H04M1/66

Mobile terminal device, information management device, and information management system

According to the present invention, a mobile terminal device includes: an operation input section which accepts operations; a memory section which previously stores a list of states of the mobile terminal device during use as locking conditions to determine a state at the time of limiting an operation of the mobile terminal device; a state determining section which generates state information in accordance with a state of the mobile terminal device; and a function limiting section which determines whether the state information meets the locking conditions, and switches the mobile terminal device to a locked state to limit an operation of the operation input section, when the state information is determined to meet the locking conditions.

Terminal Anti-Lost Method and Terminal
20170346939 · 2017-11-30 ·

Embodiments of the present disclosure disclose a terminal anti-lost method and a terminal, to resolve a problem that a lost terminal is difficult to find when a user discovers in a timely manner that the terminal is lost. The method in the embodiments of the present disclosure includes: first detecting, by the terminal when receiving a specific instruction, whether the terminal is currently in a lock screen state, where the specific instruction represents an instruction of controlling the terminal to decrease volume and/or an instruction of preventing the terminal from receiving a carrier signal; and skipping executing, by the terminal, the instruction when it is determined that the terminal is in the lock screen state, and controlling the terminal to increase the volume and/or play an alarm tone by using a loudspeaker.

Method of executing function of electronic device and electronic device using same
09830499 · 2017-11-28 · ·

Disclosed is a method of performing a function of an electronic device. The method includes: detecting a first hovering object in proximity to the electronic device; measuring a first coordinate of at least one point included on a surface of the first hovering object based on detection of the first hovering object; generating first shape information on the first hovering object based on the first coordinate; and setting a function to be executed in accordance with the first shape information.

Method and apparatus for transreceiving privacy information
09826396 · 2017-11-21 · ·

A method and an apparatus for transmitting and receiving privacy information are disclosed. The method includes transmitting a connection (ATTACH) message including a terminal type indication, privacy type, privacy indication, and transmission period, receiving a connection complete (ATTACH ACCEPT) message; and transmitting location information. According to the embodiments of the present invention, the method and the apparatus for transmitting and receiving privacy information can provide an adequate protection for the privacy information in a terminal.

System and method for providing service using terminal scanning device, terminal scanning device applied to same, and operation method of terminal scanning device
09826383 · 2017-11-21 · ·

Disclosed are a system and a method for providing a service using a terminal scanning device. When the terminal scanning device scans for a terminal located within a particular range, executes a particular application pre-installed in a terminal found through the scanning, and provides user information of the found terminal to a service server, the found terminal receives a particular service related to the user information from the service server through a link with the particular application executed by the terminal scanning device. Therefore, necessary information can be automatically provided to the terminal when the terminal approaches a particular place such as a shop or a building without a continuous scanning operation.

Spatial physical layer security in wireless communication systems

Certain aspects of the present disclosure provide techniques for wireless communication by a first wireless device. The first wireless device may participate in a beam forming procedure with a second wireless device to evaluate a plurality of transmit (TX) and receive (RX) beam pairs. The first wireless device may select one of the TX and RX beam pairs based on the evaluation. The first wireless device may determine at least one cryptographic key based on channel parameters associated with a selected one of the TX and RX beam pairs. The first wireless device may use the at least one cryptographic key for communications with the second wireless device.

Identifier-based access control in mobile networks
11265699 · 2022-03-01 · ·

A network terminal, e.g., LTE or 5G, can connect to a home network via a serving network. The terminal can have a terminal identifier (TID), such as an IMEI or other PEI, and a network subscriber can have a subscriber identifier (SID), such as an IMSI or other SUPI. In some nonlimiting examples, a network node can determine that a SID and a TID are authorized for joint use and, in response, transmit authorization information. In some nonlimiting examples, a network node can receive an attach request having verification data and encrypted identification data. The network node can receive decrypted identity data and determine that the identity data corresponds with the verification data. In some nonlimiting examples, the terminal can send an attach request comprising encrypted SID and TID data, and a cryptographic hash, to a network node.

Wireless device and computer readable medium for storing a message in a wireless device

Embodiments of the disclosure include a wireless device and a computer readable medium with programmable instructions which when executed cause a processor of the wireless device to securely store a message. The device and computer readable medium are configured to receive a message at the device, filter the message according to at least one predetermined criteria, encrypt the message if the message includes at least the one predetermined criteria, and store the encrypted message in the wireless device.

Wireless device and computer readable medium for storing a message in a wireless device

Embodiments of the disclosure include a wireless device and a computer readable medium with programmable instructions which when executed cause a processor of the wireless device to securely store a message. The device and computer readable medium are configured to receive a message at the device, filter the message according to at least one predetermined criteria, encrypt the message if the message includes at least the one predetermined criteria, and store the encrypted message in the wireless device.

Method and apparatus for vehicle message recall

A system includes a processor configured to receive a request for publication of a message to a vehicle. The processor is further configured to determine if the message has a time-sensitive indicia, defining an expiration time, affiliated therewith. Also, the processor is configured to deliver messages having time-sensitive indicia to a time-sensitive inbox. The processor is additionally configured to remove messages from the time sensitive inbox when a defined expiration time for a given message has passed.