Data Recovery Simcard

Written on 8:01 PM by CommuniKation



Download5000.com - Data Recovery Simcard - SIM, card, data ...
Simcard data recovery program safely and securely recovers all lost deleted text messages and phonebook contact numbers from mobile phone SIM card. USB simcard data backup utility provides facility to know about general simcard details ...
Download5000.com New shareware... - http://www.download5000.com/





--
   www.OlympicCricket.net
Cricket Tournament for London 2012

SETOOL WORKSTATION V1; iPhone 3G 2.2.1,

Written on 7:28 PM by CommuniKation

Full Unlocking & Flashing SETOOL WORKSTATION V1

By arydayak
GSM CDMA Mobile Repair Forum > Product Device Support Flasher Box >
Hardware/Software-Products > SETOOL3 Box · Reload this Page Full Unlocking
& Flashing SETOOL WORKSTATION V1. User Name, Remember Me? Password ...
<http://www.cyber-flasher.com/setool3-box/12681-full-unlocking-flashing-setool-workstation-v1.html>
GSM CDMA Mobile Repair Forum


Unlock iPhone 3G 2.2.1 / 2.2 EASY & CHEAP |
u can unlock any mobile device to work with another carrier but it must be
the same network technology. When u do this with the iphone ur data
services will constantly need program upgrades. A real pain in the ass!
banstaman ...
<http://iphonegap.com/2009/02/28/unlock-iphone-3g-221-22-easy-cheap/>


Unlocking a Samsung G600 - Techwatch: Satellite TV forums, FTA ...
By Woody_north_east
Go Back, Techwatch: Satellite TV forums, FTA, Cable, Hardware, & Tech
forums > GSM Cellular > Mobile Phones. Unlocking a Samsung G600 ... Mobile
Phones Cellular phones, smart phones, and cell phone networks. ...
<http://www.techwatch.co.uk/forums/55000-unlocking-a-samsung-g600.html>
Techwatch: Satellite TV forums,...



Download Firmware Nokia FREE
By abbas_bsp
Download Firmware Nokia FREE GSM Mobile Links. ... GSM Mobile Links Usefull
Links related to GSM, Cell Phones and Unlocking Programs and Sits. LinkBack
· Thread Tools. Old Today, 12:24 PM. abbas_bsp. Junior Member. Join Date:
Feb 2009 ...
<http://www.dhakamobile.com/gsm-mobile-links/4507-download-firmware-nokia-free.html>
Dhaka Mobile


Unlocking Phones Review March

Written on 7:14 PM by CommuniKation

Apple Pulls Old iPhone Firmware

PhoneNews.com - Davis,CA,USA
And, by taking them offline, Apple ensures that it's one step harder to
obtain the tools needed to unlock the iPhone. Our real question is… why
did Apple ...
<http://www.phonenews.com/blog/apple-pulls-old-iphone-firmware-465.html>



How much extra would you pay for an unlocked phone/PDA on ebay ...
By admin
I have PDA phone I want to sell on ebay. My cell phone provider will send
me the unlock codes for a phone once every 90 days. I'm trying to decide.
<http://mylaptopia.com/2009/02/how-much-extra-would-you-pay-for-an-unlocked-phonepda-on-ebay/>
Free Laptop and Notebook Information



Unlock iPhone - iPhone Hacks and Apps :

By Berry Brown
Dig alittle deeper, and you will see tutorials absolutely talking about
jailbreaking, preparing the phone for the software, firmware patches,
unlocking the SIM-lock, and much more. It is all very complex stuff,
especially when you learn ...
<http://www.cvntravel.com/?p=1225>
CVN Travel



When sync outlook to verizon Q phone - FixYa
for 2 month yahoo page keep cutting off on instant... Answer This...
Microsoft Office Outlook 2003 for PC. Huawei ETS 2258 unlock phone code. I
cannot seem to find a code to unlock ETS 2258 phone. Can. ...
<http://www.fixya.com/support/t1726753-when_sync_outlook_verizon_q_phone>
FixYa's Unsolved Problems (In...


Portable apparatus and its method of unlocking with new simplified PIN code

Written on 12:40 PM by CommuniKation

Portable apparatus and its method of unlocking with new simplified PIN code

 Yukio Miyashita
Abstract  Abstract | Drawing | Description | Claims

Abstract
A method of unlocking at least one of functions provided to a portable apparatus is provided which includes: judging whether or not an predetermined first code is entered; second judging whether or not a predetermined second code is entered, wherein the character length of the predetermined first code is shorter than the character length of the predetermined second code, if the predetermined first code is not entered; and unlocking the one of functions provided to the portable apparatus, if the predetermined first or second code is entered. A portable apparatus with plurality of functions is provided which includes: a controlling means for setting a first code and a second code; and a storing means for storing the first code and the second code, wherein the controlling means judges whether or not the first code is entered; the controlling means judges whether or not the second code is entered, where in the character length of the first code is shorter than the character length...

Patent number: 7350701
Filing date: 8 Jun 2005
Issue date: 1 Apr 2008
Inventor: Yukio Miyashita
Assignee: NEC Corporation
Primary Examiner: Thien Minh Le
Attorney: Michael Best & Friedrich LLP
Application number11/147,940

U.S. Classification
235/382; 235/380

Search within this patent

Citations

Patent NumberTitleIssue date
4945556Method of locking function of mobile telephone system 31 Jul 1990
5931948 Portable computer system having password control means for holding one or more passwords such that the passwords are unreadable by direct access from a main processor3 Aug 1999
6052408 Cellular communication system with dynamically modified data transmission parameters18 Apr 2000
6085337 Method and system for reliably indicating test results during a self-check operation4 Jul 2000
6400255 Vehicle lock apparatus4 Jun 2002
6560274 Transceiver6 May 2003

Claims

What is claimed is:

1. A method of unlocking at least one of functions provided to a portable apparatus, comprising:

judging whether or not a predetermined first code is entered;
second judging whether or not a predetermined second code is entered, wherein the character length of said predetermined first code is shorter than the character length of said predetermined second code, if said predetermined first code is not entered; and
unlocking said one of functions provided to said portable apparatus, if said predetermined first or second code is entered.

2. The method of unlocking at least one of functions provided to a portable apparatus according to claim 1, wherein characters of said predetermined first code are identical to designated several characters included in said predetermined second code.

3. The method of unlocking at least one of functions provided to a portable apparatus according to claim 2, wherein said designated several characters of said predetermined first code are consecutive characters in sequence of characters included in said predetermined second code.

4. The method of unlocking at least one of functions provided to a portable apparatus according to claim 3, wherein said consecutive characters are leftmost characters of said predetermined second code.

5. The method of unlocking at least one of functions provided to a portable apparatus according to claim 3, wherein said consecutive characters are rightmost characters of said predetermined second code.

6. The method of unlocking at least one of functions provided to a portable apparatus according to claim 3, wherein said consecutive characters are center characters of said predetermined second code.

7. The method of unlocking at least one of functions provided to a portable apparatus according to claim 1, wherein said character is a numeral number.

8. The method of unlocking at least one of functions provided to a portable apparatus according to claim 1, wherein said portable apparatus is a mobile phone.

9. The method of unlocking at least one of functions provided to a portable apparatus according to claim 1, wherein sequence of characters included in said predetermined first and second codes is changeable to another sequence of characters.

10. The method of unlocking at least one of functions provided to a portable apparatus according to claim 1, wherein each different sequence of characters included in said predetermined first and second codes is assignable to each of said functions provided to said portable apparatus, respectively.

11. The method of unlocking at least one of functions provided to a portable apparatus according to claim 1, wherein each different sequence of characters included in said predetermined first and second codes is assignable to each of selected plurality of functions among said functions provided to said portable apparatus.

12. The method of unlocking at least one of functions provided to a portable apparatus according to claim 1, further comprising;

selecting an unlocking mode wherein said predetermined first code is not used.

13. A portable apparatus with plurality of functions, comprising:

a controlling means for setting a first code and a second code; and
a storing means for storing said first code and said second code,
wherein said controlling means judges whether or not said first code is entered;
said controlling means judges whether or not said second code is entered, wherein the character length of said first code is shorter than the character length of said second code, if said first code is not entered; and
said controlling means unlocks at least one of functions provided to said portable apparatus, if said first or second code is entered.

14. The portable apparatus with plurality of functions according to claim 13, wherein characters of said first code are identical to designated several characters included in said second code.

15. The portable apparatus with plurality of functions according to claim 14, wherein said designated several characters of said first code are consecutive characters in sequence of characters included in said second code.

