Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Security or fraud prevention

Subclass of:

455 - Telecommunications

455403000 - RADIOTELEPHONE SYSTEM

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
455411000 Privacy, lock-out, or authentication 1000
Entries
DocumentTitleDate
20130183931DETECTOR OF UPLINK FREQUENCIES WITH FEEDBACK - An apparatus and method for detection of uplink frequencies from a mobile device, such as a cell phone, may be used as an alarm for people not to use their mobile device, or may signal security personnel when an unauthorized mobile device is being used. The apparatus and method may measure the uplink frequency band and use feedback with the downlink frequencies to gain a better reading of the distance the mobile device being used is from the detection device The apparatus and method has more precision of distance compared to conventional detectors, as the uplink RF power of a mobile device changes depending where it's located from the cell tower transmitting the downlink data to the mobile device monitored.07-18-2013
20120171994METHOD AND SYSTEM OF SECURED WIRELESS COMMUNICATION - A method and a system for secured wireless communication are provided. The method for secured wireless communication includes connecting a first electronic device with a second electronic device via a network, detecting, by the second electronic device, a status of a particular mode of the second electronic device, and transmitting, to the first electronic device, a status of unsecured communication of the second electronic device according to the status of the particular mode of the second electronic device.07-05-2012
20120171993METHODS FOR ACCESS CONTROL WITH A BACK-OFF TIMER MAINTAINED FOR LOW PRIORITY DEVICES OR MACHINE TYPE COMMUNICATION (MTC) DEVICES, AND APPARATUSES USING THE SAME - A mobile communication device configured for Machine Type Communication (MTC) is provided. In the mobile communication device, a wireless module performs wireless transmissions and receptions to and from a service network, and a controller module starts a back-off timer in response to adding a Public Land Mobile Network07-05-2012
20120184246MOBILE COMMUNICATION DEVICE, DISPLAY CONTROL METHOD, AND DISPLAY CONTROL PROGRAM - A mobile phone including upper and lower portions, a flash memory to store images, a selecting portion to select a target image from the stored images, a closed state detection portion to detect a closed state, and a display control portion to control display of an image to display an image of an idle screen including in a background image the target image selected by the selecting portion when standing by, and the display control portion displays, in response to the change from a state in which the closed state is detected by the closed state detection portion to a state in which the closed state is not detected while the image of the idle screen is being displayed, a new idle screen that includes in the background image a new target image selected by the selecting portion subsequent to the background image included in the idle screen.07-19-2012
20120184245PORTABLE ELECTRONIC APPARATUS, SWITCHING CONTROL METHOD AND CONTROL PROGRAM - A portable electronic apparatus is provided. The portable electronic apparatus includes a display section, an operating section, a setting section which switches and sets, based on an operation to the operating section, a pseudo power-off mode in which electric power is not supplied to the display section and a crime prevention function is enabled and a power-on mode in which the electric power is supplied to the display section and entire functions including the crime prevention function are enabled, and a control section which switches the pseudo power-off mode into the power-on mode when the crime prevention function is used in a state where the pseudo power-off mode is set by the setting section.07-19-2012
20100003964INTEGRATION OF SECURE IDENTIFICATION LOGIC INTO CELL PHONE - Presented herein are systems and methods for integrating secure identification logic into cell phones. A registration is received, wherein said registration includes an identifier identifying a mobile terminal. Information is transmitted to the mobile terminal, wherein a password is a function of the information.01-07-2010
20100151821SYSTEM AND METHOD FOR PROVIDING LOCATION BASED SERVICES AT A SHOPPING FACILITY - Embodiments of the disclosed invention include a system and a method for providing location-based services to consumers of a shopping facility. In one embodiment, a consumer creates a user account, user profile, and registers one or mobile devices. The system monitors for the presence of the registered mobile devices within one or more shopping facilities. The system transmits advertising material corresponding to the user created profile to a detected registered mobile device in response to the registered mobile device being within a specified range of a store associated with the user created profile.06-17-2010
20130029636METHOD AND APPARATUS FOR GENERATING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a method for broadcasting a wireless signal representing a notice to obtain sensory data, retrieving first sensory information captured by a first sensor device coupled with a first mobile communication device where the first sensory information is associated with an environment of the first mobile communication device, and receiving from a second mobile communication device, second and third sensory information in response to the notice, where the second sensory information is captured by the second mobile communication device, where the third sensory information is captured by a third mobile communication device and provided to the second mobile communication device. Other embodiments are disclosed.01-31-2013
20100159876SYSTEM AND METHOD TO PROVISION A MOBILE DEVICE - A system and method for enabling functions on a primary mobile device from a secondary mobile device are described. The primary mobile device is configured to enable at least selected functions of the mobile communications device if authorization information is received at the primary mobile device at periodic intervals of time. The method comprises: storing at the secondary mobile device the authorization information; establishing a short range direct wireless communications link between the secondary mobile device and the primary mobile device; and periodically transmitting the authorization information to the primary mobile device to enable the at least selected functions of the mobile communications device.06-24-2010
20120178415Secure Mobile Base Station Connections - In addition to other aspects disclosed, through a non-secure network, one or more bidirectional secure logical connections are established between a mobile base station and a secure network interface.07-12-2012
20100075632MOBILE TERMINAL CAPABLE OF PREVENTING VIRUS INFECTION AND METHOD OF CONTROLLING OPERATION OF THE MOBILE TERMINAL - A method of controlling a mobile terminal, and which includes detecting, via a controller, a suspicious attempt that may have been caused by a virus from the mobile terminal, shutting down the detected attempt, choosing one or more terminals that are associated with the mobile terminal, and notifying, via an alarm unit, said one or more chosen other terminals that the mobile terminal is infected.03-25-2010
20100075631Mobile communication device - The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices (with cell phones, computers, and ATM's), and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communication with a central processor, another mobile terminal a cell phone, or a pda. The mobile communication device is hands-free being worn on or near the face, and only requires a finger touching for bimodal identity authentication. An audio receiver is compatible with the ear of the user and a microphone transmits words spoken by the user, electronically therethrough. A fingerprint sensor is mounted and positioned within the device. When user authentication is required, the user is prompted to touch the fingerprint sensor, and said fingerprint data is compared with fingerprint images of authorized users. In another aspect of the invention, mobile communication device is an eye-covering, a head covering, or an identification badge including a fingerprint sensor and a processor and is used for wireless authentication of the user.03-25-2010
20130084828METHOD AND APPARATUS FOR PROVIDING CELLPHONE SERVICE FROM ANY DEVICE - A method, non-transitory computer readable medium and apparatus for providing a cellular communication service for any device via a communications network are disclosed. For example, the method receives a log-in request of a user from a device, if the log-in request is authenticated, synchronizes the device with a configuration associated with the user and provides the cellular communication service via a subscription plan subscribed to by the user.04-04-2013
20130078945SYSTEM AND METHOD FOR VEHICLE BASED CELLULAR OFFLOAD - One or more vehicle communication systems associated with one or more vehicles may be activated. The one or more vehicles may, for example, include a gateway vehicle. A backhaul connection between a vehicle communication system associated with the gateway vehicle and a cellular infrastructure may be established. Signals from the cellular infrastructure may be received at the vehicle communication system associated with gateway vehicle. Using the vehicle communication system associated with the gateway vehicle, the signals received from the cellular infrastructure may be transmitted. Signals from one or more mobile devices may be received using the vehicle communication system associated with the gateway vehicle. The signals received from the one or more mobile devices may be transmitted to the cellular infrastructure using the vehicle communication system associated with the gateway vehicle.03-28-2013
20130040604CONTROLLING TEXT MESSAGES ON A MOBILE DEVICE - Methods, systems and devices for controlling access to messaging (SMS, MMS, email, etc.) on mobile devices (e.g., cell phones) during times or in locations in which such activity is prohibited or inhibited by the parental control settings. Parental control settings limit messaging features available to mobile devices to certain times and/or locations. Messages received at restricted times/locations are stored in temporary memory without notifying the mobile device user (i.e., messages are not placed in the inbox), unless the message is received from a pre-approved source (e.g., parent, teachers, etc.). Once the context for restricting access to messaging (e.g., time, location, etc.) no longer applies, the stored messages may be transferred from the temporary memory to the inbox and the user may be alerted regarding the new message.02-14-2013
20130040603Wireless access point detection - According to aspects of the present invention there are provided methods and apparatus for detecting a suspect wireless access point in a communication network including a plurality of wireless access points providing access services to client devices. Identity information associated with the wireless access points is collected from a multiplicity of client devices. A reputation request is received from a client device, the request including identity information of an available wireless access point. The received identity information is compared with the collected identity information for determining an indication of trust of the available wireless access point. The indication of trust of the available wireless access point is transmitted to the client device. The wireless access points may include a cellular wireless access point or base station, wireless access point, a Wi-Fi access point, or a femto-cell access point.02-14-2013
20100105356Secure mobile communication system - Secure mobile communication system comprises of a mobile communication device having a processor, a RF transceiver to establish mobile voice communication and receive and send text or email messages, an alphanumeric keypad is used for dialing phone numbers or creating text or e-mail messages, the mobile communication device RF transceiver or a receiver is designed to receive RF signals from a vehicle mount RF transmitter or transceiver device, the a vehicle mount RF transmitter or transceiver device transmitting RF coded signals when vehicle ignition is in on position and or when vehicle is in motion.04-29-2010
20100105355METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTION OF AN UNAUTHORIZED SERVICE MESSAGE IN A NETWORK - A method is described for detecting an unauthorized service message in a communications network. The method comprising the steps of: receiving a signaling message associated with a supplementary service (SS) message and/or a unstructured supplementary service data (USSD) message from a first network node, the signaling message comprising identification information of the sender of the SS message and/or USSD message and first location information of the first network node; requesting second location information of the first network node from the a second network node serving the sender of the SS message and/or USSD message; and, comparing the first location information with the second location information in order to determine whether the SS message and/or USSD message is authorized or not.04-29-2010
20130035063SYSTEM AND METHOD FOR PREVENTING AND/OR LIMITING USE OF A MOBILE DEVICE - A system and a method for preventing and/or limiting use of mobile devices are provided. The method includes receiving, by a mobile device, a message indicating that the mobile device is in a certain location, and determining a user-configured security policy of the mobile device based on the certain location. The method further includes at least one of disabling and enabling, by the mobile device, one or more functions of the mobile device based on the determined user-configured security policy.02-07-2013
20130035062Secure Mobile Communication System and Method - A security level indicator for a mobile communication device is adapted to alert a user of a device when the weighed combination of security-related parameters reaches a predefined level.02-07-2013
20100330958MOBILE COMMUNICATION DEVICE AND METHOD FOR DISABLING APPLICATIONS - A mobile communication device (12-30-2010
20130045712Systems, Methods, and Computer Program Products for Managing Access to Femtocell Coverage - Systems, methods, and computer program products are for managing access to a femtocell coverage area. An exemplary method includes storing in a memory component a first identifier corresponding to a subscribed service of a communication device and a second identifier corresponding to a user of the communication device, and granting access to the femtocell coverage area using the second identifier.02-21-2013
20130090086SYSTEM AND METHOD FOR VALIDATING A USER EQUIPMENT LOCATION IN A TELECOMMUNICATION NETWORK - In a method for validating a location provided by a user equipment requesting a service to a telecommunication network, the network receives (04-11-2013
20130090085COMMUNICATION SYSTEM WITH ACCESS MANAGEMENT MECHANISM AND METHOD OF OPERATION THEREOF - A method of operation of a communication system includes: registering a primary communication identification for identifying a reception device; generating a map communication identification associated with the primary communication identification; generating an authorization condition for the map communication identification for contacting the reception device; and controlling a device access based on the authorization condition for accepting an access request to the reception device with the map communication identification instead of the primary communication identification.04-11-2013
20100267363Methods and Apparatuses Generating a Radio Base Station Key in a Cellular Radio System - In a method and a system for providing secure communication in a cellular radio system radio base station key is generated by determining a set of data bits known to both the UE and the radio base station, and creating the radio base station key in response to the determined set of data.10-21-2010
20090305669TRANSACTION METHOD BETWEEN TWO SERVERS INCLUDING A PRIOR VALIDATING STEP USING TWO MOBILE TELEPHONES - Before effecting a transaction between two servers, this method sets up a communications channel in a wireless telecommunications network between each server and a mobile terminal. One of the servers sends a signal on its wireless communications channel. That signal is received by the mobile terminal in wireless communication with the server, emitted by the loudspeaker of that mobile terminal, picked up by the microphone of the other mobile terminal, and sent by wireless communication to the other server. If the received signal is validated by one or both of the two servers, the transaction is effected.12-10-2009
20090305668METHOD AND SYSTEM FOR PROTECTION AGAINST THE UNAUTHORIZED USE OF A TERMINAL - A method and system for protecting against unauthorized use of a mobile terminal operating with a subscriber identity module (SIM) card is provided. The method for protecting against unauthorized use of a terminal operating with a subscriber identity module (SIM) card compares a secondary version of a temporary identity information stored in a storage unit and a primary version of the temporary identity information stored in the SIM card; sends a message containing a unique identity information to a network when the primary version and the secondary version of the temporary identity information differ from each other; and restricts operation of a function of the terminal when a registration reject message is received in response to the message containing the unique identity information.12-10-2009
20090305666Method for handling roaming of mobile device to restricted area - As a mobile device moves from one location area to another, the mobile device detects the different location identifiers broadcast by the wireless network(s) in those locations areas. The mobile device stores the location identifier for the last location area in which the mobile device was located. By comparing a received location identifier to the stored location identifier, the mobile device determines if the mobile device has entered a new location area. If so, the mobile device sends a location update request. In one embodiment, if the location update request is for a location area to which access by the mobile device is restricted, the network sends a communication to the mobile device that triggers the mobile device to update a location identifier stored at the mobile device to the location identifier for the restricted location area so that the mobile can update the network after entering/selecting a different location area.12-10-2009
20090305664 METHOD AND APPARATUS FOR ATTEMPTING ACCESS IN WIRELESS COMMUNICATION SYSTEMS - A method and apparatus for processing an AttemptAccess command in a wireless communication system is provided, comprising setting a ProbeSequenceNumber to 1, setting a ProbeNumber to 1, setting a TerminalAccessRetryPersistence value to a TerminalAccessClass number field of an AccessRetryPersistence value and setting a PilotPN value.12-10-2009
20090093232PROVISIONING COMMUNICATION NODES - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.04-09-2009
20130072153System and Method for Determining and Communicating Presence Information - A system and method for communicating presence information that can include at a first server of a communication platform, receiving an authorization token of a first client application; verifying at least one permission associated with the authorization token; registering a presence status of the first client application upon verifying the at least one permission of the authorization token; at a second server of the communication platform, accepting an incoming communication request; retrieving communication instructions according to the incoming communication request; identifying an instruction to communicate with a communication destination of the first client application; accessing the presence status resource of the first client application; establishing communication with the first client application according to the accessed presence status resource.03-21-2013
20110059723Mobile Terminal - A mobile terminal used in a wireless communication system includes a first base station group for which base station information is advertised to the mobile terminal, a second base station group for which the base station information is not advertised to the mobile terminal, the mobile terminal being able to access each base station in the first base station group and a specified base station in the second base station group. The mobile terminal includes a unit to receive location information, and a unit to execute base station detection processing regarding the first base station group and the second base station group when the location information is associated with the specified base station, and to execute the base station detection processing regarding the first base station group while restricting the base station detection processing regarding the second base station group when the location information is not associated with the specified base station.03-10-2011
20130059563DETECTION OF A REROUTING OF A COMMUNICATION CHANNEL OF A TELECOMMUNICATION DEVICE CONNECTED TO AN NFC CIRCUIT - The invention relates to a method for detecting an attempt to reroute a communication channel between a port of a security module and a port of a near-field communication router, which are in a telecommunication device, wherein, upon receiving a message in a near-field communication format, the security module verifies from which port of the communication router said message originates.03-07-2013
20120309349ENTERPRISE MOBILE NETWORK FOR PROVIDING CELLULAR WIRELESS SERVICE USING LICENSED RADIO FREQUENCY SPECTRUM AND THE SESSION INITIATION PROTOCOL - Support for Session Initiation Protocol (SIP) devices is provided in an enterprise mobile network that provides wireless service within a coverage area associated with an enterprise using licensed radio frequency spectrum. In various embodiments, support SIP devices is provided by, for example, incorporating SIP user agent in a mobile switching subsystem or in a base station subsystem or by incorporating SIP server functionality into a mobile switching subsystem.12-06-2012
20130065555POLICY MANAGEMENT OF ELECTRONIC DEVICES - A system and method for the management of a device, including the establishment and enforcement of policies/rules associated with feature or functions that may be performed with the device. Modern devices are capable of many things, including making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. Depending on who is using the device, such as a child, student, or an employee, there may be a need or desire to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.03-14-2013
20110021175CONFIGURATION WITH THE PAYMENT BUTTON IN THE MOBILE COMMUNICATION DEVICE, THE WAY THE PAYMENT PROCESS IS STARTED - On the interface side (01-27-2011
20120115436Method and Apparatus for Terminal Access - The present invention discloses a method for terminal access, and this method includes: receiving an access request sent by a terminal; analyzing the access request to obtain a service type of the terminal; determining a number of residual equivalent users according to a difference between an access equivalent user number threshold corresponding to the service type of the terminal currently and a number of accessed terminals; and determining whether to respond to the access request according to the number of the residual equivalent users and a preset minimum residual equivalent user threshold. The present invention further discloses an apparatus for accessing the terminal. With the present invention, dynamic variation of the wireless environment can be adapted, QoS with higher quality can be provided for the users, and the experience and the feeling of the users are improved.05-10-2012
20120115435Privacy in Mobile Device Communications - The subject disclosure is directed towards mobile device privacy and anonymity. When a contact is marked as private, or when a device operates in a private mode, one or more privacy-related actions with respect to an incoming or outgoing communication are performed. Privacy-related actions include logging private telephone call information to a private, protected log, storing private message content to a private protected store, or not saving any such information or content. Another privacy-related action comprises not allowing a visible or audible notification to occur when a private communication is received.05-10-2012
20080299946MOBILE BASED IDENTIFICATION IN SECURITY AND ASSET MANAGEMENT SYSTEMS - This invention relates to using consumer devices, such as mobile telephones, to identify, authenticate, locate and contact users of security and asset management systems. Such consumer devices can be used not only with the security systems but also for other uses. A device is initially registered with the security system. As needed, the device is presented to the system for authentication, enabling a person access to a secure area. In addition, the system can determine the person's location in the secure area and can send information messages to the person as well as notifying the person in case of emergency.12-04-2008
