Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Security or fraud prevention

Subclass of:

455 - Telecommunications

455403000 - RADIOTELEPHONE SYSTEM

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
455411000 Privacy, lock-out, or authentication 1955
Entries
DocumentTitleDate
20080200146CELL ACCESS RESTRICTION AND WTRU ACCESS CLASS OPTIMIZATION IN LTE SYSTEM INFORMATION - A method and apparatus for cell access restriction, wherein a new access class (AC) definition including a WTRU barred-bit assignment is assigned during cell subscription. A cell access restriction information element (IE) is then broadcast when an operator is restricting access to a cell. The WTRU then can determine whether a cell is restricted based on a comparison of the cell access restriction IE to the barred-bit definition. A base station (BS) is able to transmit the new cell access restriction IE in a fast-read master information block (MIB).08-21-2008
20080207165LIMITING USE OF ELECTRONIC EQUIPMENT FEATURES BASED ON LOCATION... - A method and apparatus for limiting the use of one or more features and/or applications provided in electronic equipment based on identification information and location information associated with the electronic equipment is disclosed. Upon initiation of an application and/or feature, a request is made to a remote server. The request includes identification information and location information associated with a geographical location of the electronic equipment. A database maintained at the remote server determines whether the user has the necessary privileges to activate the application and/or feature and whether any limits (e.g., digital rights management) should be placed on the content created from the application and/or feature.08-28-2008
20080227432Activating the Unlocking of a Mobile Terminal - The invention concerns a method for activating unlocking of a mobile terminal (TM) to be connected to a radio communication network (RR) and co-operating with a smart card (CP), wherein an unlocking activating indicator stored in a first state in the card is periodically read by an application of the terminal to maintain the terminal locked if the indicator is in the first state. A server (SO) transmits an updating message including a state-changing command to the card via the terminal after a predetermined usage time interval so that an application in the card shifts the unlocking activating indicator into a second state. If the unlocking activating indicator is read in the second state by the terminal application, the latter commands the unlocking of the mobile terminal. The interaction between the terminal as well as providing sufficient revenue to the operator who has sold the terminal09-18-2008
20080274716APPLICATION LOGGING INTERFACE FOR A MOBILE DEVICE - A mobile device, and particularly a wireless device, provides a computing platform upon which third-party (e.g., accessory) applications can execute, increasing features/functions desirable to a user. In order to better serve users of wireless devices, third-party developers of such applications would benefit from information about how their fielded applications are being used. However, creating log packets that can ultimately reach the developers is generally not permissible or enabled by wireless devices due to privacy concerns, safeguards against malicious applications, the environment generally afforded to accessory applications, the limited communication channel (e.g., bandwidth, duration, user expense, etc.), and difficulty in integrating such applications to chipsets tailored for mobile devices, such as cell phones. Authentication of the application and a defined log header prior to deployment coupled a confirming unlock feature on the device allows for log packets of increasing complexity that can be selectively allowed, filtered, and reported by a device.11-06-2008
20080280591Inbound Phone Control - A method, including receiving at a network element, from a first telecommunications enabled device, a control connection request directed to a second telecommunications enabled device, connecting a control connection to the second telecommunications enabled device wherein the control connection is connected without requiring user input at the second telecommunications enabled device to answer the control connection request, and providing access to one or more functionalities of the second telecommunications enabled device to the first telecommunications enabled device through the control connection.11-13-2008
20080293376METHOD AND SYSTEM FOR MANAGING MOBILITY OF AN ACCESS TERMINAL IN A MOBILE COMMUNICATION SYSTEM USING MOBILE IP - A method for managing mobility of an AT in a mobile communication system using Mobile IPv4. The AAA and the AT generate a first key for mutual authentication between the AT and a HA, and the AAA and the AG generate a second key for mutual authentication between the AG and the HA. The AG generates a third key for mutual authentication between the AG and the AT. The AT acquires a CoA that it will use in a foreign network. The AT sends an RRQ message to the AG. The AG verifies the RRQ message received from the AT, using a third authentication key. The AG then sends to the HA an RRQ message. The HA verifies the AT and the AG, and allocates an HoA of the AT. The HA sends an RRP message including the allocated HoA of the AT in response to the RRQ message.11-27-2008
20080299946MOBILE BASED IDENTIFICATION IN SECURITY AND ASSET MANAGEMENT SYSTEMS - This invention relates to using consumer devices, such as mobile telephones, to identify, authenticate, locate and contact users of security and asset management systems. Such consumer devices can be used not only with the security systems but also for other uses. A device is initially registered with the security system. As needed, the device is presented to the system for authentication, enabling a person access to a secure area. In addition, the system can determine the person's location in the secure area and can send information messages to the person as well as notifying the person in case of emergency.12-04-2008
20080305766Communication Device and Method for Setting a Security Configuration for a Communication Device - After a successful determination of an application environment for the communication device, a security configuration is selected from a number of stored security configurations and the communication device configured according to the selected security configuration.12-11-2008
20080305767Communication System, Mobile Station, Switch Apparatus, and Communication Method - A communication system according to the present invention includes: a mobile station 12-11-2008
20080305768Validating User Identity by Cooperation Between Core Network and Access Controller - An identifier, required by a radio access network controller in order to support resource allocation associated with a predetermined condition, is sent from a core network to the radio access network controller independently of the predetermined condition. The identifier is thus available to the radio access network controller for verification of mobile user identity, regardless of whether it is needed to support resource allocation. A radio access network controller can receive an identifier in a communication sent by a core network according to a communication protocol. The radio access network controller terminates the communication protocol to access the communication, and uses the identifier for verification of mobile user identity.12-11-2008
20080318546SECURITY ACTIVATION IN WIRELESS COMMUNICATIONS NETWORKS - Systems and methodologies are described that facilitate security activation within a specified security activation time. Thus, where handover occurs or is initiated within the activation time, security keys can be activated in such a way as to not be substantially affected by the handover. In one example, a handover time can be set to occur beyond the security activation time to ensure the security activation happens first. Additionally, a handover command can comprise security keys that can be activated upon handover in another example. Moreover, in non-real-time contexts, dummy packets can be transmitted to allow timer operability with packet sequence numbering, or security activation times can be substantially ignored by utilizing a verification process.12-25-2008
20080318547COMMUNICATIONS NETWORK - A distributed communications network comprising a plurality of nodes and a plurality of user devices, wherein each node comprises: a communications device for establishing bi-directional wireless communication with at least one user device, a communications device for establishing bi-directional communication with at least one other node; and a data processor in association with a local memory for storing information for presentation to users, and wherein at least one of the nodes further includes a communications device connected to a further communications network, and wherein nodes are grouped into clusters that cooperate with one another such that if a user requests information which is held in the local memory of a node within a cluster then the nodes cooperate to supply that information to the user and if a connection between a user and the further communications network is required, the nodes cooperate to establish it.12-25-2008
20090005004COMMUNICATION DEVICES AND METHOD OF COMMUNICATION - In a portable communications device, information provided by an identification means is used to establish communication between communication means and a second device, such as a point of sale machine, to ensure that the correct portable communications device is connected to the second device where there may be a large number of second devices and a large number of portable communications devices in close proximity.01-01-2009
20090011738Mobile communication apparatus - In order to provide a mobile communication apparatus that is capable of preventing a fraudulent access, via the mobile communication apparatus, to a data communication service intended for a mobile communication apparatus; a mobile communication apparatus 01-08-2009
20090017790SYSTEMS AND METHODS FOR RESTRICTING SERVICE IN MOBILE DEVICES - Systems and methods are described that enable remote restriction of workforce mobile phones, media players, computers and other devices. In particular, systems, apparatus and methods are described that deny or allow connections involving the mobile device based on the content of a preauthorized contact list provided by a business administrator. The connection may be any combination of incoming connection, outgoing connection, voice connection, data connection. The list of preauthorized contacts maybe updated upon receipt of a synchronization command from a business administrator. Access to the list of contacts can be blocked upon receiving a lockdown command from the business administrator. The list of contacts can be destroyed upon receiving a poison pill command from the business administrator. A client is described for controlling use of the mobile device.01-15-2009
20090029675VEHICLE SAFETY DEVICE FOR REDUCING DRIVER DISTRACTIONS - A safety device for automotive vehicles (cars, buses and trucks) or rail locomotives. The device inhibits use of cellular telephones and other communication devices that run the risk of distracting a driver/operator while the vehicle is in motion. Several techniques for inhibiting use are described which can be used individually or in a complementary combinations. In one technique, a rapidly varying signal level is created local to the communication device. The variations exceed the operational limits of the system, thereby inhibiting communications. In another technique, the safety device emits radiation that interferes with the reception of signals by the communication device only within the interior of the vehicle and will not interfere with cell phones or wireless devises outside the automotive vehicle or rail locomotive. As another alternative, masking signals also may be generated to prevent signals sent by the communication device within the vehicle from being intelligible at receiving stations outside the vehicle.01-29-2009
20090042540System and Methodology for Automated Provisioning of New User Accounts - System and methodology are described that allow a new user of a user-operated device (e.g., wireless digital camera, cellular phone, video camera, audio device, or the like) to immediately begin using the features and services of the device without having to first activate a new user account. Thus in the instance where the user-operated device is a newly-acquired wireless digital camera, for example, the user can immediately begin taking and uploading his or her pictures to a photo Web site prior to having to open a user account, or having to perform other cumbersome activation steps. In such a wireless digital camera embodiment, the photo Web site and vendors of either cellular-enabled digital cameras or camera-enabled cellular phones provide user Web accounts based upon the unique ID or phone number belonging to one of these two devices. The user need only bother to “open” his or her account, that is, establish a user name and password, at some subsequent point in time that is convenient for the user (e.g., when the user is first visiting the photo Web site, using a browser, to view the digital photographs he or she previously uploaded). This approach allows users to use his or her newly-acquired device (e.g., immediately take pictures and upload them to an account at a photo Web site) right “out-of-the-box,” all without having to first register or setup a new user account.02-12-2009
20090047928Method and system for using message based security challenge and response questions for multi-factor authentication in mobile access to electronic information - A method for allowing an alleged user to establish using multiple factors of authentication that he or she is in fact the authorized user of an information source. The method uses multiple factor authentication using challenge and response messages containing personal choices of the user which are not known to people other than the authorized user, presenting the challenge questions as enumerated multiple choice questions for ease of use, and imposing time-out restrictions on a session.02-19-2009
20090054033Enhancing Security in a Wireless Network - A method of enhancing security in a wireless mesh communication network operating in a process control environment and including a plurality of wireless network devices includes processing a join request from a wireless device wishing to join the wireless mesh communication network, providing a limited network functionality to the wireless device if the join request is granted, requesting a complete approval of the wireless device; and granting a full network functionality to the wireless device if the complete approval of the wireless device is received.02-26-2009
20090054034Maintaining Mobile Terminal Information for Secure E-Mail Communications - Methods and systems for maintaining mobile terminal information for secure email communications are provided. Information concerning multiple mobile terminals are maintained. Such information may include encryption information and an identifier for each mobile terminal. A service activation code that includes encryption information and an identifier from an authenticated user of the mobile terminal is received. The encryption information may be provided to a connectivity function for use in establishing an encrypted data channel. The established encrypted data channel may then be used to convey e-mail communications to and from the mobile terminal.02-26-2009
20090061819Method and apparatus for controlling access and presence information using ear biometrics - A method and apparatus control the operations of an audio device by obtaining by the audio device biometric information about an ear of a user; identifying the user by processing the biometric information; and controlling the operation of the audio device in response to the identification of the user. Also, a method and apparatus control the operations of an external database by receiving biometric information about the ear of a user from an audio device; identifying the user by processing the biometric information; and transmitting a control message to another system. Further, a method and apparatus control the operations of a telecommunication system by receiving biometric information about an ear of a user from a telecommunication set; identifying the user by processing the biometric information; and controlling the operation of the telecommunication system in response to the identification of the user.03-05-2009
20090075628METHOD AND APPARATUS FOR GENERATING A CRYPTOSYNC - A method and apparatus for generating a cryptosync is disclosed that generates a cryptosync with the desired variability without the overhead in complexity and size of prior cryptosyncs. The cryptosync is generated from a combination of fields including fields relating to the segmentation and reassembly of the data packets at a transmitting terminal and a receiving terminal. The resultant cryptosync does not repeat during the use of a particular security key.03-19-2009
20090088131MOBILE ACCESS IN A DIVERSE ACCESS POINT NETWORK - Facilitating user terminal (UT) access to wireless networks having base stations (BSs) of disparate access types is described herein. In some aspects, BS parameterization is provided to facilitate search and/or access to distinct types of network BSs. For instance, parameters can modify a likelihood of identifying or remaining coupled to restricted access (RA) BSs in a home Node B (HNB) deployment. In other aspects of the subject disclosure, a PLMN ID reserved for HNBs is provided comprising multiple region IDs. Where a UT identifies a home region, HNBs can be given preference over macro BSs. Additionally, the UT can keep track of HNBs and HNB regions that reject access to the UT, and implement a delay time to mitigate rapid signaling to foreign HNBs in a dense HNB deployment. Accordingly, the subject disclosure provides for more efficient UT access in heterogeneous access type networks.04-02-2009
20090093232PROVISIONING COMMUNICATION NODES - Provisioning and access control for communication nodes involves assigning identifiers to sets of nodes where the identifiers may be used to control access to restricted access nodes that provide certain services only to certain defined sets of nodes. In some aspects provisioning a node may involve providing a unique identifier for sets of one or more nodes such as restricted access points and access terminals that are authorized to receive service from the restricted access points. Access control may be provided by operation of a restricted access point and/or a network node. In some aspects, provisioning a node involves providing a preferred roaming list for the node. In some aspects, a node may be provisioned with a preferred roaming list through the use of a bootstrap beacon.04-09-2009
20090098855METHOD AND SYSTEM FOR PROVISIONING COMMUNICATION SERVICE TO A MOBILE COMMUNICATION DEVICE TO RESTRICT USE WHEN OPERATING A VEHICLE - A mobile communication device has communication service restricted when it becomes apparent that the device is in transit. The communication system receives an access control message indicating the device is in transit. The system accesses a mobility access profile stored in a database. The mobility access profile indicates provisioning changes to be made in providing communication service to the mobile communication device while the device is in transit.04-16-2009
20090098856SECURITY SYSTEM AND METHOD FOR A MOBILE PHONE - A security system for a mobile phone is disclosed for securing private information of the mobile phone. The system may set at least two PIN numbers for a super user and a general user, encrypt a phone book system of the mobile phone by setting a security status for each contact in a phone book system of the mobile phone. The system also may start a secure work mode if a user of the mobile phone is a super user and starting a non-secure work mode if the user is a general user of the mobile phone. A security method for a mobile phone is also disclosed.04-16-2009
20090104888Onetime Passwords For Mobile Wallets - A mobile wallet and network system using onetime passwords for authentication is disclosed according to one embodiment of the invention. A onetime password may be generated at a mobile wallet server and transmitted to the mobile device. The onetime password may then be used to authenticate the user of the mobile wallet when completing a transaction. Authentication may require entry of the onetime password and confirmation that the onetime password entered matches the onetime password sent by the mobile wallet server. In other embodiments of the invention, a mobile wallet and a mobile wallet server are in sync and each generate the same onetime password at the same time. These onetime passwords may then be used to authenticate the user of the mobile wallet.04-23-2009
20090104889MAN-IN-THE-MIDDLE DETECTOR AND A METHOD USING IT - A method receives signaling messages by a mobile apparatus at least from one base station of a cellular network, interprets a received signaling message, searches for an anomaly with at least one signaling parameter of the received signaling message from a first base station to a known comparison signaling parameter, gives an alert if the comparison gives an unequal result concerning at least one signaling parameter.04-23-2009
20090104890OPERATION OF CONTROL PROTOCOL DATA UNITS IN PACKET DATA CONVERGENCE PROTOCOL - A method and apparatus reports packet data control protocol (PDCP) status and PDCP resets in a wireless communication, using control PDUs that may have security protection applied by ciphering of the control PDUs. Reliability of the PDCP status and reset messages may be assured by acknowledgment according to an acknowledged mode or to an unacknowledged mode.04-23-2009
