H04M1/66

ELECTRONIC APPARATUS AND METHOD OF SELECTIVELY APPLYING SECURITY MODE IN MOBILE DEVICE
20230199104 · 2023-06-22 ·

A mobile device includes a user interface including a display panel to display a menu image and a touch panel to receive a password, a network interface to detect an external device, a functional unit to sense a motion of the mobile device and to photograph a user, and a control unit to control the user interface, the network interface, the memory, and the functional unit, to unlock the mobile device according to a user identification process of identifying an authorized user, when the mobile device is in a time condition, in response to the sensed motion, and to unlock the mobile device according to the password when the mobile device is not in the time condition, in response to the sensed motion.

Digital device and method for providing additional service by using the same

A digital processing device capable of receiving an additional service is disclosed. In one aspect, a digital processing device includes i) an input unit, inputting a signal, ii) a subscriber identity unit, storing an identity code of a communication operator and generating a communication network access request message, iii) an additional service identity unit, storing an identity code of an additional service operator and generating an additional service request message and v) a control unit, generating a control signal allowing one of the subscriber identity unit and the additional service identity unit to be selectively driven. In accordance with at least one inventive embodiment, a user of the digital processing device can receive an additional service without his or her subscription to a specific communication operator and use various additional services in addition to the additional services provided by the subscribed communication operator.

Portable terminal and lock state control method
09848329 · 2017-12-19 · ·

A mobile phone 10 comprises a display 14 and a touch panel 16, and a lock state of restricting performance of the predetermined processing based on a touch operation is set. A home screen including a function icon is displayed on the display 14. When the lock state is set, a lock screen is produced based on this home screen. Then, the lock screen is displayed if the power supply of the display 14 is turned on. A cancellation icon corresponding to the function icon is included in the lock screen. If a cancellation operation using the cancellation icon corresponding to a mail application is performed the lock state is canceled and the mail application is performed.

Enabling secure application distribution on a (E)UICC using short distance communication techniques

The present disclosure provides for methods and devices for enabling distribution of a first security application comprised in the first wireless device to the second wireless device. One method comprises the steps of receiving, in the first wireless device, using a short distance communication technology, a hardware identifier of the second wireless device, sending, from the first wireless device, the hardware identifier and information identifying the first security application to the network node, receiving, in the network node, from the first wireless device, the hardware identifier of the second wireless device and the information identifying the security application and authorizing, in the network node, the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device.

Mobile terminal, and safety verification method and device for mobile payment
09848326 · 2017-12-19 · ·

Provided are a mobile terminal, and a safety verification method and device for mobile payment. The mobile terminal includes a payment card and an NFC chip, also includes: a conduction switch coupled between the payment card and the NFC chip, and configured to receive a control signal from a processor and control, according to the control signal, closing or opening of a conduction path between the financial card and the NFC chip; and the processor, which is configured to verify, before the financial card transacts with an external reader, verification information input by a user; generate, when the verification information input by the user passes the verification, a control signal for controlling the conduction switch to open the conduction path, and generate, when the verification information input by the user does not pass the verification, a control signal for controlling the conduction switch to close the conduction path.

Method and apparatus for providing wireless service groups

The disclosed embodiments provide a system that provides wireless service groups. During operation, a wireless device's advertising mechanism advertises a service group over Wi-Fi, wherein the service group comprises at least the wireless device and wherein the service group's security requirements regulate multicast protection within the service group. In response to receiving a request from a second device to be admitted into the service group, the wireless device's security mechanism admits the second device into the service group and sends the service group's security requirements to the second device, thereby enabling the second device to initialize multicast protection in accordance with the service group's security requirements.

System for authenticating a phone number using a phone number certificate

An apparatus, related devices and methods, having a memory element operable to store instructions; and a processor operable to execute the instructions, such that the apparatus is configured to identify, on an electronic device, a phone number of an incoming caller device; request, via an out-of-band control channel, a digital certificate for the phone number from the incoming caller device; receive, via the out-of-band control channel, the digital certificate for the phone number from the incoming caller device; determine whether the digital certificate for the phone number is authentic; and indicate, on the electronic device, based on a determination that the digital certificate for the phone number is authentic or not authentic, whether the phone number is authentic or not authentic.

System for authenticating a phone number using a phone number certificate

An apparatus, related devices and methods, having a memory element operable to store instructions; and a processor operable to execute the instructions, such that the apparatus is configured to identify, on an electronic device, a phone number of an incoming caller device; request, via an out-of-band control channel, a digital certificate for the phone number from the incoming caller device; receive, via the out-of-band control channel, the digital certificate for the phone number from the incoming caller device; determine whether the digital certificate for the phone number is authentic; and indicate, on the electronic device, based on a determination that the digital certificate for the phone number is authentic or not authentic, whether the phone number is authentic or not authentic.

Display processing apparatus

A mobile terminal apparatus including an operation lock mode setting unit that sets an operation lock mode; an event container display control unit that displays, when a predetermined event occurs, an event container indicating the occurred predetermined event on a display unit; an event container display change control unit that sets an event container between an active state and an inactive state; a lock canceling operation unit that cancels the operation lock mode; and a canceling operation handling control unit that, when an active-state event container is displayed on the display unit and the operation lock mode is canceled, performs automatic activation and display of an application program corresponding to the event of the active-state event container, and when all event containers on the display unit are in the inactive state and the operation lock mode is canceled, displays a predetermined display screen on the display unit.

Detecting undesirable signalling traffic

Undesirable signalling traffic received at a telecommunications network is detected by establishing at least one statistical parameter in respect of signalling traffic received at the telecommunications network from at least one specific source and evaluating the established at least one statistical parameter against one or more predetermined statistical profiles.