20120238244PROACTIVE COMMANDS OVER SECURE CHANNEL BETWEEN A MOBILE EQUIPMENT AND A UICC - (EN)The invention relates to a UICC comprising a toolkit applet. The UICC comprises a toolkit security component for establishing and using a secure channel for proactive commands and events exchanged by the toolkit applet of the UICC with a mobile equipment. Other communications between the UICC and the mobile equipment take place outside of this secure channel. The invention also relates to a system comprising a UICC of the above type and a mobile equipment, such as a cell phone. The invention also relates to a method to selectively protect a UICC.09-20-2012
20100041370Preventing Misuse of Random Access Procedure in Wireless Communication System - A method for preventing misuse of a random access procedure including transmitting a random access preamble, receiving a random access response message which includes a random access response that is scrambled using the identity of the random access preamble transmitted by the mobile station, checking that the random access response is in response to the random access preamble transmitted by the mobile station, and decoding the random access response.02-18-2010
20090029675VEHICLE SAFETY DEVICE FOR REDUCING DRIVER DISTRACTIONS - A safety device for automotive vehicles (cars, buses and trucks) or rail locomotives. The device inhibits use of cellular telephones and other communication devices that run the risk of distracting a driver/operator while the vehicle is in motion. Several techniques for inhibiting use are described which can be used individually or in a complementary combinations. In one technique, a rapidly varying signal level is created local to the communication device. The variations exceed the operational limits of the system, thereby inhibiting communications. In another technique, the safety device emits radiation that interferes with the reception of signals by the communication device only within the interior of the vehicle and will not interfere with cell phones or wireless devises outside the automotive vehicle or rail locomotive. As another alternative, masking signals also may be generated to prevent signals sent by the communication device within the vehicle from being intelligible at receiving stations outside the vehicle.01-29-2009
20100167691WIRELESS HANDSET VEHICLE SAFETY INTERLOCK - A method and device for controlling the operability of a transmitter on a mobile communications device by determining if the mobile communications device is located proximate to an operator's seat of a vehicle. A condition parameter of the mobile communications device may be determined. The transmitter on the mobile communications device may be disabled in response to the mobile communications device being located proximate to an operator's seat of a vehicle and further in response to the determined condition parameter. The transmitter on the mobile communications device may be enabled, in response to determining that the mobile communications device is not located in a restricted location.07-01-2010
20110294465System for selectively disabling cell phone text messaging function - A selective cell phone text messaging function disabling system prevents a vehicle occupant from text messaging while driving. Other occupants of the vehicle can text message using their cell phones. The driver's cell phone text messaging functionality is turned off by a signal broadcasting system as the driver enters the vehicle through the driver-side door. When the driver exits the vehicle through the driver-side door, the cell phone resumes its texting capability, preserving text messaging functionality while the driver is not operating the vehicle.12-01-2011
20090098856SECURITY SYSTEM AND METHOD FOR A MOBILE PHONE - A security system for a mobile phone is disclosed for securing private information of the mobile phone. The system may set at least two PIN numbers for a super user and a general user, encrypt a phone book system of the mobile phone by setting a security status for each contact in a phone book system of the mobile phone. The system also may start a secure work mode if a user of the mobile phone is a super user and starting a non-secure work mode if the user is a general user of the mobile phone. A security method for a mobile phone is also disclosed.04-16-2009
20110281554EXTENSIBLE DATA DRIVEN MESSAGE VALIDATION - Various exemplary embodiments relate to a method, network component and machine-readable storage medium for validating a message received at a network component. Embodiments may include one or more of the following: receiving a message at the network component, determining a validation scenario, determining a set of validation conditions associated with the determined validation scenario, and determining whether the message passes the validation condition. Various exemplary embodiments may further include extensible condition definitions that include one or more of the following: validation fragments, element validation definitions, and element definitions. Various exemplary embodiments may use XML to define condition definitions.11-17-2011
20090104890OPERATION OF CONTROL PROTOCOL DATA UNITS IN PACKET DATA CONVERGENCE PROTOCOL - A method and apparatus reports packet data control protocol (PDCP) status and PDCP resets in a wireless communication, using control PDUs that may have security protection applied by ciphering of the control PDUs. Reliability of the PDCP status and reset messages may be assured by acknowledgment according to an acknowledged mode or to an unacknowledged mode.04-23-2009
20090104889MAN-IN-THE-MIDDLE DETECTOR AND A METHOD USING IT - A method receives signaling messages by a mobile apparatus at least from one base station of a cellular network, interprets a received signaling message, searches for an anomaly with at least one signaling parameter of the received signaling message from a first base station to a known comparison signaling parameter, gives an alert if the comparison gives an unequal result concerning at least one signaling parameter.04-23-2009
20110130115MECHANISMS TO UPDATE A SERVING BASE STATION WITH THE CSG MEMBERSHIPS OF A MOBILE STATION - Mechanisms to update a serving BS with the CSG memberships of a MS are generally presented. In this regard, a base station is introduced including a wired backbone interface to communicate with a plurality of macro base stations and a plurality of femto base stations, and control logic, the control logic to identify one or more femto base station(s) that a mobile station is authorized to access, and the control logic to generate a request for the mobile station to scan for a specific femto base station which the mobile station is authorized to access. Other embodiments are also described and claimed.06-02-2011
20110300828UN-CIPHERED NETWORK OPERATION SOLUTION - The present invention relates to a solution for handling security issues of non access stratum (NAS) signaling in a telecommunications network (12-08-2011
20120108202SECURITY SYSTEM AND METHOD FOR AN ELECTRONIC DEVICE - A security system and method for an electronic device include comparing data in a Subscriber Identity Module (SIM) card with data in a virtual SIM card, if the virtual SIM card is not blank. The security system further include determining whether the electronic device has received a command of reporting loss of the SIM card from the network server, if the data in the SIM card is the same as the data in the virtual SIM card. The security method further includes running the electronic device normally if the electronic device has not received the command of reporting loss of the SIM card. If the command of reporting loss is received, a contact list and message of the electronic device are deleted and a calling function of the electronic device is disabled.05-03-2012
20110287740METHOD AND APPARATUS FOR ASSOCIATING IDENTITY MODULES AND TERMINAL EQUIPMENT - The present invention provides method, apparatus and computer program product for facilitating verification of an identity module, such as associated with a UICC, operatively coupled to a terminal equipment, such as a machine-type communication device. Upon determining that the identity module is in a bonded state, one or more bonding identifiers are read from the identity module and compared with at least a predetermined portion of the terminal equipment identifier, such as an IMEI, stored in the terminal equipment. If at least one of the bonding identifiers corresponds with at least a predetermined portion of the terminal equipment identifier, the identity module and/or the terminal equipment are shifted into predetermined operating conditions. A bonding process may also be performed, whereby the identity module acquires the terminal equipment identifier of currently associated terminal equipment and stores a bonding identifier in identity module memory based thereon.11-24-2011
20110287739MANAGING AUTOMATIC LOG IN TO INTERNET TARGET RESOURCES - A system and a method for managing automatic log in to Internet target resources are disclosed. The system comprises a mobile phone with a storing device to store private identities and a computer with a client browser and a browser plug-in. The browser plug-in is configured to, upon receiving information containing a login form from a target resource being accessed: request a user identifier; and send an identity request to an identification server. Furthermore, the identification server is configured to obtain a phone number associated to the user identifier and send an identity message to the phone. The phone is provided with a client application which looks up the private identities associated to the target resource and sends the selected private identity to the identification server and then to the client browser to log in to the target resource using the selected private identity.11-24-2011
20090111423NON-ACCESS STRATUM ARCHITECTURE AND PROTOCOL ENHANCEMENTS FOR LONG TERM EVOLUTION MOBILE UNITS - A method and apparatus performs processing of the non-access stratus (NAS) layer (layer 3) in long term evolution (LTE) wireless transmit/receive units (WTRUs), which allows the NAS protocol layer to route layer 3 messages to the correct NAS entity, and to encode new NAS message types and information elements. A new architecture is presented that enables NAS security. When a NAS message is generated, a determination is made as to whether or not to cipher, de-cipher and/or integrity check the NAS message based on at least one of a protocol discriminator (PD) of the NAS message, an indicator field in a header of the NAS message, the type of the NAS message, a NAS security state variable, and an indication by an upper layer protocol. The NAS security state variable indicates whether NAS security is currently active or not and may comprise one bit.04-30-2009
20100015948BASE STATION AND MOBILE TERMINAL - To provide a security technique (a base station and a mobile terminal) for easily guarding a building such as a house for an average family or a small office at a low price by using a cellular phone terminal and a small base station (femtocell). A base station (FCL) of a mobile communication system placed in a building includes a communication unit (01-21-2010
20090305667Method and system for mobile identity verification and security - A system and method for mobile identify identification and security over a communications network is provided. The system and method include validation processes which provide for an increasing level of intrusion and/or user interaction.12-10-2009
20110263222Apparatus and Method for Implementing a Security Mode Configuration in a Wireless Communication Device - An apparatus and a method for implementing a security mode configuration in a wireless communication device are disclosed.10-27-2011
20090305665METHOD OF IDENTIFYING A TRANSMITTING DEVICE - An exemplary method of identifying a transmitting device includes receiving a signal. A discrete Fourier transform of at least one portion of the signal produces a plurality of frequencies that indicate at least one unique characteristic of the transmitting device. A determination is made whether the transmitting device is a known device based upon the plurality of frequencies.12-10-2009
20100267364Extended hot desking features for multi-device users - The present application provides “hot desking” features for multi-device users. A number of automatic hot desking registrations are provided in which users are assigned multiple devices on a permanent basis. A private branch exchange or central switch can be provided with a list of these devices and can relieve the user of the requirement of registration by detecting use of these devices and assigning user features and other pertinent system properties e.g. as an indication of location for find me/follow me services. The extension allows for automatically hot desking using a listed device, hot desking based on a location associated with a listed device, and hot desking using declared associations of listed devices.10-21-2010
20100081413SYSTEM FOR CONTROLLING ACCESS TO A SERVICE, AND CORRESPONDING METHOD, CONTROL DEVICE, AND COMPUTER PROGRAM - The invention relates to a system for controlling access to a service offered by a communications network. According to the invention, such a service is accessible via a plurality of private access stations to the communications network, such as home gateways (HG04-01-2010
20090286509RECIPROCAL ADDITION OF ATTRIBUTE FIELDS IN ACCESS CONTROL LISTS AND PROFILES FOR FEMTO CELL COVERAGE MANAGEMENT - System(s) and method(s) provide access management to femto cell service through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). A mechanism for reciprocal addition of access field attributes in access control lists and white list profiles also is provided. The mechanism allows at least in part for a first subscriber to be added to a configured white list of a second subscriber, when the first subscriber configures a new white list, the second subscriber is reciprocally incorporated in the new white list. Such mechanism can be driven and facilitates generation of associations among groups of subscribers that share specific commonalities.11-19-2009
20090061819Method and apparatus for controlling access and presence information using ear biometrics - A method and apparatus control the operations of an audio device by obtaining by the audio device biometric information about an ear of a user; identifying the user by processing the biometric information; and controlling the operation of the audio device in response to the identification of the user. Also, a method and apparatus control the operations of an external database by receiving biometric information about the ear of a user from an audio device; identifying the user by processing the biometric information; and transmitting a control message to another system. Further, a method and apparatus control the operations of a telecommunication system by receiving biometric information about an ear of a user from a telecommunication set; identifying the user by processing the biometric information; and controlling the operation of the telecommunication system in response to the identification of the user.03-05-2009
20100099379Wireless device content information theft protection system - A wireless device, such as a laptop computer or a cellular phone, may contain confidential information which may be secured by an internal security system. When the device is stolen, the user can provide a portion of a kill code to a wireless service provider. The wireless service provider provides its own portion of the kill code and combines it with the user's supplied code. Then, the service provider may transmit the combined kill code to the wireless device. Upon receipt, the wireless device may erase all confidential information on the device. In other embodiments, it may erase any unlocked block of memory. As still another alternative, the system may also, upon receipt of the combined kill code, disable the operating system.04-22-2010
20120295586METHOD FOR MANAGING INFORMATION IN A TELEPHONE AND TELEPHONE FOR MANAGING INFORMATION - Mobile telephone manages stored telephone data and includes a memory that stores telephone data related to at least one of incoming telephone calls to and outgoing telephone calls from mobile telephone, a personal access code entry device that enables a user of mobile telephone to enter a personal access code, a first list containing public telephone data stored in memory before personal access code is entered. Public telephone data in first list is accessible by all users during operation of mobile telephone, a second list containing private telephone data stored in memory after personal access code is entered. Private telephone data in second list is accessible by user only after entry of personal access code. A device provided for at least one of blocking and rejecting an incoming telephone call when telephone number for incoming call is stored in second list and personal access code has not been entered.11-22-2012
20090143048METHOD FOR DESTRUCTIVE READOUT OF DATA IN CASE OF MOBILE THEFT - A method for destructively reading out data from a stolen or lost mobile phone. A special switch off feature disables all the services associated with the mobile phone, except for a messaging service and the ability to destructively read out data. A user can retrieve the data stored in the mobile phone from a remote location. Once the data is retrieved, all the data in the mobile phone is erased.06-04-2009
20080207165LIMITING USE OF ELECTRONIC EQUIPMENT FEATURES BASED ON LOCATION... - A method and apparatus for limiting the use of one or more features and/or applications provided in electronic equipment based on identification information and location information associated with the electronic equipment is disclosed. Upon initiation of an application and/or feature, a request is made to a remote server. The request includes identification information and location information associated with a geographical location of the electronic equipment. A database maintained at the remote server determines whether the user has the necessary privileges to activate the application and/or feature and whether any limits (e.g., digital rights management) should be placed on the content created from the application and/or feature.08-28-2008
20090275309SECURITY CAPABILITY NEGOTIATION METHOD, SYSTEM, AND EQUIPMENT - A security capability negotiation method is applicable to perform security capability negotiation during a mobile network handover. The method includes the following processes: a second network receives a handover request sent by a first network; an access network entity of the second network selects a corresponding security capability, or an access network entity and a core network (CN) entity of the second network respectively select a corresponding security capability; the second network sends the selected security capability to a user equipment (UE) via the first network. Moreover, a security capability negotiation system is also provided. Consistent with the provided system and method, it may be unnecessary for the MME to know the security capability of the corresponding eNB in a certain manner during a handover from a 2G/3G network to an LTE network. Meanwhile, during the handover from the LTE network to the 3G network, the SGSN does not need to introduce new requirements.11-05-2009
20090280774Traffic encryption key generation in a wireless communication network - In one embodiment, a traffic encryption key is generated based on a count value associated with a mobile. The count value is indicative of network accesses by a mobile, and the traffic encryption key is for encrypting communication traffic between the mobile and a base station. Generation of the traffic encryption key at a base station may be triggered by receipt of a message indicating that the mobile may handoff to the base station. In this embodiment, the message includes the count value. In another embodiment, the traffic encryption key is generated based on the count value and a key count. The mobile may trigger updating the traffic encryption key by changing the key count, and sending the new key count to the base station in a traffic encryption key update request message.11-12-2009
20090280775Providing Base Station Almanac to Mobile Station - The subject matter disclosed herein relates to a hierarchal base station almanac received at a mobile station.11-12-2009
20090286510LOCATION-BASED SERVICES IN A FEMTOCELL NETWORK - System(s) and method(s) are provided to route traffic and signaling between a set of networked femto access points (APs) and enable location-based services. A femto AP in the set of femto APs is functionally linked to a routing platform that manages traffic and signaling, and is functionally connected to a controller component that relays at least part of data and control to a femto network platform. The femto network platform allows access to one or more external networks. Routing platform can exchange signaling with one or more femto APs to enable, at least in part, location-based services based at least in part on identifier(s) for a femto AP, access privileges, or time-of-flight measurements that assess propagation timing between a mobile device and a femto AP. Routing platform can supply timing configuration to enable predetermined spatial resolution of location estimates. Location estimates can be recorded and conveyed to a consumer layer.11-19-2009
20090291668OFFLINE MOBILE RFID EVENT PERSISTENCY AND SYNCHRONIZATION - In various embodiments, RFID events are pre-processes with filtering logic by a mobile interrogator/reader before being inserted into tables of a local relational database on the mobile device when the mobile device cannot otherwise communicate collected events to a centralized data hub. The RFID events are stored in a normalized format that provides a simple, efficient, and standard interface for persisting the RFID events such that local access from applications on the mobile device is provided.11-26-2009
20110171932METHOD AND SYSTEM FOR DISTRIBUTING DATA TO MOBILE DEVICES - Embodiments of the invention are concerned with a method and a system for distributing mobile applications, in particular to aspects of receiving, processing and displaying advertisements on mobile terminals. In one aspect, embodiments provide a software component for controlling movement for an advertisement image on a mobile terminal, the mobile terminal comprising a display area and a processor, the software component comprising processable instructions defining movement of the advertisement image relative to the display area, wherein the instructions are wirelessly transmissible to the mobile terminal and the processor is arranged to process said instructions in order to more the advertisement image.07-14-2011
20100159875Telephone Handset Contact List Synchronization - A method comprises a first telephone handset selecting a second telephone handset as an approved contact exchange partner. The first telephone handset and the second telephone handset comprise contact information organized in a database. The first telephone handset establishes a telephone call between the first telephone handset and the second telephone handset. The first telephone handset receives contact update information from the second telephone handset in a first protocol. The first telephone handset synchronizes the contact update information with the contact information of the first telephone handset.06-24-2010
20100216428MOBILE COMMUNICATION APPARATUS HAVING ANTI-THEFT AND AUTO-NOTIFICATION FUNCTIONS - A mobile communication apparatus comprises an anti-theft control circuit and a transmission control circuit. The anti-theft control circuit has an information management module and a security module. The information management module is used for storing a user personal database comprising at least one of a phonebook database, a schedule database, and an e-mail database. The transmission control circuit is used for transmitting data and/or signals. When the transmission control circuit receives a remote message, the security module examines whether the remote message is a predetermined legitimate remote control message; wherein if YES, the transmission control circuit sends out at least one record of the phonebook database, the schedule database, and the e-mail database to an electronic apparatus indicated by the remote message.08-26-2010
20100136949METHOD OF PROVIDING SECURE, CONFIDENTIAL, CONTACT BETWEEN INDIVIDUALS, AND FOR THUS PROTECTING THE ASSETS AND PROPERTY OF THE INDIVIDUALS - The present invention provides a method for providing secure communication between individuals. The method includes the steps of a provider, assigning to a subscriber a unique identifier, providing the subscriber at least one tag having the unique identifier and contact information for a provider indicated thereon, receiving a communication from a third-party wishing to contact the subscriber, and transmitting the third-party's message to the subscriber associated with the unique identifier.06-03-2010