20090111423NON-ACCESS STRATUM ARCHITECTURE AND PROTOCOL ENHANCEMENTS FOR LONG TERM EVOLUTION MOBILE UNITS - A method and apparatus performs processing of the non-access stratus (NAS) layer (layer 3) in long term evolution (LTE) wireless transmit/receive units (WTRUs), which allows the NAS protocol layer to route layer 3 messages to the correct NAS entity, and to encode new NAS message types and information elements. A new architecture is presented that enables NAS security. When a NAS message is generated, a determination is made as to whether or not to cipher, de-cipher and/or integrity check the NAS message based on at least one of a protocol discriminator (PD) of the NAS message, an indicator field in a header of the NAS message, the type of the NAS message, a NAS security state variable, and an indication by an upper layer protocol. The NAS security state variable indicates whether NAS security is currently active or not and may comprise one bit.04-30-2009
20090143048METHOD FOR DESTRUCTIVE READOUT OF DATA IN CASE OF MOBILE THEFT - A method for destructively reading out data from a stolen or lost mobile phone. A special switch off feature disables all the services associated with the mobile phone, except for a messaging service and the ability to destructively read out data. A user can retrieve the data stored in the mobile phone from a remote location. Once the data is retrieved, all the data in the mobile phone is erased.06-04-2009
20090163173UNAUTHORIZED CALL ACTIVITY DETECTION IN A CELLULAR COMMUNICATION SYSTEM - A cellular communication system (06-25-2009
20090163174DEVICE AND METHOD FOR DETECTING AND PREVENTING SENSITIVE INFORMATION LEAKAGE FROM PORTABLE TERMINAL - A device and method for detecting and preventing sensitive information leakage from a portable terminal is provided. A device for detecting and preventing leakage of sensitive information from a portable terminal includes a data storage unit that stores data containing sensitive information, an external interface that interfaces the portable terminal with the external, a sensitive information manager that detects and prevents leakage of the sensitive information stored in the data storage unit through the external interface, and a sensitive information leakage detecting and preventing unit that is disposed between the data storage unit and the external interface to detect and prevent the leakage of the sensitive information.06-25-2009
20090170471SECURITY CELLULAR RADIO ACTIVATION AND REGISTRATION VIA SMS - A system and method for activating and registering a security system with a cellular provider using SMS messages is provided. The SMS messages used for activating and registering the security system are generated in a format that is predetermined by the processing station in order to provide a uniform structure for presenting the necessary information required for the specified function, i.e., activation or registration. The use of a uniform structure for the SMS allows the message to be processed entirely by a computer thus reducing cost, delay and error from having the information entered manually by a technician.07-02-2009
20090170472SHARED NETWORK INFRASTRUCTURE - Two or more communications applications are executed on a shared processing platform to process signals received from and transmitted to wireless devices according to a communications protocol, the shared processing platform having shared hardware resources including memory and at least one data processor. A security mechanism is provided to enable each communications application to have independent control of access to data and configuration settings that are private to the communications application. Compatibility of hardware configuration settings associated with different communications applications is determined, and conflicts between hardware configuration settings associated with different communications applications are mediated.07-02-2009
20090197569SYSTEM AND METHOD FOR ENHANCING SECURITY FOR A MOBILE ELECTRONIC DEVICE OPERATED BY A CHILD - To enhance security related to an electronic device used by a child, communications involving the electronic may be monitored. When the child's electronic device receives a call or other form of communication from an unknown device, identification information about the unknown device may be forwarded to an electronic device of a parent or other supervisor. Also, when the child initiates a communication with another device, the electronic device of the parent or other supervisor may receive a notification.08-06-2009
20090197570PAGING AND ACCESS VIA DIFFERENT NODES - Signaling-only access may be established with an access node under certain circumstances such as, for example, upon determining that a node is not authorized for data access at the access node. A node that is not authorized for data access at an access node may still be paged by the access node through the use of signaling-only access. In this way, transmissions by the access node may not interfere with the reception of pages at the node. A first node may be selected for providing paging while a second node is selected for access under certain circumstances such as, for example, upon determining that the second node provides more desirable service than the first node.08-06-2009
20090209230Accessing user interactive electronic communications devices - An accessing system for a user interactive electronic communications device is disclosed. The accessing system comprises a general data interactive zone accessible via a first user input access protocol and a secure data interactive zone accessible via a security user input access protocol. The system does not prompt the user to input the secure user access protocol and so the existence of the secure zone is only revealed when the secure user access protocol is input.08-20-2009
20090209231Method to allow community-identity based communications using mobile phones - An apparatus in one example has: first user equipment having a first set of personal information for use in a community based network, and a second set of personal information for use in a public network; second user equipment having a first set of personal information for use in the community based network, and a second set of personal information for use in the public network; a trusted presence system in an IMS network operatively coupled to the first and second user equipment; and the trusted presence system being structured such that, when the first user equipment is in the community based network places a call to the second user equipment in the public network, the second set of personal information of the second user equipment is withheld from the first user equipment at least during call setup.08-20-2009
20090215430APPARATUS AND METHOD FOR CONTROLLING ACCESS TO NETWORK IN WIRELESS COMMUNICATION SYSTEM - In a wireless communication system, an apparatus and method for managing an uplink communication between a network and a plurality of terminals is achieved by transmitting a response condition parameter from the network to the plurality of terminals subscribing to a multicast service. The parameter is associated with controlling the uplink communication of the plurality of terminals. The terminal then applies the response control parameter to a predetermined test and responds to the network if the terminal determines that it is qualified to respond to the network in response to a result of the predetermined test. The network evaluates whether the parameter needs to be transmitted to the plurality of terminals and whether the parameter needs to be updated based on at least part of responses received by the network.08-27-2009
20090221264STORAGE SYSTEM OF MOBILE TERMINAL AND ACCESS CONTROL METHOD - Provided is a storage system of a mobile terminal and an access control method for more securely preventing unauthorized access to data stored in a storage medium attachable and detachable to and from the mobile terminal. The storage system of the mobile terminal includes the steps of: receiving an SMS message from an OTA server; relaying the SMS message including an access restriction request to request restriction of access to storage data stored in the USIM; and setting the USIM to an access restriction state in which access from the outside to the storage data is restricted based on the access restriction request included in the relayed SMS message.09-03-2009
20090233578Methods and apparatuses for dynamic management of security associations in a wireless network - Methods for dynamic management of security associations in a network are provided. According to one method, a security key management entity determines whether to apply a new security key as an active security key based on an existing active security key. Each of the new security key and the existing active security key are associated with a same home agent, and the existing active security key serves as a basis for an existing security association between the home agent and at least one other network element.09-17-2009
20090239500Maintaining secure communication of a network device - Methods of a network device maintaining secure communication are disclosed. One method includes the device obtaining identification numbers of all other devices the device is communicating with. The device computes a hash function, wherein inputs to the hash function include the identification numbers of the other devices and a secure hardware-stored identification number of the device. The device calculates a session key based on a master key, a random number and the computed hash function.09-24-2009
20090239501COMMUNICATION APPARATUS AND COMPUTER PRODUCT - A communication apparatus includes an executor configured to execute given process, a restrictor configured to restrict the executor from executing the given process, an authenticator configured to perform authentication, a canceller configured to cancel the restriction applied by the restrictor if the authentication by the authenticator has succeeded, a communicator capable of wirelessly communicating with a wireless station, and a time measurer configured to measure time that has elapsed since wireless communication with the wireless station became difficult. If a previously set restriction condition that a state where the wireless communication with the wireless station is difficult continues until the time measured by the time measurer reaches a given value is satisfied, the restrictor restricts execution of the given process.09-24-2009
20090247122SYSTEM FOR MONITORING THE UNAUTHORIZED USE OF A DEVICE - The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.10-01-2009
20090247123Method for Providing Security Services by Using Mobile Terminal Password and Mobile Terminal Thereof - A security service providing method using a mobile terminal password and a mobile terminal thereof. A normal password and an emergency password are stored in a smart card in advance. When a password for using a special service is input by a mobile terminal user, the input password is compared with the normal password and the emergency password. When the input password corresponds to the normal password, a special service requested by the user is provided. When the input password corresponds to the emergency password, a predetermined emergency process is performed. According to the emergency process, an emergency message is transmitted to the outside through a predetermined emergency networking process, predetermined virtual process information is displayed, or an abnormal process message for indicating unavailability of provision of the requested special service is displayed to the mobile terminal. Therefore, security is guaranteed and reliability is provided to the user who uses a special service through a mobile terminal by providing an emergency process performance function to the limited function of the password used for identification and authentication.10-01-2009
20090247124PROVISIONING MOBILE DEVICES BASED ON A CARRIER PROFILE - Systems and methods for provisioning computing devices are provided. Carrier provisioning profiles are distributed to computing devices via an activation service during the provisioning process. The carrier provisioning profiles specify access limitations to certain device resources which may otherwise be available to users of the device.10-01-2009
20090253406SYSTEM FOR MITIGATING THE UNAUTHORIZED USE OF A DEVICE - The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.10-08-2009
20090253407Systems and Methods for Providing Enhanced Voicemail Services - A method for operating a mobile device to set a voicemail password directly from the mobile device includes providing the mobile device with a memory for storing a visual voicemail (VVM) application, an interface for receiving user input to the VVM application, and a transceiver for communication with a VVM system. The VVM application includes an option to create a voicemail password. The method further includes: receiving a selection of the option to create the voicemail password, creating the voicemail password based upon an input of a password string, generating a request that includes instructions to the VVM system to associate the voicemail password with a voicemail account, and transmitting the request to the VVM system.10-08-2009
20090275309SECURITY CAPABILITY NEGOTIATION METHOD, SYSTEM, AND EQUIPMENT - A security capability negotiation method is applicable to perform security capability negotiation during a mobile network handover. The method includes the following processes: a second network receives a handover request sent by a first network; an access network entity of the second network selects a corresponding security capability, or an access network entity and a core network (CN) entity of the second network respectively select a corresponding security capability; the second network sends the selected security capability to a user equipment (UE) via the first network. Moreover, a security capability negotiation system is also provided. Consistent with the provided system and method, it may be unnecessary for the MME to know the security capability of the corresponding eNB in a certain manner during a handover from a 2G/3G network to an LTE network. Meanwhile, during the handover from the LTE network to the 3G network, the SGSN does not need to introduce new requirements.11-05-2009
20090280774Traffic encryption key generation in a wireless communication network - In one embodiment, a traffic encryption key is generated based on a count value associated with a mobile. The count value is indicative of network accesses by a mobile, and the traffic encryption key is for encrypting communication traffic between the mobile and a base station. Generation of the traffic encryption key at a base station may be triggered by receipt of a message indicating that the mobile may handoff to the base station. In this embodiment, the message includes the count value. In another embodiment, the traffic encryption key is generated based on the count value and a key count. The mobile may trigger updating the traffic encryption key by changing the key count, and sending the new key count to the base station in a traffic encryption key update request message.11-12-2009
20090280775Providing Base Station Almanac to Mobile Station - The subject matter disclosed herein relates to a hierarchal base station almanac received at a mobile station.11-12-2009
20090286509RECIPROCAL ADDITION OF ATTRIBUTE FIELDS IN ACCESS CONTROL LISTS AND PROFILES FOR FEMTO CELL COVERAGE MANAGEMENT - System(s) and method(s) provide access management to femto cell service through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). A mechanism for reciprocal addition of access field attributes in access control lists and white list profiles also is provided. The mechanism allows at least in part for a first subscriber to be added to a configured white list of a second subscriber, when the first subscriber configures a new white list, the second subscriber is reciprocally incorporated in the new white list. Such mechanism can be driven and facilitates generation of associations among groups of subscribers that share specific commonalities.11-19-2009
20090286510LOCATION-BASED SERVICES IN A FEMTOCELL NETWORK - System(s) and method(s) are provided to route traffic and signaling between a set of networked femto access points (APs) and enable location-based services. A femto AP in the set of femto APs is functionally linked to a routing platform that manages traffic and signaling, and is functionally connected to a controller component that relays at least part of data and control to a femto network platform. The femto network platform allows access to one or more external networks. Routing platform can exchange signaling with one or more femto APs to enable, at least in part, location-based services based at least in part on identifier(s) for a femto AP, access privileges, or time-of-flight measurements that assess propagation timing between a mobile device and a femto AP. Routing platform can supply timing configuration to enable predetermined spatial resolution of location estimates. Location estimates can be recorded and conveyed to a consumer layer.11-19-2009
20090291668OFFLINE MOBILE RFID EVENT PERSISTENCY AND SYNCHRONIZATION - In various embodiments, RFID events are pre-processes with filtering logic by a mobile interrogator/reader before being inserted into tables of a local relational database on the mobile device when the mobile device cannot otherwise communicate collected events to a centralized data hub. The RFID events are stored in a normalized format that provides a simple, efficient, and standard interface for persisting the RFID events such that local access from applications on the mobile device is provided.11-26-2009
20090305664 METHOD AND APPARATUS FOR ATTEMPTING ACCESS IN WIRELESS COMMUNICATION SYSTEMS - A method and apparatus for processing an AttemptAccess command in a wireless communication system is provided, comprising setting a ProbeSequenceNumber to 1, setting a ProbeNumber to 1, setting a TerminalAccessRetryPersistence value to a TerminalAccessClass number field of an AccessRetryPersistence value and setting a PilotPN value.12-10-2009
20090305665METHOD OF IDENTIFYING A TRANSMITTING DEVICE - An exemplary method of identifying a transmitting device includes receiving a signal. A discrete Fourier transform of at least one portion of the signal produces a plurality of frequencies that indicate at least one unique characteristic of the transmitting device. A determination is made whether the transmitting device is a known device based upon the plurality of frequencies.12-10-2009
20090305666Method for handling roaming of mobile device to restricted area - As a mobile device moves from one location area to another, the mobile device detects the different location identifiers broadcast by the wireless network(s) in those locations areas. The mobile device stores the location identifier for the last location area in which the mobile device was located. By comparing a received location identifier to the stored location identifier, the mobile device determines if the mobile device has entered a new location area. If so, the mobile device sends a location update request. In one embodiment, if the location update request is for a location area to which access by the mobile device is restricted, the network sends a communication to the mobile device that triggers the mobile device to update a location identifier stored at the mobile device to the location identifier for the restricted location area so that the mobile can update the network after entering/selecting a different location area.12-10-2009
20090305667Method and system for mobile identity verification and security - A system and method for mobile identify identification and security over a communications network is provided. The system and method include validation processes which provide for an increasing level of intrusion and/or user interaction.12-10-2009
20090305668METHOD AND SYSTEM FOR PROTECTION AGAINST THE UNAUTHORIZED USE OF A TERMINAL - A method and system for protecting against unauthorized use of a mobile terminal operating with a subscriber identity module (SIM) card is provided. The method for protecting against unauthorized use of a terminal operating with a subscriber identity module (SIM) card compares a secondary version of a temporary identity information stored in a storage unit and a primary version of the temporary identity information stored in the SIM card; sends a message containing a unique identity information to a network when the primary version and the secondary version of the temporary identity information differ from each other; and restricts operation of a function of the terminal when a registration reject message is received in response to the message containing the unique identity information.12-10-2009
20090305669TRANSACTION METHOD BETWEEN TWO SERVERS INCLUDING A PRIOR VALIDATING STEP USING TWO MOBILE TELEPHONES - Before effecting a transaction between two servers, this method sets up a communications channel in a wireless telecommunications network between each server and a mobile terminal. One of the servers sends a signal on its wireless communications channel. That signal is received by the mobile terminal in wireless communication with the server, emitted by the loudspeaker of that mobile terminal, picked up by the microphone of the other mobile terminal, and sent by wireless communication to the other server. If the received signal is validated by one or both of the two servers, the transaction is effected.12-10-2009
20090318114METHOD FOR PAIRING ELECTRONIC EQUIPMENT IN A WIRELESS NETWORK SYSTEM - A method pairs electronic equipment, particularly, in a wireless network system. The method includes: providing first and second wireless electronic equipment to be paired which store a first and a second public key, respectively, and providing a user with a wireless portable electronic device which stores a third public key. Then, the portable electronic device transmits the third public key in turn to the first and second electronic equipment, and receiving from the first and second equipment the first and second public keys, respectively. Moreover, the portable electronic device calculates first and second numbers starting from the first and second public keys, respectively. The same first and second numbers is independently calculated by the first and second electronic equipment, respectively, starting from the third public key and representing secret numbers shared between the portable device and the first and second electronic equipment. Finally, the portable device provides a secure communication key to be transmitted in turn to the first and second equipment through encryption with the first and second secret numbers, respectively.12-24-2009