16. The portable apparatus with plurality of functions according to claim 15, wherein said consecutive characters are leftmost characters of said second code.

17. The portable apparatus with plurality of functions according to claim 15, wherein said consecutive characters are rightmost characters of said second code.

18. The portable apparatus with plurality of functions according to claim 15, wherein said consecutive characters are center characters of said second code.

19. The portable apparatus with plurality of functions according to claim 13, wherein said character is a numeral number.

20. The portable apparatus with plurality of functions according to claim 13, wherein said portable apparatus is a mobile phone.

21. The portable apparatus with plurality of functions according to claim 13, wherein sequence of characters included in said first and second codes is changeable to another sequence of characters.

22. The portable apparatus with plurality of functions according to claim 13, wherein each different sequence of characters included in said first and second codes is assignable to each of said functions provided to said portable apparatus, respectively.

23. The portable apparatus with plurality of functions according to claim 13, wherein each different sequence of characters included in said first and second codes is assignable to each of selected plurality of functions among said functions provided to said portable apparatus.

24. The portable apparatus with plurality of functions according to claim 13,

wherein said controlling means selects an unlocking mode wherein said first code is not used.

Drawings

Password protection for mobile phones

Written on 12:38 PM by CommuniKation

Password protection for mobile phones

 Jun Liu
Abstract Abstract | Drawing | Description | Claims

Abstract
A method of password protection in a mobile phone. The method utilizes the password mechanism and features of Flash memory for safeguarding the data inside the phone.

Application number: 10/901,783
Publication number: US 2006/0025110 A1
Filing date: 28 Jul 2004
Inventor: Jun Liu

U.S. Classification
455411000

Search within this application

Claims

What is claimed is:

1. A method of password-protecting a phone, comprising the steps of:

enabling a password protection feature in the phone;
entering a lock mode in the phone after a first specified duration of phone non-operation elapses;
setting a lock mode flag, in a nonvolatile memory of the phone, to enabled status; and
requesting an access password in response to a user attempting to use the phone while the phone is in lock mode.

2. The method of claim 1 further comprising the steps of:

comparing a user-entered password to the access password while the phone is in lock mode; and
entering unlock mode if the user-entered password matches the access password.

3. The method of claim 1 wherein the lock mode flag remains set to enabled status in the nonvolatile memory when the phone is restarted so that the lock mode is entered and the access password is requested when the phone is restarted.

4. The method of claim 1 wherein the first specified duration of phone non-operation is modifiable by a user when the phone is not in lock mode.

5. The method of claim 1 wherein the access password is stored in the nonvolatile memory of the phone.

6. The method of claim 1 further comprising the step re-requesting the access password if a user-entered password does not match the access password.

7. The method of claim 6 further comprising the step of the phone remaining in lock mode and not re-requesting the access password if the user enters an incorrect password a consecutive specified number of times.

8. The method of claim 7 wherein the consecutive specified number of times is modifiable by a user when the phone is not in lock mode.

9. The method of claim 1 wherein the phone enters a screensaver mode after a second specified duration of phone non-operation.

10. The method of claim 9 wherein the second specified duration of phone non-operation is modifiable by a user when the phone is not in lock mode.

11. The method of claim 9 wherein the second specified duration of phone non-operation is equal to the first specified duration of phone non-operation, such that the phone enters the lock mode and the screensaver mode substantially simultaneously.

12. The method of claim 1 wherein the nonvolatile memory is embodied on a flash memory chip.

13. A method of password-protecting a phone, comprising the steps of:

entering a lock mode in the phone when a user manually selects the lock mode;
setting a lock mode flag, in a nonvolatile memory of the phone, to enabled status;
requesting an access password in response to a user attempting to use the phone while the phone is in lock mode;
wherein the lock mode flag remains set to enabled status in the nonvolatile memory if the phone is restarted so that the lock mode is entered and the access password is requested when the phone is restarted.

14. The method of claim 13 further comprising the steps of:

comparing a user-entered password to the access password; and
entering unlock mode if the user-entered password matches the access password.

15. The method of claim 13 wherein the access password is stored in the nonvolatile memory of the phone.

16. The method of claim 13 further comprising the step re-requesting the access password if a user-entered password does not match the access password.

17. The method of claim 16 further comprising the step of the phone remaining in lock mode and not re-requesting the access password if the user enters an incorrect password a consecutive specified number of times.

18. The method of claim 17 wherein the consecutive specified number of times is modifiable by a user when the phone is not in lock mode.

19. The method of claim 13 wherein the phone enters a screensaver mode after a specified duration of phone non-operation elapses.

20. The method of claim 13 wherein the phone automatically enters the lock mode after a specified duration of phone non-operation if a user does not manually select the lock mode.

21. The method of claim 13 wherein the nonvolatile memory is embodied on a flash memory chip.

22. A phone, comprising:

means for enabling a password protection feature in the phone;
means for causing the phone to enter a lock mode after a specified duration of phone non-operation elapses;
means for setting a lock mode flag, in a nonvolatile memory of the phone, to enabled status when the phone is in lock mode; and
means for requesting an access password in response to a user attempting to use the phone while the phone is in lock mode.

23. The phone of claim 22 further comprising:

means for comparing a user-entered password to the access password; and
means for causing the phone to enter unlock mode if the user-entered password matches the access password.

24. The phone of claim 23 wherein the lock mode flag remains set to enabled status in the nonvolatile memory when the phone is restarted so that the lock mode is entered and the access password is requested when the phone is restarted.


Locking and unlocking method in mobile telephone

Written on 12:36 PM by CommuniKation

Locking and unlocking method in mobile telephone
Document Type and Number:
United States Patent 6801765

Abstract:
Disclosed is a method for locking and unlocking a mobile telephone. The method comprises setting a locking mode by receiving a locking voice, a locking-wait time and a locking number; receiving a locking voice when there is a key input in the locking mode; partially releasing the locking function when the received locking voice is identical to a registered locking voice; switching an operation mode of the mobile telephone to an idle mode, after partially releasing the locking function; and switching the operation mode of the mobile telephone back to the locking mode, when there is no key input in the idle mode until the locking-wait time has elapsed.


Representative Image:
Inventors:
Roo, Kyung-yun (Kyongsangbuk-do, KR)
Lee, Youn-man (Kyongsangbuk-do, KR)
Hwang, Yong-duck (Kyongsangbuk-do, KR)
      Plaque It!

Application Number:
09/473223
Publication Date:
10/05/2004
Filing Date:
12/27/1999
View Patent Images:
Images are available in PDF form when logged in. To view PDFs, Login  or  Create Account (Free!)
Assignee:
Samsung Electronics Co., Ltd. (KR)
Primary Class:
Other Classes:
455/563
International Classes:
H04M1/667; H04M1/66; H04M1/66; H04M1/68
Field of Search:
455/410, 379/88.01, 455/411, 379/93.03, 340/5.81, 455/563, 340/5.84, 379/88.02, 704/275, 340/5.85, 455/575, 379/189, 340/5.8, 704/231, 704/246, 340/5.1, 455/566, 455/422, 379/903, 455/565, 455/550
US Patent References:
5046125Lock control method for on-board terminal equipment of a mobile telecommunications system
Takizawa455/411
5241583Portable radio telephone which terminates an electronic keypad lock function upon sensing an incoming call
Martensson 455/565
5646604Mobile unit and a method for enabling a dial lock in the mobile unit
Maruyama et al.455/411
5749052Cellular telephone management system
Hidem et al.455/422
6195568 Radiotelephone adapted to the identity of its user
Irvin455/563
Foreign References:
JP09064967



Primary Examiner:
Vuong, Quochien
Attorney, Agent or Firm:
Dilworth & Barrese, LLP
Claims:
What is claimed is:

1. A method for locking and unlocking a mobile telephone, comprising the steps of: setting a locking mode by receiving a registered locking voice, a registered locking-wait time and a registered locking number; partially releasing said locking mode when a received locking voice is identical to said registered locking voice; switching an operation mode of the mobile telephone to an idle mode, after partially releasing the locking function; and switching said operation mode of the mobile telephone back to said locking mode when there is no key input in said idle mode and when said registered locking-wait time has elapsed.

2. The method as claimed in claim 1, further comprising the steps of: displaying a locking-number input request character message upon receipt of a voice locking function release key and when said input received locking voice is identical to said registered locking voice; receiving a locking number; and completely releasing said locking mode when said received locking number is identical to said registered locking number.