20120289191METHOD AND APPARATUS FOR HANDLING INCOMING STATUS MESSAGES - An approach is presented for handling incoming status messages with respect to a request and/or a communication channel (e.g., PSMS). A PSMS client causes, at least in part, a transmission of a request over a communication channel, the request originating from an application associated with a device. A status message client of the PSMS client causes, at least in part, a monitoring of one or more inboxes associated with the communication channel for one or more status messages related to the communication channel, the request, or a combination thereof. The status message client causes, at least in part, a presentation of a representation of at least a portion of the one or more status messages, status information interpreted from the one or more status messages, or a combination thereof in a user interface of the application.11-15-2012
20120289192BEACON AND MANAGEMENT INFORMATION ELEMENTS WITH INTEGRITY PROTECTION - Certain aspects of the present disclosure relate to protecting integrity of transmitted messages in a wireless communications.11-15-2012
20110201305METHOD AND SYSTEM FOR ENSURING USER AND/OR DEVICE ANONYMITY FOR LOCATION BASED SERVICES (LBS) - A mobile device may communicate with a location server during location based services (LBS) operations using a secure identifier. The secure identifier abstracts identification information of the mobile device and/or identification information of a user of the mobile device in instances that the mobile device and/or user identification information are deemed protectable from the location server. The location server may be operable to store location data corresponding to the mobile device and/or the user in a location reference database based on the secure identifier. The secure identifier may comprise a unique value, which may be randomly generated. The secure identifier may also be generated based on the mobile device and/or user identification information, by applying, for example, encryption algorithms to the mobile device and/or user identification information. Service providers for the mobile device may retrieve the abstracted mobile device and/or user identification information from the secure identifier.08-18-2011
20080274716APPLICATION LOGGING INTERFACE FOR A MOBILE DEVICE - A mobile device, and particularly a wireless device, provides a computing platform upon which third-party (e.g., accessory) applications can execute, increasing features/functions desirable to a user. In order to better serve users of wireless devices, third-party developers of such applications would benefit from information about how their fielded applications are being used. However, creating log packets that can ultimately reach the developers is generally not permissible or enabled by wireless devices due to privacy concerns, safeguards against malicious applications, the environment generally afforded to accessory applications, the limited communication channel (e.g., bandwidth, duration, user expense, etc.), and difficulty in integrating such applications to chipsets tailored for mobile devices, such as cell phones. Authentication of the application and a defined log header prior to deployment coupled a confirming unlock feature on the device allows for log packets of increasing complexity that can be selectively allowed, filtered, and reported by a device.11-06-2008
20100248687METHODS AND SYSTEMS FOR ENCODING AND DECODING AUDIO SIGNALS - Methods and systems for encoding and decoding audio signals are described. In one embodiment, a first DTMF tone in an audio signal may be identified and decoded. A second DTMF tone in the audio signal may be identified and decoded at a time delay from the first DTMF tone. A requested action is determined for an electronic figurine associated with the first DTMF tone and the second DTMF tone. The second DTMF tone is different than the first DTMF tone. Additional methods and systems are disclosed.09-30-2010
20080293376METHOD AND SYSTEM FOR MANAGING MOBILITY OF AN ACCESS TERMINAL IN A MOBILE COMMUNICATION SYSTEM USING MOBILE IP - A method for managing mobility of an AT in a mobile communication system using Mobile IPv4. The AAA and the AT generate a first key for mutual authentication between the AT and a HA, and the AAA and the AG generate a second key for mutual authentication between the AG and the HA. The AG generates a third key for mutual authentication between the AG and the AT. The AT acquires a CoA that it will use in a foreign network. The AT sends an RRQ message to the AG. The AG verifies the RRQ message received from the AT, using a third authentication key. The AG then sends to the HA an RRQ message. The HA verifies the AT and the AG, and allocates an HoA of the AT. The HA sends an RRP message including the allocated HoA of the AT in response to the RRQ message.11-27-2008
20080305768Validating User Identity by Cooperation Between Core Network and Access Controller - An identifier, required by a radio access network controller in order to support resource allocation associated with a predetermined condition, is sent from a core network to the radio access network controller independently of the predetermined condition. The identifier is thus available to the radio access network controller for verification of mobile user identity, regardless of whether it is needed to support resource allocation. A radio access network controller can receive an identifier in a communication sent by a core network according to a communication protocol. The radio access network controller terminates the communication protocol to access the communication, and uses the identifier for verification of mobile user identity.12-11-2008
20080305767Communication System, Mobile Station, Switch Apparatus, and Communication Method - A communication system according to the present invention includes: a mobile station 12-11-2008
20080305766Communication Device and Method for Setting a Security Configuration for a Communication Device - After a successful determination of an application environment for the communication device, a security configuration is selected from a number of stored security configurations and the communication device configured according to the selected security configuration.12-11-2008
20080318547COMMUNICATIONS NETWORK - A distributed communications network comprising a plurality of nodes and a plurality of user devices, wherein each node comprises: a communications device for establishing bi-directional wireless communication with at least one user device, a communications device for establishing bi-directional communication with at least one other node; and a data processor in association with a local memory for storing information for presentation to users, and wherein at least one of the nodes further includes a communications device connected to a further communications network, and wherein nodes are grouped into clusters that cooperate with one another such that if a user requests information which is held in the local memory of a node within a cluster then the nodes cooperate to supply that information to the user and if a connection between a user and the further communications network is required, the nodes cooperate to establish it.12-25-2008
20080280591Inbound Phone Control - A method, including receiving at a network element, from a first telecommunications enabled device, a control connection request directed to a second telecommunications enabled device, connecting a control connection to the second telecommunications enabled device wherein the control connection is connected without requiring user input at the second telecommunications enabled device to answer the control connection request, and providing access to one or more functionalities of the second telecommunications enabled device to the first telecommunications enabled device through the control connection.11-13-2008
20120196567Mobile Communication Device Providing Communication Pathway Determination Assistance - A system and method in a mobile communication device for providing assistance to a user in determining a communication pathway. A system may comprise processor-executable instructions, that when executed by a processor, cause a mobile communication device that supports a communication type over multiple networks to access availability information stored in a remote database for determining available networks among the multiple networks for performing the communication type, determine the available networks using the availability information, provide user assistance for determining a selected network among the available networks for the communication type, and perform the communication type using the selected network.08-02-2012
20100144313METHOD FOR PERFORMING AN AUTHENTICATION OF ENTITIES DURING ESTABLISHMENT OF WIRELESS CALL CONNECTION - Disclosed is the method for establishing a connection between a base station and a terminal so as to transmit and receive data in the E-UMTS (Evolved Universal Mobile Telecommunications System) or LTE (Long-Term Evolution) system, and more particularly, to a method for determining, by each entity, whether to establish a connection by comparing an authentication input value transmitted from a counterpart entity with an authentication input range.06-10-2010
20090054033Enhancing Security in a Wireless Network - A method of enhancing security in a wireless mesh communication network operating in a process control environment and including a plurality of wireless network devices includes processing a join request from a wireless device wishing to join the wireless mesh communication network, providing a limited network functionality to the wireless device if the join request is granted, requesting a complete approval of the wireless device; and granting a full network functionality to the wireless device if the complete approval of the wireless device is received.02-26-2009
20090054034Maintaining Mobile Terminal Information for Secure E-Mail Communications - Methods and systems for maintaining mobile terminal information for secure email communications are provided. Information concerning multiple mobile terminals are maintained. Such information may include encryption information and an identifier for each mobile terminal. A service activation code that includes encryption information and an identifier from an authenticated user of the mobile terminal is received. The encryption information may be provided to a connectivity function for use in establishing an encrypted data channel. The established encrypted data channel may then be used to convey e-mail communications to and from the mobile terminal.02-26-2009
20110039519Mobile Banking - Systems and methods are disclosed for identifying circumstances where end-to-end security is not available to a mobile banking customer. The user may be alerted/warned or restricted from accessing some banking services through his/her WAP-enabled mobile device if the server (e.g., bank server) determines that end-to-end security is not available. In some instances, the bank server may access a computer data file containing a list of known end-to-end secure devices and gateways to verify the integrity of the data communication. The server may verify the integrity of the data communication using loose matching.02-17-2011
20090163173UNAUTHORIZED CALL ACTIVITY DETECTION IN A CELLULAR COMMUNICATION SYSTEM - A cellular communication system (06-25-2009
20090005004COMMUNICATION DEVICES AND METHOD OF COMMUNICATION - In a portable communications device, information provided by an identification means is used to establish communication between communication means and a second device, such as a point of sale machine, to ensure that the correct portable communications device is connected to the second device where there may be a large number of second devices and a large number of portable communications devices in close proximity.01-01-2009
20080318546SECURITY ACTIVATION IN WIRELESS COMMUNICATIONS NETWORKS - Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.12-25-2008
20090088131MOBILE ACCESS IN A DIVERSE ACCESS POINT NETWORK - Facilitating user terminal (UT) access to wireless networks having base stations (BSs) of disparate access types is described herein. In some aspects, BS parameterization is provided to facilitate search and/or access to distinct types of network BSs. For instance, parameters can modify a likelihood of identifying or remaining coupled to restricted access (RA) BSs in a home Node B (HNB) deployment. In other aspects of the subject disclosure, a PLMN ID reserved for HNBs is provided comprising multiple region IDs. Where a UT identifies a home region, HNBs can be given preference over macro BSs. Additionally, the UT can keep track of HNBs and HNB regions that reject access to the UT, and implement a delay time to mitigate rapid signaling to foreign HNBs in a dense HNB deployment. Accordingly, the subject disclosure provides for more efficient UT access in heterogeneous access type networks.04-02-2009
20090163174DEVICE AND METHOD FOR DETECTING AND PREVENTING SENSITIVE INFORMATION LEAKAGE FROM PORTABLE TERMINAL - A device and method for detecting and preventing sensitive information leakage from a portable terminal is provided. A device for detecting and preventing leakage of sensitive information from a portable terminal includes a data storage unit that stores data containing sensitive information, an external interface that interfaces the portable terminal with the external, a sensitive information manager that detects and prevents leakage of the sensitive information stored in the data storage unit through the external interface, and a sensitive information leakage detecting and preventing unit that is disposed between the data storage unit and the external interface to detect and prevent the leakage of the sensitive information.06-25-2009
20090215430APPARATUS AND METHOD FOR CONTROLLING ACCESS TO NETWORK IN WIRELESS COMMUNICATION SYSTEM - In a wireless communication system, an apparatus and method for managing an uplink communication between a network and a plurality of terminals is achieved by transmitting a response condition parameter from the network to the plurality of terminals subscribing to a multicast service. The parameter is associated with controlling the uplink communication of the plurality of terminals. The terminal then applies the response control parameter to a predetermined test and responds to the network if the terminal determines that it is qualified to respond to the network in response to a result of the predetermined test. The network evaluates whether the parameter needs to be transmitted to the plurality of terminals and whether the parameter needs to be updated based on at least part of responses received by the network.08-27-2009
20120142313METHOD AND APPARATUS FOR CONFIGURING AND LOCATING A HOME BASE STATION - Techniques for configuring a Home evolved Node B (HeNB) in a location server and positioning the HeNB are disclosed. In one aspect, location for a HeNB is supported based on LTE Positioning Protocol (LPP) messages. The HeNB communicates LPP messages with a location server. These LPP messages are terminated at the HeNB instead of a UE. At least one location transaction for the HeNB can be performed to configure in the location server and/or locate the HeNB based on the LPP messages. In another aspect, location for a HeNB is supported based on an embedded UE in the HeNB. The HeNB establishes a location session with a location server based on an embedded UE ID, which is assigned to the HeNB and recognized by the location server as being for a HeNB instead of a UE. At least one location transaction for the HeNB is performed during the location session.06-07-2012
20090233578Methods and apparatuses for dynamic management of security associations in a wireless network - Methods for dynamic management of security associations in a network are provided. According to one method, a security key management entity determines whether to apply a new security key as an active security key based on an existing active security key. Each of the new security key and the existing active security key are associated with a same home agent, and the existing active security key serves as a basis for an existing security association between the home agent and at least one other network element.09-17-2009
20090209230Accessing user interactive electronic communications devices - An accessing system for a user interactive electronic communications device is disclosed. The accessing system comprises a general data interactive zone accessible via a first user input access protocol and a secure data interactive zone accessible via a security user input access protocol. The system does not prompt the user to input the secure user access protocol and so the existence of the secure zone is only revealed when the secure user access protocol is input.08-20-2009
20110143712Method and Arrangement in a Telecommunication System - Embodiments herein include methods and arrangements for controlling access of mobile devices to a network, such as GSM. The mobile devices belong to an access control class (ACC) and also belong to an additional access control class (EACC) that provides extended access control. The arrangement broadcasts system information to the mobile devices that comprises a first indicator indicating an ACC. The first indicator indicates whether a mobile device is allowed to access or is barred from accessing the network. The system information further comprises a second indicator indicating an EACC. The second indicator indicates whether a mobile device is allowed to access or is limited from accessing the network. Limited access may entail blocking a mobile device from initiating communications with the network, blocking the mobile device from receiving network initiated communications, or both. A mobile device blocked from network initiated communication may not answer a page from the network.06-16-2011
20090221264STORAGE SYSTEM OF MOBILE TERMINAL AND ACCESS CONTROL METHOD - Provided is a storage system of a mobile terminal and an access control method for more securely preventing unauthorized access to data stored in a storage medium attachable and detachable to and from the mobile terminal. The storage system of the mobile terminal includes the steps of: receiving an SMS message from an OTA server; relaying the SMS message including an access restriction request to request restriction of access to storage data stored in the USIM; and setting the USIM to an access restriction state in which access from the outside to the storage data is restricted based on the access restriction request included in the relayed SMS message.09-03-2009
20090247124PROVISIONING MOBILE DEVICES BASED ON A CARRIER PROFILE - Systems and methods for provisioning computing devices are provided. Carrier provisioning profiles are distributed to computing devices via an activation service during the provisioning process. The carrier provisioning profiles specify access limitations to certain device resources which may otherwise be available to users of the device.10-01-2009
20090247122SYSTEM FOR MONITORING THE UNAUTHORIZED USE OF A DEVICE - The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.10-01-2009
20090239500Maintaining secure communication of a network device - Methods of a network device maintaining secure communication are disclosed. One method includes the device obtaining identification numbers of all other devices the device is communicating with. The device computes a hash function, wherein inputs to the hash function include the identification numbers of the other devices and a secure hardware-stored identification number of the device. The device calculates a session key based on a master key, a random number and the computed hash function.09-24-2009
20090239501COMMUNICATION APPARATUS AND COMPUTER PRODUCT - A communication apparatus includes an executor configured to execute given process, a restrictor configured to restrict the executor from executing the given process, an authenticator configured to perform authentication, a canceller configured to cancel the restriction applied by the restrictor if the authentication by the authenticator has succeeded, a communicator capable of wirelessly communicating with a wireless station, and a time measurer configured to measure time that has elapsed since wireless communication with the wireless station became difficult. If a previously set restriction condition that a state where the wireless communication with the wireless station is difficult continues until the time measured by the time measurer reaches a given value is satisfied, the restrictor restricts execution of the given process.09-24-2009
20090253406SYSTEM FOR MITIGATING THE UNAUTHORIZED USE OF A DEVICE - The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.10-08-2009
20090253407Systems and Methods for Providing Enhanced Voicemail Services - A method for operating a mobile device to set a voicemail password directly from the mobile device includes providing the mobile device with a memory for storing a visual voicemail (VVM) application, an interface for receiving user input to the VVM application, and a transceiver for communication with a VVM system. The VVM application includes an option to create a voicemail password. The method further includes: receiving a selection of the option to create the voicemail password, creating the voicemail password based upon an input of a password string, generating a request that includes instructions to the VVM system to associate the voicemail password with a voicemail account, and transmitting the request to the VVM system.10-08-2009
20120231764METHOD AND APPARATUS FOR VALIDATING INTEGRITY OF A MOBILE COMMUNICATION DEVICE - A method for validating integrity of a mobile communication device includes installing an integrity verification application on the mobile communication device. The method also includes establishing a first pass indicator and a second pass indicator including receiving a first instance of the first pass indicator. The method also includes receiving a second instance of the first pass indicator as a challenge for verification. In response to receiving the second instance of the first pass indicator, the second pass indicator may be displayed as an indication of the integrity.09-13-2012
20120231763METHOD AND SYSTEM FOR ANTIVIRUS ON A MOBILE DEVICE BY SIM CARD - The invention provides a method and system for antivirus on a mobile device by a SIM card. The method includes steps of obtaining signature data of a file on the current mobile device, receiving the same, retrieving a virus database on the SIM card for determining whether file on the current mobile device includes a virus and returning the retrieved result to client side of the mobile device, and the client side of the mobile device performing related operation according to the retrieved result.09-13-2012
20110143711SYSTEMS AND METHODS TO SECURE TRANSACTIONS VIA MOBILE DEVICES - Systems and methods are provided to improve security of payment transactions via mobile communications. In one aspect, a system includes an interchange having a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats and to communicate with the common format processor in a common format for the confirmation of payment requests, made via mobile phones. The common format processor is to determine a risk of a payment request being fraudulent based on the personal identification information associated with a mobile phone and, after the payment request is confirmed and when the risk is below a threshold, to communicate one or more premium messages to the mobile phone to collect funds to fulfill the payment request.06-16-2011
20100151822Security Protocols for Mobile Operator Networks - Security protocols for mobile operator networks are described. In embodiments, mobile communication link is established between a mobile phone and a media content provider via a communication service provider with which the mobile phone is registered for mobile communications, and via at least one roaming node network with which the communication service provider has a roaming service agreement. The media content provider receives a security policy request from the mobile phone to establish a security policy for end-to-end security of the mobile communication link between the media content provider and the mobile phone for data communication security. The media content provider then communicates a security policy response to the mobile phone to establish the security policy for the end-to-end security of the mobile communication link that is adaptable to security restrictions of the roaming node network.06-17-2010