20100003964INTEGRATION OF SECURE IDENTIFICATION LOGIC INTO CELL PHONE - Presented herein are systems and methods for integrating secure identification logic into cell phones. A registration is received, wherein said registration includes an identifier identifying a mobile terminal. Information is transmitted to the mobile terminal, wherein a password is a function of the information.01-07-2010
20100009656NETWORK ACCESS AUTHENTICATION AND AUTHORIZATION METHOD AND AN AUTHORIZATION KEY UPDATING METHOD - A network access authentication and authorization method includes the steps of: constructing an access and authorization request packet; constructing a certificate authentication request packet, constructing a certificate authentication response packet; constructing an access and authorization response packet; constructing an access and authorization acknowledgement packet. And an authorization key updating method includes the steps of: constructing an access and authorization request packet; constructing an access and authorization response packet; constructing an access and authorization acknowledgement packet. The invention resolves the security problem that a mobile terminal accesses a base station in the wideband wireless multimedia network, and realizes both bi-directional identity authentication of a mobile terminal and a base station and unidirectional identity authentication from a base station to a mobile terminal. The authorization key negotiation calculation is simple, and the key management is simply realized by using message acknowledgement manner. The invention is applied to the wired network and the wireless network, such as the wireless local area network, the wireless metropolitan area network, and the broadband wireless multimedia network etc.01-14-2010
20100015947METHOD FOR SWITCHING A TELEMATICS COMMUNICATION - A method for providing telematics communications is provided comprising: sending an ignition-on message to a switching server by a telematics device, when an ignition is turned on; sending a switching phone list to the telematics device by the switching server; sending to the switching server, by the telematics device, information about a mobile terminal that a driver or passenger selects from the switching phone list and an authentication number that the driver or passenger inputs; and sending a switching setting result to the mobile terminal by the switching server after performing user authentication by using the authentication number and performing switching setting to allow a telephone number assigned to the selected mobile terminal to be switched to that of the telematics device.01-21-2010
20100015948BASE STATION AND MOBILE TERMINAL - To provide a security technique (a base station and a mobile terminal) for easily guarding a building such as a house for an average family or a small office at a low price by using a cellular phone terminal and a small base station (femtocell). A base station (FCL) of a mobile communication system placed in a building includes a communication unit (01-21-2010
20100015949METHOD AND DEVICE TO USE A MOBILE TERMINAL WITH A NEW SUBSCRIPTION - The invention relates to a method and device to use a locked mobile terminal with a new subscription. This method is based on presentation of several IMSI and detection of an IMSI with valid MCC and/or MNC code replaced by another IMSI so that the end-user can use his new SIM card with the locked mobile terminal.01-21-2010
20100041370Preventing Misuse of Random Access Procedure in Wireless Communication System - A method for preventing misuse of a random access procedure including transmitting a random access preamble, receiving a random access response message which includes a random access response that is scrambled using the identity of the random access preamble transmitted by the mobile station, checking that the random access response is in response to the random access preamble transmitted by the mobile station, and decoding the random access response.02-18-2010
20100048167ADJUSTING SECURITY LEVEL OF MOBILE DEVICE BASED ON PRESENCE OR ABSENCE OF OTHER MOBILE DEVICES NEARBY - One embodiment of the present invention provides a method for adjusting security status on a mobile device, the method comprising: collecting security-related contextual information which includes information of nearby mobile devices and/or the geographic location of the intelligent mobile device; evaluating a threat level based on the collected security-related contextual information; invoking a security policy; and adjusting the security status of the mobile device based on the threat level and the security policy.02-25-2010
20100048168Telecommunications Networks - Providing a mobile terminal with system information which enables the terminal to access one of the cells of a cellular telecommunications system includes transmitting from the telecommunications system to all terminals within the cell, including the terminal, a system information indicator that makes available to the terminal system information to provide access to the system. The system information indicator is transmitted on the broadcast channel (BCH). The system information indicator may be a sub-set of the system information conventionally transmitted on the BCH but which is sufficient to allow the mobile terminal to access the network and obtain in the downlink further system information. Alternatively, the information transmitted in the BCH may be a profile index value which directs the mobile terminal to retrieve from a store of the mobile terminal system information pre-stored on the mobile terminal.02-25-2010
20100056104METHOD AND SYSTEM FOR RESTRICTED ACCESS CONFIGURATION OF ACCESS POINT BASE STATIONS - Devices and methods are provided for the controlling access to access point (AP) base stations. In particular, described herein are techniques for the automated configuration of AP base stations for restricted access. For example, the technique may involve receiving a contact list from an access terminal (AT) associated with the AP base station and a network operator. From the received contact list, saved contacts associated with the operator may be identified. The technique may further involve retrieving identifiers for the identified contacts, and generating an allowed user list from the identifiers, which may be used to configure the AP base station for restricted access.03-04-2010
20100062743WIRELESS LOCK - The invention provides for a portable device, a system comprising at least two portable devices and a method according to which at least a first portable device and at least a second portable device can be arranged so that said devices have to be located within a short distance from each other if access to the contents in said first device should remain enabled and/or access to the contents in said second device should remain enabled.03-11-2010
20100069037METHOD AND PROCEDURES FOR PRIORITIZED TRANSMISSION ON CONTENTION CHANNELS - A method and mobile terminal for an improved random access prioritization scheme for Random Access Channel (RACH) transmission is provided by increasing the transmission probability based on remaining access cycles and, whereby the access delay for terminals having less remaining access cycles is decreased by increasing the transmission probability.03-18-2010
20100069038COMMUNICATION SYSTEM AND COMMUNICATION METHOD - To provide a communication system including a mobile terminal which can prevent leak of information even if the mobile terminal is lost and reproduce previously accumulated confidential data without losing newly created and updated confidential data. A mobile terminal includes connection state judging device which detects a line connection state with a server. When the line connection state is a broadband connection, the data is read directly from and written directly into a data storing device of the server. When the line connection state is a narrowband connection, the data is temporarily read out and written into a data storing device of the terminal. When the operation of the mobile terminal is completed or a security operation starting instruction is issued by a user, the updated confidential data is written into the data storing device of the server and then the confidential data is erased from the mobile terminal.03-18-2010
20100069039STORAGE MEDIUM, COMMUNICATION SYSTEM, AND CONTROL DEVICE - Various services relating to cellular phones are integrally provided on a SIM card at the initiative of carriers. A wireless communication function via a reflected-wave transmission system is mounted to a SIM card to allow access to a control interface of a SIM card from an external control device via a wireless communication. The SIM card is provided with a credit function for treating electronic money as well as a SIM function for allowing a carrier to treat subscriber information. Furthermore, a high-capacity of memory card function is added to the SIM card to allow access to the control interface of the memory card from a control device via the reflected-wave transmission system.03-18-2010
20100069040SYSTEM AND METHOD FOR AUTOMATICALLY ALTERING DEVICE FUNCTIONALITY - A system and method for automatically altering device functionality based on the occurrence of certain predetermined conditions. A link may be established between a device and a trusted server to provide an association between various conditions that may be detected at the device and actions that are to be taken on the device. In particular, software traps can be set up and linked to device functionality such that execution of the trap may automatically disable or enable certain device capabilities. Some aspects of the invention are directed to a system and method for remotely setting software traps for detecting software viruses and, upon execution of the traps, several methods for establishing a quarantine on infected devices.03-18-2010
20100075631Mobile communication device - The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices (with cell phones, computers, and ATM's), and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communication with a central processor, another mobile terminal a cell phone, or a pda. The mobile communication device is hands-free being worn on or near the face, and only requires a finger touching for bimodal identity authentication. An audio receiver is compatible with the ear of the user and a microphone transmits words spoken by the user, electronically therethrough. A fingerprint sensor is mounted and positioned within the device. When user authentication is required, the user is prompted to touch the fingerprint sensor, and said fingerprint data is compared with fingerprint images of authorized users. In another aspect of the invention, mobile communication device is an eye-covering, a head covering, or an identification badge including a fingerprint sensor and a processor and is used for wireless authentication of the user.03-25-2010
20100075632MOBILE TERMINAL CAPABLE OF PREVENTING VIRUS INFECTION AND METHOD OF CONTROLLING OPERATION OF THE MOBILE TERMINAL - A method of controlling a mobile terminal, and which includes detecting, via a controller, a suspicious attempt that may have been caused by a virus from the mobile terminal, shutting down the detected attempt, choosing one or more terminals that are associated with the mobile terminal, and notifying, via an alarm unit, said one or more chosen other terminals that the mobile terminal is infected.03-25-2010
20100081413SYSTEM FOR CONTROLLING ACCESS TO A SERVICE, AND CORRESPONDING METHOD, CONTROL DEVICE, AND COMPUTER PROGRAM - The invention relates to a system for controlling access to a service offered by a communications network. According to the invention, such a service is accessible via a plurality of private access stations to the communications network, such as home gateways (HG04-01-2010
20100099379Wireless device content information theft protection system - A wireless device, such as a laptop computer or a cellular phone, may contain confidential information which may be secured by an internal security system. When the device is stolen, the user can provide a portion of a kill code to a wireless service provider. The wireless service provider provides its own portion of the kill code and combines it with the user's supplied code. Then, the service provider may transmit the combined kill code to the wireless device. Upon receipt, the wireless device may erase all confidential information on the device. In other embodiments, it may erase any unlocked block of memory. As still another alternative, the system may also, upon receipt of the combined kill code, disable the operating system.04-22-2010
20100105355METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTION OF AN UNAUTHORIZED SERVICE MESSAGE IN A NETWORK - A method is described for detecting an unauthorized service message in a communications network. The method comprising the steps of: receiving a signaling message associated with a supplementary service (SS) message and/or a unstructured supplementary service data (USSD) message from a first network node, the signaling message comprising identification information of the sender of the SS message and/or USSD message and first location information of the first network node; requesting second location information of the first network node from the a second network node serving the sender of the SS message and/or USSD message; and, comparing the first location information with the second location information in order to determine whether the SS message and/or USSD message is authorized or not.04-29-2010
20100105356Secure mobile communication system - Secure mobile communication system comprises of a mobile communication device having a processor, a RF transceiver to establish mobile voice communication and receive and send text or email messages, an alphanumeric keypad is used for dialing phone numbers or creating text or e-mail messages, the mobile communication device RF transceiver or a receiver is designed to receive RF signals from a vehicle mount RF transmitter or transceiver device, the a vehicle mount RF transmitter or transceiver device transmitting RF coded signals when vehicle ignition is in on position and or when vehicle is in motion.04-29-2010
20100112978METHOD FOR TRANSMITTING AND RECEIVING BROADCAST SERVICE INFORMATION AND USER EQUIPMENT FOR BROADCAST SERVICE - Provided are a method for transmitting and receiving broadcasting service information and a mobile station for a broadcasting service. The method for transmitting broadcasting service information at a base station, includes registering a mobile station in a first cell, wherein the first cell is a cell managed by the base station, receiving vehicle related information from the mobile station mounted on a vehicle, and broadcasting the received vehicle related information to target cells.05-06-2010
20100120396DEVICE INCLUDING AUTHENTICATION GLYPH - A phone used in an authentication process. The phone includes a processor, a display coupled to the processor, and a computer readable medium coupled to the processor. The computer readable medium includes (i) code for displaying a first authentication image including a plurality of image elements including a set of image elements, where the image elements in the set of image elements are located at a first set of positions on a display screen, (ii) code for receiving a first glyph having a first configuration corresponding to the set of image elements from a user while the first authentication image is displayed, (iii) code for displaying a second authentication image including the plurality of image elements including the set of image elements, where the image elements in the set of image elements are located at a second set of positions on the display screen, where the second set of positions is different than the first set of positions, and (iv) code for receiving a second glyph having a second configuration corresponding to the set of image elements from a user while the first authentication image is displayed05-13-2010
20100120397CREATION AND SIGNALLING OF UE LISTS TO SUPPORT FREQUENCY SELECTIVE REPEATER OPERATION - A method of supporting frequency-selective repeaters (eNodeRs) in a wireless telecommunication system. A base station (eNodeB) classifies User Equipments (UEs) into two categories or lists of users: a white list containing UEs that may need the assistance of repeaters, and a black list containing UEs that do not need repeater assistance. The eNodeB transmits one of these two lists to the eNodeRs. The eNodeRs do not amplify resource blocks (RBs) scheduled for black list UEs. Each repeater may decide on its own whether to amplify signals for a non-black list UE by measuring signals from the UE and comparing them with predefined criteria.05-13-2010
20100130164Customer Identification and Authentication Procedure for Online Internet Payments using Mobile Phone - This invention shows a mobile terminal device (05-27-2010
20100130165SYSTEM AND METHOD FOR IDENTITY PROTECTION USING MOBILE DEVICE SIGNALING NETWORK DERIVED LOCATION PATTERN RECOGNITION - A system and method for recognizing patterns in wireless device locations using wireless device location data derived from a communications signaling network is provided. By using wireless network supported signaling operations and messages, location data concerning the whereabouts of wireless devices, and hence wireless device users, may be obtained. The location data derived from the communications signaling network may be statistically analyzed to reveal potential geographic patterns that may indicate meaningful behaviors of the purported users of the wireless devices.05-27-2010
20100136949METHOD OF PROVIDING SECURE, CONFIDENTIAL, CONTACT BETWEEN INDIVIDUALS, AND FOR THUS PROTECTING THE ASSETS AND PROPERTY OF THE INDIVIDUALS - The present invention provides a method for providing secure communication between individuals. The method includes the steps of a provider, assigning to a subscriber a unique identifier, providing the subscriber at least one tag having the unique identifier and contact information for a provider indicated thereon, receiving a communication from a third-party wishing to contact the subscriber, and transmitting the third-party's message to the subscriber associated with the unique identifier.06-03-2010
20100144313METHOD FOR PERFORMING AN AUTHENTICATION OF ENTITIES DURING ESTABLISHMENT OF WIRELESS CALL CONNECTION - Disclosed is the method for establishing a connection between a base station and a terminal so as to transmit and receive data in the E-UMTS (Evolved Universal Mobile Telecommunications System) or LTE (Long-Term Evolution) system, and more particularly, to a method for determining, by each entity, whether to establish a connection by comparing an authentication input value transmitted from a counterpart entity with an authentication input range.06-10-2010
20100151821SYSTEM AND METHOD FOR PROVIDING LOCATION BASED SERVICES AT A SHOPPING FACILITY - Embodiments of the disclosed invention include a system and a method for providing location-based services to consumers of a shopping facility. In one embodiment, a consumer creates a user account, user profile, and registers one or mobile devices. The system monitors for the presence of the registered mobile devices within one or more shopping facilities. The system transmits advertising material corresponding to the user created profile to a detected registered mobile device in response to the registered mobile device being within a specified range of a store associated with the user created profile.06-17-2010
20100151822Security Protocols for Mobile Operator Networks - Security protocols for mobile operator networks are described. In embodiments, mobile communication link is established between a mobile phone and a media content provider via a communication service provider with which the mobile phone is registered for mobile communications, and via at least one roaming node network with which the communication service provider has a roaming service agreement. The media content provider receives a security policy request from the mobile phone to establish a security policy for end-to-end security of the mobile communication link between the media content provider and the mobile phone for data communication security. The media content provider then communicates a security policy response to the mobile phone to establish the security policy for the end-to-end security of the mobile communication link that is adaptable to security restrictions of the roaming node network.06-17-2010
20100159875Telephone Handset Contact List Synchronization - A method comprises a first telephone handset selecting a second telephone handset as an approved contact exchange partner. The first telephone handset and the second telephone handset comprise contact information organized in a database. The first telephone handset establishes a telephone call between the first telephone handset and the second telephone handset. The first telephone handset receives contact update information from the second telephone handset in a first protocol. The first telephone handset synchronizes the contact update information with the contact information of the first telephone handset.06-24-2010