3. A method for locking and unlocking a mobile telephone, comprising the steps of: setting a voice locking mode by receiving a registered locking voice, a registered locking-wait time and a registered locking number, and switching an operation mode of the mobile telephone to a voice locking mode; displaying a locking-voice input request character message upon receipt of a key input in the voice locking mode; outputting a locking-voice input request voice message; receiving a locking voice within a predetermined time; partially releasing the voice locking function when the received locking voice is identical to said registered locking voice, and switching the voice locking mode to an idle mode; and switching the idle mode to said voice locking mode, when there is no key input for the registered locking-wait time in the idle mode.

4. The method as claimed in claim 3, further comprising the steps of: determining whether a voice locking function release key for completely releasing the voice locking function is received, when the received locking voice is identical to the registered locking voice; displaying a locking-number input request character message upon receipt of the voice locking function release key; outputting a locking-number input request message; receiving a locking number; and completely releasing the voice locking function, when the received locking number is identical to a registered locking number.

5. The method as claimed in claim 3, wherein the voice locking function setting step comprises the steps of: upon receipt of a voice locking function setting key, switching an operation mode of the mobile telephone to a voice locking function setting mode; displaying a locking-voice input request character message; receiving a registered locking voice within a predetermined time registering said received registered locking voice; displaying a locking-wait time input request character message; receiving a registered locking-wait time within a predetermined time, and registering the received registered locking-wait time; displaying a locking-number input request character message for completely releasing the voice locking function; receiving a registered locking number within a predetermined time, and registering the received registered locking number; and setting the voice locking function in the mobile telephone and releasing the voice locking function setting mode.

6. The method as claimed in claim 5, further comprising the step of outputting a locking-voice input request voice message after displaying the locking-voice input request character message.

7. The method as claimed in claim 5, further comprising the step of outputting a locking-wait time input request voice message after displaying the locking-wait time input request character message.

8. The method as claimed in claim 5, further comprising the step of outputting a locking-number input request voice message after displaying the locking-number input request character message.

9. The method as claimed in claim 5, wherein the locking-wait time is a waiting time required when the mobile telephone is set back to the voice locking mode because no key input is received after the voice locking function is partially released.

10. A method for locking and unlocking a mobile telephone which includes a key input device, comprising the steps of: setting a locking mode by receiving a registered automatic locking number and a registered automatic locking time input with the key input device; switching an operation mode of the mobile telephone to a locking mode, when there is no key input from the key input device for said registered automatic locking time; and receiving an automatic locking number when there is a key input in the locking mode, and releasing the locking mode when the received automatic locking number is identical to said registered automatic locking number.

11. The method as claimed in claim 10, wherein the locking mode setting step comprises the step of: upon receipt of an automatic locking function setting key, setting an operation of the mobile telephone to an automatic locking function setting mode; receiving a registered automatic locking number; and setting a registered automatic locking time.

12. A method for locking and unlocking a mobile telephone, comprising the steps of: requesting input of a locking voice, when there is no key input in a voice locking mode where a registered locking voice, a registered locking-wait time and a registered locking number are entered in the mobile telephone; receiving said locking voice within a predetermined time according to the locking voice input request; determining whether a voice locking function release key is input, when the received locking voice is identical to said registered locking voice; upon receipt of the voice locking function release key, requesting input of a locking number; receiving said locking number within a predetermined time according to the locking number input request; and completely releasing the voice locking function, when the received locking number is identical to said registered locking number.

Description:
This application claims priority to an application entitled "Locking and Unlocking Method in Mobile Telephone" filed in the Korean Industrial Property Office on Dec. 26, 1998 and assigned Serial No. 98-59047, the contents of which are hereby incorporated by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to a mobile telephone, and in particular, to a locking and unlocking method in a mobile telephone.

2. Description of the Related Art

As the popularity of mobile telephones increases, the potential for fraudulent use of the mobile telephone also increases. Therefore, most mobile telephones have a locking function using a locking number (or password). In this case, one other than the user who knows the password can unlock the mobile telephone by inputting the password. Therefore, it is not possible to completely prevent the fraudulent use. In addition, the user must input the password containing several numerals one by one in order to unlock the mobile telephone. This is an annoyance for the mobile user, as the inputting of the password may obstruct careful driving and must be repeated upon completion of the call.

Moreover, when the mobile telephone is missing and in an unlocked state, it is not possible to prevent the fraudulent use.

SUMMARY OF THE INVENTION

It is, therefore, an object of the present invention to provide a method for locking and unlocking a mobile telephone by using a voice.

It is another object of the present invention to provide a method for locking a partially unlocked mobile telephone again after a lapse of a predetermined time.

It is yet another object of the present invention to provide a method for automatically locking and unlocking a mobile telephone in an idle mode after a lapse of a predetermined time.

To achieve the above objects, there is provided a method for locking and unlocking a mobile telephone. The method comprises setting a locking mode by receiving a registered locking voice, a registered locking-wait time and a registered locking number; receiving a locking voice when there is a key input in the locking mode; partially releasing the locking function when the received locking voice is identical to the registered locking voice; switching an operation mode of the mobile telephone to an idle mode after partially releasing the locking function; and switching the operation mode of the mobile telephone back to the locking mode when there is no key input in the idle mode until the locking-wait time has elapsed.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other objects, features and advantages of the present invention will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings in which:

FIG. 1 is a block diagram illustrating a mobile telephone to which the present invention is applicable;

FIGS. 2A and 2B are flow charts illustrating a procedure for setting a voice locking function according to an embodiment of the present invention;

FIGS. 3A and 3B are flow charts illustrating a voice locking/unlocking procedure according to an embodiment of the present invention;

FIG. 4 is a flow chart illustrating a procedure for setting an automatic locking function according to an embodiment of the present invention;

FIG. 5 is a flow chart illustrating an automatic locking/unlocking procedure according to an embodiment of the present invention; and

FIGS. 6A and 6B are flow charts illustrating a voice locking/unlocking procedure according to another embodiment of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

A preferred embodiment of the present invention will be described herein below with reference to the accompanying drawings. In the following description, well-known functions or constructions are not described in detail since they would obscure the invention in unnecessary detail.

Referring to FIG. 1 , there is shown a block diagram of a mobile telephone to which the present invention is applicable. A controller 111 controls the overall operation of the mobile telephone. A memory 113 stores a control program of the mobile telephone, and control data generated from the controller 111 . A key input device 115 includes a plurality of dialing digit keys, a MENU key and a SEND key, and generates a key signal corresponding to a key selected by the user and provides the generated key signal to the controller 111 . In the embodiment of the present invention, a specific key such as a voice locking function setting key and a voice locking function release key can be set by combination of the keys prepared in the key input device 115 .

A voice memory 117 stores a plurality of voice messages. Particularly, the voice memory 117 stores (1) a locking-voice input request voice message requesting input of a locking voice, (2) a locking-wait time input request voice message requesting input of locking-wait time, (3) a locking-number input request voice message requesting input of a locking number, (4) a locking-voice input request voice message requesting input of a locking voice for partially releasing the voice locking function, (5) a locking-number input request voice message requesting input of a locking number for completely releasing the voice locking function, and (6) an input registered locking voice.

An audio processor 119 , under the control of the controller 111 , converts a voice message read from the voice memory 117 into an analog signal and outputs it through a speaker. In addition, the audio processor 119 converts an analog signal input from a microphone into a digital signal.

A transmitter 121 modulates a signal provided from the controller 111 into a radio signal. A duplexer 123 transmits the radio signal provided from the transmitter 121 via an antenna, and provides a radio signal received from the antenna to a receiver 125 . The receiver 125 demodulates the radio signal provided from the duplexer 123 and provides the demodulated signal to the controller 111 . The controller 111 controls a call according to the demodulated signal provided from the receiver 125 . A display 127 , which is comprised of an LCD (Liquid Crystal Display) or an LED (Light Emitting Device), displays operating states of the mobile telephone, under the control of the controller 111 .

Referring now to FIG. 2A , there is shown a procedure for setting a voice locking function according to an embodiment of the present invention. Controller 111 scans the key input device 115 at stated periods in step 211 to determine whether a voice locking function setting key is input or not. The voice locking function setting key is defined by combination of the keys prepared in the key input device 115 . Upon receipt of an input key other than the voice locking function setting key, the controller 111 performs an operation corresponding to the input key in step 213 and then the routine ends.

However, upon receipt of the voice locking function setting key, the controller 111 switches an operation mode of the mobile telephone to a voice locking function setting mode in step 215 . Thereafter, in step 217 , the controller 111 accesses the memory 113 to read a locking-voice input request character message such as "Please, input a locking voice", and displays the read character message on the display 127 . Subsequently, in step 219 , the controller 111 access the voice memory 117 to read a locking-voice input request voice message such as "Please, input a locking voice", converts the read voice message to an analog signal using the audio processor 119 , and then outputs it through the speaker. The controller 111 then determines in step 221 whether a voice signal is input by the user through the microphone. When no voice signal is input, the controller 111 repeatedly examines in step 223 whether a predetermined time, for example, 5 seconds has elapsed or not. When the predetermined time has elapsed, the controller 111 remedies the error condition in step 225 and then the routine ends.