20090047928Method and system for using message based security challenge and response questions for multi-factor authentication in mobile access to electronic information - A method for allowing an alleged user to establish using multiple factors of authentication that he or she is in fact the authorized user of an information source. The method uses multiple factor authentication using challenge and response messages containing personal choices of the user which are not known to people other than the authorized user, presenting the challenge questions as enumerated multiple choice questions for ease of use, and imposing time-out restrictions on a session.02-19-2009
20130122861SYSTEM AND METHOD FOR VERIFYING APPS FOR SMART PHONE - A system and method for verifying apps for a smart phone are provided. The system for verifying apps for a smart phone includes an app auto-verification device and an app self-verification device. The app auto-verification device analyzes the installation tile of an app to be installed in the smart phone, constructs a scenario, executes the app in the smart phone in accordance with the scenario, and determines malicious behavior using the results of the execution. The app self-verification device monitors an installation file corresponding to an app to be installed in the smart phone, and determines malicious behavior by analyzing a behavioral log corresponding to results of the monitoring.05-16-2013
20100216426User-Customized Mobility Method and System in a Mobile Communication System - An access point to a restricted-access cell of a cellular network detects at least one cell of the cellular network in the vicinity of the cell in which it is located. It sends a server of the cellular network an identifier (RAC08-26-2010
20100216427TRACKING MOBILE COMMUNICATION DEVICES - A mobile telecommunication device that is associated with a mobile telecommunication subscription periodically produces a status report with at least one detail about the mobile telecommunication device and an identification of the subscription associated with the mobile telecommunication device; and sends the status report to a tracking element. The tracking element receives periodical status reports from a set of mobile telecommunication devices, each status report having at least one detail about respective mobile telecommunication device and an identification of the subscription associated with the mobile telecommunication device. The tracking element further monitors the received status reports and determines whether a reporting trigger is met.08-26-2010
20090042540System and Methodology for Automated Provisioning of New User Accounts - System and methodology are described that allow a new user of a user-operated device (e.g., wireless digital camera, cellular phone, video camera, audio device, or the like) to immediately begin using the features and services of the device without having to first activate a new user account. Thus in the instance where the user-operated device is a newly-acquired wireless digital camera, for example, the user can immediately begin taking and uploading his or her pictures to a photo Web site prior to having to open a user account, or having to perform other cumbersome activation steps. In such a wireless digital camera embodiment, the photo Web site and vendors of either cellular-enabled digital cameras or camera-enabled cellular phones provide user Web accounts based upon the unique ID or phone number belonging to one of these two devices. The user need only bother to “open” his or her account, that is, establish a user name and password, at some subsequent point in time that is convenient for the user (e.g., when the user is first visiting the photo Web site, using a browser, to view the digital photographs he or she previously uploaded). This approach allows users to use his or her newly-acquired device (e.g., immediately take pictures and upload them to an account at a photo Web site) right “out-of-the-box,” all without having to first register or setup a new user account.02-12-2009
20090075628METHOD AND APPARATUS FOR GENERATING A CRYPTOSYNC - A method and apparatus for generating a cryptosync is disclosed that generates a cryptosync with the desired variability without the overhead in complexity and size of prior cryptosyncs. The cryptosync is generated from a combination of fields including fields relating to the segmentation and reassembly of the data packets at a transmitting terminal and a receiving terminal. The resultant cryptosync does not repeat during the use of a particular security key.03-19-2009
20100197270TELEPHONE SERVER AND COMPUTER READABLE MEDIUM - The first telephone server may be configured so as to be capable of communicating with a second telephone server with which a first wireless telephone device is registered. The first telephone server may be configured to receive authentication information sent from the first wireless telephone device located within a wireless communication area of the first telephone server. The first telephone server may be configured to send a first command including the authentication information to the second telephone server. The first telephone server may be configured to receive a first response sent in response to the first command from the second telephone server. The first telephone server may be configured to receive a call request, sent from the first wireless telephone device to a second wireless telephone device, by using a wireless communication. The first telephone server may be configured to send the call request to the second wireless telephone device by using the wireless communication without utilizing the second telephone server on a condition that the first response is a positive response and the second wireless telephone device is located within the wireless communication area. The first telephone server may be configured to receive, by means of wireless communication, a second response sent in response to the first command from the second wireless telephone device. The first telephone server may be configured to send the second response to the first wireless telephone device by using the wireless communication.08-05-2010
20100197269APPARATUS AND METHOD FOR MANAGING SECURE INFORMATION IN A MOBILE TERMINAL - To manage secure information in a mobile terminal, a method for storing the secure information in the mobile terminal includes locating initial bad blocks in a memory of the mobile terminal. A location of a secure block is determined using the locations of the initial bad blocks; and the secure information is stored to a secure block of the determined location.08-05-2010
20090247123Method for Providing Security Services by Using Mobile Terminal Password and Mobile Terminal Thereof - A security service providing method using a mobile terminal password and a mobile terminal thereof. A normal password and an emergency password are stored in a smart card in advance. When a password for using a special service is input by a mobile terminal user, the input password is compared with the normal password and the emergency password. When the input password corresponds to the normal password, a special service requested by the user is provided. When the input password corresponds to the emergency password, a predetermined emergency process is performed. According to the emergency process, an emergency message is transmitted to the outside through a predetermined emergency networking process, predetermined virtual process information is displayed, or an abnormal process message for indicating unavailability of provision of the requested special service is displayed to the mobile terminal. Therefore, security is guaranteed and reliability is provided to the user who uses a special service through a mobile terminal by providing an emergency process performance function to the limited function of the password used for identification and authentication.10-01-2009
20090170471SECURITY CELLULAR RADIO ACTIVATION AND REGISTRATION VIA SMS - A system and method for activating and registering a security system with a cellular provider using SMS messages is provided. The SMS messages used for activating and registering the security system are generated in a format that is predetermined by the processing station in order to provide a uniform structure for presenting the necessary information required for the specified function, i.e., activation or registration. The use of a uniform structure for the SMS allows the message to be processed entirely by a computer thus reducing cost, delay and error from having the information entered manually by a technician.07-02-2009
20130130647Method, User Network Equipment and Management System Thereof for Secure Data Transmission - A method for secure data transmission, and the method includes: after a Home (evolved) Node-B (H(e)NB) establishes a connection with a H(e)NB Management System (H(e)MS), data is transmitted between the H(e)NB and the H(e)MS via a secure path; when the H(e)NB or the H(e)MS receives data, verify the integrity and/or the confidentiality of said received data, and if the verification fails, retain or discard said received data. The present invention also provides user network equipment and a user network equipment management system for secure data transmission. The present invention removes various threats caused by the insecure data transmission and a variety of inconveniences caused by improperly handling downloaded data of the H(e)NB in practical applications.05-23-2013
20130130648PROVIDING SUPPORT TO A USER - A system for providing support to a user, the system comprising a server, the server communicatively coupled to a number of mobile devices, in which the server receives a number of sets of voice messages and configuration data from the mobile devices and causes the voice messages and configuration data to be routed to a number of support providers. A method of providing support to a user, the method comprising receiving a data packet from a mobile device containing a voice message and appended user specific configuration data, the voice message containing a service request from the user; routing the voice message and appended user specific configuration data to a customer service provider; and responding to the user's service request.05-23-2013
20100279652Remotely Locating and Commanding a Mobile Device - Methods, systems, and apparatus are presented for processing a remote command message. In one aspect, a method includes accessing a subscribed topic hosted on a notification service, the subscribed topic corresponding to a mobile device, retrieving a remote command message included in the subscribed topic that identifies a command to be executed by the mobile device, determining whether the command can be executed by the mobile device, publishing a result message associated with the command, and executing, by the mobile device, the command based on the determining. Publishing the result message further can include identifying in the remote command message a result topic corresponding to the notification service and publishing the result message to the identified result topic. Additionally, the subscribed topic can be uniquely associated with the mobile device.11-04-2010
20110111731MOBILE COMMUNICATION METHOD AND SWITCHING CENTER - In a procedure for a mobile station (UE) to perform handover from a cell under the control of a radio base station (NB) of an UTRAN scheme to a cell under the control of a radio base station (eNB) of an E-UTRA scheme, a switching center (MME) of the E-UTRA scheme receives, from and the radio base station (eNB) of the E-UTRA scheme, a handover request acknowledge message including a transparent container including a security algorithm of an AS used in a communication between the mobile station (UE) and the radio base station (eNB) of the E-UTRA scheme; and the switching center (MME) of the E-UTRA scheme transmits, to a switching center (SGSN) of the UTRA scheme, a NAS PDU including the transparent container, a security algorithm of a NAS and a security processing parameter of the NAS.05-12-2011
20100330959Method for Updating UE Capability Information in a Mobile Telecommunications Network - The present invention relates to methods and arrangements for handling UE capability information a mobile telecommunications network wherein an eNodeB (12-30-2010
20100330960SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR THIRD PARTY MONITORING AND CONTROL OF CALLS - Methods, systems, and computer readable media for third party monitoring and control of calls are disclosed. For example, a method performed at a signaling node includes receiving a signaling message indicating an attempted call communication to a called party device from a calling party device and determining if the called party device is subscribed to a call monitoring service. In response to determining that the called party device is subscribed to the call monitoring service, sending a notification message to a monitoring third party device associated with the called party device, wherein the notification message indicates the attempted call communication between the monitored called party device and the calling party device. The method further includes receiving a response to the notification message from the third party device, and determining whether or not to allow the attempted communication to proceed between the monitored called party device and calling party device based on the response from the monitoring third party device.12-30-2010
20110009091PORTABLE TERMINAL HAVING MOUNTED IC CHIP, APPLICATION AREA CONTROL METHOD, AND APPLICATION AREA CONTROL PROGRAM - A portable terminal in which an application area in a contactless IC chip can be shared by a plurality of users. The portable terminal is provided with the IC chip that has a contactless communication function enabling use of a plurality of services. In addition, the portable terminal is provided with an application area information storage unit that stores application area information for associating users, application identifiers for identifying applications corresponding to services to be used, and plural application areas provided in the IC chip; and an application area control unit that puts into a useable state an application area of a user corresponding to the identification information in the IC chip, based on the application area information and the identification information for identifying the users, read from a loaded storage medium; wherein the plurality of services that use the contactless communication function can be used by each user.01-13-2011
20110014895METHOD FOR EXCHANGING DATA BETWEEN A MOBILE TELEPHONE AND A FIXED LINE TELEPHONE - The invention relates to a method for exchanging data between a mobile telephone and a fixed line telephone. According to the invention, a mobile telephone equipped with Near Field Communication (NFC) technology and a fixed line telephone that is also equipped with NFC technology are initially placed in a reception range, subsequently the mobile telephone and the fixed line telephone are coupled by means of the NFC technology, and then data is transmitted between the mobile telephone and the fixed line telephone by means of the NFC technology. Said coupling occurs when the mobile telephone and the fixed line telephone are authenticated, and two different NFC technologies are used for the authentication of the mobile telephone and the fixed line telephone, and the subsequent transmission of data.01-20-2011
20110034147ROUTING MOBILE USERS TO SECURE LOCATIONS BASED ON TRANSACTION TYPE - Systems and methods are disclosed for routing mobile users to safe, or secure, locations. In one embodiment, based on threat information obtained from one or more source, a threat level is determined for a location of a user of a mobile device. The threat level is indicative of physical safety and/or network safety at the location of the user of the mobile device. The threat level may be a function of a transaction type of a transaction being performed or desired to be performed by the user of the mobile device. If the location is unsafe, a safe location is identified, and the user of the mobile device is routed to the safe location.02-10-2011
20110034148APPARATUS AND METHOD FOR DETECTING COMMUNICATION OPERATION RESULTED FROM AN ERRONEOUS CONTENT IN MOBILE PLATFORM - Disclosed are an apparatus and a method for detecting whether a content executed in a mobile platform of mobile communication terminal perform a communication operation without a user's reservation or permission, thereby preventing an unexpected communication operation. In this invention, if a content performs the communication operation due to its malfunction by a computer virus or a program error, the communication operation, such as voice calling or message transmission to unspecified communication terminal or access to arbitrary wireless internet server, is detected and interrupted. With the interruption of the unexpected communication operation, the user's damage, such as the payment of charges for communication services, is previously prevented. In case of the interruption of the communication operation, the user is informed of the erroneous content and the performed communication operation so that the user selects the corresponding contents to be deleted or preserved.02-10-2011
20110117882Systems and Methods for Retrieving Voicemail Account Information - A provisioning system configured to retrieve a voicemail password and/or a pilot number for a voicemail account, create a first service request directed to an over-the-air system, and send the first service request to the over-the-air system, if the provisioning system determines that the voicemail account has been initialized. The first service request instructs the over-the-air system to format a first message including the voicemail password and/or the pilot number for delivery to a mobile device. The provisioning system is further configured to create a second service request directed to the over-the-air system and send the second service request to the over-the-air system, if the provisioning system determines that the voicemail account has not been initialized. The second service request instructs the over-the-air system to format a second message including a default voicemail password and/or a default pilot number for delivery to the mobile device.05-19-2011
20110117881METHOD AND APPARATUS FOR THE ACTIVATION OF SERVICES - An approach is provided for presenting an activation indicator to a user. A connection with a mobile device is detected. Retrieval is caused, at least in part, of a unique hardware identifier associated with the mobile device. It is determined that the mobile device is eligible for a service based on the unique hardware identifier. Presentation is caused, at least in part, of a visual indicator of the eligibility for the service based on the determination.05-19-2011
20110086613MANAGEMENT OF ACCESS TO ENTRY POINTS ON A COMMUNICATION DEVICE - A system and method for managing access to entry points in a graphical user interface on a communication device are provided. The entry points are associated with services such as message services and are actuatable to invoke a content listing display for viewing content associated with a given service. One entry point provides access to a unified inbox for display of messages received or sent via a plurality of message services. Other entry points provide access to other message services or filtered views of the unified inbox. Access to the various entry points is provided via a user interface displaying one or more user interface elements, such as icons, pointing to the various entry points. Display of the elements is managed so as to hide elements pointing to potentially duplicative views.04-14-2011
20110086612NETWORK ACCESS CONTROL - According to one embodiment of the present invention, there is provided a method of authorizing a communication device to connect to a network. The method comprises receiving, at a processor, a communication device identifier and a subscriber identifier, determining, by the processor, whether the received communication device identifier is associated with the received subscriber identifier in a data store. Where it is determined that the received identifiers are not so associated the method further comprise requesting, by the processor, a security token associated with the communication device, receiving, at the processor, a security token, determining, by the processor, whether the received security token matches a stored security token associated with the received communication device identifier in the data store, and where it is so determined, authorizing the communication device to connect to the network.04-14-2011
20110212705SHARING PROFILE DATA BETWEEN TELECOMMUNICATION DEVICES - In an embodiment, a profile server creates a profile that includes profile data and is associated with a first subscriber device. A second subscriber device receives an incoming call from the first subscriber device and queries the profile server for a profile associated with the first subscriber device. The profile server determines that the profile data is authorized for distribution to the second subscriber device, and thereby transmits the profile data in response to the received query and based on the determined authorization.09-01-2011
20100056104METHOD AND SYSTEM FOR RESTRICTED ACCESS CONFIGURATION OF ACCESS POINT BASE STATIONS - Devices and methods are provided for the controlling access to access point (AP) base stations. In particular, described herein are techniques for the automated configuration of AP base stations for restricted access. For example, the technique may involve receiving a contact list from an access terminal (AT) associated with the AP base station and a network operator. From the received contact list, saved contacts associated with the operator may be identified. The technique may further involve retrieving identifiers for the identified contacts, and generating an allowed user list from the identifiers, which may be used to configure the AP base station for restricted access.03-04-2010
20100015947METHOD FOR SWITCHING A TELEMATICS COMMUNICATION - A method for providing telematics communications is provided comprising: sending an ignition-on message to a switching server by a telematics device, when an ignition is turned on; sending a switching phone list to the telematics device by the switching server; sending to the switching server, by the telematics device, information about a mobile terminal that a driver or passenger selects from the switching phone list and an authentication number that the driver or passenger inputs; and sending a switching setting result to the mobile terminal by the switching server after performing user authentication by using the authentication number and performing switching setting to allow a telephone number assigned to the selected mobile terminal to be switched to that of the telematics device.01-21-2010
20100062743WIRELESS LOCK - The invention provides for a portable device, a system comprising at least two portable devices and a method according to which at least a first portable device and at least a second portable device can be arranged so that said devices have to be located within a short distance from each other if access to the contents in said first device should remain enabled and/or access to the contents in said second device should remain enabled.03-11-2010
20100069040SYSTEM AND METHOD FOR AUTOMATICALLY ALTERING DEVICE FUNCTIONALITY - A system and method for automatically altering device functionality based on the occurrence of certain predetermined conditions. A link may be established between a device and a trusted server to provide an association between various conditions that may be detected at the device and actions that are to be taken on the device. In particular, software traps can be set up and linked to device functionality such that execution of the trap may automatically disable or enable certain device capabilities. Some aspects of the invention are directed to a system and method for remotely setting software traps for detecting software viruses and, upon execution of the traps, several methods for establishing a quarantine on infected devices.03-18-2010
20100069039STORAGE MEDIUM, COMMUNICATION SYSTEM, AND CONTROL DEVICE - Various services relating to cellular phones are integrally provided on a SIM card at the initiative of carriers. A wireless communication function via a reflected-wave transmission system is mounted to a SIM card to allow access to a control interface of a SIM card from an external control device via a wireless communication. The SIM card is provided with a credit function for treating electronic money as well as a SIM function for allowing a carrier to treat subscriber information. Furthermore, a high-capacity of memory card function is added to the SIM card to allow access to the control interface of the memory card from a control device via the reflected-wave transmission system.03-18-2010