20100159876SYSTEM AND METHOD TO PROVISION A MOBILE DEVICE - A system and method for enabling functions on a primary mobile device from a secondary mobile device are described. The primary mobile device is configured to enable at least selected functions of the mobile communications device if authorization information is received at the primary mobile device at periodic intervals of time. The method comprises: storing at the secondary mobile device the authorization information; establishing a short range direct wireless communications link between the secondary mobile device and the primary mobile device; and periodically transmitting the authorization information to the primary mobile device to enable the at least selected functions of the mobile communications device.06-24-2010
20100167690user terminal for enhanced security in a wireless communications system, and a system for its use - The invention discloses a user terminal (07-01-2010
20100167691WIRELESS HANDSET VEHICLE SAFETY INTERLOCK - A method and device for controlling the operability of a transmitter on a mobile communications device by determining if the mobile communications device is located proximate to an operator's seat of a vehicle. A condition parameter of the mobile communications device may be determined. The transmitter on the mobile communications device may be disabled in response to the mobile communications device being located proximate to an operator's seat of a vehicle and further in response to the determined condition parameter. The transmitter on the mobile communications device may be enabled, in response to determining that the mobile communications device is not located in a restricted location.07-01-2010
20100167692METHODS, SYSTEMS, AND APPARATUS FOR HANDLING SECURE-VOICE-COMMUNICATION SESSIONS - An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed.07-01-2010
20100173606Network-Based Subscriber Calling Restrictions - Methods and systems are provided that enable communication with a wireless device. In one such method, a communication event that is intended for a wireless device is detected and a user account associated with the wireless device is identified. Information associated with the user account is identified and a determination is made as to whether the information permits the communication event to occur. If the determination is that the information does not permit the communication event to occur, the communication event is terminated. If the determination is that the information permits the communication event to occur, the communication event is enabled.07-08-2010
20100173607MOBILE COMMUNICATIONS DEVICE WITH SECURITY FEATURES - A mobile communications device for communicating with a wireless network is described. The device includes a processor, a communications sub-system connected to the processor for exchanging signals with the wireless network and with the processor, a user input device connected to the processor for sending user input signals to the processor in response to user inputs. A security module is associated with the processor for automatically taking a security action upon detecting a predetermined security user input through the user input device. The security action can include sending a duress message and/or wiping data stored on the device.07-08-2010
20100173608SAFE APPLICATION DISTRIBUTION AND EXECUTION IN A WIRELESS ENVIRONMENT - The present invention provides safe and secure application distribution and execution by providing systems and methods that test an application to ensure that it satisfies predetermined criteria associated with the environment in which it will execute. Furthermore, by using rules and permission lists, application removal, and a modification detection technique, such as digital signatures, the present invention provides mechanisms to safely distribute and execute tested, or untested, applications by determining whether the application has been modified, determining if it has permission to execute in a given wireless device environment, and removing the application should it be desirable to do so.07-08-2010
20100184405USER PROFILE BASED CONTENT DELIVERY BETWEEN A STANDARD HANDSET AND A FEMTOCELL DEVICE - An access device receives content from a broadband IP network to be communicated to a wireless handset over a radio access network (RAN). The access device acquires a user profile utilized in the radio network for the wireless handset. Based on the acquired user profile, the access device determines transmission parameters utilized for communicating the received content to the wireless handset using an air interface protocol over the radio access network. A security level and/or a security protocol, a transcoding mechanism, and/or transmission bit rate are determined based on the acquired user profile. A resolution, transmission bit rate, coding structure, security protocol and/or security level for transmitting the received content to the wireless handset are adjusted based on the acquired user profile. Alternately, the access device is enabled to receive content from the wireless handset using a transmission profile determined based on user profile of the wireless handset.07-22-2010
20100197269APPARATUS AND METHOD FOR MANAGING SECURE INFORMATION IN A MOBILE TERMINAL - To manage secure information in a mobile terminal, a method for storing the secure information in the mobile terminal includes locating initial bad blocks in a memory of the mobile terminal. A location of a secure block is determined using the locations of the initial bad blocks; and the secure information is stored to a secure block of the determined location.08-05-2010
20100197270TELEPHONE SERVER AND COMPUTER READABLE MEDIUM - The first telephone server may be configured so as to be capable of communicating with a second telephone server with which a first wireless telephone device is registered. The first telephone server may be configured to receive authentication information sent from the first wireless telephone device located within a wireless communication area of the first telephone server. The first telephone server may be configured to send a first command including the authentication information to the second telephone server. The first telephone server may be configured to receive a first response sent in response to the first command from the second telephone server. The first telephone server may be configured to receive a call request, sent from the first wireless telephone device to a second wireless telephone device, by using a wireless communication. The first telephone server may be configured to send the call request to the second wireless telephone device by using the wireless communication without utilizing the second telephone server on a condition that the first response is a positive response and the second wireless telephone device is located within the wireless communication area. The first telephone server may be configured to receive, by means of wireless communication, a second response sent in response to the first command from the second wireless telephone device. The first telephone server may be configured to send the second response to the first wireless telephone device by using the wireless communication.08-05-2010
20100216426User-Customized Mobility Method and System in a Mobile Communication System - An access point to a restricted-access cell of a cellular network detects at least one cell of the cellular network in the vicinity of the cell in which it is located. It sends a server of the cellular network an identifier (RAC08-26-2010
20100216427TRACKING MOBILE COMMUNICATION DEVICES - A mobile telecommunication device that is associated with a mobile telecommunication subscription periodically produces a status report with at least one detail about the mobile telecommunication device and an identification of the subscription associated with the mobile telecommunication device; and sends the status report to a tracking element. The tracking element receives periodical status reports from a set of mobile telecommunication devices, each status report having at least one detail about respective mobile telecommunication device and an identification of the subscription associated with the mobile telecommunication device. The tracking element further monitors the received status reports and determines whether a reporting trigger is met.08-26-2010
20100216428MOBILE COMMUNICATION APPARATUS HAVING ANTI-THEFT AND AUTO-NOTIFICATION FUNCTIONS - A mobile communication apparatus comprises an anti-theft control circuit and a transmission control circuit. The anti-theft control circuit has an information management module and a security module. The information management module is used for storing a user personal database comprising at least one of a phonebook database, a schedule database, and an e-mail database. The transmission control circuit is used for transmitting data and/or signals. When the transmission control circuit receives a remote message, the security module examines whether the remote message is a predetermined legitimate remote control message; wherein if YES, the transmission control circuit sends out at least one record of the phonebook database, the schedule database, and the e-mail database to an electronic apparatus indicated by the remote message.08-26-2010
20100233995SYSTEM AND METHOD OF SELECTIVELY RESTRICTING OPERATIONS OF A MOBILE PHONE IN A TELECOMMUNICATIONS SYSTEM - A system and method of selectively restricting usage of a user equipment (UE) in a telecommunications system. The system includes a graphical user interface (GUI) for receiving a plurality of restrictions. Each restriction provides a constraint on use of the UE. The GUI allows an administrator of the UE to select and modify the restrictions. The system also includes a traffic server for determining if usage of the UE is within one of the restrictions. If the UE is within one of the restrictions, the traffic server terminates the call. The restrictions may include a time of the day, day of the week or geographical location.09-16-2010
20100240342Distributed wireless online access system - A method for providing wireless online access comprises: establishing a wireless access signal space wherein a wireless communications link is established between a secondary wireless unit and at least one primary wireless unit, thereby providing a corresponding secondary subscriber with online access by data packet transmission between the primary wireless unit and the secondary wireless unit; and receiving, from an online access provider, a credited revenue amount in return for providing online access for the secondary subscriber.09-23-2010
20100248687METHODS AND SYSTEMS FOR ENCODING AND DECODING AUDIO SIGNALS - Methods and systems for encoding and decoding audio signals are described. In one embodiment, a first DTMF tone in an audio signal may be identified and decoded. A second DTMF tone in the audio signal may be identified and decoded at a time delay from the first DTMF tone. A requested action is determined for an electronic figurine associated with the first DTMF tone and the second DTMF tone. The second DTMF tone is different than the first DTMF tone. Additional methods and systems are disclosed.09-30-2010
20100261451SECURED DATA TRANSMISSION IN COMMUNICATIONS SYSTEM - A solution for providing a data security service in a wireless communications system (S) is disclosed. In the solution, a first security association (SA10-14-2010
20100267363Methods and Apparatuses Generating a Radio Base Station Key in a Cellular Radio System - In a method and a system for providing secure communication in a cellular radio system radio base station key is generated by determining a set of data bits known to both the UE and the radio base station, and creating the radio base station key in response to the determined set of data.10-21-2010
20100267364Extended hot desking features for multi-device users - The present application provides “hot desking” features for multi-device users. A number of automatic hot desking registrations are provided in which users are assigned multiple devices on a permanent basis. A private branch exchange or central switch can be provided with a list of these devices and can relieve the user of the requirement of registration by detecting use of these devices and assigning user features and other pertinent system properties e.g. as an indication of location for find me/follow me services. The extension allows for automatically hot desking using a listed device, hot desking based on a location associated with a listed device, and hot desking using declared associations of listed devices.10-21-2010
20100279652Remotely Locating and Commanding a Mobile Device - Methods, systems, and apparatus are presented for processing a remote command message. In one aspect, a method includes accessing a subscribed topic hosted on a notification service, the subscribed topic corresponding to a mobile device, retrieving a remote command message included in the subscribed topic that identifies a command to be executed by the mobile device, determining whether the command can be executed by the mobile device, publishing a result message associated with the command, and executing, by the mobile device, the command based on the determining. Publishing the result message further can include identifying in the remote command message a result topic corresponding to the notification service and publishing the result message to the identified result topic. Additionally, the subscribed topic can be uniquely associated with the mobile device.11-04-2010
20100279653MULTI-TIER AND SECURE SERVICE WIRELESS COMMUNICATIONS NETWORKS - The present invention pertains to improved communication quality and security of transmission in cellular communication networks. A customer has the option to pay different fees for different tiers of service relating to voice quality, bandwidth access, and different tiers of service relating to communications security. Higher tiers may guarantee a specific vocoder or bit rate is used, or guarantee a specific encryption protocol is use to ensure secure communications. Different tiers may be associated with customers' records for billing purposes. The network may afford high end devices higher voice quality and/or security via a lookup table indicating what level of service is associated with a given device. Calling or receiving devices may negotiate with each other to change to a more robust vocoder or bit rate to ensure a higher quality and/or security. Furthermore, the user may opt to change the quality and/or security level before or during a call.11-04-2010
20100279654Apparatus and Method of Handling Simultaneous Universal Terrestrial Radio Access Network Radio Resource Control Procedures Which Change the Security Configuration in a Universal Mobile Telecommunications System User Equipment - The details of an apparatus and method of handling simultaneous universal terrestrial radio access network radio resource control procedures which change the security configuration in a universal mobile telecommunications system user equipment are disclosed herein. According to one aspect of the present application, there is provided a user equipment apparatus having a message handler, a sequential processor, a command store, and a security configuration change detector, wherein said message handler is coupled to said command store, is coupled to said sequential processor, and is coupled to said security configuration change detector to save, process, and detect configuration changes in commands respectively, and to determine if there is an existing command at the user equipment, such that the user equipment appears to the UTRAN as though it were processing commands simultaneously. According to another aspect, there is provided a method of processing simultaneous commands at a user equipment having a security configuration, including the steps of: determining if there is an existing command at the user equipment; upon reception of a received command: suspending the existing command processing; determining if commands contain a security configuration change; and either rejecting the received command; or saving the received command prior to resuming the existing command; such that the user equipment appears to the UTRAN to be processing commands simultaneously.11-04-2010
20100291895SWITCHING FUNCTIONS FOR MOBILE PAYMENTS SYSTEM - A method includes receiving an information translation request, where the request is for translation of an account holder's mobile telephone number into the account holder's payment card account number. The request is related to a purchase transaction. A database is accessed to identify the account holder's service provider and a transaction acceptance request is transmitted to the service provider. The service provider provides an indication that the account holder has accepted the transaction, and the account holder's mobile telephone number is then translated into the payment card account number, which is then transmitted in response to the information translation request.11-18-2010
20100291896METHOD, SYSTEM AND TRUSTED SERVICE MANAGER FOR SECURELY TRANSMITTING AN APPLICATION TO A MOBILE PHONE - A Trusted Service Manager (TSM) receives via a first communication channel from a Service Provider (SP) a request (REQ(MIA)) that contains an application (MIA) together with a unique identifier of a mobile phone (MOB), particularly its telephone number. The mobile phone (MOB) is equipped with a memory device (MIF) that comprises multiple memory sectors being protected by sector keys. Preferably the memory device (MIF) is a MIFARE device. The TSM extracts the application (MIA) and the unique identifier from the received request, assigns destination sector(s) and associated sector key(s) of the memory device (MIF), compiles the application (MIA), the sector key(s) and the sector number(s) of the destination sector(s) into a setup-message (SU(MIA)), encrypts the setup-message and transmits it to either the mobile phone via a second communication channel or the Service Provider via the first communication channel (CN). If the setup-message (SU(MIA)) is transmitted to the Service Provider, the Service Provider sends it over the second communication channel to the mobile phone.11-18-2010
20100291897SYSTEM AND METHOD FOR FEMTO COVERAGE IN A WIRELESS NETWORK - Systems and methods are disclosed that provide femto-based wireless coverage in a communication network. This can involve providing an interworking function that communications with a femto base station or femto cell to provide connectivity to the core network. The interworking function can provide service and mobility management where a femto cell (such as a home node B (HNB)) is served concurrently by an IMS core and a legacy core. The interworking function can also provide service through a femto cell to a variety of mobile nodes such as legacy devices and IMS capable devices. The interworking function also provides the ability for handoffs to occur between the core networks and between a femto cell and a macro cell.11-18-2010
20100304712FEMTO CELL SERVICE DELIVERY PLATFORM USAGE COMPLIANCE - Embodiments of the disclosed invention include an apparatus, method, and computer program product for managing cellular usage in controlled areas. For example, in one embodiment, a cellular monitoring system communicates with one or more femto cells located within a controlled area for detecting the presence of unauthorized cellular devices or for monitoring the usage of cellular devices within the controlled area.12-02-2010
20100311390Mobile communication device - The mobile communication device is for use as a cell phone, as a wireless identity authentication device with other electronic devices (with cell phones, computers, and ATM's), and as a headset in the form of an earphone, an eye-covering, or a head covering for audio communication with a central processor, another mobile terminal a cell phone, or a pda. The mobile communication device is hands-free being worn on or near the face, and only requires a finger touching for bimodal identity authentication. An audio receiver is compatible with the ear of the user and a microphone transmits words spoken by the user, electronically therethrough. A fingerprint sensor is mounted and positioned within the device. When user authentication is required, the user is prompted to touch the fingerprint sensor, and said fingerprint data is compared with fingerprint images of authorized users. In another aspect of the invention, mobile communication device is an eye-covering, a head covering, or an identification badge including a fingerprint sensor and a processor and is used for wireless authentication of the user.12-09-2010
20100317319Providing Trusted Communication - Electronic communication is susceptible to SPAM, phishing attacks, and other unwanted communications because of a recipient's limited control over communication transmitted by a sender. Functionality can be implemented to employ a multi-level approach to establishing trust between a sender and a recipient prior to transmitting any communication to prevent unwanted content from being transmitted to a recipient. Initial levels of trust may be established by requiring the sender to provide trust establishment information about the recipient. Based on the validity and percent accuracy of the provided trust establishment information, the communication may be discarded or transmitted to the recipient. A final level of trust depends on the approval of a trust validation request sent to the recipient on behalf of the sender. Such a system configured to provide trusted communication can reduce the probability of the recipient receiving large scale SPAM, phishing attacks, telemarketing calls, and other unwanted communication.12-16-2010
20100317320METHOD AND APPARATUS FOR PREVENTING UNAUTHORIZED USE OF COMPUTING DEVICES - Methods and devices for preventing unauthorized use of mobile devices allow users to create a mobile device identification number (MDIN) which must be entered before mobile devices can access a new removable memory unit. Upon activation a mobile device may check an identifier of an installed removable memory unit to determine if the memory unit has been changed. If the mobile device determines that the memory unit is new, it may prompt the user to enter the MDIN. If the entry made by the user matches the MDIN stored in secure memory, the mobile device will access the new memory unit and function normally. However, if the entry does not match the MDIN stored in memory the mobile device may not access the new memory unit, thereby denying use of the mobile device. Example removable memory units include Subscriber Identity Modules, Universal Integrated Circuit Cards, and Removable User Identity Modules.12-16-2010