When a voice signal is input by the user in step 221 , the controller 111 converts the input voice signal to a digital signal through the audio processor 119 and stores the converted digital signal as a registered locking voice in the voice memory 117 , in step 227 . Thereafter, in step 229 , the controller 111 accesses the memory 113 to read a locking-wait time input request character message such as "Please, input locking-wait time", and displays the read character message on the display 127 . Here, the "locking-wait time" refers to a waiting time required when the mobile telephone is set back to the voice locking mode because no key input is received after the voice locking function is partially released. In step 231 , the controller 111 accesses the voice memory 117 to read a locking-wait time input request voice message such as "Please, input locking-wait time", converts the read voice message to an analog signal using the audio processor 119 , and then outputs it through the speaker. The controller 111 determines in step 233 whether the locking-wait time is input or not. The locking-wait time may be input using the keys prepared in the key input device 115 . When the locking-wait time is not input, the controller 111 determines in step 235 whether a predetermined time, for example, 3 seconds has elapsed or not. When the predetermined time has elapsed, the controller 111 remedies the error condition in step 237 and then the routine ends. When the locking-wait time is input in the step 233 , the controller 111 registers the input locking-wait time in the memory 113 in step 239 .

Referring now to FIG. 2B , there is shown the continuation of the procedure for setting a voice locking function according to an embodiment of the present invention. Referring to step 241 , the controller 111 accesses the memory 113 to read a character message requiring input of a locking number for completely releasing the voice locking function, such as "Please, input a locking number", and displays the read character message on the display 127 . In step 243 , the controller 111 accesses the voice memory 117 to read a voice message requiring input of the locking number such as "Please, input a locking number", converts the read voice message to an analog signal using the audio processor 119 , and then outputs it through the speaker. The controller 111 scans the key input device 115 in step 245 , to determine whether the locking number has been input. When the locking number is not input, the controller 111 determines in step 247 whether a predetermined time, for example, 3 seconds has elapsed or not. When the predetermined time has elapsed, the controller 111 remedies the error condition in step 249 and then the routine ends.

However, when the locking number has been input in step 245 , the controller 111 registers the input locking number in the memory 113 in step 251 . Then, the controller 111 sets the voice locking function in step 253 , and releases the voice locking function setting mode in step 255 .

As described above, in the voice locking function setting procedure of FIGS. 2A and 2B , the mobile telephone sets the locking voice, locking-wait time and locking number.

Referring to FIG. 3A , there is shown a voice locking/unlocking procedure according to an embodiment of the present invention. The controller 111 scans the key input device 115 in step 311 , to determine whether a key is input. When a key is input, the controller 111 determines in step 313 whether the voice locking function is set in the mobile telephone. When the voice locking function is not set, the controller 111 performs an operation corresponding to the input key in step 315 and ends the routine.

However, when the voice locking function is set, the controller 111 accesses the memory 113 to read a locking-voice input request character message such as "Please, input a locking voice", and displays the read character message on the display 127 , in step 317 . Thereafter, in step 319 , the controller 111 accesses the voice memory 117 to read a locking-voice input request voice message such as "Please, input a locking voice", converts the read voice message to an analog signal using the audio processor 119 , and outputs it through the speaker. The controller 111 determines in step 321 whether a voice signal is input by the user through the microphone. When no voice signal is input, the controller 111 determines in step 323 whether a predetermine time, for example, 3 seconds has elapsed or not. When the predetermined time has elapsed, the controller 111 remedies the error condition in step 325 and then the routine ends.

When the voice signal is input in step 321 , the controller 111 determines in step 327 whether the input voice signal corresponds to a locking voice registered in the voice memory 117 . When the input voice signal does not correspond to the registered locking voice, the controller 111 accesses the voice memory 117 to read a locking-voice re-input request voice message such as "Unregistered locking voice. Please, input the locking voice again", processes the read voice message to an analog signal using the audio processor 119 , and outputs the analog voice signal through the speaker, in step 329 . In the embodiment, the number of re-inputting the locking voice is limited to 3.

Referring now to FIG. 3B , there is shown a continuation of the voice locking/unlocking procedure according to an embodiment of the present invention. When the input voice signal corresponds to the registered voice in step 327 of FIG. 3A , the controller 111 scans the key input device in step 331 , to determine whether a voice locking function release key is input or not. The voice locking function release key is defined by combination of the keys prepared in the key input device 115 . When it is determined in step 331 that the voice locking function release key is input, the controller 111 accesses the memory 113 to read a locking-number input request character message such as "Please, input a locking number", and displays the read character message on the display 127 , in step 333 . Thereafter, in step 335 , the controller 111 accesses the voice memory 117 to read a locking-number input request voice message such as "Please, input the locking number", converts the read voice message to an analog signal using the audio processor 119 , and outputs the converted analog voice signal through the speaker. The controller 111 scans the key input device 115 in step 337 , to determine whether the locking number has been input or not. If it is determined that the locking number has been input, the controller 111 examines in step 339 whether the input locking number is identical to a locking number registered in the memory 113 . When the input locking number is not identical to the registered locking number, the controller 111 accesses the voice memory 117 to read a locking number re-input request voice message such as "Unregistered locking number. Please, input the locking number again", converts the read voice message to an analog signal using the audio processor 119 , and outputs the converted analog voice signal through the speaker, in step 341 . Thereafter, the procedure returns to the step 337 . In the embodiment, the number of re-inputting the locking number is limited to 2, by way of example.

However, if it is determined in step 339 that the input locking number is identical to the registered locking number, the controller 111 completely releases the voice locking function in step 343 and ends the routine.

Further, if it is determined in step 331 that the voice locking function release key is not input, the controller 111 partially releases the voice locking function in step 345 and switches an operation mode of the mobile telephone to the idle mode in step 347 . The controller 111 scans the key input device 115 in step 349 , to determine whether a key is input. When a key is input, the controller 111 performs the other operation corresponding to the key input in step 351 and ends the routine. However, when no key is input, the controller 111 determines in step 353 whether a locking-wait time, for example, 30 minutes has elapsed or not. When the locking-wait time has elapsed, the controller 111 switches an operation mode of the mobile telephone to a voice locking mode in step 355 and ends the routine.

In the voice locking/unlocking procedure of FIGS. 3A and 3B , the voice locking function is partially released using the locking voice so as to enable the user to perform the call, and the voice locking function is automatically and repeatedly set when there is no key input for the locking-wait time.

Referring to FIG. 4 , there is shown a procedure for setting an automatic locking function according to an embodiment of the present invention. The controller 111 scans the key input device 115 at stated periods in step 411 , to determine whether an automatic locking function setting key is input or not. The automatic locking function setting key can be defined by combination of the keys prepared in the key input device 115 . Upon receipt of a key other than the automatic locking function setting key, the controller 111 performs an operation corresponding to the input key in step 413 and ends the routine.

Upon receipt of the automatic locking function setting key, the controller 111 switches an operation mode of the mobile telephone to an automatic locking function setting mode in step 415 . Thereafter, in step 417 , the controller 111 accesses the memory 113 to read a locking-number input request character message such as "Please, input a locking number", and displays the read character message on the display 127 . In step 419 , the controller 111 accesses the voice memory 117 to read a locking-number input request voice message such as "Please, input a locking number", converts the read voice message to an analog signal, and outputs the converted analog voice signal through the speaker. The controller 111 scans the key input device 115 in step 421 to determine whether a key for locking number setting is input or not. When the key is not input, the controller 111 repeatedly examines in step 423 whether a predetermined time, for example, 5 seconds has elapsed or not. When the predetermined time has elapsed, the controller 111 proceeds to step 429 after remedying the error condition in step 440 .

If it is determined in step 421 that the key is input, the controller 111 sets a number corresponding to the input key as a locking number and registers it in the memory 113 , in step 425 . Thereafter, in step 427 , the controller 111 sets an automatic locking-wait time corresponding to locking number setting. The automatic locking-wait time refers to a waiting time required when the mobile telephone is set to an automatic locking mode because no key input is received in the idle mode. Thereafter, the controller 111 releases the automatic locking function setting mode in step 429 , and ends the routine.

In the automatic locking function setting procedure of FIG. 4 , the automatic locking-wait time is set according to the input locking number.