20100069038COMMUNICATION SYSTEM AND COMMUNICATION METHOD - To provide a communication system including a mobile terminal which can prevent leak of information even if the mobile terminal is lost and reproduce previously accumulated confidential data without losing newly created and updated confidential data. A mobile terminal includes connection state judging device which detects a line connection state with a server. When the line connection state is a broadband connection, the data is read directly from and written directly into a data storing device of the server. When the line connection state is a narrowband connection, the data is temporarily read out and written into a data storing device of the terminal. When the operation of the mobile terminal is completed or a security operation starting instruction is issued by a user, the updated confidential data is written into the data storing device of the server and then the confidential data is erased from the mobile terminal.03-18-2010
20100069037METHOD AND PROCEDURES FOR PRIORITIZED TRANSMISSION ON CONTENTION CHANNELS - A method and mobile terminal for an improved random access prioritization scheme for Random Access Channel (RACH) transmission is provided by increasing the transmission probability based on remaining access cycles and, whereby the access delay for terminals having less remaining access cycles is decreased by increasing the transmission probability.03-18-2010
20110250866CONDUCTING A MOBILE FINANCIAL TRANSCATION USING A SECURE ELEMENT AND SMS - A method for conducting a mobile financial transaction using an NFC secure element and transmitting data associated with the transaction between a wireless communication and a remote server. The method includes running a mobile application on the wireless communication device, in which the mobile application is a rich client application. The method further includes transmitting data associated with the mobile application between the wireless communication device and the remote server using short message service (SMS). The mobile application links corresponding data transmitted through the short message service (SMS) for use by the mobile application.10-13-2011
20110081886SYSTEMS AND METHODS FOR COMMUNICATION PROTECTION - A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are not used for identification and authorization during communication between the mobile unit and a base station. Instead, a set of private identifiers is determined and is known only to the phone company and the base stations controlling the mobile phone calls. These private identifiers allow dynamic and continual updating of the mobile phone and base station directories with current valid identifiers that are used for communication between the devices.04-07-2011
20110081887Apparatus and Method for Handling a Connection Reject Message - There is provided a method, in a wireless communications device, the method comprising: receiving from a first RAT a reject message, the reject message indicating a period of time; camping on a cell of a second RAT; disallowing camping on a cell of the first RAT unless at least one of the following criteria are met: the period of time has elapsed; and the wireless communications device receives a further message indicating that the first RAT has confirmed it will accept a connection from the wireless communications device.04-07-2011
20100130164Customer Identification and Authentication Procedure for Online Internet Payments using Mobile Phone - This invention shows a mobile terminal device (05-27-2010
20110070863METHOD AND APPARATUS FOR INCREMENTALLY DETERMINING LOCATION CONTEXT - Techniques to derive or predict location context for a user of a mobile device include receiving signal data that indicates a set of one or more distinct signal sources from which signals are received at the mobile device for each of multiple different times. The method further comprises determining whether the mobile device is moving outside a specified area at a current time based on the signal data. The method further comprises incrementing a count for a stationary state associated with the set of one or more distinct signal sources at the current time, if the mobile device is determined to be not moving outside the specified area. The method also comprises delivering a service to the mobile device based on the stationary state.03-24-2011
20110151834Apparatus And Method For Determining An Invalid Base Station - It is determined whether a base station is an invalid base station. At an electronic device at the vehicle, communications are wirelessly received from a base station. It is determined whether the base station is an invalid base station based at least in part upon at least one security parameter included in the received communications.06-23-2011
20120202460Invoking Denial of Service in Universal Mobile Telecommunications System (UMTS) Networks - A method of invoking denial of service in 3G networks is provided. The method includes receiving a downlink UMTS signal that is operating at a downlink UMTs frequency provided by the UMTS base station. A reference downlink UMTS signal is provided with a reference downlink UMTS frequency. The reference downlink UMTs frequency is aligned with the downlink UMTS frequency based on a frequency offset between the downlink UMTS frequency and the reference downlink UMTS frequency to provide an aligned frequency. A common pilot channel (CPICH) is transmitted over the reference downlink UMTS signal operating at the aligned frequency. Service for the UMTS base station is denied when the CPICH is combined with a UMTS base station CPICH operating at the downlink frequency.08-09-2012
20110014894CONTROLLING THE USE OF ACCESS POINTS IN A TELECOMMUNICATIONS NETWORK - A GSM or UMTS mobile telecommunications network is disclosed. In addition to the conventional radio access network comprising the base stations, one or more additional access points are provided. An access point is connected to the network core by an IP transport broadband connection. The access point is configured to appear to the mobile terminal as a conventional base station—that is, it communicates with the mobile terminal using GSM or UMTS transport protocols and does not require any modification to a standard GSM or UMTS mobile terminal. Access Points are typically not under the direct control of the network provider. Arrangements are disclosed which allow the network provider to verify that the access point a mobile terminal is about to commence communicating through is at a particular location. Differential charging may be performed in dependence upon a subscriber's location.01-20-2011
20100120397CREATION AND SIGNALLING OF UE LISTS TO SUPPORT FREQUENCY SELECTIVE REPEATER OPERATION - A method of supporting frequency-selective repeaters (eNodeRs) in a wireless telecommunication system. A base station (eNodeB) classifies User Equipments (UEs) into two categories or lists of users: a white list containing UEs that may need the assistance of repeaters, and a black list containing UEs that do not need repeater assistance. The eNodeB transmits one of these two lists to the eNodeRs. The eNodeRs do not amplify resource blocks (RBs) scheduled for black list UEs. Each repeater may decide on its own whether to amplify signals for a non-black list UE by measuring signals from the UE and comparing them with predefined criteria.05-13-2010
20100112978METHOD FOR TRANSMITTING AND RECEIVING BROADCAST SERVICE INFORMATION AND USER EQUIPMENT FOR BROADCAST SERVICE - Provided are a method for transmitting and receiving broadcasting service information and a mobile station for a broadcasting service. The method for transmitting broadcasting service information at a base station, includes registering a mobile station in a first cell, wherein the first cell is a cell managed by the base station, receiving vehicle related information from the mobile station mounted on a vehicle, and broadcasting the received vehicle related information to target cells.05-06-2010
20100261451SECURED DATA TRANSMISSION IN COMMUNICATIONS SYSTEM - A solution for providing a data security service in a wireless communications system (S) is disclosed. In the solution, a first security association (SA10-14-2010
20090318114METHOD FOR PAIRING ELECTRONIC EQUIPMENT IN A WIRELESS NETWORK SYSTEM - A method pairs electronic equipment, particularly, in a wireless network system. The method includes: providing first and second wireless electronic equipment to be paired which store a first and a second public key, respectively, and providing a user with a wireless portable electronic device which stores a third public key. Then, the portable electronic device transmits the third public key in turn to the first and second electronic equipment, and receiving from the first and second equipment the first and second public keys, respectively. Moreover, the portable electronic device calculates first and second numbers starting from the first and second public keys, respectively. The same first and second numbers is independently calculated by the first and second electronic equipment, respectively, starting from the third public key and representing secret numbers shared between the portable device and the first and second electronic equipment. Finally, the portable device provides a secure communication key to be transmitted in turn to the first and second equipment through encryption with the first and second secret numbers, respectively.12-24-2009
20120202461System and Method for Processing a Voicemail - Described is a system and method for processing a voice mail. The method comprises receiving a voice mail, converting the voice mail into a text message using a predefined speech-to-text conversion algorithm and transmitting the text message to a wireless computing device.08-09-2012
20120202459Providing a Service With Location-Based Authorization - Methods and systems for providing a service are provided. A request is received to provide the service to a device. A location of the device, or a network interface through which the device is coupled, is determined. Finally, the delivery of the service is authorized based on the determined location of the device, or the determined network interface.08-09-2012
20110256845VERIFYING GEOGRAPHICAL LOCATION OF WIDE AREA NETWORK USERS - A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded. The access code is broadcast in a defined region that includes the purported geographical location of the user. A user access code is then received via the wide area network from the user. The user access code is compared with the access code broadcast in a defined region, and the first network address is compared to a second network address from which the user access code is received. If the codes and addresses match, the geographical location of the user is considered verifies and the user may be validated. Various methods for broadcasting the access code and various systems for implementing the method are disclosed.10-20-2011
20090098855METHOD AND SYSTEM FOR PROVISIONING COMMUNICATION SERVICE TO A MOBILE COMMUNICATION DEVICE TO RESTRICT USE WHEN OPERATING A VEHICLE - A mobile communication device has communication service restricted when it becomes apparent that the device is in transit. The communication system receives an access control message indicating the device is in transit. The system accesses a mobility access profile stored in a database. The mobility access profile indicates provisioning changes to be made in providing communication service to the mobile communication device while the device is in transit.04-16-2009
20100311390Mobile communication device - The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices (with cell phones, computers, and ATM's), and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communication with a central processor, another mobile terminal a cell phone, or a pda. The mobile communication device is hands-free being worn on or near the face, and only requires a finger touching for bimodal identity authentication. An audio receiver is compatible with the ear of the user and a microphone transmits words spoken by the user, electronically therethrough. A fingerprint sensor is mounted and positioned within the device. When user authentication is required, the user is prompted to touch the fingerprint sensor, and said fingerprint data is compared with fingerprint images of authorized users. In another aspect of the invention, mobile communication device is an eye-covering, a head covering, or an identification badge including a fingerprint sensor and a processor and is used for wireless authentication of the user.12-09-2010
20120122421SYSTEM AND METHOD FOR REDUCING LATENCY IN A WIRELESS LOCATION SYSTEM - A system and method for providing a location of a mobile device in a network. The method includes: receiving a location request; determining the location of the mobile device responsive to the location request; holding the determined location of the mobile device until a permission to send the determined location is received; receiving the permission to send the determined location; and transmitting the determined location of the mobile device responsive to the received permission.05-17-2012
20110021174METHOD AND APPARATUS FOR AUTOMATICALLY DAMAGING CIRCUITRY OF A MOBILE DEVICE WHEN ONE OR MORE CONDITIONS ARE DETECTED - A mobile device is configured with electrical circuitry that causes the transmit channel electrical circuitry of the transmitter (Tx) of the mobile device to be electrically coupled to the receive channel electrical circuitry of the receiver (Rx) of the mobile device when one or more predetermined conditions occur. The electrical coupling of the transmit channel circuitry to the receive channel circuitry causes the Rx to be sufficiently damaged to render the mobile device nonoperational, thereby preventing further use of the mobile device. The one or more predetermined conditions correspond to conditions that indicate the mobile device has been lost or stolen and/or that an unauthorized user is attempting to use the mobile device in some manner.01-27-2011
20110053557KEY CONTROL WITH REAL TIME COMMUNICATIONS TO REMOTE LOCATIONS - A key control system includes at least one premise, a lockbox capable of securing a key to the premise and at least one mobile telephone associated with a user and having a stored access device program capable of communicating an access request to the lockbox. The premise is subject to authorized access by others, such as the user, based on preferences of an approval party established with the system. If specified by these preferences, the mobile telephone automatically initiates a communication to a selected destination to request approval of the access request.03-03-2011
20110136469WIRELESS COMMUNICATION DEVICE MANAGEMENT - A method and system that limits the use of a communication device present in an area controlled by an intelligent controller. The intelligent controller detects any present communication devices in the area and conducts an inventory providing information about each detected device. The intelligent controller compares that information to a standard of use data, which specifies the conditions need to be present for allowing the usage of a communication device. If such conditions are not met, the intelligent controller sends commands to the communication device to restrict its functionality. Else if, the intelligent controller is incapable of restricting the communication device, it can notify authorities of unauthorized usage of a communication device in the restricted area.06-09-2011
20100323662Communicating Cell Restriction Status Information between Radio Access Network Nodes - A cellular radio communications network includes a core network coupled to a radio access network (RAN) that has multiple RAN nodes for communication with mobile radio terminals. Each of the multiple RAN nodes serves one or more cells. At least one cell associated with a first RAN node is in a restricted or reserved access state in which access to the one cell is restricted for at least some mobile radio terminals. The first RAN node sends a message to a second RAN node to inform the second RAN node of that restricted access cell. The fact that the restricted status of the one cell has changed is detected. A global message tha is not related to a specific mobile terminal is generated that includes information that the restricted status of the one cell has changed. The first RAN node sends the global message to the second RAN node to inform the second RAN node of the change in the restricted status of the one cell.12-23-2010
20100323663Method and User Equipment in a Communication Network - The invention relates to a user equipment (12-23-2010
20090209231Method to allow community-identity based communications using mobile phones - An apparatus in one example has: first user equipment having a first set of personal information for use in a community based network, and a second set of personal information for use in a public network; second user equipment having a first set of personal information for use in the community based network, and a second set of personal information for use in the public network; a trusted presence system in an IMS network operatively coupled to the first and second user equipment; and the trusted presence system being structured such that, when the first user equipment is in the community based network places a call to the second user equipment in the public network, the second set of personal information of the second user equipment is withheld from the first user equipment at least during call setup.08-20-2009
20110151833Apparatus And Method For Detecting A Cloned Base Station - Communications are established between a base station and a mobile unit. The mobile unit analyzes the content of at least some information received from the base station relating to neighboring cells. When the analyzing indicates that the base station is a cloned base station, a warning is initiated to the user.06-23-2011
20110136470METHOD FOR ADMINISTERING THE AUTHORIZATION OF MOBILE TELEPHONES WITHOUT A SIM CARD - The present invention relates to a method for administering the authorization of at least one mobile telephone (06-09-2011
20120309348ACTIVATION SOLUTION - To securely factory activate a mobile device according to authorized records, factory activation server generates and sends a signed factory activation record including a signed factory activation ticket. Signed factory activation record and ticket are cryptographically signed using factory private key stored in factory activation server. Factory private key is different from customer private key stored in the activation server that provides activation tickets for customer activation. If factory activation record is valid, application processor (AP) included in the device performs factory activation of the device which includes AP activating to allow for factory testing and rebooting at a predetermined reboot time. Wireless communication processor (BB) included in the device verifies the factory activation ticket and if valid, BB performs factory activation including: BB registering to a cellular telephone communications network for factory testing, and unregistering from the network after a predetermined unregistering time. Other embodiments are also described.12-06-2012
20090197569SYSTEM AND METHOD FOR ENHANCING SECURITY FOR A MOBILE ELECTRONIC DEVICE OPERATED BY A CHILD - To enhance security related to an electronic device used by a child, communications involving the electronic may be monitored. When the child's electronic device receives a call or other form of communication from an unknown device, identification information about the unknown device may be forwarded to an electronic device of a parent or other supervisor. Also, when the child initiates a communication with another device, the electronic device of the parent or other supervisor may receive a notification.08-06-2009
20090197570PAGING AND ACCESS VIA DIFFERENT NODES - Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node.08-06-2009
20110263221METHOD FOR DETECTING SECURITY ERROR IN MOBILE TELECOMMUNICATIONS SYSTEM AND DEVICE OF MOBILE TELECOMMUNICATIONS - A method and apparatus for detecting a security error at a PDCP layer of an LTE (Long Term Evolution) system, a mobile communication system, are disclosed.10-27-2011
20110189976Paging group network and method for updating mobile station locations - A paging group network includes multiple paging groups formed by areas covered by base stations (BSs). The paging group network further includes an anchor paging controller (PC) and a relay PC. The anchor paging controller initiates a page to a mobile station (MS), addresses the paging group in which the MS is located, and stores status information about the MS in a corresponding location register (LR). The relay PC manages the paging groups. A method for updating MS locations is also provided. Thereby, the present invention optimizes the paging and location updating processes, and reduces the complexity of managing the idle mode.08-04-2011
20110217950Apparatus & method to improve pairing security in Bluetooth.TM. headsets & earbuds - The invention disclosed provides an improved Bluetooth™ system with increased security and privacy for “device association” (“pairing”) of two Bluetooth™ devices where one device has no display. Heretofore, only Secure Simple Pairing (SSP) Association Model “Just Works” is used if one device is display-less. Unfortunately, Just Works is vulnerable to exploits known as “Man-In-The-Middle” (MITM) attacks. By contrast, my invention implements uses Numeric Comparison (heretofore, unusable when one of the pairing devices are display-less). Numeric Comparison is more secure than Just Works, because both agree to a randomly-generated 6-digit number. My innovation allows display-less Bluetooth™ devices (headsets or ear buds) to pair with display-bearing devices, because the matching 6-digit number on the displaying device is “spoken” or sounded (voice recordings, beeps, tones) into a displayless device user's ear. This allows displayless device users to hear sounds (spoken or beeped) equivalent to displayed 6-digit numbers to facilitate comparison, matching, and secure Bluetooth pairing. This reduces or eliminates risk of MITM exploits.09-08-2011
20110009090CELLULAR PHONE WITH BOUNDARY ALARM - A method and apparatus to provide an automatic alarm for a cell phone. A user of the cell phone can set a safe zone, which is a geographic area centered at a particular location with a circular boundary of a preset radius. If the cell phone is removed outside of this radius, the cell phone is presumably stolen, and thus an audible alarm on the cell phone can be triggered.01-13-2011
20120302209SYSTEM AND METHOD FOR IDENTITY PROTECTION USING MOBILE DEVICE SIGNALING NETWORK DERIVED LOCATION PATTERN RECOGNITION - A system and method for recognizing patterns in wireless device locations using wireless device location data derived from a communications signaling network is provided. By using wireless network supported signaling operations and messages, location data concerning the whereabouts of wireless devices, and hence wireless device users, may be obtained. The location data derived from the communications signaling network may be statistically analyzed to reveal potential geographic patterns that may indicate meaningful behaviors of the purported users of the wireless devices.11-29-2012
20100184405USER PROFILE BASED CONTENT DELIVERY BETWEEN A STANDARD HANDSET AND A FEMTOCELL DEVICE - An access device receives content from a broadband IP network to be communicated to a wireless handset over a radio access network (RAN). The access device acquires a user profile utilized in the radio network for the wireless handset. Based on the acquired user profile, the access device determines transmission parameters utilized for communicating the received content to the wireless handset using an air interface protocol over the radio access network. A security level and/or a security protocol, a transcoding mechanism, and/or transmission bit rate are determined based on the acquired user profile. A resolution, transmission bit rate, coding structure, security protocol and/or security level for transmitting the received content to the wireless handset are adjusted based on the acquired user profile. Alternately, the access device is enabled to receive content from the wireless handset using a transmission profile determined based on user profile of the wireless handset.07-22-2010
20120040640Mobile Terminal Capable of Being Tracked and Located and Method for Tracking and Locating - A mobile terminal capable of being tracked and located is disclosed, comprising a built-in card and a security system module which are connected with each other. The security system module generates a short message used for tracking and locating when receiving an incoming call request or a short message sent by the built-in card, wherein the short message at least carries an identification of a cellular tower interacting with the built-in card and information of current signal intensity, and the short message is sent into the built-in card; the built-in card sends the received incoming call request or the short message to the security system module and periodically sends the short message used for tracking and locating generated by the security system module to the set security number. A corresponding method is also provided. The security system is good at cover-up to bring the advantages of security and saving electricity.02-16-2012