20100317321SELECTIVE FIRST DELIVERY ATTEMPT (FDA) PROCESSING FOR TEXT MESSAGES - Systems and methods are disclosed for selectively applying First Delivery Attempt (FDA) processing for text messages. A text message system in one embodiment includes a rules database that stores rules defining which text messages are authorized to be delivered using FDA processing. The text message system further includes a message processor that initially receives a text message, and determines whether to selectively apply FDA processing for a time period due to an occurrence of a triggering event. If selective FDA processing applies, then the message processor processes the rules in the rules database to determine whether the text message is authorized for FDA processing during the time period of selective FDA processing. If authorized, then the message processor forwards the text message to an FDA system for FDA processing. If not authorized, then the message processor forwards the text message to a store-and-forward system for store-and-forward processing.12-16-2010
20100317322System And Method For Facilitating The Growth Of A Mobile Community - A system and method for automatically matching a plurality of mobile subscribers is disclosed. The system includes at least one server for receiving from each mobile subscriber within the plurality of mobile subscribers a contact list. Said server is adapted to process the contact list to produce a set of normalised contact information for each subscriber in the system; compare the set normalised contact information for a selected subscriber with a subscriber network identification assigned to each subscriber with the system; identify subscriber network identifications that match entries contained in the set normalised contact information of said selected subscriber; compile a listing of the matched subscriber network identifications; and forward an invite to each subscriber within the listing of matched subscriber network identifications.12-16-2010
20100323662Communicating Cell Restriction Status Information between Radio Access Network Nodes - A cellular radio communications network includes a core network coupled to a radio access network (RAN) that has multiple RAN nodes for communication with mobile radio terminals. Each of the multiple RAN nodes serves one or more cells. At least one cell associated with a first RAN node is in a restricted or reserved access state in which access to the one cell is restricted for at least some mobile radio terminals. The first RAN node sends a message to a second RAN node to inform the second RAN node of that restricted access cell. The fact that the restricted status of the one cell has changed is detected. A global message tha is not related to a specific mobile terminal is generated that includes information that the restricted status of the one cell has changed. The first RAN node sends the global message to the second RAN node to inform the second RAN node of the change in the restricted status of the one cell.12-23-2010
20100323663Method and User Equipment in a Communication Network - The invention relates to a user equipment (12-23-2010
20100330958MOBILE COMMUNICATION DEVICE AND METHOD FOR DISABLING APPLICATIONS - A mobile communication device (12-30-2010
20100330959Method for Updating UE Capability Information in a Mobile Telecommunications Network - The present invention relates to methods and arrangements for handling UE capability information a mobile telecommunications network wherein an eNodeB (12-30-2010
20100330960SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR THIRD PARTY MONITORING AND CONTROL OF CALLS - Methods, systems, and computer readable media for third party monitoring and control of calls are disclosed. For example, a method performed at a signaling node includes receiving a signaling message indicating an attempted call communication to a called party device from a calling party device and determining if the called party device is subscribed to a call monitoring service. In response to determining that the called party device is subscribed to the call monitoring service, sending a notification message to a monitoring third party device associated with the called party device, wherein the notification message indicates the attempted call communication between the monitored called party device and the calling party device. The method further includes receiving a response to the notification message from the third party device, and determining whether or not to allow the attempted communication to proceed between the monitored called party device and calling party device based on the response from the monitoring third party device.12-30-2010
20110003580TELECOMMUNICATIONS DEVICE SECURITY - A terminal (01-06-2011
20110003581METHOD AND SYSTEM OF PROVIDING PERSONAL INFORMATION CONTROL SERVICE FOR MOBILE COMMUNICATION TERMINAL - A method and system for providing a personal information control service for a mobile communication terminal are disclosed. The method for providing personal information control service for a mobile communication terminal includes: transmitting, by a service client, a loss registration control command to a service operating system; notifying, by the service operating system, that a mobile communication terminal of a user has been lost by using one of a method of transmitting a particular form of loss control message to the user mobile communication terminal and a method of originating a call using a particular origination number to the user mobile communication terminal in response to the loss registration control command; and activating, by a control agent provided in the user mobile communication terminal, a service function of the control agent to protect personal information of the mobile communication terminal based on the notification about the loss. When the mobile communication terminal is lost, it can be controlled by transmitting a particular form of message or originating a call using a particular origination number.01-06-2011
20110009090CELLULAR PHONE WITH BOUNDARY ALARM - A method and apparatus to provide an automatic alarm for a cell phone. A user of the cell phone can set a safe zone, which is a geographic area centered at a particular location with a circular boundary of a preset radius. If the cell phone is removed outside of this radius, the cell phone is presumably stolen, and thus an audible alarm on the cell phone can be triggered.01-13-2011
20110009091PORTABLE TERMINAL HAVING MOUNTED IC CHIP, APPLICATION AREA CONTROL METHOD, AND APPLICATION AREA CONTROL PROGRAM - A portable terminal in which an application area in a contactless IC chip can be shared by a plurality of users. The portable terminal is provided with the IC chip that has a contactless communication function enabling use of a plurality of services. In addition, the portable terminal is provided with an application area information storage unit that stores application area information for associating users, application identifiers for identifying applications corresponding to services to be used, and plural application areas provided in the IC chip; and an application area control unit that puts into a useable state an application area of a user corresponding to the identification information in the IC chip, based on the application area information and the identification information for identifying the users, read from a loaded storage medium; wherein the plurality of services that use the contactless communication function can be used by each user.01-13-2011
20110014894CONTROLLING THE USE OF ACCESS POINTS IN A TELECOMMUNICATIONS NETWORK - A GSM or UMTS mobile telecommunications network is disclosed. In addition to the conventional radio access network comprising the base stations, one or more additional access points are provided. An access point is connected to the network core by an IP transport broadband connection. The access point is configured to appear to the mobile terminal as a conventional base station—that is, it communicates with the mobile terminal using GSM or UMTS transport protocols and does not require any modification to a standard GSM or UMTS mobile terminal. Access Points are typically not under the direct control of the network provider. Arrangements are disclosed which allow the network provider to verify that the access point a mobile terminal is about to commence communicating through is at a particular location. Differential charging may be performed in dependence upon a subscriber's location.01-20-2011
20110014895METHOD FOR EXCHANGING DATA BETWEEN A MOBILE TELEPHONE AND A FIXED LINE TELEPHONE - The invention relates to a method for exchanging data between a mobile telephone and a fixed line telephone. According to the invention, a mobile telephone equipped with Near Field Communication (NFC) technology and a fixed line telephone that is also equipped with NFC technology are initially placed in a reception range, subsequently the mobile telephone and the fixed line telephone are coupled by means of the NFC technology, and then data is transmitted between the mobile telephone and the fixed line telephone by means of the NFC technology. Said coupling occurs when the mobile telephone and the fixed line telephone are authenticated, and two different NFC technologies are used for the authentication of the mobile telephone and the fixed line telephone, and the subsequent transmission of data.01-20-2011
20110021174METHOD AND APPARATUS FOR AUTOMATICALLY DAMAGING CIRCUITRY OF A MOBILE DEVICE WHEN ONE OR MORE CONDITIONS ARE DETECTED - A mobile device is configured with electrical circuitry that causes the transmit channel electrical circuitry of the transmitter (Tx) of the mobile device to be electrically coupled to the receive channel electrical circuitry of the receiver (Rx) of the mobile device when one or more predetermined conditions occur. The electrical coupling of the transmit channel circuitry to the receive channel circuitry causes the Rx to be sufficiently damaged to render the mobile device nonoperational, thereby preventing further use of the mobile device. The one or more predetermined conditions correspond to conditions that indicate the mobile device has been lost or stolen and/or that an unauthorized user is attempting to use the mobile device in some manner.01-27-2011
20110021175CONFIGURATION WITH THE PAYMENT BUTTON IN THE MOBILE COMMUNICATION DEVICE, THE WAY THE PAYMENT PROCESS IS STARTED - On the interface side (01-27-2011
20110034147ROUTING MOBILE USERS TO SECURE LOCATIONS BASED ON TRANSACTION TYPE - Systems and methods are disclosed for routing mobile users to safe, or secure, locations. In one embodiment, based on threat information obtained from one or more source, a threat level is determined for a location of a user of a mobile device. The threat level is indicative of physical safety and/or network safety at the location of the user of the mobile device. The threat level may be a function of a transaction type of a transaction being performed or desired to be performed by the user of the mobile device. If the location is unsafe, a safe location is identified, and the user of the mobile device is routed to the safe location.02-10-2011
20110034148APPARATUS AND METHOD FOR DETECTING COMMUNICATION OPERATION RESULTED FROM AN ERRONEOUS CONTENT IN MOBILE PLATFORM - Disclosed are an apparatus and a method for detecting whether a content executed in a mobile platform of mobile communication terminal perform a communication operation without a user's reservation or permission, thereby preventing an unexpected communication operation. In this invention, if a content performs the communication operation due to its malfunction by a computer virus or a program error, the communication operation, such as voice calling or message transmission to unspecified communication terminal or access to arbitrary wireless internet server, is detected and interrupted. With the interruption of the unexpected communication operation, the user's damage, such as the payment of charges for communication services, is previously prevented. In case of the interruption of the communication operation, the user is informed of the erroneous content and the performed communication operation so that the user selects the corresponding contents to be deleted or preserved.02-10-2011
20110039519Mobile Banking - Systems and methods are disclosed for identifying circumstances where end-to-end security is not available to a mobile banking customer. The user may be alerted/warned or restricted from accessing some banking services through his/her WAP-enabled mobile device if the server (e.g., bank server) determines that end-to-end security is not available. In some instances, the bank server may access a computer data file containing a list of known end-to-end secure devices and gateways to verify the integrity of the data communication. The server may verify the integrity of the data communication using loose matching.02-17-2011
20110053557KEY CONTROL WITH REAL TIME COMMUNICATIONS TO REMOTE LOCATIONS - A key control system includes at least one premise, a lockbox capable of securing a key to the premise and at least one mobile telephone associated with a user and having a stored access device program capable of communicating an access request to the lockbox. The premise is subject to authorized access by others, such as the user, based on preferences of an approval party established with the system. If specified by these preferences, the mobile telephone automatically initiates a communication to a selected destination to request approval of the access request.03-03-2011
20110059723Mobile Terminal - A mobile terminal used in a wireless communication system includes a first base station group for which base station information is advertised to the mobile terminal, a second base station group for which the base station information is not advertised to the mobile terminal, the mobile terminal being able to access each base station in the first base station group and a specified base station in the second base station group. The mobile terminal includes a unit to receive location information, and a unit to execute base station detection processing regarding the first base station group and the second base station group when the location information is associated with the specified base station, and to execute the base station detection processing regarding the first base station group while restricting the base station detection processing regarding the second base station group when the location information is not associated with the specified base station.03-10-2011
20110065417METHOD AND APPARATUS TO CONTROL THE USE OF APPLICATIONS ON HANDHELD DEVICES BASED ON NETWORK SERVICE - A method and apparatus to control the use of applications on handheld device is based on network service, the method comprising the steps of: receiving a network identifier; correlating the network identifier with application and/or feature limitations stored on the mobile device; and limiting application usage based on the results of such correlating step.03-17-2011
20110070863METHOD AND APPARATUS FOR INCREMENTALLY DETERMINING LOCATION CONTEXT - Techniques to derive or predict location context for a user of a mobile device include receiving signal data that indicates a set of one or more distinct signal sources from which signals are received at the mobile device for each of multiple different times. The method further comprises determining whether the mobile device is moving outside a specified area at a current time based on the signal data. The method further comprises incrementing a count for a stationary state associated with the set of one or more distinct signal sources at the current time, if the mobile device is determined to be not moving outside the specified area. The method also comprises delivering a service to the mobile device based on the stationary state.03-24-2011
20110081886SYSTEMS AND METHODS FOR COMMUNICATION PROTECTION - A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are not used for identification and authorization during communication between the mobile unit and a base station. Instead, a set of private identifiers is determined and is known only to the phone company and the base stations controlling the mobile phone calls. These private identifiers allow dynamic and continual updating of the mobile phone and base station directories with current valid identifiers that are used for communication between the devices.04-07-2011
20110081887Apparatus and Method for Handling a Connection Reject Message - There is provided a method, in a wireless communications device, the method comprising: receiving from a first RAT a reject message, the reject message indicating a period of time; camping on a cell of a second RAT; disallowing camping on a cell of the first RAT unless at least one of the following criteria are met: the period of time has elapsed; and the wireless communications device receives a further message indicating that the first RAT has confirmed it will accept a connection from the wireless communications device.04-07-2011
20110086612NETWORK ACCESS CONTROL - According to one embodiment of the present invention, there is provided a method of authorizing a communication device to connect to a network. The method comprises receiving, at a processor, a communication device identifier and a subscriber identifier, determining, by the processor, whether the received communication device identifier is associated with the received subscriber identifier in a data store. Where it is determined that the received identifiers are not so associated the method further comprise requesting, by the processor, a security token associated with the communication device, receiving, at the processor, a security token, determining, by the processor, whether the received security token matches a stored security token associated with the received communication device identifier in the data store, and where it is so determined, authorizing the communication device to connect to the network.04-14-2011
20110086613MANAGEMENT OF ACCESS TO ENTRY POINTS ON A COMMUNICATION DEVICE - A system and method for managing access to entry points in a graphical user interface on a communication device are provided. The entry points are associated with services such as message services and are actuatable to invoke a content listing display for viewing content associated with a given service. One entry point provides access to a unified inbox for display of messages received or sent via a plurality of message services. Other entry points provide access to other message services or filtered views of the unified inbox. Access to the various entry points is provided via a user interface displaying one or more user interface elements, such as icons, pointing to the various entry points. Display of the elements is managed so as to hide elements pointing to potentially duplicative views.04-14-2011
20110105078PAGING SIGNAL TRANSMISSION METHOD AND MOBILE STATION FOR THE SAME - A paging signal transmitting method includes a step of allowing each of mobile stations (UE) to receive security data from a network node (05-05-2011
20110111731MOBILE COMMUNICATION METHOD AND SWITCHING CENTER - In a procedure for a mobile station (UE) to perform handover from a cell under the control of a radio base station (NB) of an UTRAN scheme to a cell under the control of a radio base station (eNB) of an E-UTRA scheme, a switching center (MME) of the E-UTRA scheme receives, from and the radio base station (eNB) of the E-UTRA scheme, a handover request acknowledge message including a transparent container including a security algorithm of an AS used in a communication between the mobile station (UE) and the radio base station (eNB) of the E-UTRA scheme; and the switching center (MME) of the E-UTRA scheme transmits, to a switching center (SGSN) of the UTRA scheme, a NAS PDU including the transparent container, a security algorithm of a NAS and a security processing parameter of the NAS.05-12-2011
20110117881METHOD AND APPARATUS FOR THE ACTIVATION OF SERVICES - An approach is provided for presenting an activation indicator to a user. A connection with a mobile device is detected. Retrieval is caused, at least in part, of a unique hardware identifier associated with the mobile device. It is determined that the mobile device is eligible for a service based on the unique hardware identifier. Presentation is caused, at least in part, of a visual indicator of the eligibility for the service based on the determination.05-19-2011
20110117882Systems and Methods for Retrieving Voicemail Account Information - A provisioning system configured to retrieve a voicemail password and/or a pilot number for a voicemail account, create a first service request directed to an over-the-air system, and send the first service request to the over-the-air system, if the provisioning system determines that the voicemail account has been initialized. The first service request instructs the over-the-air system to format a first message including the voicemail password and/or the pilot number for delivery to a mobile device. The provisioning system is further configured to create a second service request directed to the over-the-air system and send the second service request to the over-the-air system, if the provisioning system determines that the voicemail account has not been initialized. The second service request instructs the over-the-air system to format a second message including a default voicemail password and/or a default pilot number for delivery to the mobile device.05-19-2011
20110124314SYSTEM AND METHOD FOR MANAGING MOBILE TELEPHONES - Disclosed are a system and method for associating a plurality of telephone numbers with a mobile telephone that includes a database of a plurality of telephone numbers linked to a plurality of codes and a mobile telephone network configured and arranged to associate the mobile telephone with a particular telephone number when the network receives the code linked to the particular telephone number.05-26-2011
