the operation that electronic equipment can be configured to respond registering functional is automatically carried out restricted network and is connected.Response receives the situation of user data item (registration telephone number 272), in step 420, and pre-determines network (210) and sets up restricted network and be connected (290).This can use, and GSM, CDMA or 3G voice connect, SMS connects, or some other data connects and realizes.Then, in step 425, electronic equipment retrieval facility identifier (255).Device identifier (for example, ESN) is stored in the safe storage (119) in factory (240) lining safely.Then, in step 430, electronic equipment uses restricted network connection that device identifier (255) is forwarded to and pre-determines network.Then, in step 435, receive further user data item corresponding to user ID data (PIN).Identical with registration telephone number (272), this user ID data (270) can be used keypad 106 or touch quick display screen 105 and import.Then, in step 440, equipment uses restricted connection network (290) that user ID data (PIN) is forwarded to and pre-determines network (210).As alternative, can transmit step (430,440) at two and carry out two user data input steps (415,435) before.
Information-device identifier (ESN) that network (210) use sends and user ID data (PIN)-so that register the user or the buyer of new account card (235) to equipment (100).New account card (235) is related with user identifier (IMSI) (normally will distribute to the telephone number of electronic equipment).So, as previously mentioned, user identifier (IMSI) is related with device identifier (ESN) in network.Successfully on network after the device registration, in step 445, electronic equipment receives registration message from pre-determining network.Then, in step 450, the user identity algorithm (265) that electronic equipment is stored safe in utilizationly is determined user identifier (IMSI) according to the user ID data (PIN) of input.User identifier (IMSI) is stored in the equipment, for example, is stored in the static memory (113), is used for and network (210) foundation common communications (295) subsequently.General network connects (295) and can use user identifier (IMSI) and encryption key (A-key) on the equipment of being stored in to set up, and encryption key (A-key) is used for the message that receives from network is decrypted and the message that is transferred to network is encrypted.Understand as those skilled in the art, this secret shared data (A-key) is stored on equipment and the network safely, and can be with generating session key and being used to carry out authentication.
Then, in step 455, when the user data item that receives corresponding to (non-registered) telephone number, can set up common with network or registering communication (295).In step 460, the equipment retrieval is stored in the encryption key (260) in the safe storage (119) safely.Understand as those skilled in the art, this can realize in many ways that for example, encryption key (A-key) is normally maintained secrecy, but can use with secret algorithm that provides by equipment or network and pseudo random number, to generate the session key that uses by equipment and network.Then, can use user identifier (IMSI) to identifying customer by network, and the encryption key (A-key) that comprises the session key of from then on deriving, connect with network (210).Then, use encryption/session key that the message between network and the equipment is carried out encrypt/decrypt, this is known.
Fig. 5 has shown the method for several unregistered electronic equipments of registration on network.Method 400 can pre-determine execution on the network 210.In step 505, set up restricted network and be connected (290) for one in network and the many unregistered electronic equipments (100).As mentioned above, this can use and pre-determine telephone number associated data or voice and be connected and realize.Network can provide step by step register instruction to the user, is shown or is carried out audio frequency output by electronic equipment; For example, now from new account card input PIN.Then, in step 510, network connects slave unit receiving equipment identifier (ESN) by restricted network.In response, in step 515, network obtains the encryption key (A-key) corresponding to device identifier (ESN) from unregistered device databases.Many device identifiers (255) and their corresponding encryption keys (260) will be stored in the unregistered device databases (225) of service centre (220) of network (210).These device identifiers (255) and encryption key (260) are former (355) that receive from the factory (240) of production corresponding electronic device.In step 520, network also uses restricted network to connect slave unit and receives user ID data (PIN).As noted earlier, user ID data (270) is related with user identifier (275) by user identity algorithm (265).Then, in step 525, network uses user identity algorithm (265) to determine user identifier (IMSI) according to the user ID data (PIN) that receives.
Suppose that the ESN and the PIN that receive are legal, in step 530, network is related with the user identifier of determining (IMSI) with corresponding encryption key (A-key) with device identifier (ESN).This associated steps can realize by the new record (217) among the HLR (215) that user identifier (IMSI), device identifier (ESN) and encryption key (A-key) is written to network.Subsequently, related with user identifier (IMSI) any equipment all will use encryption key (A-key) to carry out common communications.If user identifier (IMSI) uses together with different equipment (ESN ') for a certain reason, so, common communications is inoperative, because the encryption key (A-key, A-key ') that is used by equipment and network is with difference.In step 535, successfully with user identifier (IMSI) related with device identifier (ESN)-facility registration-afterwards, network is forwarded to registration message in the equipment.Then, in step 540, network can be set up common communications with equipment.Common or non-restricted network connects and uses with the encryption key (A-key) of device association with at the user identifier (IMSI) of equipment new registration.
Embodiment allows to sell electronic equipment and carries out individually to these equipment of network registry.This just need not provide special device registration and technical training in the point of sale of equipment.This has also promoted a large amount of productions based on the equipment of non-subscriber card, because registration can be carried out simply by the user.In addition, registration process can be simplified, and can carry out automatically basically.
In the explanation in front, specific embodiment of the present invention has been described.Yet those skilled in the art will understand, and under the situation that does not depart from the scope of setting forth as following claim of the present invention, can carry out various modifications and change.Correspondingly, illustrate and figure should be regarded as illustratively, rather than restrictive that all such modifications all comprise within the scope of the invention.Advantage, advantage, to the solution of problem, and may cause any advantage, advantage, or solution takes place or the tangible more any element that becomes should not be understood that key, essential or the basic characteristics or the element of any or all claim.The present invention is only defined by claims, and what be included in the application waits any modification of making in the process of examining and all equivalents of these claims.
Those skilled in the art will recognize that, equipment as described above and method can be used as the processor control routine and realize, for example, be placed on the medium that carries such as CD, CD or DVD-ROM, programmable memory such as read-only memory (firmware), or on the data carrier such as optics or electrical signal carrier.For some application, embodiments of the invention can be realized with DSP (digital signal processor), ASIC (application-specific integrated circuit (ASIC)) or FPGA (field programmable gate array).So, code can comprise conventional programming code or microcode, or is used to be provided with or control the code of ASIC or FPGA.Code can also comprise the code that dynamically disposes the equipment that can dispose repeatedly such as the logic gate array that can programme repeatedly.Similarly, code can comprise the code of the hardware description language such as VerilogTM or VHDL (Very High Speed Integrated Circuit (VHSIC) hardware description language).As the skilled person will appreciate, code can distribute between the assembly of a plurality of connections that communicate with one another.In appropriate circumstances, embodiment can also use on the scene-(repeatedly) programmable analog array or the code that similarly moves on the equipment are realized, so that configure.