Referring to FIG. 5 , there is shown an automatic locking/unlocking procedure according to an embodiment of the present invention. The controller 111 examines in step 511 whether the mobile telephone is set to an automatic locking mode. When the mobile telephone is set to an automatic locking mode, the controller 111 scans the key input device 115 in step 513 to examine whether a key is input. When a key is input, the controller 111 performs an operation corresponding to the key input in step 515 and ends the routine.

However, when no key is input, the controller 111 determines in step 517 whether a predetermined automatic locking-wait time has elapsed or not. When the automatic locking-wait time has elapsed, the controller 111 switches an operation mode of the mobile telephone to an automatic locking mode in step 519 . Thereafter, in step 521 , the controller 111 determines whether there is the user's attempt to use the mobile telephone. Here, the "user's attempt to use the mobile telephone" refers to the user's attempt to use a call or service function of the mobile telephone by pressing a MENU or SEND key of the key input device 115 . If it is determined in step 521 that there is a user's attempt to use the mobile telephone, the controller 111 accesses the memory 113 to read a locking-number input request character message such as "Please, input a locking number", and displays the read character message on the display 127 , in step 523 . Thereafter, in step 525 , the controller 111 accesses the voice memory 117 to read a locking number input request voice message such as "Please, input locking number", converts the read voice message to an analog signal using the audio processor 119 , and outputs the converted analog voice signal through the speaker. In step 527 , the controller 111 scans the key input device 115 to examine whether a locking number has been input or not. When the locking number is not input, the controller 111 determines in step 529 whether a predetermined time, for example, 5 seconds 20 has elapsed or not. When the predetermined time has elapsed, the controller 111 returns to step 513 after remedying the error condition in step 540 .

If a locking number has been input in step 527 , the controller 111 determines in step 531 whether the input locking number is identical to a set locking number. When the input locking number is not identical to a set locking number, the controller 111 accesses the voice memory 117 to read a locking number re-input request voice message such as "Incorrect locking number. Please, input the locking number again", converts the read voice message to an analog signal using the audio processor 119 , and outputs the converted analog audio signal through the speaker, in step 533 . Thereafter, the procedure returns to the step 527 . Here, the number of re-inputting the locking number is limited to a predetermined number, and when the re-input number exceeds the predetermined number, the controller 111 generates an error signal.

When it is determined in step 531 that the input locking number is identical to a set locking number, the controller 111 releases the automatic locking mode of the mobile telephone in step 535 , and ends the routine.

In the automatic locking/unlocking procedure of FIG. 5 , the automatic locking mode is set when there is no key input for the automatic locking-wait time, and the automatic locking mode is released when the locking number is input in the automatic locking mode.

Referring to FIG. 6A , there is shown a voice locking/unlocking procedure according to another embodiment of the present invention. Upon power-on of the mobile telephone, the controller 111 examines in step 611 whether a voice locking function is set or not. When the voice locking function is set, the controller 111 examines in step 613 whether there is key input from the user by scanning the key input device 115 . When there is a key input, the controller 111 performs an operation corresponding to the key input in step 614 and ends the routine.

However, when there is no key input, the controller 111 determines in step 615 whether a locking-wait time for the set automatic locking function has elapsed or not. If the time has not elapsed, the procedure goes to step 613 . If however, the locking-wait time has elapse, the controller 111 switches an operation mode of the mobile telephone to a voice locking mode for performing the voice locking function, in step 617 . Thereafter, the controller 111 determines in step 619 whether there is a key input signal from the key input device 115 . Upon receipt of the key input signal, the controller 111 proceeds to step 621 . Otherwise, the controller 111 ends the procedure. The operations performed in steps 621 to 659 are identical to the operations performed in steps 317 to 355 of FIGS. 3A and 3B . Therefore, a detailed description will be avoided.

To sum up, by performing the locking/unlocking method using a voice, it is possible to prevent the fraudulent use of the mobile telephone by a person other than the user. In addition, inputting the locking number by voice provides for safer driving operation. Furthermore, the voice locking function is automatically performed again after a lapse of a predetermined time when the voice locking function is released, thus enabling a double locking function. In addition, when there is no key input for a predetermined time after power-on, the mobile telephone is automatically locked. Therefore, it is not necessary for the user to repeat the annoying locking function setting procedure.

While the invention has been shown and described with reference to a certain preferred embodiment thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Method of unlocking a mobile telephone type wireless communication terminal

Written on 12:34 PM by CommuniKation

Method of unlocking a mobile telephone type wireless communication terminal

 Thierry Dupuis et al
Abstract Abstract | Drawing | Description | Claims

Abstract
In a method of unlocking mobile telephones, in particular one using the "SIM-LOCK" method, the user of the telephone submits an unlocking request directly to the manufacturer of the telephone and the manufacturer sends unlocking information to the telephone after verifying with the operator that the user is entitled to unlocking. This simplifies the administration of unlocking requests and makes it more reliable.

Application number: 10/808,465
Publication number: US 2004/0192388 A1
Filing date: 25 Mar 2004
Inventors: Thierry Dupuis, Alain Guirauton
Assignee: ALCATEL

U.S. Classification
455558000; 455557000

International Classification
H04M001/68

Search within this application

Claims

What is claimed is:

1. A method of unlocking a mobile telephone wherein the user of said telephone submits an unlocking request to the manufacturer of said telephone and said manufacturer sends unlocking information to said telephone.

2. The method claimed in claim 1 wherein said manufacturer contacts the user's operator to verify that said user is entitled to unlocking.

3. The method claimed in claim 2 wherein said user sends said unlocking request to said manufacturer via said operator in a manner that is transparent to said operator.

4. The method claimed in claim 2 wherein said manufacturer sends said unlocking information to said telephone via said operator in a manner that is transparent to said operator.

5. The method claimed in claim 1 wherein said manufacturer sends said telephone a confirmation message containing indications of the operations effected.

6. The method claimed in claim 1 wherein said manufacturer sends said operator a confirmation message containing indications of the operations effected.

7. The method claimed in claim 1 wherein said manufacturer sends said telephone and said operator respective confirmation messages containing indications of the operations effected and said message sent to said telephone and said message sent to said operator contain at least some different indications.

8. The method claimed in claim 1 wherein information is exchanged between said terminal and said manufacturer via modulation means for transmitting data on the speech channel.

Drawings

Page 2

Introduction to Mobile Phone Flasher Devices

Written on 12:31 PM by CommuniKation

Introduction to Mobile Phone Flasher Devices and Considerations for their Use in
Mobile Phone Forensics
Marwan Al-Zarouni