20110124315SYSTEM AND METHOD FOR MANAGING INDIVIDUAL USE OF A MOBILE TELECOMMUNICATIONS ACCOUNT - Disclosed are a system and method for managing access to a mobile telecommunication account by disabling use of a mobile device associated with a mobile telecommunication account or sub account when the mobile network detects that a restriction contained in a restriction database is violated.05-26-2011
20110124316ENHANCED WIRELESS HANDSET, INCLUDING DIRECT HANDSET-TO-HANDSET COMMUNICATION MODE - A wireless handset is provided with enhanced features and capabilities. The wireless handset may be embodied as a full-featured handset that is capable of operating either within a wireless network (such as a cellular or PCS network) or in a direct handset-to-handset communication mode that is independent of the wireless network. Alternatively, the wireless handset may be embodied as a special purpose handset, that is capable of simply operating in a direct handset-to-handset communication mode. The wireless handset may additionally include features for supporting and enhancing direct communication between handsets. Such features may include a find feature that permits a user to determine which objects, including other wireless handset users, are located within a predetermined operating range of the wireless handset. A memorize feature may also be provided to permit handsets and other objects exchange information by wireless transmission.05-26-2011
20110130115MECHANISMS TO UPDATE A SERVING BASE STATION WITH THE CSG MEMBERSHIPS OF A MOBILE STATION - Mechanisms to update a serving BS with the CSG memberships of a MS are generally presented. In this regard, a base station is introduced including a wired backbone interface to communicate with a plurality of macro base stations and a plurality of femto base stations, and control logic, the control logic to identify one or more femto base station(s) that a mobile station is authorized to access, and the control logic to generate a request for the mobile station to scan for a specific femto base station which the mobile station is authorized to access. Other embodiments are also described and claimed.06-02-2011
20110136469WIRELESS COMMUNICATION DEVICE MANAGEMENT - A method and system that limits the use of a communication device present in an area controlled by an intelligent controller. The intelligent controller detects any present communication devices in the area and conducts an inventory providing information about each detected device. The intelligent controller compares that information to a standard of use data, which specifies the conditions need to be present for allowing the usage of a communication device. If such conditions are not met, the intelligent controller sends commands to the communication device to restrict its functionality. Else if, the intelligent controller is incapable of restricting the communication device, it can notify authorities of unauthorized usage of a communication device in the restricted area.06-09-2011
20110136470METHOD FOR ADMINISTERING THE AUTHORIZATION OF MOBILE TELEPHONES WITHOUT A SIM CARD - The present invention relates to a method for administering the authorization of at least one mobile telephone (06-09-2011
20110143711SYSTEMS AND METHODS TO SECURE TRANSACTIONS VIA MOBILE DEVICES - Systems and methods are provided to improve security of payment transactions via mobile communications. In one aspect, a system includes an interchange having a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats and to communicate with the common format processor in a common format for the confirmation of payment requests, made via mobile phones. The common format processor is to determine a risk of a payment request being fraudulent based on the personal identification information associated with a mobile phone and, after the payment request is confirmed and when the risk is below a threshold, to communicate one or more premium messages to the mobile phone to collect funds to fulfill the payment request.06-16-2011
20110143712Method and Arrangement in a Telecommunication System - Embodiments herein include methods and arrangements for controlling access of mobile devices to a network, such as GSM. The mobile devices belong to an access control class (ACC) and also belong to an additional access control class (EACC) that provides extended access control. The arrangement broadcasts system information to the mobile devices that comprises a first indicator indicating an ACC. The first indicator indicates whether a mobile device is allowed to access or is barred from accessing the network. The system information further comprises a second indicator indicating an EACC. The second indicator indicates whether a mobile device is allowed to access or is limited from accessing the network. Limited access may entail blocking a mobile device from initiating communications with the network, blocking the mobile device from receiving network initiated communications, or both. A mobile device blocked from network initiated communication may not answer a page from the network.06-16-2011
20110151833Apparatus And Method For Detecting A Cloned Base Station - Communications are established between a base station and a mobile unit. The mobile unit analyzes the content of at least some information received from the base station relating to neighboring cells. When the analyzing indicates that the base station is a cloned base station, a warning is initiated to the user.06-23-2011
20110151834Apparatus And Method For Determining An Invalid Base Station - It is determined whether a base station is an invalid base station. At an electronic device at the vehicle, communications are wirelessly received from a base station. It is determined whether the base station is an invalid base station based at least in part upon at least one security parameter included in the received communications.06-23-2011
20110159841SYSTEMS, APPARATUS AND METHODS TO FACILITATE HANDOVER SECURITY - Systems, methods and apparatus for facilitating handover security are provided. In some embodiments, the method can include deriving a key value for handover from a GERAN/UTRAN system to an E-UTRAN system using a first input value. The method can also include deriving a key value for a connection establishment using a second input value, wherein the first input value is different from the second input value and is different from input values derived subsequent to the second input value, and wherein the first input value, the second input value and the input values derived subsequent to the second input value are configured to be input to a same key derivation function configured to output a key for use between a network entity and user equipment.06-30-2011
20110159842Motion-Based Disabling of Messaging On A Wireless Communications Device By Differentiating A Driver From A Passenger - When a wireless communications device is traveling at a speed exceeding a lower threshold but less than an upper threshold, the device is presumed to be traveling in a motor vehicle. In order to inhibit operation of the wireless communication device by a driver without restricting operation by a passenger, access to certain device functions or applications such as e-mail, text messaging, etc. are limited by challenging the user of the device to respond to an ergonomic challenge that requires two-handed user input. Only if two-handed input is received will the wireless communications device grant access to e-mail or instant messaging.06-30-2011
20110171932METHOD AND SYSTEM FOR DISTRIBUTING DATA TO MOBILE DEVICES - Embodiments of the invention are concerned with a method and a system for distributing mobile applications, in particular to aspects of receiving, processing and displaying advertisements on mobile terminals. In one aspect, embodiments provide a software component for controlling movement for an advertisement image on a mobile terminal, the mobile terminal comprising a display area and a processor, the software component comprising processable instructions defining movement of the advertisement image relative to the display area, wherein the instructions are wirelessly transmissible to the mobile terminal and the processor is arranged to process said instructions in order to more the advertisement image.07-14-2011
20110183645RICH PRESENCE STATUS BASED ON LOCATION, ACTIVITY, AVAILABILITY AND TRANSIT STATUS OF A USER - A method and system for determining and sharing rich presence status of a user is presented. Multiple types of presence status options are associated with user's status based on location, activity, availability, transit status, and user's text updates, which the user can selectively share on their mobile device with different groups of users, and make one or more aspects of their presence status broadly available to everyone. Also a system to determine status based on auto-updates and manual updates is presented.07-28-2011
20110189976Paging group network and method for updating mobile station locations - A paging group network includes multiple paging groups formed by areas covered by base stations (BSs). The paging group network further includes an anchor paging controller (PC) and a relay PC. The anchor paging controller initiates a page to a mobile station (MS), addresses the paging group in which the MS is located, and stores status information about the MS in a corresponding location register (LR). The relay PC manages the paging groups. A method for updating MS locations is also provided. Thereby, the present invention optimizes the paging and location updating processes, and reduces the complexity of managing the idle mode.08-04-2011
20110201305METHOD AND SYSTEM FOR ENSURING USER AND/OR DEVICE ANONYMITY FOR LOCATION BASED SERVICES (LBS) - A mobile device may communicate with a location server during location based services (LBS) operations using a secure identifier. The secure identifier abstracts identification information of the mobile device and/or identification information of a user of the mobile device in instances that the mobile device and/or user identification information are deemed protectable from the location server. The location server may be operable to store location data corresponding to the mobile device and/or the user in a location reference database based on the secure identifier. The secure identifier may comprise a unique value, which may be randomly generated. The secure identifier may also be generated based on the mobile device and/or user identification information, by applying, for example, encryption algorithms to the mobile device and/or user identification information. Service providers for the mobile device may retrieve the abstracted mobile device and/or user identification information from the secure identifier.08-18-2011
20110212705SHARING PROFILE DATA BETWEEN TELECOMMUNICATION DEVICES - In an embodiment, a profile server creates a profile that includes profile data and is associated with a first subscriber device. A second subscriber device receives an incoming call from the first subscriber device and queries the profile server for a profile associated with the first subscriber device. The profile server determines that the profile data is authorized for distribution to the second subscriber device, and thereby transmits the profile data in response to the received query and based on the determined authorization.09-01-2011
20110217950Apparatus & method to improve pairing security in Bluetooth.TM. headsets & earbuds - The invention disclosed provides an improved Bluetooth™ system with increased security and privacy for “device association” (“pairing”) of two Bluetooth™ devices where one device has no display. Heretofore, only Secure Simple Pairing (SSP) Association Model “Just Works” is used if one device is display-less. Unfortunately, Just Works is vulnerable to exploits known as “Man-In-The-Middle” (MITM) attacks. By contrast, my invention implements uses Numeric Comparison (heretofore, unusable when one of the pairing devices are display-less). Numeric Comparison is more secure than Just Works, because both agree to a randomly-generated 6-digit number. My innovation allows display-less Bluetooth™ devices (headsets or ear buds) to pair with display-bearing devices, because the matching 6-digit number on the displaying device is “spoken” or sounded (voice recordings, beeps, tones) into a displayless device user's ear. This allows displayless device users to hear sounds (spoken or beeped) equivalent to displayed 6-digit numbers to facilitate comparison, matching, and secure Bluetooth pairing. This reduces or eliminates risk of MITM exploits.09-08-2011
20110223884METHOD AND SYSTEM FOR ENHANCED MESSAGING - Techniques for acquiring, sending, receiving or using status information from a remote location over a network are disclosed. The status information is transmitted over the network between or among electronic devices. The status information can be provided by one or more sensors associated with the electronic device that is transmitting the status information. The status information can be transmitted with messages so as to enhance the messages. The electronic devices include at least computing devices, such as personal computers, personal digital assistants, pagers, and mobile telephones.09-15-2011
20110250866CONDUCTING A MOBILE FINANCIAL TRANSCATION USING A SECURE ELEMENT AND SMS - A method for conducting a mobile financial transaction using an NFC secure element and transmitting data associated with the transaction between a wireless communication and a remote server. The method includes running a mobile application on the wireless communication device, in which the mobile application is a rich client application. The method further includes transmitting data associated with the mobile application between the wireless communication device and the remote server using short message service (SMS). The mobile application links corresponding data transmitted through the short message service (SMS) for use by the mobile application.10-13-2011
20110256844Cell Phone Based Sound Production - A cell phone based sound producing device is a sound producing device that takes advantage of the likelihood that a user is already carrying a cell phone and does not need to also carry an electronic sound producing device. Another advantage is that cell phones are designed to communicate across a communications network. As such, the cell phone based sound producing device can download sounds from a server, store them, and play them. Electronic payment systems for ring tones that are played on a cell phone already exist. These electronic payment systems can be adapted to payment for sound producing device modules and for sounds. Recovery information can be used to restore modules and sounds that are lost due to cell phone breakage or upgrades.10-20-2011
20110256845VERIFYING GEOGRAPHICAL LOCATION OF WIDE AREA NETWORK USERS - A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded. The access code is broadcast in a defined region that includes the purported geographical location of the user. A user access code is then received via the wide area network from the user. The user access code is compared with the access code broadcast in a defined region, and the first network address is compared to a second network address from which the user access code is received. If the codes and addresses match, the geographical location of the user is considered verifies and the user may be validated. Various methods for broadcasting the access code and various systems for implementing the method are disclosed.10-20-2011
20110263221METHOD FOR DETECTING SECURITY ERROR IN MOBILE TELECOMMUNICATIONS SYSTEM AND DEVICE OF MOBILE TELECOMMUNICATIONS - A method and apparatus for detecting a security error at a PDCP layer of an LTE (Long Term Evolution) system, a mobile communication system, are disclosed.10-27-2011
20110263222Apparatus and Method for Implementing a Security Mode Configuration in a Wireless Communication Device - An apparatus and a method for implementing a security mode configuration in a wireless communication device are disclosed.10-27-2011
20110281554EXTENSIBLE DATA DRIVEN MESSAGE VALIDATION - Various exemplary embodiments relate to a method, network component and machine-readable storage medium for validating a message received at a network component. Embodiments may include one or more of the following: receiving a message at the network component, determining a validation scenario, determining a set of validation conditions associated with the determined validation scenario, and determining whether the message passes the validation condition. Various exemplary embodiments may further include extensible condition definitions that include one or more of the following: validation fragments, element validation definitions, and element definitions. Various exemplary embodiments may use XML to define condition definitions.11-17-2011
20110287739MANAGING AUTOMATIC LOG IN TO INTERNET TARGET RESOURCES - A system and a method for managing automatic log in to Internet target resources are disclosed. The system comprises a mobile phone with a storing device to store private identities and a computer with a client browser and a browser plug-in. The browser plug-in is configured to, upon receiving information containing a login form from a target resource being accessed: request a user identifier; and send an identity request to an identification server. Furthermore, the identification server is configured to obtain a phone number associated to the user identifier and send an identity message to the phone. The phone is provided with a client application which looks up the private identities associated to the target resource and sends the selected private identity to the identification server and then to the client browser to log in to the target resource using the selected private identity.11-24-2011
20110287740METHOD AND APPARATUS FOR ASSOCIATING IDENTITY MODULES AND TERMINAL EQUIPMENT - The present invention provides method, apparatus and computer program product for facilitating verification of an identity module, such as associated with a UICC, operatively coupled to a terminal equipment, such as a machine-type communication device. Upon determining that the identity module is in a bonded state, one or more bonding identifiers are read from the identity module and compared with at least a predetermined portion of the terminal equipment identifier, such as an IMEI, stored in the terminal equipment. If at least one of the bonding identifiers corresponds with at least a predetermined portion of the terminal equipment identifier, the identity module and/or the terminal equipment are shifted into predetermined operating conditions. A bonding process may also be performed, whereby the identity module acquires the terminal equipment identifier of currently associated terminal equipment and stores a bonding identifier in identity module memory based thereon.11-24-2011
20110294465System for selectively disabling cell phone text messaging function - A selective cell phone text messaging function disabling system prevents a vehicle occupant from text messaging while driving. Other occupants of the vehicle can text message using their cell phones. The driver's cell phone text messaging functionality is turned off by a signal broadcasting system as the driver enters the vehicle through the driver-side door. When the driver exits the vehicle through the driver-side door, the cell phone resumes its texting capability, preserving text messaging functionality while the driver is not operating the vehicle.12-01-2011
20110300828UN-CIPHERED NETWORK OPERATION SOLUTION - The present invention relates to a solution for handling security issues of non access stratum (NAS) signaling in a telecommunications network (12-08-2011
20110306318APPARATUS AND METHODS FOR PROVISIONING SUBSCRIBER IDENTITY DATA IN A WIRELESS NETWORK - Apparatus and methods for provisioning wireless devices for operation in one or more networks. In one embodiment, a provisioning service may provide access client (e.g., Subscriber Identity Module) data to a secure element in the wireless user device. The device may be preloaded with a provisioning SIM profile. The device may use the provisioning profile to roam onto a carrier, and communicate with a provisioning service, which may present the user with a list of available wireless carriers, such as carriers that service the user's current geographic location. In response to a user selection, the provisioning service may load a SIM profile associated with the selected carrier onto the secure element. The loaded SIM profile can be used to obtain wireless service from the selected carrier. The user may add multiple SIM profiles, and/or may delete SIM profiles.12-15-2011
20110312299Methods and apparatuses facilitating synchronization of security configurations - Methods and apparatuses are provided for synchronizing security parameters between access terminals and a wireless network. An access terminal and network entity can conduct a security mode procedure where the access terminal sends a security mode complete message to the network entity. On receipt of the security mode complete message, the network entity may update to new security parameters. The access terminal may initiate a mobility procedure while the security mode procedure is ongoing and may, as a result, abort the security mode procedure and revert back to the old security parameters. The access terminal can send a mobility update message to the network entity including a dedicated status indicator adapted to inform the network entity that the access terminal has reverted back to the old security parameters. In response to the mobility update message, the network entity may revert back to the old security parameters.12-22-2011