20110306318APPARATUS AND METHODS FOR PROVISIONING SUBSCRIBER IDENTITY DATA IN A WIRELESS NETWORK - Apparatus and methods for provisioning wireless devices for operation in one or more networks. In one embodiment, a provisioning service may provide access client (e.g., Subscriber Identity Module) data to a secure element in the wireless user device. The device may be preloaded with a provisioning SIM profile. The device may use the provisioning profile to roam onto a carrier, and communicate with a provisioning service, which may present the user with a list of available wireless carriers, such as carriers that service the user's current geographic location. In response to a user selection, the provisioning service may load a SIM profile associated with the selected carrier onto the secure element. The loaded SIM profile can be used to obtain wireless service from the selected carrier. The user may add multiple SIM profiles, and/or may delete SIM profiles.12-15-2011
20100120396DEVICE INCLUDING AUTHENTICATION GLYPH - A phone used in an authentication process. The phone includes a processor, a display coupled to the processor, and a computer readable medium coupled to the processor. The computer readable medium includes (i) code for displaying a first authentication image including a plurality of image elements including a set of image elements, where the image elements in the set of image elements are located at a first set of positions on a display screen, (ii) code for receiving a first glyph having a first configuration corresponding to the set of image elements from a user while the first authentication image is displayed, (iii) code for displaying a second authentication image including the plurality of image elements including the set of image elements, where the image elements in the set of image elements are located at a second set of positions on the display screen, where the second set of positions is different than the first set of positions, and (iv) code for receiving a second glyph having a second configuration corresponding to the set of image elements from a user while the first authentication image is displayed05-13-2010
20090170472SHARED NETWORK INFRASTRUCTURE - Two or more communications applications are executed on a shared processing platform to process signals received from and transmitted to wireless devices according to a communications protocol, the shared processing platform having shared hardware resources including memory and at least one data processor. A security mechanism is provided to enable each communications application to have independent control of access to data and configuration settings that are private to the communications application. Compatibility of hardware configuration settings associated with different communications applications is determined, and conflicts between hardware configuration settings associated with different communications applications are mediated.07-02-2009
20090104888Onetime Passwords For Mobile Wallets - A mobile wallet and network system using onetime passwords for authentication is disclosed according to one embodiment of the invention. A onetime password may be generated at a mobile wallet server and transmitted to the mobile device. The onetime password may then be used to authenticate the user of the mobile wallet when completing a transaction. Authentication may require entry of the onetime password and confirmation that the onetime password entered matches the onetime password sent by the mobile wallet server. In other embodiments of the invention, a mobile wallet and a mobile wallet server are in sync and each generate the same onetime password at the same time. These onetime passwords may then be used to authenticate the user of the mobile wallet.04-23-2009
20120252408CELLULAR PHONE PROVIDED WITH KEY LOCK FUNCTION - A mobile phone 10-04-2012
20100015949METHOD AND DEVICE TO USE A MOBILE TERMINAL WITH A NEW SUBSCRIPTION - The invention relates to a method and device to use a locked mobile terminal with a new subscription. This method is based on presentation of several IMSI and detection of an IMSI with valid MCC and/or MNC code replaced by another IMSI so that the end-user can use his new SIM card with the locked mobile terminal.01-21-2010
20120003957METHOD AND APPARATUS FOR VERIFICATION OF A TELEPHONE NUMBER - The invention relates to a method and apparatus for verification of a mobile telephone number. The method comprises: storing a mobile telephone number and a corresponding mobile subscriber identity number; receiving a request for verification of the mobile telephone number; sending, in response to the request, an IMSI query requesting a mobile subscriber identity number registered in association with the mobile telephone number in an HLR; receiving, in response to the IMSI query, the mobile subscriber identity number associated with the mobile telephone number in the HLR; comparing the stored mobile subscriber identity number and the received mobile subscriber identity number, and, if the comparison shows that the received mobile subscriber identity number corresponds to the stored mobile subscriber identity number; initiating the performance of the messaging-or-positioning service in relation to the mobile telephone number.01-05-2012
20120208500METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A PRIVATE AND EFFICIENT GEOLOCATION SYSTEM - An apparatus for preserving privacy of a determined location(s) of a device may include a processor and memory storing executable computer code causing the apparatus to at least perform operations including receiving a request for determining a location of a device based on received fingerprint data corresponding to a summary of radio information identifying a physical place, location, area, or region. The summary based on information received from radio frequency (RF) devices. The computer program code may further cause the apparatus to determine whether fingerprint data associated with a geographical location of the RF devices is stored locally for determining whether to request a network device to determine the location of the device based on providing the network device with fingerprint data and false fingerprint data relating to a location(s) that does not correspond to a current location of the device. Corresponding methods and computer program products are also provided.08-16-2012
20120028605COMMUNICATION TERMINAL AND COMMUNICATION SYSTEM - Provided is a communication terminal capable of suppressing the phenomenon of personal information being transmitted contrary to the will of the person. A communication terminal (02-02-2012
20120028604CERTIFICATION AND ACTIVATION OF USED PHONES PURCHASED THROUGH AN ONLINE AUCTION - A system and method for providing an online auction of a wireless device. An indicator is displayed to a winner of an online auction of the wireless device. The indicator is associated with an option for the user to certify the wireless device for use with one or more providers of telecommunications services. The wireless device is certified in response to the selection of the indicator by the winner.02-02-2012
20120064861COMMUNICATION TERMINAL DEVICE AND SECURITY METHOD - Provided is a communication terminal device which can prevent the situation that the communication terminal device cannot be used for a while within a security area, can release a security lock without making a user aware of the release, and can increase usability. In the device, a GPS unit (03-15-2012
20120157045Methods, Systems, and Apparatus for Handling Secure-Voice-Communication Sessions - An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed.06-21-2012
20120157044MOBILE TERMINAL AND METHOD OF CONTROLLING A MODE SCREEN DISPLAY THEREIN - A mobile terminal including a memory configured to store at least a first and second operating system including at least first and second modes, respectively; and a controller configured to execute the first operating system and to activate the first mode corresponding to the first operating system, to display a first information screen on a display corresponding to the activated first mode, to receive a switching signal indicating the first mode is to be switched to the second mode, to activate the second mode and deactivate the first mode, and to display a second information screen on the display corresponding to the second mode and that is different than the first information screen. Further, the controller is further configured to selectively transmit information included on the first or second information screen to at least one external terminal based on a prescribed designated level.06-21-2012
20120115437SYSTEM AND METHOD FOR SECURITY ON A MOBILE DEVICE USING MULTIPLE COMMUNICATION DOMAINS - A mobile device and a method for providing security to a mobile device having two or more communication domains is provided. The mobile device receives a communication service request. The communication domain of the communication service request is determined, the request domain being one of the two or more communication domains of the mobile device. A set of applicable restrictions is then determined from a list of communication restrictions comprising restrictions on use of services of the mobile device for each of the two or more communications domains. These applicable restrictions are then applied to the communication service request by the mobile device.05-10-2012
20120071131METHOD AND SYSTEM FOR PROFILING DATA COMMUNICATION ACTIVITY OF USERS OF MOBILE DEVICES - A method for profiling data communication activity of users of mobile devices, comprises sniffing traffic flows between a mobile device and the Internet through a cellular network; extracting a plurality of traffic attributes included in the traffic flows and associated with the mobile device; logging the extracted plurality of traffic attributes; analyzing the plurality of traffic attributes for generating a user profile for a user of the mobile device based on the plurality of traffic attributes, wherein the user profile includes at least one of an advertising targeted user profile and a security targeted user profile; and sharing information and alerts related to the generated user profile with at least one external system.03-22-2012
20110065417METHOD AND APPARATUS TO CONTROL THE USE OF APPLICATIONS ON HANDHELD DEVICES BASED ON NETWORK SERVICE - A method and apparatus to control the use of applications on handheld device is based on network service, the method comprising the steps of: receiving a network identifier; correlating the network identifier with application and/or feature limitations stored on the mobile device; and limiting application usage based on the results of such correlating step.03-17-2011
20110105078PAGING SIGNAL TRANSMISSION METHOD AND MOBILE STATION FOR THE SAME - A paging signal transmitting method includes a step of allowing each of mobile stations (UE) to receive security data from a network node (05-05-2011
20120164976USAGE MANAGEMENT SYSTEM AND USAGE MANAGEMENT METHOD - A usage management system includes a first storage and a processor. The first storage stores, for each communication area and for each user, usage restriction information regarding a network device which locates in each communication area and which is used by each user and connectable to a communication network. The processor identifies a location area which is a communication area in which a target network device locates, identifies a target user present in the identified location area, acquires usage restriction information regarding the target network device for the identified target user from the first storage, and controls operations of the target network device in accordance with the acquired usage restriction information.06-28-2012
20120122422Access Network Discovery and Selection Function, ANDSF, Node Distributing Closed Subscriber Group, CSG, Information - The invention relates to a method in an Access Network Discovery and Selection Function, ANDSF, node for distributing Closed Subscriber Group information. The CSG information comprises an Allowed CSG List of a first UE and cell information indicating position of a cell with controlled access associated to the Allowed CSG List. The method comprises retrieving an Allowed CSG List of the radio cell from a CSG Database over a first network 05-17-2012
20120220263MOBILE APPLICATION SYSTEM - A particular method includes accessing a webpage at a web server from a mobile application executing at a mobile device. A mobile application tag may be identified in the webpage, where the mobile application tag is independent of a device type of the mobile device. The method also includes determining that the mobile application tag corresponds to a native device function of the mobile device and accessing the native device function.08-30-2012
20110183645RICH PRESENCE STATUS BASED ON LOCATION, ACTIVITY, AVAILABILITY AND TRANSIT STATUS OF A USER - A method and system for determining and sharing rich presence status of a user is presented. Multiple types of presence status options are associated with user's status based on location, activity, availability, transit status, and user's text updates, which the user can selectively share on their mobile device with different groups of users, and make one or more aspects of their presence status broadly available to everyone. Also a system to determine status based on auto-updates and manual updates is presented.07-28-2011
20120164975Secure Wireless Device Area Network of a Cellular System - Embodiments may comprise logic such as hardware and/or code to provide a secure device area network. Many embodiments comprise a gateway node or enterprise enhanced node with a services distribution frame installed on a customer's premises. The gateway node or enterprise enhanced node may interconnect the secure wireless device area network at the customer's premises with a cellular network. In many embodiments, the cellular network core may provision authentication credentials and security keys, and manage access polies to facilitate access by Application Service Providers to devices on premises including smart devices via a security and policy enforcement function of a services distribution frame of the gateway node or enterprise enhanced node, Authorized members of the secure wireless device area network may connect to the Wide Area Network (WAN) through the gateway node and the cellular network core.06-28-2012
20120129491METHOD OF PROVIDING TELECOMMUNICATIONS NETWORK SECURITY - Disclosed is a method of providing network security within a mobile radio communications network and including creating a security context for communications between a mobile radio communications device and the network, the security context being created responsive to an input parameter such as the downlink NAS count, and the method further including, as part of each initial handover attempt, controlling the parameter so as to apply a version of the parameter different from a previous version, for example as incremented downlink NAS count, and preferably independently of network signaling messages.05-24-2012
20100240342Distributed wireless online access system - A method for providing wireless online access comprises: establishing a wireless access signal space wherein a wireless communications link is established between a secondary wireless unit and at least one primary wireless unit, thereby providing a corresponding secondary subscriber with online access by data packet transmission between the primary wireless unit and the secondary wireless unit; and receiving, from an online access provider, a credited revenue amount in return for providing online access for the secondary subscriber.09-23-2010
20100173606Network-Based Subscriber Calling Restrictions - Methods and systems are provided that enable communication with a wireless device. In one such method, a communication event that is intended for a wireless device is detected and a user account associated with the wireless device is identified. Information associated with the user account is identified and a determination is made as to whether the information permits the communication event to occur. If the determination is that the information does not permit the communication event to occur, the communication event is terminated. If the determination is that the information permits the communication event to occur, the communication event is enabled.07-08-2010
20100173607MOBILE COMMUNICATIONS DEVICE WITH SECURITY FEATURES - A mobile communications device for communicating with a wireless network is described. The device includes a processor, a communications sub-system connected to the processor for exchanging signals with the wireless network and with the processor, a user input device connected to the processor for sending user input signals to the processor in response to user inputs. A security module is associated with the processor for automatically taking a security action upon detecting a predetermined security user input through the user input device. The security action can include sending a duress message and/or wiping data stored on the device.07-08-2010
20100173608SAFE APPLICATION DISTRIBUTION AND EXECUTION IN A WIRELESS ENVIRONMENT - The present invention provides safe and secure application distribution and execution by providing systems and methods that test an application to ensure that it satisfies predetermined criteria associated with the environment in which it will execute. Furthermore, by using rules and permission lists, application removal, and a modification detection technique, such as digital signatures, the present invention provides mechanisms to safely distribute and execute tested, or untested, applications by determining whether the application has been modified, determining if it has permission to execute in a given wireless device environment, and removing the application should it be desirable to do so.07-08-2010
20120252405Connecting mobile devices, internet-connected hosts, and cloud services - Applications are downloaded to a device from a cloud-based service by establishing trust with between the device and a host system. The host system and the cloud-based service have a pre-existing trust relationship.10-04-2012
20120252407MULTI-TIER SERVICE AND SECURE WIRELESS COMMUNICATIONS NETWORKS - The present invention pertains to improved communication quality and security of transmission in cellular communication networks. A customer has the option to pay different fees for different tiers of service relating to voice quality, bandwidth access, and different tiers of service relating to communications security. Higher tiers may guarantee a specific vocoder or bit rate is used, or guarantee a specific encryption protocol is use to ensure secure communications. Different tiers may be associated with customers' records for billing purposes. The network may afford high end devices higher voice quality and/or security via a lookup table indicating what level of service is associated with a given device. Calling or receiving devices may negotiate with each other to change to a more robust vocoder or bit rate to ensure a higher quality and/or security. Furthermore, the user may opt to change the quality and/or security level before or during a call.10-04-2012
20120252404METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR SECURITY CONFIGURATION COORDINATION DURING A CELL UPDATE PROCEDURE - A method, apparatus and computer program product are provided for maintaining synchronization with respect to the security configurations of the network and a mobile terminal, even during a cell update procedure. A method may include causing a cell update message to be provided during performance of a cell update procedure and including, with the cell update message, a security configuration information element indicating that a mobile terminal has applied an updated security configuration in an instance in which the mobile terminal has applied the updated security configuration. The method may also include, with the cell update message, the information element indicating that the mobile terminal has reverted to a prior security configuration in an instance in which the mobile terminal has reverted to a prior security configuration. Corresponding apparatuses and computer program products are also provided.10-04-2012
20120171992SYSTEM AND METHOD FOR SECURE CONTAINMENT OF SENSITIVE FINANCIAL INFORMATION STORED IN A MOBILE COMMUNICATION TERMINAL - A method for securing information over-the-air (OTA) in a non-Universal Integrated Circuit Card (UICC) type secure element (SE) of a mobile terminal including receiving a request to initialize an OTA proxy of a mobile terminal, initializing the OTA proxy, receiving a request to secure information, and securing, using the OTA proxy, the requested information in the non-UICC type SE. A method for reconstructing a mobile wallet application including receiving a request to reconstruct the mobile wallet application for a user; transmitting stored mobile wallet application information associated with the user to the mobile terminal; receiving mobile terminal information and SE information; and transmitting a stored application associated with the mobile wallet application information to the mobile terminal. A mobile terminal to secure information OTA in a non-UICC type SE including an OTA proxy to receive a securing command from a TSM, and a non-UICC SE.07-05-2012
20120171991METHOD AND APPARATUS FOR CONFIGURING NODES IN A WIRELESS NETWORK - Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the security settings on the access point based on the security key, and saving the security key in a profile data file on a removable memory device along with a portable configuration utility for using the profile data file for configuring other nodes on the network. The removable memory device can then be inserted into other nodes and the portable configuration utility can be run to match the same key on the other network nodes based on the information stored in the profile data file on the removable memory device.07-05-2012
20120252409METHOD AND DEVICE FOR SETTING GRAPH PASSWORD OF COMMUNICATION TERMINAL - A method and apparatus for setting a graph password of a communication terminal are disclosed to solve the problem that the security of the traditional character password is lower. The method includes the following steps: in a case when a setting graph password instruction of a user is received and it is judged that no character password is set before, generating a graph interface with a plurality of loaded pictures, wherein, each loaded picture is randomly filled in a corresponding grid of a two-dimensional lattice of the graph interface; obtaining a picture identification (ID) and a coordinate value for setting a graph password by selecting at least one loaded picture in the graph interface as the picture corresponding to the graph password; converting the picture ID and the coordinate value for setting the graph password into a character password and storing the character password, finishing setting the graph password.10-04-2012
20100048167ADJUSTING SECURITY LEVEL OF MOBILE DEVICE BASED ON PRESENCE OR ABSENCE OF OTHER MOBILE DEVICES NEARBY - One embodiment of the present invention provides a method for adjusting security status on a mobile device, the method comprising: collecting security-related contextual information which includes information of nearby mobile devices and/or the geographic location of the intelligent mobile device; evaluating a threat level based on the collected security-related contextual information; invoking a security policy; and adjusting the security status of the mobile device based on the threat level and the security policy.02-25-2010
20100048168Telecommunications Networks - Providing a mobile terminal with system information which enables the terminal to access one of the cells of a cellular telecommunications system includes transmitting from the telecommunications system to all terminals within the cell, including the terminal, a system information indicator that makes available to the terminal system information to provide access to the system. The system information indicator is transmitted on the broadcast channel (BCH). The system information indicator may be a sub-set of the system information conventionally transmitted on the BCH but which is sufficient to allow the mobile terminal to access the network and obtain in the downlink further system information. Alternatively, the information transmitted in the BCH may be a profile index value which directs the mobile terminal to retrieve from a store of the mobile terminal system information pre-stored on the mobile terminal.02-25-2010
20120178416METHOD, ACCESS CONTROL NODE AND DOMAIN NAME SERVER IN A WIRELESS COMMUNICATION SYSTEM - A method in a access control node for selecting of a local gateway co-located with or near a home node is provided. The access control node receives (07-12-2012