School of Computer and Information Science

Edith Cowan University
forensics@marwan.com

Abstract
The paper gives an overview of mobile phone flasher devices and their use for servicing mobile phones, their
illegitimate uses and their use in mobile phone forensics. It discusses the different varieties of flasher devices
and the differences between them. It also discusses the shortcomings of conventional mobile forensics software
and highlights the need for the use of flasher devices in mobile forensics to compensate for the shortcomings.
The paper then discusses the issues with the use of flasher devices in mobile forensics and precautions and
considerations of their use. The paper goes further to suggest means of testing the flasher devices and suggest
some tools that can be used to analyse raw data gathered from mobile phones that have been subjected to
flasher devices.
Keywords
Mobile Forensics, Cell Phone Forensics, Flasher Box, Hex Dumping, UFS-3 Tornado.
INTRODUCTION
The need to address issues with mobile phone forensics is ever important. The number of mobile phone users
nowadays surpasses 2.5 billion people across 218 countries and territories (Smith and Pringle 2007). Mobile
phone abuse and problems caused by the use of camera devices within mobile phones are also increasing (Tarica
2007). Yet, conventional mobile phone forensic solutions do not seem to keep up with advances in mobile
phone technologies. Furthermore, the development cost for supporting less popular mobile phones by such
forensic solutions contributes to driving the prices of such forensic solutions higher (Espiner 2007). This is in
addition to expensive updates and yearly subscriptions or service agreements that are sometimes needed to get
support for the latest mobile phone devices.
New types of devices called "flasher boxes", also know as "flashers", are relatively cheap and are now becoming
significant additions to mobile forensic investigators' arsenal of forensic tools. These devices are being used by
forensic investigators in Europe and the United States of America to acquire forensic images directly from
mobile phone devices (Breeuwsma et al. 2007, Purdue 2007).
ABOUT FLASHERS AND THEIR MOBILE SERVICE USES
Flasher boxes are also known as flashers or clips and they are mobile phone service devices used by mobile
phone service providers and shops. They are mainly used to recover user data from dead or faulty mobile phones
that otherwise will not provide access to data stored on their internal memory. They can also be used to update
or replace software that is stored in the mobile phone's Read Only Memory (ROM). This software is commonly
referred to as "firmware" and is usually pre-installed on phones by either the manufacturer of the phone such as
Nokia and Sony-Ericsson or phone service providers such as Three Mobile or Telstra.
Flashers are also used to add language support and set regional settings for mobile phones. Changing regional
settings can enable a user that bought a mobile phone device from Australia with Telstra-based firmware for
example and did not have Arabic language support by default in the firmware to re-flash it with an Arabic-
supported firmware supplied by Nokia in the Middle East. Therefore, he or she will have a mobile phone that
now supports the Arabic language and will therefore be able to send and receive Arabic Short Message Service
(SMS) messages.
Other uses for flasher boxes include removing or changing carrier settings and unlocking SIM restrictions or
carrier based locks or call restrictions. Even though Subscriber Identity Module (SIM) unlocking is legal in
some countries such as Australia, it can be illegal in some other countries.
Page 2
IMEI AND THE ILLEGAL USE OF FLASHERS
International Mobile Equipment Identity (IMEI) is a unique 15 digit international serial number used to identify
a mobile phone handset to a mobile phone network. This number can used to identify illegal mobile phone
handsets. Each time a mobile phone is switched on or a call is made on it, the network provider checks the IMEI
number of the handset, then it cross references it with a blacklist register such as the Central Equipment Identity
Register (CIER) used in the United Kingdom. If it is on the blacklist then the network will either refuse to send a
signal to the phone or will supply a signal but will not allow any outgoing or incoming calls (UnlockMe 2007).
Flashers can be illegally used to change the IMEI number of some mobile phone devices. This in effect enables
criminals to illegally re-enable stolen or lost mobile phones that won't be otherwise usable on a certain mobile
phone network.
Figure 1 below is a screen shot of the flasher software for UFS3 by SarasSoft that shows the option to change
(rebuild) the IMEI number of the mobile device under the Aux features box within the DCTL group of devices
options for the Nokia mobile phone brand flashing. It is worth noting that for Nokia, only DCT3 and DCTL
group of devices allow for IMEI modification. Newer Nokia mobile phone devices embed the IMEI number in a
non-re-writable chip and therefore are not subject to IMEI rebuilding.
Figure1: Rebuild IMEI option for DCTL range of Nokia mobile phones
FLASHER BOX COMPONENTS AND VARIETIES
Flashers are a combination of software, hardware and drivers. There are many varieties of flasher boxes
covering a wide variety of mobile phones. Therefore, choosing the correct box for a type of mobile phone
device or phone model or mobile phone manufacturer can be a daunting task. There are two main categories of
flasher boxes:
• Branded Boxes. The features of which include:
• They are more expensive than their proprietary counterparts.
• They have well known names and model numbers.
• They have unique serial numbers.
• Some boxes need activation. Software, updates and support is provided for these boxes.
The level of support varies depending on manufacturer of box.
• They are widely used by service technicians.
• They are sold by recognized suppliers and an "approved supplier list" is often found on
the manufacturer's website.
• Easier to get support for them in forums and on other support websites.
Page 3
• Some boxes come with a large amount of cables and can cover both GSM and CDMA
phones.
• They do not usually require an external power supply to function. They rely on the
USB interface as a power source.
• Unbranded (Proprietary) Boxes:
• Much cheaper than branded boxes
• Sometimes match the original flasher boxes in components and functionality.
• Sometimes combine the functionality and phone support of more than one branded
flasher box.
• Sometimes support the addition of a smartcard from branded flasher boxes.
• Do not usually come with any software and/or drivers and put the onus on the buyer to
come up with the software from other Internet sources.
• Some boxes come with phone flashing/servicing cables while others do not.
• Some require an external power supply that is not usually provided with the purchase
(IPMart 2007).
Figure 2: I-Pmart 2 In 1 Flasher Box With Smart Card Holder (IPMart 2007)
It is worth mentioning that none of the flasher boxes, branded or unbranded, are supported or indorsed by the
manufacturers of mobile phones such as Nokia, Sony-Ericsson and others. The top selling branded boxes for the
Nokia brand of mobile phone devices include:
• Universal box (UniversalBox 2007).
• JAF box (Odeon 2007).
• MT-Box for Nokia. There is a separate MT-Box for Sony-Ericsson. Even though both boxes are
exactly the same and come with a 10 uses trial for the opposite brand (MT-Box 2007).
• UFS 3 tornado: The original flasher box and most widely recommended and used (UFSxSupport 2007).
Page 4
Figure 3: UFS 3 Tornado Flasher Box
Widely used flasher boxes with support for multiple brands of mobile phones include:
• Smart Clip: Motorola, Sendo and others (Smart-Clip 2007).
• GTS Box: Nokia, Motorola, Samsung, Sharp, LG, Sony Ericsson and Siemens (GTS 2007).
• Vygis: LG, Sharp, Sanyo, NEC, BenQ, Alcatel, and Toshiba (Vygis 2007).
There are paid service sites and free phone repair communities that provide the following:
• Video tutorials on setup and use of boxes (FoneFunShop 2007).
• Constantly updated raw ROM images and language packs to flash mobile phone memory with.
• Service manuals and updates for software to cover a wide variety of mobile phones and flasher boxes.
USB flasher dongles that can be used for mobile phone servicing often offer less functionality than USB flasher
boxes but may offer other added services such as:
• Remote unlocking and de-branding of phones.
• Credit points that can be used to do things such as IMEI change or unlocking of devices from a service
provider.
An example of a product that needs pre-paid credit to unlock and de-brand mobile phones is the JAF device for
Windows Mobile Phones (GSMServer 2007). It should be noted however that the JAF device will not work with
all phone models running Windows Mobile software. While it supports some phones made by the Taiwanese
HTC manufacturer, the do not support devices made by Palm which run Windows Mobile software.
Figure 5: JAF WM software and USB Dongle (PolPhone 2006)
Page 5
ISSUES WITH COMMAND BASED FORENSICS SOFTWARE TOOLS
There are a wide range of software applications and mobile forensic toolkits that claim to acquire data from
mobile phones in a forensically sound manner without altering any content in the mobile phone’s memory. Such
claims however cannot be verified. The basic flaw in these forensic software tools is in the way they gain access
to data in the phone’s memory. They use command and response protocols that provide indirect access to
memory (McCarthy 2005).
Command and response protocols such as AT Commands (AT is short for attention) are commands that were
originally developed to control modems to do things like dial, hang up, switch modes, and other modem
commands. These commands are utilized by current command based forensic software to communicate with the
mobile phone and query it about certain data held in the phone’s memory. This means that the forensic software
does not have direct access or low level access to data within the phone’s memory and in effect treats every
mobile phone as a black box. This also means that the software is dependant on the phone’s operating system
based command to retrieve data in the phone’s memory. This could also mean that by querying the operating
system, the device could be creating changes to the memory of the device. Because of this dependency on the
operating system, such forensic toolkits cannot recover data from dead or faulty mobile phones.
Another flaw with these forensic software applications is that they cannot recover deleted data. This is because