20110312300MOBILE APPLICATION GATEWAY FOR CONNECTING DEVICES ON A CELLULAR NETWORK WITH INDIVIDUAL ENTERPRISE AND DATA NETWORKS - A mobile application gateway for connecting devices on a cellular network with individual networks, such as enterprise voice and data networks and/or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise. The invention may consist of a primarily of core network and services components based on the IMS network architecture, and is backward compatible to support legacy systems in place in current telecom and data networks.12-22-2011
20120003957METHOD AND APPARATUS FOR VERIFICATION OF A TELEPHONE NUMBER - The invention relates to a method and apparatus for verification of a mobile telephone number. The method comprises: storing a mobile telephone number and a corresponding mobile subscriber identity number; receiving a request for verification of the mobile telephone number; sending, in response to the request, an IMSI query requesting a mobile subscriber identity number registered in association with the mobile telephone number in an HLR; receiving, in response to the IMSI query, the mobile subscriber identity number associated with the mobile telephone number in the HLR; comparing the stored mobile subscriber identity number and the received mobile subscriber identity number, and, if the comparison shows that the received mobile subscriber identity number corresponds to the stored mobile subscriber identity number; initiating the performance of the messaging-or-positioning service in relation to the mobile telephone number.01-05-2012
20120021720ADVANCED PREDICTIVE INTELLIGENCE FOR TERMINATION BYPASS DETECTION AND PREVENTION - Provided are methods and systems for detecting and preventing bypass fraud in telecommunication networks, primarily for detecting and preventing SIM box fraud in telecommunication networks. The methods include generating one or more test calls from a remote agent to a local agent where the remote agent can be a roaming agent or a remote dialer. The local agent is a subscriber number. The methods further include facilitating call forwarding of the test calls from the local agent to a local number. The methods include identifying the presence of bypass fraud by analyzing caller identification information of the test call received on the local number. Finally, the methods include preventing future use of a detected SIM box.01-26-2012
20120028604CERTIFICATION AND ACTIVATION OF USED PHONES PURCHASED THROUGH AN ONLINE AUCTION - A system and method for providing an online auction of a wireless device. An indicator is displayed to a winner of an online auction of the wireless device. The indicator is associated with an option for the user to certify the wireless device for use with one or more providers of telecommunications services. The wireless device is certified in response to the selection of the indicator by the winner.02-02-2012
20120028605COMMUNICATION TERMINAL AND COMMUNICATION SYSTEM - Provided is a communication terminal capable of suppressing the phenomenon of personal information being transmitted contrary to the will of the person. A communication terminal (02-02-2012
20120040640Mobile Terminal Capable of Being Tracked and Located and Method for Tracking and Locating - A mobile terminal capable of being tracked and located is disclosed, comprising a built-in card and a security system module which are connected with each other. The security system module generates a short message used for tracking and locating when receiving an incoming call request or a short message sent by the built-in card, wherein the short message at least carries an identification of a cellular tower interacting with the built-in card and information of current signal intensity, and the short message is sent into the built-in card; the built-in card sends the received incoming call request or the short message to the security system module and periodically sends the short message used for tracking and locating generated by the security system module to the set security number. A corresponding method is also provided. The security system is good at cover-up to bring the advantages of security and saving electricity.02-16-2012
20120064861COMMUNICATION TERMINAL DEVICE AND SECURITY METHOD - Provided is a communication terminal device which can prevent the situation that the communication terminal device cannot be used for a while within a security area, can release a security lock without making a user aware of the release, and can increase usability. In the device, a GPS unit (03-15-2012
20120071131METHOD AND SYSTEM FOR PROFILING DATA COMMUNICATION ACTIVITY OF USERS OF MOBILE DEVICES - A method for profiling data communication activity of users of mobile devices, comprises sniffing traffic flows between a mobile device and the Internet through a cellular network; extracting a plurality of traffic attributes included in the traffic flows and associated with the mobile device; logging the extracted plurality of traffic attributes; analyzing the plurality of traffic attributes for generating a user profile for a user of the mobile device based on the plurality of traffic attributes, wherein the user profile includes at least one of an advertising targeted user profile and a security targeted user profile; and sharing information and alerts related to the generated user profile with at least one external system.03-22-2012
20120077461METHOD AND SYSTEM FOR PREAUTHENTICATING A MOBILE NODE - A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is preauthenticated with the one or more PPoAs using a transitivity of trust between the mobile node, the CPoA, and one or more authentication servers.03-29-2012
20120100830ANONYMOUS PARTY VOICE CALL PROCESSING - A voice processing system in a communication network performs an operation in relation to a call from an anonymous calling party to a called party in a home network associated with the system. The operation uses the identity of the anonymous calling party without revealing the identity to the called party. The operations may include allowing the called party to return a call to the anonymous calling party or to send a message to the anonymous calling party, or performing a task in response to future calls or messages from the anonymous calling party such as filtering, blocking, or diverting or requesting authorization for the calling party to call the anonymous called party on demand, hi one aspect, the system automatically generates a dummy number for the anonymous calling party and uses the dummy number to guarantee anonymity by including said dummy number in a notification message or an out-dial notification. The notification may be a missed call notification or an anonymous call notification to the called party, allowing the called party to instruct or perform an operation in relation to the anonymous call while guaranteeing anonymity A voice processing system in a communication network performs an operation in relation to a call from an anonymous calling party to a called party in a home network associated with the system. The operation uses the identity of the anonymous calling party without revealing the identity to the called party. The operations may include allowing the called party to return a call to the anonymous calling party or to send a message to the anonymous calling party, or performing a task in response to future calls or messages from the anonymous calling party such as filtering, blocking, or diverting or requesting authorization for the calling party to call the anonymous called party on demand, hi one aspect, the system automatically generates a dummy number for the anonymous calling party and uses the dummy number to guarantee anonymity by including said dummy number in a notification message or an out-dial notification. The notification may be a missed call notification or an anonymous call notification to the called party, allowing the called party to instruct or perform an operation in relation to the anonymous call while guaranteeing anonymity.04-26-2012
20120108202SECURITY SYSTEM AND METHOD FOR AN ELECTRONIC DEVICE - A security system and method for an electronic device include comparing data in a Subscriber Identity Module (SIM) card with data in a virtual SIM card, if the virtual SIM card is not blank. The security system further include determining whether the electronic device has received a command of reporting loss of the SIM card from the network server, if the data in the SIM card is the same as the data in the virtual SIM card. The security method further includes running the electronic device normally if the electronic device has not received the command of reporting loss of the SIM card. If the command of reporting loss is received, a contact list and message of the electronic device are deleted and a calling function of the electronic device is disabled.05-03-2012
20120115435Privacy in Mobile Device Communications - The subject disclosure is directed towards mobile device privacy and anonymity. When a contact is marked as private, or when a device operates in a private mode, one or more privacy-related actions with respect to an incoming or outgoing communication are performed. Privacy-related actions include logging private telephone call information to a private, protected log, storing private message content to a private protected store, or not saving any such information or content. Another privacy-related action comprises not allowing a visible or audible notification to occur when a private communication is received.05-10-2012
20120115436Method and Apparatus for Terminal Access - The present invention discloses a method for terminal access, and this method includes: receiving an access request sent by a terminal; analyzing the access request to obtain a service type of the terminal; determining a number of residual equivalent users according to a difference between an access equivalent user number threshold corresponding to the service type of the terminal currently and a number of accessed terminals; and determining whether to respond to the access request according to the number of the residual equivalent users and a preset minimum residual equivalent user threshold. The present invention further discloses an apparatus for accessing the terminal. With the present invention, dynamic variation of the wireless environment can be adapted, QoS with higher quality can be provided for the users, and the experience and the feeling of the users are improved.05-10-2012
20120115437SYSTEM AND METHOD FOR SECURITY ON A MOBILE DEVICE USING MULTIPLE COMMUNICATION DOMAINS - A mobile device and a method for providing security to a mobile device having two or more communication domains is provided. The mobile device receives a communication service request. The communication domain of the communication service request is determined, the request domain being one of the two or more communication domains of the mobile device. A set of applicable restrictions is then determined from a list of communication restrictions comprising restrictions on use of services of the mobile device for each of the two or more communications domains. These applicable restrictions are then applied to the communication service request by the mobile device.05-10-2012
20120122421SYSTEM AND METHOD FOR REDUCING LATENCY IN A WIRELESS LOCATION SYSTEM - A system and method for providing a location of a mobile device in a network. The method includes: receiving a location request; determining the location of the mobile device responsive to the location request; holding the determined location of the mobile device until a permission to send the determined location is received; receiving the permission to send the determined location; and transmitting the determined location of the mobile device responsive to the received permission.05-17-2012
20120122422Access Network Discovery and Selection Function, ANDSF, Node Distributing Closed Subscriber Group, CSG, Information - The invention relates to a method in an Access Network Discovery and Selection Function, ANDSF, node for distributing Closed Subscriber Group information. The CSG information comprises an Allowed CSG List of a first UE and cell information indicating position of a cell with controlled access associated to the Allowed CSG List. The method comprises retrieving an Allowed CSG List of the radio cell from a CSG Database over a first network 05-17-2012
20120129491METHOD OF PROVIDING TELECOMMUNICATIONS NETWORK SECURITY - Disclosed is a method of providing network security within a mobile radio communications network and including creating a security context for communications between a mobile radio communications device and the network, the security context being created responsive to an input parameter such as the downlink NAS count, and the method further including, as part of each initial handover attempt, controlling the parameter so as to apply a version of the parameter different from a previous version, for example as incremented downlink NAS count, and preferably independently of network signaling messages.05-24-2012
20120142313METHOD AND APPARATUS FOR CONFIGURING AND LOCATING A HOME BASE STATION - Techniques for configuring a Home evolved Node B (HeNB) in a location server and positioning the HeNB are disclosed. In one aspect, location for a HeNB is supported based on LTE Positioning Protocol (LPP) messages. The HeNB communicates LPP messages with a location server. These LPP messages are terminated at the HeNB instead of a UE. At least one location transaction for the HeNB can be performed to configure in the location server and/or locate the HeNB based on the LPP messages. In another aspect, location for a HeNB is supported based on an embedded UE in the HeNB. The HeNB establishes a location session with a location server based on an embedded UE ID, which is assigned to the HeNB and recognized by the location server as being for a HeNB instead of a UE. At least one location transaction for the HeNB is performed during the location session.06-07-2012
20120149327METHOD AND DEVICE FOR EXECUTION CONTROL FOR PROTECTED INTERNAL FUNCTIONS AND APPLICATIONS EMBEDDED IN MICROCIRCUIT CARDS FOR MOBILE TERMINALS - The invention in particular relates to the execution control of protected internal functions and applications embedded in a mobile terminal microcircuit card. The control of a protected internal function is directly carried out in the microcircuit card. After having detected (06-14-2012
20120157044MOBILE TERMINAL AND METHOD OF CONTROLLING A MODE SCREEN DISPLAY THEREIN - A mobile terminal including a memory configured to store at least a first and second operating system including at least first and second modes, respectively; and a controller configured to execute the first operating system and to activate the first mode corresponding to the first operating system, to display a first information screen on a display corresponding to the activated first mode, to receive a switching signal indicating the first mode is to be switched to the second mode, to activate the second mode and deactivate the first mode, and to display a second information screen on the display corresponding to the second mode and that is different than the first information screen. Further, the controller is further configured to selectively transmit information included on the first or second information screen to at least one external terminal based on a prescribed designated level.06-21-2012
20120157045Methods, Systems, and Apparatus for Handling Secure-Voice-Communication Sessions - An exemplary computing system may receive a first request from a first voice-communication device to establish a secure-voice-communication session with a second voice-communication device. The computing system may also receive a second request from the second voice-communication device to establish the secure-voice-communication session with the first voice-communication device. The computing system may establish the secure-voice-communication session between the first and second voice-communication devices. Corresponding methods, apparatus, and computer-readable media are also disclosed.06-21-2012
20120164975Secure Wireless Device Area Network of a Cellular System - Embodiments may comprise logic such as hardware and/or code to provide a secure device area network. Many embodiments comprise a gateway node or enterprise enhanced node with a services distribution frame installed on a customer's premises. The gateway node or enterprise enhanced node may interconnect the secure wireless device area network at the customer's premises with a cellular network. In many embodiments, the cellular network core may provision authentication credentials and security keys, and manage access polies to facilitate access by Application Service Providers to devices on premises including smart devices via a security and policy enforcement function of a services distribution frame of the gateway node or enterprise enhanced node, Authorized members of the secure wireless device area network may connect to the Wide Area Network (WAN) through the gateway node and the cellular network core.06-28-2012
20120164976USAGE MANAGEMENT SYSTEM AND USAGE MANAGEMENT METHOD - A usage management system includes a first storage and a processor. The first storage stores, for each communication area and for each user, usage restriction information regarding a network device which locates in each communication area and which is used by each user and connectable to a communication network. The processor identifies a location area which is a communication area in which a target network device locates, identifies a target user present in the identified location area, acquires usage restriction information regarding the target network device for the identified target user from the first storage, and controls operations of the target network device in accordance with the acquired usage restriction information.06-28-2012
20120171991METHOD AND APPARATUS FOR CONFIGURING NODES IN A WIRELESS NETWORK - Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the security settings on the access point based on the security key, and saving the security key in a profile data file on a removable memory device along with a portable configuration utility for using the profile data file for configuring other nodes on the network. The removable memory device can then be inserted into other nodes and the portable configuration utility can be run to match the same key on the other network nodes based on the information stored in the profile data file on the removable memory device.07-05-2012
20120171992SYSTEM AND METHOD FOR SECURE CONTAINMENT OF SENSITIVE FINANCIAL INFORMATION STORED IN A MOBILE COMMUNICATION TERMINAL - A method for securing information over-the-air (OTA) in a non-Universal Integrated Circuit Card (UICC) type secure element (SE) of a mobile terminal including receiving a request to initialize an OTA proxy of a mobile terminal, initializing the OTA proxy, receiving a request to secure information, and securing, using the OTA proxy, the requested information in the non-UICC type SE. A method for reconstructing a mobile wallet application including receiving a request to reconstruct the mobile wallet application for a user; transmitting stored mobile wallet application information associated with the user to the mobile terminal; receiving mobile terminal information and SE information; and transmitting a stored application associated with the mobile wallet application information to the mobile terminal. A mobile terminal to secure information OTA in a non-UICC type SE including an OTA proxy to receive a securing command from a TSM, and a non-UICC SE.07-05-2012
20120171993METHODS FOR ACCESS CONTROL WITH A BACK-OFF TIMER MAINTAINED FOR LOW PRIORITY DEVICES OR MACHINE TYPE COMMUNICATION (MTC) DEVICES, AND APPARATUSES USING THE SAME - A mobile communication device configured for Machine Type Communication (MTC) is provided. In the mobile communication device, a wireless module performs wireless transmissions and receptions to and from a service network, and a controller module starts a back-off timer in response to adding a Public Land Mobile Network07-05-2012
20120171994METHOD AND SYSTEM OF SECURED WIRELESS COMMUNICATION - A method and a system for secured wireless communication are provided. The method for secured wireless communication includes connecting a first electronic device with a second electronic device via a network, detecting, by the second electronic device, a status of a particular mode of the second electronic device, and transmitting, to the first electronic device, a status of unsecured communication of the second electronic device according to the status of the particular mode of the second electronic device.07-05-2012
20120178415Secure Mobile Base Station Connections - In addition to other aspects disclosed, through a non-secure network, one or more bidirectional secure logical connections are established between a mobile base station and a secure network interface.07-12-2012
20120178416METHOD, ACCESS CONTROL NODE AND DOMAIN NAME SERVER IN A WIRELESS COMMUNICATION SYSTEM - A method in a access control node for selecting of a local gateway co-located with or near a home node is provided. The access control node receives (07-12-2012
20120184245PORTABLE ELECTRONIC APPARATUS, SWITCHING CONTROL METHOD AND CONTROL PROGRAM - A portable electronic apparatus is provided. The portable electronic apparatus includes a display section, an operating section, a setting section which switches and sets, based on an operation to the operating section, a pseudo power-off mode in which electric power is not supplied to the display section and a crime prevention function is enabled and a power-on mode in which the electric power is supplied to the display section and entire functions including the crime prevention function are enabled, and a control section which switches the pseudo power-off mode into the power-on mode when the crime prevention function is used in a state where the pseudo power-off mode is set by the setting section.07-19-2012
