Patent classifications
H04M3/16
Mobile device sharing facilitation methods and systems in a context of plural communication records
Structures and protocols are presented for using or otherwise relating to a first mobile device (a smartphone or tablet computer or wearable device, e.g.) configured to be shared by two or more parties such that a subset of the parties may be addressed selectively (in content directed to such parties, e.g.) in a cost-effective manner.
Long term evolution machine to machine privacy protection
An intelligent decision engine is configured on a mobile device that includes rules and criteria that the engine uses to determine whether to allow the mobile device to engage in M2M communications with an M2M device. The criteria may be based on user groups, location of the mobile device, privacy zones that may or may not include the M2M device, “black” and/or “white” access lists, time of day, traffic on a wireless link to a wireless network, etc. If the communication meets all applicable criteria it is permitted to commence, and if not, it is blocked.
Wireless traffic channel release prevention before update process completion
Embodiments described herein provide systems and methods for preventing release of a wireless traffic channel before update process completion. In a particular embodiment, a method provides establishing a wireless traffic channel between the wireless communication device and a wireless access point of a wireless communication network. The method further provides identifying an event that triggers release of the wireless traffic channel by the wireless communication device and, upon identifying the event, preventing the release of the wireless traffic channel until a background update process that uses the wireless traffic channel is completed. Upon completion of the background update process, the method provides allowing the release of the wireless traffic channel.
Method and apparatus for accessing network
A method for providing access information for accessing a network device from a first terminal to a second terminal includes obtaining, by a first terminal, access information instructing a second terminal to access the network, the access information including a service set identifier SSID and an access password, selecting a plurality of destination addresses including the access information from a designated multicast address segment, and multicasting a plurality of user datagram protocol (UDP) multicast messages including the plurality of destination addresses to the second terminal.
Apparatus and methods for secure architectures in wireless networks
Apparatus, methods, computer readable media and processors may provide a secure architecture within which a client application on a wireless device may, in some aspects, exchange information securely with resident device resources, and in other aspects, with a remote server over a wireless network.
Mobile device to provide enhanced security based upon contextual sensor inputs
Disclosed is a mobile device to provide enhanced security based upon contextual sensor inputs. The mobile device may include: a biometric sensor; a contextual sensor; and a processor. The processor may be configured to: determine an authentication score based upon a biometric input received from the biometric sensor; modulate the authentication score based upon a contextual sensor input from the contextual sensor related to an event; and determine if the modulated authentication score falls below a predetermined threshold. If the authentication score falls below the predetermined threshold, the processor may command that a secondary authentication be performed or the destruction of a biometric template.
Method for implementing SIM card function on terminal, terminal, and UICC
The present invention discloses a method for implementing a SIM card function on a terminal, a terminal and a UICC. The method includes: downloading information for implementing the SIM card function; writing the information for implementing the SIM card function into a reserved storage space of the terminal; and after the SIM card is activated, authenticating an access identity of a terminal user by using the information for implementing the SIM card function. In the present invention, the information for implementing the SIM card function is downloaded to the terminal, so as to implement the SIM card function by means of software.
Monitoring of signalling traffic
Signalling messages may be monitored in a telecommunications network by receiving an indication of a signalling message for a network entity of the telecommunications network, the signalling message comprising a signalling dialog identifier. The signalling dialog identifier of the received signalling message is compared with a list of known signalling dialog identifiers relating to the network entity and the signalling message is categorized based on a result of the step of comparing, for example as suspicious. If a number of signalling messages for a network entity of the telecommunications network categorized as suspicious and having a common additional characteristic is at least a threshold value, an alert may be generated.
Mobile electronic device
A mobile electronic device according to an embodiment has an identifier, a determiner, and a permitter. The identifier identifies the operating system of a mobile terminal to which its own device is connected and determines whether the identified operating system is a prescribed operating system. If the identifier determines that the identified operating system is the prescribed operating system, the determiner performs processing to determine whether or not authentication data held in its own device and authentication data held in an authentication data holding device that can communicate via a network match. If the determiner determines that there is a match, the permitter permits data processing using processing data held in a processing data holding device that can communicate via the network.
Blocked device checking in roaming scenarios
In certain cellular communication systems, a roaming communication device may attempt to establish a connection with a visited wireless communication network. Before allowing the connection, the visited network may check to see whether the International Mobile Equipment Identity (IMEI) of the device has been listed in an Equipment Identity Register (EIR) as being blocked, and may refuse the connection if the IMEI is listed as being blocked. In addition, when the home network of the device receives a request to authorize usage of the device, the home network may also check its own EIR to determine whether the IMEI has been blocked. If the IMEI has been blocked in the EIR of the home network, the home network indicates to the visited network that the connection should be refused.