they access data at a high level or logical level which means that when a file is deleted, the pointer to that file
within the operating system is erased which means that the file is no longer accessible by the operating system
or visible to the phone’s software. In addition, some mobile phone devices do not respond to AT commands
making acquiring them with command based tools impossible (Purdue 2007).
Some command based mobile forensics software were not originally developed for forensic purposes and
therefore they could unexpectedly write to the mobile phone device’s memory (Horenbeeck 2007). Some
forensic software suits such as MOBILedit Forensic 2.2 sometimes require the investigator to install additional
software on the target mobile device (MOBILedit 2007). This is in direct violation of the principles of electronic
evidence as published by the United Kingdom’s Association of Chief Police Officers (ACPO) Good Practice
Guide for Computer based Electronic Evidence (ACPO 2003). The guide states the following:
“No action taken by law enforcement agencies or their agents should change data held on a computer or storage
media which may subsequently be relied upon in court.”
It is also in violation of the Guidelines for Best Practice in the Forensic Examination of Digital Technology
published by the European Network of Forensic Science Institutes (ENFSI) which states (ENFSI 2006):
“Upon seizing digital evidence, actions taken should not change that evidence.” and “Wherever possible no
actions taken during the seizing of any evidential material should cause that material to be changed and this is of
particular importance when dealing with digital evidence which could be seen as prone to accidental
‘tampering’. Where actions have been taken that change the data, this should be fully documented."
Therefore, new ways to gain direct access to data held on mobile phones without resorting to the operating
system software or hardware command and response protocols must be utilized in mobile phone forensics.
Flasher boxes can provide this direct low level access and therefore they can be considered as a future pathway
on the quest for a more optimal acquisition of mobile phones.
FLASHER BOXES AND MOBILE PHONE FORENSICS
The forensic use of flashers is already being taught to future digital forensic examiners in Purdue's College of
Technology in the United States of America (Purdue 2007). It is also being used by European investigators in
mobile forensic cases (Purdue 2007, Gratzer and Naccache 2007).
Flasher boxes offer access to the phone memory unmatched by command based methods. They also do not
require the investigator to install any software on the target mobile phone and therefore do not disrupt the
evidence in that way. This in turn means that they follow rules of evidence more closely than command based
forensic software tools. But because they are not usually documented, there are no easy methods of determining
if they do actually preserve evidence in the phones memory and there is no guarantee that the flashers will work
in a consistent manner (Gratzer and Naccache 2007).
Moreover, these devices not approved or tested by the mobile phones manufacturers to work properly on their
mobile phone headsets. Furthermore, they are not forensically proven nor tested for forensic soundness.
Because of that, investigators should be careful when attempting to use such devices in mobile phone forensics
cases.
Flasher software and hardware were designed for mobile phone servicing needs which means that they are
capable of writing to the memory of the phone as well as reading from it. By design, the flasher software does
Page 6
not offer write blocking as with made-for-purpose forensic software. So, the flasher software could be writing to
the phone while reading data from it, it effect altering evidence on the phone.
One of the limitations of flasher reading capabilities is dependant on the mobile phone device and/or range of
mobile phone devices and the design of the software itself. With some mobile phone devices, full access to
memory is blocked and only partial access is possible through the use of flasher software. Some flasher
software skip some spare areas in the memory space and do not perform a full copy of the devices memory
(Breeuwsma et al. 2007).
Moreover, flasher software present the user with both the memory reading and writing buttons on the same
screen which can lead to accidental pressing or the wrong button on the flasher software which could lead to the
total loss of evidence from the phone's memory. Figure 6 below shows some of the dangerous buttons that
should be avoided by forensic investigators:
Figure 6: Some of the buttons that should be avoided.
Pressing the wrong write button could also damage the phone’s memory in a way that could render the device
useless turning the device into a “brick” (Harrington 2007).
FLASHER CABLES AND INTERFACES
The flasher box typically connects to the mobile device via a special cable made for that phone model. One side
of the cable is the RJ-45 standard Ethernet networking cable interface. The other side usually contains a number
of pins that contact the mobile phone’s service ports through the Joint Test Action Group (JTAG) connection or
the Mbus/Fbus connections (Harrington 2007). Figure 7 below shows a Nokia 6600 cable for the UFS3 Tornado
Box.
Page 7
Figure 7: Connectors on the UFS3 cable for Nokia 6600
Software Installation Precautions
The appropriate software for each type of flasher box is usually made available through the official support site
for the flasher box manufacturer. A username and password are given to each customer once they purchase a
flasher box. Each flasher box is has a unique serial number that is displayed in the software’s dialog box after
it’s installed.
Choosing the right driver for the type of mobile device can be confusing at times. This is because the support
sites usually update the drivers frequently. Sometimes an older version of a USB driver and software bundle will
run perfectly with some mobile phone models while a newer USB driver and software bundle will not work with
the same device. Information about the best version of driver for each type of device or device range can be
found in phone service forums as well as the support site itself.
USB drivers for the flasher box hardware in addition to the phone servicing software should always be installed
BEFORE connecting the USB cable to the flasher box. If a certain version of software does not work properly
with a mobile phone model or phone range then both the flasher servicing software and the USB drivers
associated with it should be completely uninstalled. After restarting the machine after the un-installation the
investigator can try another USB driver and software bundle until the appropriate driver and software
combination is found. The following section of the paper describes some further considerations when using
flasher boxes.
CONSIDERATIONS WHEN USING FLASHER BOXES
Some phones are accessible through service ports located on the bottom of the phone as with some Nokia
models such as the 3220 shown below:
Figure 8: Nokia 3220 Fbus connections (Harrington 2007).
Some phones such as the Nokia N95 require an external 9V battery to be connected to the cable to power the
phone while operating it with the flasher box. The investigators must always make sure that the battery is fully
charged to insure consistent operation and results.
Page 8
One of the biggest concerns when it comes to acquisitions through the use of flashers is the loss of volatile data.
This is because, in the some cases, the phone needs to be turned off and the battery for the phone needs to be
removed to allow for access to the phone’s service ports which are pin contact points on the back of the phone
that enable the acquisition of the mobile phone device. These points can be located under the battery of the
phone, underneath the SIM card or just below the phone itself without the need to remove the battery of the
phone. The location of the service ports is highly dependent on the model of the mobile phone.
Investigators should be careful when they deal with mobile phones with service ports under the SIM card. This
is because when SIM cards are removed, some phones tend to loose information associated with them and this
information might not be recoverable again. The pictures below show a connection cable with contact pins, a
mobile phone with the pin contact points under the battery but not under the SIM card, and another mobile
phone where the contact points are located beneath the SIM card (Nokia 6600).
Figure 9: Contact pins that the cable from the flasher device connects to can be either under the
SIM card or not depending on the device model(EmbedTronics 2005).
Service Ports located under the SIM Card
in Nokia 6600
Contact pins on a flasher phone access
cable
Service Ports located under the battery of
the phone but not under the SIM Card
On the other hand, if a phone to be investigated has no SIM card inserted in its SIM card slot, it is recommended
that a flasher box is used before any other command based tools. This is because if another SIM card is inserted
in the phone, or if the phone is powered up normally without a SIM card inserted, it might lose important
information about the SIM card previously inserted into it.
Some mobile phones require a SIM card to be inserted into them before allowing access to the phone, this means
that command based software will not be able to acquire the phone without a SIM card present. Therefore,
through testing of flasher boxes with each phone model is essential before using them for the forensic
acquisition of mobile phones. Scenarios such as the ones described above, with and without SIM cards with AT
commands first then flashers and vice versa should also be tested. Additional in depth testing considerations and
suggestions are listed hereafter.
TESTING AND VERIFYING FLASHER ACQUISITIONS
One of the ways to verify the functionality of flasher boxes it to disassemble the flasher’s code and track its
behaviour with a logical analyser to understand its effect on the handset. This is not always easy to do and
sometimes not possible at all and depends on the competence of the investigators and their knowledge in the
practical use of logical analysers (Gratzer and Naccache 2007).
Page 9
Another way to verify the use of the flasher device is to test it with a large number of mobile phone devices of
the same model investigated in a particular case. One study into the use of flashers in mobile forensics suggests
that some of these devices be used to develop an experimental protocol or acquisition procedure (Breeuwsma et
