H04M1/68

Computer system hardware validation for virtual communication network elements

A data communication network has computer systems that process virtual network elements during network processing time cycles to forward data communication packets for user data services. The computer systems process hardware-embedded codes during the network processing time cycles to identify the computer systems. A security server validates the computer system identities for the virtual network elements. A database system maintains a distributed data structure that individually associates the data services, the computer systems, the virtual network elements, and the computer system validities. The security server and the database system could be discrete systems or they may be at least partially integrated within the computer systems where they would typically execute during different processing time cycles from the virtual network elements.

Method for synchronizing encryption information between SCell and UE

The present application discloses a method for synchronizing encryption information between a SCell and UE, which includes that: the SCell transmits a COUNT value of RB established for the UE to a PCell; the PCell transmits the COUNT value received from the SCell to the UE; and the PCell receives a COUNT value of RB established on the SCell that is saved by the UE from the UE. Or, the SCell and the UE may directly exchange the COUNT value of RB. By the present application, the security and correctness of data can be ensured.

Communication system
11457387 · 2022-09-27 · ·

A communication system is described in which user plane communication and control plane communication for a particular mobile communication device can be split between a base station that operates a small cell and a macro base station. Appropriate security for the user plane and control plane communications is safeguarded by ensuring that each base station is able to obtain or derive the correct security parameters for protecting the user plane or control plane communication for which it is responsible.

Anti-theft protection method and device for cellular phone

An anti-theft protection method and device for a cellular phone is provided. The method includes: judging whether the cellular phone satisfies a pre-set condition for starting an anti-theft mode, if so, starting the anti-theft mode; and transmitting anti-theft protection information to a designated contact to instruct the designated contact to perform anti-theft processing for the cellular phone. The device comprises a judgment module, a starting module, and a transmission module.

Network locking method and system for wireless terminal
09775043 · 2017-09-26 · ·

The present disclosure provides a network locking method for a wireless terminal, comprising: a front-end network-locking module sends a locking certificate generation request to a wireless terminal, and the wireless terminal generates a locking certificate according to the locking certificate generation request; a back-end network-locking module signs the locking certificate to generate a signed locking certificate; the front-end network-locking module performs communication interaction with the wireless terminal to send the signed locking certificate to the wireless terminal, for the wireless terminal to perform locking operations.

Mobile device sharing facilitation methods and systems in a context of plural communication records

Structures and protocols are presented for using or otherwise relating to a first mobile device (a smartphone or tablet computer or wearable device, e.g.) configured to be shared by two or more parties such that a subset of the parties may be addressed selectively (in content directed to such parties, e.g.) in a cost-effective manner.

Long term evolution machine to machine privacy protection
09774982 · 2017-09-26 · ·

An intelligent decision engine is configured on a mobile device that includes rules and criteria that the engine uses to determine whether to allow the mobile device to engage in M2M communications with an M2M device. The criteria may be based on user groups, location of the mobile device, privacy zones that may or may not include the M2M device, “black” and/or “white” access lists, time of day, traffic on a wireless link to a wireless network, etc. If the communication meets all applicable criteria it is permitted to commence, and if not, it is blocked.

Wireless traffic channel release prevention before update process completion

Embodiments described herein provide systems and methods for preventing release of a wireless traffic channel before update process completion. In a particular embodiment, a method provides establishing a wireless traffic channel between the wireless communication device and a wireless access point of a wireless communication network. The method further provides identifying an event that triggers release of the wireless traffic channel by the wireless communication device and, upon identifying the event, preventing the release of the wireless traffic channel until a background update process that uses the wireless traffic channel is completed. Upon completion of the background update process, the method provides allowing the release of the wireless traffic channel.

Apparatus and methods for secure architectures in wireless networks
09769669 · 2017-09-19 · ·

Apparatus, methods, computer readable media and processors may provide a secure architecture within which a client application on a wireless device may, in some aspects, exchange information securely with resident device resources, and in other aspects, with a remote server over a wireless network.

Method for implementing SIM card function on terminal, terminal, and UICC

The present invention discloses a method for implementing a SIM card function on a terminal, a terminal and a UICC. The method includes: downloading information for implementing the SIM card function; writing the information for implementing the SIM card function into a reserved storage space of the terminal; and after the SIM card is activated, authenticating an access identity of a terminal user by using the information for implementing the SIM card function. In the present invention, the information for implementing the SIM card function is downloaded to the terminal, so as to implement the SIM card function by means of software.