20100009656NETWORK ACCESS AUTHENTICATION AND AUTHORIZATION METHOD AND AN AUTHORIZATION KEY UPDATING METHOD - A network access authentication and authorization method includes the steps of: constructing an access and authorization request packet; constructing a certificate authentication request packet, constructing a certificate authentication response packet; constructing an access and authorization response packet; constructing an access and authorization acknowledgement packet. And an authorization key updating method includes the steps of: constructing an access and authorization request packet; constructing an access and authorization response packet; constructing an access and authorization acknowledgement packet. The invention resolves the security problem that a mobile terminal accesses a base station in the wideband wireless multimedia network, and realizes both bi-directional identity authentication of a mobile terminal and a base station and unidirectional identity authentication from a base station to a mobile terminal. The authorization key negotiation calculation is simple, and the key management is simply realized by using message acknowledgement manner. The invention is applied to the wired network and the wireless network, such as the wireless local area network, the wireless metropolitan area network, and the broadband wireless multimedia network etc.01-14-2010
20100291897SYSTEM AND METHOD FOR FEMTO COVERAGE IN A WIRELESS NETWORK - Systems and methods are disclosed that provide femto-based wireless coverage in a communication network. This can involve providing an interworking function that communications with a femto base station or femto cell to provide connectivity to the core network. The interworking function can provide service and mobility management where a femto cell (such as a home node B (HNB)) is served concurrently by an IMS core and a legacy core. The interworking function can also provide service through a femto cell to a variety of mobile nodes such as legacy devices and IMS capable devices. The interworking function also provides the ability for handoffs to occur between the core networks and between a femto cell and a macro cell.11-18-2010
20100291895SWITCHING FUNCTIONS FOR MOBILE PAYMENTS SYSTEM - A method includes receiving an information translation request, where the request is for translation of an account holder's mobile telephone number into the account holder's payment card account number. The request is related to a purchase transaction. A database is accessed to identify the account holder's service provider and a transaction acceptance request is transmitted to the service provider. The service provider provides an indication that the account holder has accepted the transaction, and the account holder's mobile telephone number is then translated into the payment card account number, which is then transmitted in response to the information translation request.11-18-2010
20120225640SYSTEM AND METHOD FOR SECURING A BASE STATION USING SIM CARDS - Methods and systems are provided for securing integrated base stations, such as base station routers (BSRs), in which a SIM card is operatively coupled with a secured portion of a base station and a secure association is established therebetween to facilitate encryption key exchange between the secured portion of the base station and a core network.09-06-2012
20120225639PORTABLE COMPUTERIZED WIRELESS PAYMENT APPARATUS AND METHODS - A mobile user apparatus and associated methods useful for conducting payment transactions wirelessly, such as at point-of-sale locations. In one embodiment, the mobile user apparatus is a cellular-enabled mobile device that includes a short-range passive radio frequency transceiver that when interrogated by a reader at the point-of-sale, issues a reply including information relating to an account of the user of the mobile apparatus that is to be debited for the payment. In one variant, the information stored on the mobile device is encrypted for security, and the mobile user apparatus is further configured to receive transaction data wirelessly in return.09-06-2012
20120264399COMMUNICATION DEVICES AND METHOD OF COMMUNICATION - In a portable communications device, information provided by an identification means is used to establish communication between communication means and a second device, such as a point of sale machine, to ensure that the correct portable communications device is connected to the second device where there may be a large number of second devices and a large number of portable communications devices in close proximity.10-18-2012
20120264398ELECTRONIC DEVICE AND UNLOCKING METHOD THEREOF - An electronic device includes a detecting unit, a proximity sensor and an unlocking unit. The detecting unit is used for detecting whether the electronic device is in a standby state, and generating a first signal when it is detected that the electronic device is in the standby state. The proximity sensor is used for sensing whether a person is proximate to the electronic device, and generates a second signal when it is determined the person is proximate to the electronic device. The unlocking unit is used for unlocking the electronic device when the first and second signals are generated within the same period of time.10-18-2012
20120190332PROTECTION OF A SECURITY ELEMENT COUPLED TO AN NFC CIRCUIT - A method and a device for protecting a security module connected to a near-field communication router in a telecommunication device, wherein a transmission between the router and the security module is only allowed in the presence of a radio frequency communication flow detected by the router.07-26-2012
20120190331AGGREGATING MULTIPLE FUNCTIONS INTO A SINGLE PLATFORM - Methods and apparatus, including computer program products, for aggregating multiple functions into a single platform. A communications system includes at least one processor, at least one computer readable storage medium storing computer executable instructions that, when executed by the at least one processor, implement components including a workflow module comprising sets of workflow instructions for processing different types of information packets, and selectable communication function modules, the workflow module coordinating processing of a received packet using selected ones of the selectable communication function modules.07-26-2012
20090017790SYSTEMS AND METHODS FOR RESTRICTING SERVICE IN MOBILE DEVICES - Systems and methods are described that enable remote restriction of workforce mobile phones, media players, computers and other devices. In particular, systems, apparatus and methods are described that deny or allow connections involving the mobile device based on the content of a preauthorized contact list provided by a business administrator. The connection may be any combination of incoming connection, outgoing connection, voice connection, data connection. The list of preauthorized contacts maybe updated upon receipt of a synchronization command from a business administrator. Access to the list of contacts can be blocked upon receiving a lockdown command from the business administrator. The list of contacts can be destroyed upon receiving a poison pill command from the business administrator. A client is described for controlling use of the mobile device.01-15-2009
20110124316ENHANCED WIRELESS HANDSET, INCLUDING DIRECT HANDSET-TO-HANDSET COMMUNICATION MODE - A wireless handset is provided with enhanced features and capabilities. The wireless handset may be embodied as a full-featured handset that is capable of operating either within a wireless network (such as a cellular or PCS network) or in a direct handset-to-handset communication mode that is independent of the wireless network. Alternatively, the wireless handset may be embodied as a special purpose handset, that is capable of simply operating in a direct handset-to-handset communication mode. The wireless handset may additionally include features for supporting and enhancing direct communication between handsets. Such features may include a find feature that permits a user to determine which objects, including other wireless handset users, are located within a predetermined operating range of the wireless handset. A memorize feature may also be provided to permit handsets and other objects exchange information by wireless transmission.05-26-2011
20110124315SYSTEM AND METHOD FOR MANAGING INDIVIDUAL USE OF A MOBILE TELECOMMUNICATIONS ACCOUNT - Disclosed are a system and method for managing access to a mobile telecommunication account by disabling use of a mobile device associated with a mobile telecommunication account or sub account when the mobile network detects that a restriction contained in a restriction database is violated.05-26-2011
20110124314SYSTEM AND METHOD FOR MANAGING MOBILE TELEPHONES - Disclosed are a system and method for associating a plurality of telephone numbers with a mobile telephone that includes a database of a plurality of telephone numbers linked to a plurality of codes and a mobile telephone network configured and arranged to associate the mobile telephone with a particular telephone number when the network receives the code linked to the particular telephone number.05-26-2011
20110003581METHOD AND SYSTEM OF PROVIDING PERSONAL INFORMATION CONTROL SERVICE FOR MOBILE COMMUNICATION TERMINAL - A method and system for providing a personal information control service for a mobile communication terminal are disclosed. The method for providing personal information control service for a mobile communication terminal includes: transmitting, by a service client, a loss registration control command to a service operating system; notifying, by the service operating system, that a mobile communication terminal of a user has been lost by using one of a method of transmitting a particular form of loss control message to the user mobile communication terminal and a method of originating a call using a particular origination number to the user mobile communication terminal in response to the loss registration control command; and activating, by a control agent provided in the user mobile communication terminal, a service function of the control agent to protect personal information of the mobile communication terminal based on the notification about the loss. When the mobile communication terminal is lost, it can be controlled by transmitting a particular form of message or originating a call using a particular origination number.01-06-2011
20110003580TELECOMMUNICATIONS DEVICE SECURITY - A terminal (01-06-2011
20120264397Selective Establishment of Radio Access Bearers to Support Simultaneous Voice and Data Communications in a Mobile Telecommunications Network - Systems, methods, and computer-readable media are for selectively establishing radio access bearers configured to support simultaneous voice and data communications in a mobile telecommunications network. An exemplary method includes receiving a request to initiate a data session at a mobile device that is currently engaged in a voice session and, in response to receiving the request, determining if the mobile device is capable of supporting a radio access bearer configured to simultaneously support the data session and the voice session. The method further includes allowing or denying establishment of the radio access bearer based upon the determination.10-18-2012
20100233995SYSTEM AND METHOD OF SELECTIVELY RESTRICTING OPERATIONS OF A MOBILE PHONE IN A TELECOMMUNICATIONS SYSTEM - A system and method of selectively restricting usage of a user equipment (UE) in a telecommunications system. The system includes a graphical user interface (GUI) for receiving a plurality of restrictions. Each restriction provides a constraint on use of the UE. The GUI allows an administrator of the UE to select and modify the restrictions. The system also includes a traffic server for determining if usage of the UE is within one of the restrictions. If the UE is within one of the restrictions, the traffic server terminates the call. The restrictions may include a time of the day, day of the week or geographical location.09-16-2010
20110256844Cell Phone Based Sound Production - A cell phone based sound producing device is a sound producing device that takes advantage of the likelihood that a user is already carrying a cell phone and does not need to also carry an electronic sound producing device. Another advantage is that cell phones are designed to communicate across a communications network. As such, the cell phone based sound producing device can download sounds from a server, store them, and play them. Electronic payment systems for ring tones that are played on a cell phone already exist. These electronic payment systems can be adapted to payment for sound producing device modules and for sounds. Recovery information can be used to restore modules and sounds that are lost due to cell phone breakage or upgrades.10-20-2011
20120100830ANONYMOUS PARTY VOICE CALL PROCESSING - A voice processing system in a communication network performs an operation in relation to a call from an anonymous calling party to a called party in a home network associated with the system. The operation uses the identity of the anonymous calling party without revealing the identity to the called party. The operations may include allowing the called party to return a call to the anonymous calling party or to send a message to the anonymous calling party, or performing a task in response to future calls or messages from the anonymous calling party such as filtering, blocking, or diverting or requesting authorization for the calling party to call the anonymous called party on demand, hi one aspect, the system automatically generates a dummy number for the anonymous calling party and uses the dummy number to guarantee anonymity by including said dummy number in a notification message or an out-dial notification. The notification may be a missed call notification or an anonymous call notification to the called party, allowing the called party to instruct or perform an operation in relation to the anonymous call while guaranteeing anonymity A voice processing system in a communication network performs an operation in relation to a call from an anonymous calling party to a called party in a home network associated with the system. The operation uses the identity of the anonymous calling party without revealing the identity to the called party. The operations may include allowing the called party to return a call to the anonymous calling party or to send a message to the anonymous calling party, or performing a task in response to future calls or messages from the anonymous calling party such as filtering, blocking, or diverting or requesting authorization for the calling party to call the anonymous called party on demand, hi one aspect, the system automatically generates a dummy number for the anonymous calling party and uses the dummy number to guarantee anonymity by including said dummy number in a notification message or an out-dial notification. The notification may be a missed call notification or an anonymous call notification to the called party, allowing the called party to instruct or perform an operation in relation to the anonymous call while guaranteeing anonymity.04-26-2012
20120329426SYSTEM AND METHOD FOR MONITORING THE SECURITY OF CELLULAR DEVICE COMMUNICATION - System and method for monitoring security status of an inspected cellular device engaged in a cellular network are disclosed. Status parameters related to the inspected cellular device are gathered and analyzed. A security status of the inspected cellular device is determined based on the analysis.12-27-2012
20120289194COMMUNICATION SYSTEM AND COMMUNICATION METHOD - To provide a communication system including a mobile terminal which can prevent leak of information even if the mobile terminal is lost and reproduce previously accumulated confidential data without losing newly created and updated confidential data. A mobile terminal includes connection state judging device which detects a line connection state with a server. When the line connection state is a broadband connection, the data is read directly from and written directly into a data storing device of the server. When the line connection state is a narrowband connection, the data is temporarily read out and written into a data storing device of the terminal. When the operation of the mobile terminal is completed or a security operation starting instruction is issued by a user, the updated confidential data is written into the data storing device of the server and then the confidential data is erased from the mobile terminal.11-15-2012
20120289193Method and Apparatus For Monitoring and Theft Prevention - There is provided a device comprising a mobile broadband module comprising radio communication means. The device further comprises at least a first SIM for providing user domain services and at least a second SIM for providing service domain services. The second SIM is isolated from an end user of the device. According to an embodiment, the first SIM is associated with the end user of the device, wherein the end user may be associated with a first identity, and wherein the second SIM is associated with a service provider, the service provider being associated with a second identity. A method comprising: identifying which of the first and the second communication paths a command is issued from; and continuing with the command or discontinuing with the command in dependence on the identified path, such that the end user is not able to perform operation on to access the isolated second SIM.11-15-2012
20100167690user terminal for enhanced security in a wireless communications system, and a system for its use - The invention discloses a user terminal (07-01-2010
20100167692METHODS, SYSTEMS, AND APPARATUS FOR HANDLING SECURE-VOICE-COMMUNICATION SESSIONS - An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed.07-01-2010
20130012164SYSTEM AND METHOD FOR SECURING A BASE STATION USING SIM CARDS - Methods and systems are provided for securing integrated base stations, such as base station routers (BSRs), in which a SIM card is operatively coupled with a secured portion of a base station and a secure association is established therebetween to facilitate encryption key exchange between the secured portion of the base station and a core network.01-10-2013
20130012163APPARATUS AND METHOD OF CIPHERING IN WIRELESS TELECOMMUNICATIONS USER EQUIPMENT OPERATIVE WITH A PLURALITY OF RADIO ACCESS NETWORKS - A method in a wireless telecommunications device operative with a plurality of radio access networks, the method comprising: when operating with a first radio access network reading at least one ciphering variable applicable in the second radio access network (e.g. in UMTS reading the value of a variable START from the USIM of the device). When at least one ciphering variable applicable in the second radio access network renders ciphering in the second radio access network infeasible without further authentication (e.g. in UMTS when the value of START in USIM is equal to a value THRESHOLD), using a substitute value for the ciphering parameter (e.g. START) when establishing a connection with the second radio access network.01-10-2013
20100130165SYSTEM AND METHOD FOR IDENTITY PROTECTION USING MOBILE DEVICE SIGNALING NETWORK DERIVED LOCATION PATTERN RECOGNITION - A system and method for recognizing patterns in wireless device locations using wireless device location data derived from a communications signaling network is provided. By using wireless network supported signaling operations and messages, location data concerning the whereabouts of wireless devices, and hence wireless device users, may be obtained. The location data derived from the communications signaling network may be statistically analyzed to reveal potential geographic patterns that may indicate meaningful behaviors of the purported users of the wireless devices.05-27-2010
20120149327METHOD AND DEVICE FOR EXECUTION CONTROL FOR PROTECTED INTERNAL FUNCTIONS AND APPLICATIONS EMBEDDED IN MICROCIRCUIT CARDS FOR MOBILE TERMINALS - The invention in particular relates to the execution control of protected internal functions and applications embedded in a mobile terminal microcircuit card. The control of a protected internal function is directly carried out in the microcircuit card. After having detected (06-14-2012
20130017804EFFICIENT PROCESSING OF RADIO RESOURCE REQUESTSAANM Jun; JerryAACI AustinAAST TXAACO USAAGP Jun; Jerry Austin TX USAANM Liu; HuitaoAACI AustinAAST TXAACO USAAGP Liu; Huitao Austin TX USAANM Parra; DarwinAACI PleasantonAAST CAAACO USAAGP Parra; Darwin Pleasanton CA USAANM Li; YunpengAACI AustinAAST TXAACO USAAGP Li; Yunpeng Austin TX US - A system for efficiently transmitting requests for data access from a wireless communications device to a radio access network. Requests for data access may be aggregated to more efficiently use radio resources. Aggregated requests may not be transmitted until a total number of requests or size of aggregated requests exceeds a threshold. Regardless of aggregation, requests may be stored until a timer expires, and then transmitted to the radio access network. Request priority, environmental data, and device data may be taken into account in determining when to transmit requests for data access.01-17-2013
20110159842Motion-Based Disabling of Messaging On A Wireless Communications Device By Differentiating A Driver From A Passenger - When a wireless communications device is traveling at a speed exceeding a lower threshold but less than an upper threshold, the device is presumed to be traveling in a motor vehicle. In order to inhibit operation of the wireless communication device by a driver without restricting operation by a passenger, access to certain device functions or applications such as e-mail, text messaging, etc. are limited by challenging the user of the device to respond to an ergonomic challenge that requires two-handed user input. Only if two-handed input is received will the wireless communications device grant access to e-mail or instant messaging.06-30-2011
20110159841SYSTEMS, APPARATUS AND METHODS TO FACILITATE HANDOVER SECURITY - Systems, methods and apparatus for facilitating handover security are provided. In some embodiments, the method can include deriving a key value for handover from a GERAN/UTRAN system to an E-UTRAN system using a first input value. The method can also include deriving a key value for a connection establishment using a second input value, wherein the first input value is different from the second input value and is different from input values derived subsequent to the second input value, and wherein the first input value, the second input value and the input values derived subsequent to the second input value are configured to be input to a same key derivation function configured to output a key for use between a network entity and user equipment.06-30-2011
20130171963Method and Apparatus for Secure Element Management - In accordance with an example embodiment of the present invention, a method includes receiving at a terminal a refresh message sent by a secure element, wherein said refresh message includes a request for a session reset in response to at least one value associated with a current active application on said secure element is changed. The method further includes sending by said terminal a status message to said secure element, wherein said status message notifies said current active application on said secure element that an application session reset procedure will be executed. The method further includes sending by said terminal an application selection message to said secure element, wherein said application selection message instructs said secure element to reactivate said current active application with at least said new value.07-04-2013
20080227432Activating the Unlocking of a Mobile Terminal - The invention concerns a method for activating unlocking of a mobile terminal (TM) to be connected to a radio communication network (RR) and co-operating with a smart card (CP), wherein an unlocking activating indicator stored in a first state in the card is periodically read by an application of the terminal to maintain the terminal locked if the indicator is in the first state. A server (SO) transmits an updating message including a state-changing command to the card via the terminal after a predetermined usage time interval so that an application in the card shifts the unlocking activating indicator into a second state. If the unlocking activating indicator is read in the second state by the terminal application, the latter commands the unlocking of the mobile terminal. The interaction between the terminal as well as providing sufficient revenue to the operator who has sold the terminal09-18-2008
20130143524Mediation Server, Control Method Therefor, Communication Device, Control Method Therefor, Communication System, and Computer Program - A mediation server which is able to communicate with a plurality of account managing servers (06-06-2013