al. 2007). The protocol is then fine tuned and made more stable and the procedures modified until they produce
desired results. The device investigated is then examined using the tested procedure.
Another study takes this further and suggests that the finalized protocol should not be applied to the investigated
device after testing the protocols or procedures but rather it should be tested on another set of mobile phones and
the occurrences of the following six possible outcomes are then calculated: {information extracted, information
not extracted} X {device unaltered, device altered, device destroyed}. This is then carefully documented and all
the results are presented to the investigating judge to make a decision on whether to allow the use of flashers in
the investigation (Gratzer and Naccache 2007).
PHYSICAL IMAGE ANALYSIS TOOLS
There are many tools that have surfaced in the last couple of years that address the need for the analysis of
physical memory dumps from mobile phone devices. The tools range from easy to use tools to tools that require
extensive forensics and hex editing and decoding expertise. The following is a rundown some of the tools and
their features.
• FTS Hex: The first forensic tool that was developed for the purpose of low level examination of hex
dumps from mobile phone memory. It is very basic and mainly sold to law enforcement officers (Knijff
2007, FTS 2007).
• BK forensics’ Cell Phone Analyzer: The tool is a simple to use Windows based program that can
analyse physical dumps from the following phone manufacturer devices: Sony-Ericsson, Nokia,
Blackberry, Motorola and Samsung. The tool does not give the investigator great flexibility to examine
the raw data in the dumped image but rather attempts to decode and display phone records, SMS data,
pictures and other forms of data to the examiner. An evaluation copy is available to investigators for
evaluation purposes from the developer’s website (BKForensics 2007).
• Pandora's Box: A new tool developed by Mike Harrington. It recently passed beta testing and is now
available in a full retail version. This tool is a very affordable alternative to BK Forensics’ Cell Phone
Analyser and offers the investigator with more control over the hex decoding process. It can retrieve
data such as power down time and date on Series 30 Nokia phones (MFC 2007).
• Neutrino: A mobile phone acquisition device by Guidance Software to be used with Encase version 6.
Extracted mobile device data is stored in an EnCase® Logical Evidence File (LEF) format and can be
examined via EnCase v6 only (GuidanceSoftware 2007).
Conventional hex editors, decoder software and file comparison tools can also be used to examine the physical
dump image and provide the investigator with more flexibility in examining the hex dump but require good
knowledge in hex editing, some decoding skills and an eye for recognizing patterns and oddities.
CASE HISTORIES
The first case involves a witness who declared that he recorded a confession with the video camera in his mobile
phone. The XRY forensic toolkit was used in his mobile phone to try to recover this piece of evidence but it did
not find any videos files on the mobile phone device. Copying raw data from the phone memory did result in the
recovery of a plethora or information about videos recorded in the memory and meta-data related to the videos
in addition to the recovery of some thumbnails of some videos. The examination also resulted in the discovery
of fragments of files in .3gp format that are used for video as well. No evidence was found though to back up
the witness’s claims (Breeuwsma et al. 2007).
The second case involves the discovery of two yet to be detonated improvised explosive device which used a
mobile phone as detonator. The examination of the physical image of the non-volatile memory from the mobile
device resulted in the recovery of the history of the of three to four International Mobile Subscriber Identity
(IMSI) of the SIM cards used within those two devices and helped in linking the suspects to the mobile phones
and to each other (Knijff 2007). This evidence would have not been recoverable by using command based
mobile phone forensic toolkits that rely on logical acquisition of mobile phone devices.
CONCLUSION
As with all digital forensic investigations, it is essential to recover potential evidence from a device in a well
documented manner and in a scientifically reliable manner with affecting the data on the device as little as
Page 10
possible. All examinations must be conducted within the law of the country or state in which the investigation is
taking place. The usage of flasher boxes requires a high degree of knowledge and competency from the
investigator and a great deal of preparation, carefulness and a large amount of research and testing before the
examination of a mobile device. Therefore, ample time should be allowed for the examination of such devices.
The future of mobile phones seems to be heading towards convergence with other digital devices such as the
MP3 player, GPS navigational devices, laptop computers, camcorders, Personal Digital Assistants (PDA) and
digital cameras. This means that more data will be held on such devices and the need for direct access to this
data held in flash memory in a forensically sound manner will dramatically increase because of the complexity
and the sheer amount of data stored on mobile devices. Therefore, it is very important for law enforcement
personnel to familiarize themselves with the use of flasher devices and other means of acquisition and analysis
of data held on flash memory.
REFERENCES
ACPO (2003) Good Practice Guide for Computer Based Electronic Evidence, URL
http://www.acpo.police.uk/asp/policies/Data/gpg_computer_based_evidence_v3.pdf, Accessed 1 October
2007
BKForensics (2007) Cell Phone Analyzer, URL http://www.bkforensics.com/CPA.html, Accessed 8 October
2007
Breeuwsma, M., Jongh, M. d., Klaver, C., Knijff, R. v. d. & Roeloffs, M. (2007) Forensic Data Recovery from
Flash Memory. Small Scale Digital Device Forensics Journal, 1.
EmbedTronics (2005) Welcome to Embedtronics, URL http://www.embedtronics.com/, Accessed 6 October
2007
ENFSI (2006) Guidelines for Best Practice in the Forensic Examination of Digital Technology v, URL
http://www.enfsi.org/ewg/fitwg/documents/ENFSI_Forensic_IT_Best_Practice_GUIDE_5.0.pdf,
Accessed 1 October 2007
Espiner, T. (2007) Mobile phone forensics 'hole' reported, URL
http://news.zdnet.co.uk/hardware/0,1000000091,39277347,00.htm?r=6, Accessed 29 September 2007
FoneFunShop (2007) JAF WM : Flashing Windows Mobile Smart Phones Video Turorials, URL
http://www.fonefunshop.co.uk/helpzone/jafwm.htm, Accessed 29 September 2007
FTS (2007) Forensic Telecommunication Services Ltd, URL http://www.forensicts.co.uk/phone-forensics.asp,
Accessed 8 October 2007
Gratzer, V. & Naccache, D. (2007) Cryptography, Law Enforcement, and Mobile Communications, URL
http://info.computer.org/portal/site/security/menuitem.6f7b2414551cb84651286b108bcd45f3/index.jsp?
&pName=security_level1_article&TheCat=1001&path=security/2006/v4n6&file=crypto.xml, Accessed
27 September 2007
GSMServer (2007) JAF WM - Windows Mobile based phones solution. Debranding, software update, language
change functions implemented, URL http://gsmserver.com/software/JAF-WM.php, Accessed 29
September 2007
GTS (2007) GTS-Box.org, URL http://www.gts-box.org/, Accessed 5 October 2007
GuidanceSoftware (2007) Neutrino, URL http://www.guidancesoftware.com/products/neutrino.aspx, Accessed
8 October 2007
Harrington, M. (2007) Hex Dumping Primer Part 1, URL
http://www.mobileforensicscentral.com/mfc/include/Hex_Primer_Pt_1.pdf, Accessed 6 October 2007
Horenbeeck, M. V. (2007) Key constraints in forensic mobile device acquisition, URL
http://www.daemon.be/maarten/mobforensics.html, Accessed 2 October 2007
IPMart (2007) I-Pmart 2 In 1 Box With Smart Card Holder, URL
http://www.ipmart.com/main/product/IPmart,2,In,1,Box,With,Smart,Card,Holder,,Packaged,with,187,pcs
,GSM,,CDMA,Cables,16927.php?cat=10&prod=16927&prod=16927, Accessed 29 September 2007
Knijff, R. v. d. (2007) Ten Good Reasons Why You Should Shift Focus to Small Scale Digital Device
Forensics, URL http://www.dfrws.org/2007/proceedings/vanderknijff_pres.pdf, Accessed 6 September
2007
Page 11
McCarthy, P. (2005) Forensic Analysis of Mobile Phones, URL
http://esm.cis.unisa.edu.au/new_esml/resources/publications/forensic%20analysis%20of%20mobile%20p
hones.pdf, Accessed 31 September 2007
MFC (2007) Mobile Forensics Central, URL
http://www.mobileforensicscentral.com/mfc/products/pandora.asp?pg=d&prid=346, Accessed 8 October
2007
MOBILedit (2007) MOBILedit! Forensic Application Overview, URL
http://www.mobiledit.com/forensic/default.asp, Accessed 1 September 2007
MT-Box (2007) MT-Box Nokia, URL http://www.mt-box.org/products.php, Accessed 29 September 2007
Odeon (2007) JAF by Odeon, URL http://www.odeon.cn/, Accessed 29 September 2007
PolPhone (2006) JAF WM, URL http://polphone.pl/img/resources/1150455234JAF_WM.jpg, Accessed 6
October 2007
Purdue (2007) Expert: 'Flasher' technology digs deeper for digital evidence, URL
http://www.physorg.com/news95611284.html, Accessed 27 September 2007
Smart-Clip (2007) Smart-Clip is a professional device for unlocking cell phones. Overview, URL
http://www.smart-clip.com/, Accessed 5 October 2007
Smith, M. & Pringle, D. (2007) Global Mobile Communication is 20 years old, URL
http://www.gsmworld.com/index.shtml, Accessed 28 September 2007
Tarica, E. (2007) Trouble in Cyberia, URL http://www.theage.com.au/news/education-news/trouble-in-
cyberia/2007/10/19/1192301048347.html?page=fullpage#contentSwap3, Accessed 28 September 2007
UFSxSupport (2007) UFS 3 Universal Flasher Software, URL http://www.ufsxsupport.com/, Accessed 29
September 2007
UniversalBox (2007) Universal Box, URL http://www.universalbox.com/, Accessed 29 September 2007
UnlockMe (2007) Is your Mobile phone barred or blacklisted?, URL http://www.unlockme.co.uk/blacklist.html,
Accessed 29 September 2007
Vygis (2007) VygisToolbox - Oficial website, URL http://www.vygistoolbox.com/, Accessed 5 September 2007
COPYRIGHT
Marwan Al-Zarouni ©2007. The author assigns Edith Cowan University a non-exclusive license to use this
document for personal use provided that the article is used in full and this copyright statement is reproduced.
Such documents may be published on the World Wide Web, CD-ROM, in printed form, and on mirror sites on
the World Wide Web. The author also grants a non-exclusive license to ECU to publish this document in full in
the Conference Proceedings. Any other usage is prohibited without the express permission of the author.