20120252406METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR SECURITY CONFIGURATION COORDINATION DURING A CELL UPDATE PROCEDURE - A method, apparatus and computer program product are provided for maintaining synchronization with respect to the security configurations of the network and a mobile terminal, even during a cell update procedure. A method may include causing a cell update message to be provided during performance of a cell update procedure and including, with the cell update message, a security configuration information element indicating that a mobile terminal has applied an updated security configuration in an instance in which the mobile terminal has applied the updated security configuration. The method may also include, with the cell update message, the information element indicating that the mobile terminal has reverted to a prior security configuration in an instance in which the mobile terminal has reverted to a prior security configuration. Corresponding apparatuses and computer program products are also provided.10-04-2012
20090011738Mobile communication apparatus - In order to provide a mobile communication apparatus that is capable of preventing a fraudulent access, via the mobile communication apparatus, to a data communication service intended for a mobile communication apparatus; a mobile communication apparatus 01-08-2009
20130137397Systems And Methods For Providing A Password Reset Feature - A method for providing a voicemail password reset feature can include receiving a password reset request message from a mobile device at a voicemail system, resetting a current password to a default password at the voicemail system, and sending a response message request to a short message service center. The response message request can include a request to generate a response message that includes the default password. The method can further include generating the response message at the short message center and sending the response message to the mobile device, wherein the response message includes the default password. A system for providing a voicemail password reset feature and a computer-readable medium for initiating a voicemail password reset from a mobile device.05-30-2013
20130115914Control Method for Home Base Station Access and Home Base Station Gateway - A control method for H(e)NB access and a H(e)NB gateway are provided in the present invention. The method includes the following steps: a H(e)NB gateway interacting with a Broadband Policy Control Framework (BPCF) through a H(e)NB policy function, and requesting for the admission control of a fixed broadband access network; the BPCF returning the result of the admission control to the H(e)NB gateway through the H(e)NB policy function. The present invention performs policy control for the service access of the User Equipment (UE) accessing via the H(e)NB.05-09-2013
20130115913METHOD AND APPARATUS FOR NOTIFYING ACCESS CONTROL INFORMATION - A method and an apparatus for notifying activations of extended access barring (EAB) and updates of EAB information in the field of Long Term Evolution (LTE) wireless communication systems have been proposed. In accordance with the present disclosure, the eNB notifies MTC devices of EAB changes from a paging message through the paging channel (PCH). The network could use either a single bit EAB status indicator to notify whether the EAB has been enabled or disabled or use multiple bits EAB indicator to represent different EAB parameter changes in addition to whether the EAB has been enabled or disabled. Based on the present disclosure, the network could reduce the paging overhead by require the MTC device to acquire the EAB-SIB only when it needs the EAB information.05-09-2013
20130102281MOBILE TERMINAL AND LOCK CONTROLLING METHOD - A mobile phone includes a display, a touch panel provided on the display, etc., and can be set with a lock state. In a case that the lock state is set, a lock screen including a lock object is displayed on the display. Upon receipt of a mail, notification information of a newly-arrived mail is recorded in a notification table and the notification information of the newly-arrived mail is displayed in a notification area of the lock screen. If a user performs a sliding operation after touching the lock object, and then releases from the lock object within the notification area, the lock state is canceled, and a mail function is performed such that the above-described newly-arrived mail is displayed.04-25-2013
20130102279MOBILE TERMINAL AND CONTROL METHOD OF THE SAME - A mobile terminal that may be able to access a wireless communication network and a control method thereof are provided. The mobile terminal includes: a wireless communication unit configured to access a wireless communication network; a detection unit configured to detect a connectable wireless communication network through the wireless communication unit; and a controller outputting icons each corresponding to one or more wireless communication networks detected by the detection unit to a locked screen displayed in a locked state in which inputting of a control command with respect to an application is limited, releasing the locked state when selecting of any one of the output icons is detected, and controlling the wireless communication unit to access a wireless communication network corresponding to the selected icon.04-25-2013
20130102280APPARATUS AND METHOD FOR MANAGING CONTROL INFORMATION OF APPLICATION IN PORTABLE TERMINAL - An apparatus and method to control an application in a portable terminal are provided. A method to manage an application includes confirming control information that at least one application installed in the portable terminal requires, selecting the at least one application requiring control information whose use is restricted among a plurality of applications installed in the portable terminal, and restricting a running of the selected at least one application.04-25-2013
20130203381MOBILE COMMUNICATION METHOD, RELAY NODE, AND RADIO BASE STATION - The present invention relates to a mobile communication method of sending and receiving the signaling of an S1AP/X2AP layer on DRB established between a radio base station DeNB and a relay node RN, the method comprising a step of generating a key K08-08-2013
20130203382MOBILE COMMUNICATION METHOD, MOBILE COMMUNICATION SYSTEM, AND RADIO BASE STATION - The present invention relates to a mobile communication method that sends and receives the signaling of an S1AP/X2AP layer on DRB established between a radio base station DeNB and a relay node RN, the mobile communication method including: a step of setting the above DBR in an attach process of the relay node RN; and a step of notifying the above DRB to the relay node RN and the radio base station DeNB in an attach process of the relay node RN.08-08-2013
20130130649PROVIDING ACCESS LEVELS TO SERVICES BASED ON MOBILE DEVICE SECURITY STATE - A mobile device's level of access to services provided by a service provider is based on a current security state assessment of the mobile device. Mobile devices are granted different access levels to services based on the security state of the device. A security component can assess the current security state of the mobile device by processing security data generated by the mobile device. In a specific embodiment, the security component is at the mobile device. In another specific embodiment, the security component is at a server.05-23-2013
20100279654Apparatus and Method of Handling Simultaneous Universal Terrestrial Radio Access Network Radio Resource Control Procedures Which Change the Security Configuration in a Universal Mobile Telecommunications System User Equipment - The details of an apparatus and method of handling simultaneous universal terrestrial radio access network radio resource control procedures which change the security configuration in a universal mobile telecommunications system user equipment are disclosed herein. According to one aspect of the present application, there is provided a user equipment apparatus having a message handler, a sequential processor, a command store, and a security configuration change detector, wherein said message handler is coupled to said command store, is coupled to said sequential processor, and is coupled to said security configuration change detector to save, process, and detect configuration changes in commands respectively, and to determine if there is an existing command at the user equipment, such that the user equipment appears to the UTRAN as though it were processing commands simultaneously. According to another aspect, there is provided a method of processing simultaneous commands at a user equipment having a security configuration, including the steps of: determining if there is an existing command at the user equipment; upon reception of a received command: suspending the existing command processing; determining if commands contain a security configuration change; and either rejecting the received command; or saving the received command prior to resuming the existing command; such that the user equipment appears to the UTRAN to be processing commands simultaneously.11-04-2010
20100279653MULTI-TIER AND SECURE SERVICE WIRELESS COMMUNICATIONS NETWORKS - The present invention pertains to improved communication quality and security of transmission in cellular communication networks. A customer has the option to pay different fees for different tiers of service relating to voice quality, bandwidth access, and different tiers of service relating to communications security. Higher tiers may guarantee a specific vocoder or bit rate is used, or guarantee a specific encryption protocol is use to ensure secure communications. Different tiers may be associated with customers' records for billing purposes. The network may afford high end devices higher voice quality and/or security via a lookup table indicating what level of service is associated with a given device. Calling or receiving devices may negotiate with each other to change to a more robust vocoder or bit rate to ensure a higher quality and/or security. Furthermore, the user may opt to change the quality and/or security level before or during a call.11-04-2010
20080200146CELL ACCESS RESTRICTION AND WTRU ACCESS CLASS OPTIMIZATION IN LTE SYSTEM INFORMATION - A method and apparatus for cell access restriction, wherein a new access class (AC) definition including a WTRU barred-bit assignment is assigned during cell subscription. A cell access restriction information element (IE) is then broadcast when an operator is restricting access to a cell. The WTRU then can determine whether a cell is restricted based on a comparison of the cell access restriction IE to the barred-bit definition. A base station (BS) is able to transmit the new cell access restriction IE in a fast-read master information block (MIB).08-21-2008
20110223884METHOD AND SYSTEM FOR ENHANCED MESSAGING - Techniques for acquiring, sending, receiving or using status information from a remote location over a network are disclosed. The status information is transmitted over the network between or among electronic devices. The status information can be provided by one or more sensors associated with the electronic device that is transmitting the status information. The status information can be transmitted with messages so as to enhance the messages. The electronic devices include at least computing devices, such as personal computers, personal digital assistants, pagers, and mobile telephones.09-15-2011
20100291896METHOD, SYSTEM AND TRUSTED SERVICE MANAGER FOR SECURELY TRANSMITTING AN APPLICATION TO A MOBILE PHONE - A Trusted Service Manager (TSM) receives via a first communication channel from a Service Provider (SP) a request (REQ(MIA)) that contains an application (MIA) together with a unique identifier of a mobile phone (MOB), particularly its telephone number. The mobile phone (MOB) is equipped with a memory device (MIF) that comprises multiple memory sectors being protected by sector keys. Preferably the memory device (MIF) is a MIFARE device. The TSM extracts the application (MIA) and the unique identifier from the received request, assigns destination sector(s) and associated sector key(s) of the memory device (MIF), compiles the application (MIA), the sector key(s) and the sector number(s) of the destination sector(s) into a setup-message (SU(MIA)), encrypts the setup-message and transmits it to either the mobile phone via a second communication channel or the Service Provider via the first communication channel (CN). If the setup-message (SU(MIA)) is transmitted to the Service Provider, the Service Provider sends it over the second communication channel to the mobile phone.11-18-2010
20120258686COMMUNICATION SYSTEM - A femto cell base station includes a generating part that generates a SIP message including a terminal ID of a radio terminal and a check request for the terminal ID at a predetermined time, and a first transmitting part that transmits the SIP message generated by the generating part to a higher level apparatus in the communication system.10-11-2012
20100304712FEMTO CELL SERVICE DELIVERY PLATFORM USAGE COMPLIANCE - Embodiments of the disclosed invention include an apparatus, method, and computer program product for managing cellular usage in controlled areas. For example, in one embodiment, a cellular monitoring system communicates with one or more femto cells located within a controlled area for detecting the presence of unauthorized cellular devices or for monitoring the usage of cellular devices within the controlled area.12-02-2010
20100317322System And Method For Facilitating The Growth Of A Mobile Community - A system and method for automatically matching a plurality of mobile subscribers is disclosed. The system includes at least one server for receiving from each mobile subscriber within the plurality of mobile subscribers a contact list. Said server is adapted to process the contact list to produce a set of normalised contact information for each subscriber in the system; compare the set normalised contact information for a selected subscriber with a subscriber network identification assigned to each subscriber with the system; identify subscriber network identifications that match entries contained in the set normalised contact information of said selected subscriber; compile a listing of the matched subscriber network identifications; and forward an invite to each subscriber within the listing of matched subscriber network identifications.12-16-2010
20100317321SELECTIVE FIRST DELIVERY ATTEMPT (FDA) PROCESSING FOR TEXT MESSAGES - Systems and methods are disclosed for selectively applying First Delivery Attempt (FDA) processing for text messages. A text message system in one embodiment includes a rules database that stores rules defining which text messages are authorized to be delivered using FDA processing. The text message system further includes a message processor that initially receives a text message, and determines whether to selectively apply FDA processing for a time period due to an occurrence of a triggering event. If selective FDA processing applies, then the message processor processes the rules in the rules database to determine whether the text message is authorized for FDA processing during the time period of selective FDA processing. If authorized, then the message processor forwards the text message to an FDA system for FDA processing. If not authorized, then the message processor forwards the text message to a store-and-forward system for store-and-forward processing.12-16-2010
20100317320METHOD AND APPARATUS FOR PREVENTING UNAUTHORIZED USE OF COMPUTING DEVICES - Methods and devices for preventing unauthorized use of mobile devices allow users to create a mobile device identification number (MDIN) which must be entered before mobile devices can access a new removable memory unit. Upon activation a mobile device may check an identifier of an installed removable memory unit to determine if the memory unit has been changed. If the mobile device determines that the memory unit is new, it may prompt the user to enter the MDIN. If the entry made by the user matches the MDIN stored in secure memory, the mobile device will access the new memory unit and function normally. However, if the entry does not match the MDIN stored in memory the mobile device may not access the new memory unit, thereby denying use of the mobile device. Example removable memory units include Subscriber Identity Modules, Universal Integrated Circuit Cards, and Removable User Identity Modules.12-16-2010
20100317319Providing Trusted Communication - Electronic communication is susceptible to SPAM, phishing attacks, and other unwanted communications because of a recipient's limited control over communication transmitted by a sender. Functionality can be implemented to employ a multi-level approach to establishing trust between a sender and a recipient prior to transmitting any communication to prevent unwanted content from being transmitted to a recipient. Initial levels of trust may be established by requiring the sender to provide trust establishment information about the recipient. Based on the validity and percent accuracy of the provided trust establishment information, the communication may be discarded or transmitted to the recipient. A final level of trust depends on the approval of a trust validation request sent to the recipient on behalf of the sender. Such a system configured to provide trusted communication can reduce the probability of the recipient receiving large scale SPAM, phishing attacks, telemarketing calls, and other unwanted communication.12-16-2010
20120282896Method, Apparatus and System for a Mobile Virtual Number Service in a Mobile Telecommunications System - A method of and an engine for providing a Mobile Virtual Number, MVN, service in a node of a mobile telecommunications system comprising a plurality of nodes providing service to a plurality of mobile User Equipments, UEs. The MVN service instructs the telecommunications system for handling calls related to a first mobile subscriber number, corresponding to the mobile UE, and a second mobile subscriber number such that the mobile UE operates under the second mobile subscriber number.11-08-2012
20120282895METHOD AND APPARATUS FOR MULTIMEDIA CONTENT PROMOTION IN VEHICULAR WIRELESS NETWORKS - A multimedia content dissemination system is provided for mobile vehicles. A wireless vehicle communication network provides communication among mobile vehicles in the network. At least one host vehicle within the wireless vehicle communication network is selected by an authorized entity for disseminating multimedia content received by the authorized entity. The at least one host vehicle transmits an inquiry to target vehicles in the wireless vehicle communication network. The inquiry comprises a content profile that includes descriptors associated with the multimedia content for allowing target vehicles to determine whether an interest exists in the multimedia content. The at least one host vehicle transmits the multimedia content in encrypted form to an interested target vehicle for sampling the multimedia content. The interested target vehicle requests ongoing use of the multimedia content from the authorized entity in response to sampling the multimedia content. The authorized entity provides to the interested target vehicle a decryption key for authorizing ongoing use of the multimedia content.11-08-2012
20130157616APPLIANCE IN A MOBILE DATA NETWORK THAT SPANS MULTIPLE ENCLOSURES - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network.06-20-2013
20110312300MOBILE APPLICATION GATEWAY FOR CONNECTING DEVICES ON A CELLULAR NETWORK WITH INDIVIDUAL ENTERPRISE AND DATA NETWORKS - A mobile application gateway for connecting devices on a cellular network with individual networks, such as enterprise voice and data networks and/or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise. The invention may consist of a primarily of core network and services components based on the IMS network architecture, and is backward compatible to support legacy systems in place in current telecom and data networks.12-22-2011
20110312299Methods and apparatuses facilitating synchronization of security configurations - Methods and apparatuses are provided for synchronizing security parameters between access terminals and a wireless network. An access terminal and network entity can conduct a security mode procedure where the access terminal sends a security mode complete message to the network entity. On receipt of the security mode complete message, the network entity may update to new security parameters. The access terminal may initiate a mobility procedure while the security mode procedure is ongoing and may, as a result, abort the security mode procedure and revert back to the old security parameters. The access terminal can send a mobility update message to the network entity including a dedicated status indicator adapted to inform the network entity that the access terminal has reverted back to the old security parameters. In response to the mobility update message, the network entity may revert back to the old security parameters.12-22-2011
20130189950INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING DEVICE CONTROLLING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM HAVING INFORMATION PROCESSING DEVICE CONTROLLING PROGRAM RECORDED THEREON - An information processing device includes: a communication module that performs wireless communication with another device using unique information included in an electronic card; an acquiring unit that acquires the unique information included in the electronic card; a registering unit that registers the unique information acquired by the acquiring unit in a first memory unit and a second memory unit that is provided in the communication module; a deciding unit that decides whether or not the unique information registered in the first memory unit matches the unique information registered in the second memory unit and the unique information included in the electronic card, respectively; and an activation controlling unit that allows activation of the information processing device when the deciding unit decides that the unique information registered in the first memory unit matches the unique information registered in the second memory unit and the unique information included in the electronic card.07-25-2013
20120021720ADVANCED PREDICTIVE INTELLIGENCE FOR TERMINATION BYPASS DETECTION AND PREVENTION - Provided are methods and systems for detecting and preventing bypass fraud in telecommunication networks, primarily for detecting and preventing SIM box fraud in telecommunication networks. The methods include generating one or more test calls from a remote agent to a local agent where the remote agent can be a roaming agent or a remote dialer. The local agent is a subscriber number. The methods further include facilitating call forwarding of the test calls from the local agent to a local number. The methods include identifying the presence of bypass fraud by analyzing caller identification information of the test call received on the local number. Finally, the methods include preventing future use of a detected SIM box.01-26-2012
20130203379SYSTEM AND METHOD FOR IMEI DETECTION AND ALERTING - A system and method for detecting and storing information regarding a mobile communications device within a mobile communications network. Initially, a first data record is received at a subscriber/device database comprising subscriber/device data. Next, a second data record is received at the subscriber/device database comprising additional subscriber/device data. A first data record of a subscriber may then be compared to a second data record of the same subscriber, and if the first data record is different from the second data record a service provider may be notified.08-08-2013
20130203380NETWORK DEVICE, CORE NETWORK, DIRECT MODE COMMUNICATION SYSTEM AND LAWFUL INTERCEPTION METHOD THEREOF - A network device, a core network, a direct mode communication system and a lawful interception method thereof are provided. The direct mode communication system includes the network device and the core network, and connects to a first mobile station and a second mobile station respectively. The network device registers to the core network for intercepting a communication between the first mobile station and the second mobile station and retrieves a communication data by intercepting the communication. The core network receives the communication data from the network device and stores the communication data.08-08-2013
20120077461METHOD AND SYSTEM FOR PREAUTHENTICATING A MOBILE NODE - A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is preauthenticated with the one or more PPoAs using a transitivity of trust between the mobile node, the CPoA, and one or more authentication servers.03-29-2012
20130210384SECURITY OF USER PLANE TRAFFIC BETWEEN RELAY NODE AND RADIO ACCESS NETWORK - A gateway apparatus (08-15-2013

Patent applications in class Security or fraud prevention

Patent applications in all subclasses Security or fraud prevention