20120184246MOBILE COMMUNICATION DEVICE, DISPLAY CONTROL METHOD, AND DISPLAY CONTROL PROGRAM - A mobile phone including upper and lower portions, a flash memory to store images, a selecting portion to select a target image from the stored images, a closed state detection portion to detect a closed state, and a display control portion to control display of an image to display an image of an idle screen including in a background image the target image selected by the selecting portion when standing by, and the display control portion displays, in response to the change from a state in which the closed state is detected by the closed state detection portion to a state in which the closed state is not detected while the image of the idle screen is being displayed, a new idle screen that includes in the background image a new target image selected by the selecting portion subsequent to the background image included in the idle screen.07-19-2012
20120190331AGGREGATING MULTIPLE FUNCTIONS INTO A SINGLE PLATFORM - Methods and apparatus, including computer program products, for aggregating multiple functions into a single platform. A communications system includes at least one processor, at least one computer readable storage medium storing computer executable instructions that, when executed by the at least one processor, implement components including a workflow module comprising sets of workflow instructions for processing different types of information packets, and selectable communication function modules, the workflow module coordinating processing of a received packet using selected ones of the selectable communication function modules.07-26-2012
20120190332PROTECTION OF A SECURITY ELEMENT COUPLED TO AN NFC CIRCUIT - A method and a device for protecting a security module connected to a near-field communication router in a telecommunication device, wherein a transmission between the router and the security module is only allowed in the presence of a radio frequency communication flow detected by the router.07-26-2012
20120196567Mobile Communication Device Providing Communication Pathway Determination Assistance - A system and method in a mobile communication device for providing assistance to a user in determining a communication pathway. A system may comprise processor-executable instructions, that when executed by a processor, cause a mobile communication device that supports a communication type over multiple networks to access availability information stored in a remote database for determining available networks among the multiple networks for performing the communication type, determine the available networks using the availability information, provide user assistance for determining a selected network among the available networks for the communication type, and perform the communication type using the selected network.08-02-2012
20120202459Providing a Service With Location-Based Authorization - Methods and systems for providing a service are provided. A request is received to provide the service to a device. A location of the device, or a network interface through which the device is coupled, is determined. Finally, the delivery of the service is authorized based on the determined location of the device, or the determined network interface.08-09-2012
20120202460Invoking Denial of Service in Universal Mobile Telecommunications System (UMTS) Networks - A method of invoking denial of service in 3G networks is provided. The method includes receiving a downlink UMTS signal that is operating at a downlink UMTs frequency provided by the UMTS base station. A reference downlink UMTS signal is provided with a reference downlink UMTS frequency. The reference downlink UMTs frequency is aligned with the downlink UMTS frequency based on a frequency offset between the downlink UMTS frequency and the reference downlink UMTS frequency to provide an aligned frequency. A common pilot channel (CPICH) is transmitted over the reference downlink UMTS signal operating at the aligned frequency. Service for the UMTS base station is denied when the CPICH is combined with a UMTS base station CPICH operating at the downlink frequency.08-09-2012
20120202461System and Method for Processing a Voicemail - Described is a system and method for processing a voice mail. The method comprises receiving a voice mail, converting the voice mail into a text message using a predefined speech-to-text conversion algorithm and transmitting the text message to a wireless computing device.08-09-2012
20120208500METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A PRIVATE AND EFFICIENT GEOLOCATION SYSTEM - An apparatus for preserving privacy of a determined location(s) of a device may include a processor and memory storing executable computer code causing the apparatus to at least perform operations including receiving a request for determining a location of a device based on received fingerprint data corresponding to a summary of radio information identifying a physical place, location, area, or region. The summary based on information received from radio frequency (RF) devices. The computer program code may further cause the apparatus to determine whether fingerprint data associated with a geographical location of the RF devices is stored locally for determining whether to request a network device to determine the location of the device based on providing the network device with fingerprint data and false fingerprint data relating to a location(s) that does not correspond to a current location of the device. Corresponding methods and computer program products are also provided.08-16-2012
20120220263MOBILE APPLICATION SYSTEM - A particular method includes accessing a webpage at a web server from a mobile application executing at a mobile device. A mobile application tag may be identified in the webpage, where the mobile application tag is independent of a device type of the mobile device. The method also includes determining that the mobile application tag corresponds to a native device function of the mobile device and accessing the native device function.08-30-2012
20120225639PORTABLE COMPUTERIZED WIRELESS PAYMENT APPARATUS AND METHODS - A mobile user apparatus and associated methods useful for conducting payment transactions wirelessly, such as at point-of-sale locations. In one embodiment, the mobile user apparatus is a cellular-enabled mobile device that includes a short-range passive radio frequency transceiver that when interrogated by a reader at the point-of-sale, issues a reply including information relating to an account of the user of the mobile apparatus that is to be debited for the payment. In one variant, the information stored on the mobile device is encrypted for security, and the mobile user apparatus is further configured to receive transaction data wirelessly in return.09-06-2012
20120225640SYSTEM AND METHOD FOR SECURING A BASE STATION USING SIM CARDS - Methods and systems are provided for securing integrated base stations, such as base station routers (BSRs), in which a SIM card is operatively coupled with a secured portion of a base station and a secure association is established therebetween to facilitate encryption key exchange between the secured portion of the base station and a core network.09-06-2012
20120231763METHOD AND SYSTEM FOR ANTIVIRUS ON A MOBILE DEVICE BY SIM CARD - The invention provides a method and system for antivirus on a mobile device by a SIM card. The method includes steps of obtaining signature data of a file on the current mobile device, receiving the same, retrieving a virus database on the SIM card for determining whether file on the current mobile device includes a virus and returning the retrieved result to client side of the mobile device, and the client side of the mobile device performing related operation according to the retrieved result.09-13-2012
20120231764METHOD AND APPARATUS FOR VALIDATING INTEGRITY OF A MOBILE COMMUNICATION DEVICE - A method for validating integrity of a mobile communication device includes installing an integrity verification application on the mobile communication device. The method also includes establishing a first pass indicator and a second pass indicator including receiving a first instance of the first pass indicator. The method also includes receiving a second instance of the first pass indicator as a challenge for verification. In response to receiving the second instance of the first pass indicator, the second pass indicator may be displayed as an indication of the integrity.09-13-2012
20120238244PROACTIVE COMMANDS OVER SECURE CHANNEL BETWEEN A MOBILE EQUIPMENT AND A UICC - (EN)The invention relates to a UICC comprising a toolkit applet. The UICC comprises a toolkit security component for establishing and using a secure channel for proactive commands and events exchanged by the toolkit applet of the UICC with a mobile equipment. Other communications between the UICC and the mobile equipment take place outside of this secure channel. The invention also relates to a system comprising a UICC of the above type and a mobile equipment, such as a cell phone. The invention also relates to a method to selectively protect a UICC.09-20-2012
20120252404METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR SECURITY CONFIGURATION COORDINATION DURING A CELL UPDATE PROCEDURE - A method, apparatus and computer program product are provided for maintaining synchronization with respect to the security configurations of the network and a mobile terminal, even during a cell update procedure. A method may include causing a cell update message to be provided during performance of a cell update procedure and including, with the cell update message, a security configuration information element indicating that a mobile terminal has applied an updated security configuration in an instance in which the mobile terminal has applied the updated security configuration. The method may also include, with the cell update message, the information element indicating that the mobile terminal has reverted to a prior security configuration in an instance in which the mobile terminal has reverted to a prior security configuration. Corresponding apparatuses and computer program products are also provided.10-04-2012
20120252405Connecting mobile devices, internet-connected hosts, and cloud services - Applications are downloaded to a device from a cloud-based service by establishing trust with between the device and a host system. The host system and the cloud-based service have a pre-existing trust relationship.10-04-2012
20120252406METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR SECURITY CONFIGURATION COORDINATION DURING A CELL UPDATE PROCEDURE - A method, apparatus and computer program product are provided for maintaining synchronization with respect to the security configurations of the network and a mobile terminal, even during a cell update procedure. A method may include causing a cell update message to be provided during performance of a cell update procedure and including, with the cell update message, a security configuration information element indicating that a mobile terminal has applied an updated security configuration in an instance in which the mobile terminal has applied the updated security configuration. The method may also include, with the cell update message, the information element indicating that the mobile terminal has reverted to a prior security configuration in an instance in which the mobile terminal has reverted to a prior security configuration. Corresponding apparatuses and computer program products are also provided.10-04-2012
20120252407MULTI-TIER SERVICE AND SECURE WIRELESS COMMUNICATIONS NETWORKS - The present invention pertains to improved communication quality and security of transmission in cellular communication networks. A customer has the option to pay different fees for different tiers of service relating to voice quality, bandwidth access, and different tiers of service relating to communications security. Higher tiers may guarantee a specific vocoder or bit rate is used, or guarantee a specific encryption protocol is use to ensure secure communications. Different tiers may be associated with customers' records for billing purposes. The network may afford high end devices higher voice quality and/or security via a lookup table indicating what level of service is associated with a given device. Calling or receiving devices may negotiate with each other to change to a more robust vocoder or bit rate to ensure a higher quality and/or security. Furthermore, the user may opt to change the quality and/or security level before or during a call.10-04-2012
20120252408CELLULAR PHONE PROVIDED WITH KEY LOCK FUNCTION - A mobile phone 10-04-2012
20120252409METHOD AND DEVICE FOR SETTING GRAPH PASSWORD OF COMMUNICATION TERMINAL - A method and apparatus for setting a graph password of a communication terminal are disclosed to solve the problem that the security of the traditional character password is lower. The method includes the following steps: in a case when a setting graph password instruction of a user is received and it is judged that no character password is set before, generating a graph interface with a plurality of loaded pictures, wherein, each loaded picture is randomly filled in a corresponding grid of a two-dimensional lattice of the graph interface; obtaining a picture identification (ID) and a coordinate value for setting a graph password by selecting at least one loaded picture in the graph interface as the picture corresponding to the graph password; converting the picture ID and the coordinate value for setting the graph password into a character password and storing the character password, finishing setting the graph password.10-04-2012
20120258686COMMUNICATION SYSTEM - A femto cell base station includes a generating part that generates a SIP message including a terminal ID of a radio terminal and a check request for the terminal ID at a predetermined time, and a first transmitting part that transmits the SIP message generated by the generating part to a higher level apparatus in the communication system.10-11-2012
20120264397Selective Establishment of Radio Access Bearers to Support Simultaneous Voice and Data Communications in a Mobile Telecommunications Network - Systems, methods, and computer-readable media are for selectively establishing radio access bearers configured to support simultaneous voice and data communications in a mobile telecommunications network. An exemplary method includes receiving a request to initiate a data session at a mobile device that is currently engaged in a voice session and, in response to receiving the request, determining if the mobile device is capable of supporting a radio access bearer configured to simultaneously support the data session and the voice session. The method further includes allowing or denying establishment of the radio access bearer based upon the determination.10-18-2012
20120264398ELECTRONIC DEVICE AND UNLOCKING METHOD THEREOF - An electronic device includes a detecting unit, a proximity sensor and an unlocking unit. The detecting unit is used for detecting whether the electronic device is in a standby state, and generating a first signal when it is detected that the electronic device is in the standby state. The proximity sensor is used for sensing whether a person is proximate to the electronic device, and generates a second signal when it is determined the person is proximate to the electronic device. The unlocking unit is used for unlocking the electronic device when the first and second signals are generated within the same period of time.10-18-2012
20120264399COMMUNICATION DEVICES AND METHOD OF COMMUNICATION - In a portable communications device, information provided by an identification means is used to establish communication between communication means and a second device, such as a point of sale machine, to ensure that the correct portable communications device is connected to the second device where there may be a large number of second devices and a large number of portable communications devices in close proximity.10-18-2012
20120282895METHOD AND APPARATUS FOR MULTIMEDIA CONTENT PROMOTION IN VEHICULAR WIRELESS NETWORKS - A multimedia content dissemination system is provided for mobile vehicles. A wireless vehicle communication network provides communication among mobile vehicles in the network. At least one host vehicle within the wireless vehicle communication network is selected by an authorized entity for disseminating multimedia content received by the authorized entity. The at least one host vehicle transmits an inquiry to target vehicles in the wireless vehicle communication network. The inquiry comprises a content profile that includes descriptors associated with the multimedia content for allowing target vehicles to determine whether an interest exists in the multimedia content. The at least one host vehicle transmits the multimedia content in encrypted form to an interested target vehicle for sampling the multimedia content. The interested target vehicle requests ongoing use of the multimedia content from the authorized entity in response to sampling the multimedia content. The authorized entity provides to the interested target vehicle a decryption key for authorizing ongoing use of the multimedia content.11-08-2012
20120282896Method, Apparatus and System for a Mobile Virtual Number Service in a Mobile Telecommunications System - A method of and an engine for providing a Mobile Virtual Number, MVN, service in a node of a mobile telecommunications system comprising a plurality of nodes providing service to a plurality of mobile User Equipments, UEs. The MVN service instructs the telecommunications system for handling calls related to a first mobile subscriber number, corresponding to the mobile UE, and a second mobile subscriber number such that the mobile UE operates under the second mobile subscriber number.11-08-2012
20120289191METHOD AND APPARATUS FOR HANDLING INCOMING STATUS MESSAGES - An approach is presented for handling incoming status messages with respect to a request and/or a communication channel (e.g., PSMS). A PSMS client causes, at least in part, a transmission of a request over a communication channel, the request originating from an application associated with a device. A status message client of the PSMS client causes, at least in part, a monitoring of one or more inboxes associated with the communication channel for one or more status messages related to the communication channel, the request, or a combination thereof. The status message client causes, at least in part, a presentation of a representation of at least a portion of the one or more status messages, status information interpreted from the one or more status messages, or a combination thereof in a user interface of the application.11-15-2012
20120289192BEACON AND MANAGEMENT INFORMATION ELEMENTS WITH INTEGRITY PROTECTION - Certain aspects of the present disclosure relate to protecting integrity of transmitted messages in a wireless communications.11-15-2012
20120289193Method and Apparatus For Monitoring and Theft Prevention - There is provided a device comprising a mobile broadband module comprising radio communication means. The device further comprises at least a first SIM for providing user domain services and at least a second SIM for providing service domain services. The second SIM is isolated from an end user of the device. According to an embodiment, the first SIM is associated with the end user of the device, wherein the end user may be associated with a first identity, and wherein the second SIM is associated with a service provider, the service provider being associated with a second identity. A method comprising: identifying which of the first and the second communication paths a command is issued from; and continuing with the command or discontinuing with the command in dependence on the identified path, such that the end user is not able to perform operation on to access the isolated second SIM.11-15-2012
20120289194COMMUNICATION SYSTEM AND COMMUNICATION METHOD - To provide a communication system including a mobile terminal which can prevent leak of information even if the mobile terminal is lost and reproduce previously accumulated confidential data without losing newly created and updated confidential data. A mobile terminal includes connection state judging device which detects a line connection state with a server. When the line connection state is a broadband connection, the data is read directly from and written directly into a data storing device of the server. When the line connection state is a narrowband connection, the data is temporarily read out and written into a data storing device of the terminal. When the operation of the mobile terminal is completed or a security operation starting instruction is issued by a user, the updated confidential data is written into the data storing device of the server and then the confidential data is erased from the mobile terminal.11-15-2012
20120295586METHOD FOR MANAGING INFORMATION IN A TELEPHONE AND TELEPHONE FOR MANAGING INFORMATION - Mobile telephone manages stored telephone data and includes a memory that stores telephone data related to at least one of incoming telephone calls to and outgoing telephone calls from mobile telephone, a personal access code entry device that enables a user of mobile telephone to enter a personal access code, a first list containing public telephone data stored in memory before personal access code is entered. Public telephone data in first list is accessible by all users during operation of mobile telephone, a second list containing private telephone data stored in memory after personal access code is entered. Private telephone data in second list is accessible by user only after entry of personal access code. A device provided for at least one of blocking and rejecting an incoming telephone call when telephone number for incoming call is stored in second list and personal access code has not been entered.11-22-2012
20120302209SYSTEM AND METHOD FOR IDENTITY PROTECTION USING MOBILE DEVICE SIGNALING NETWORK DERIVED LOCATION PATTERN RECOGNITION - A system and method for recognizing patterns in wireless device locations using wireless device location data derived from a communications signaling network is provided. By using wireless network supported signaling operations and messages, location data concerning the whereabouts of wireless devices, and hence wireless device users, may be obtained. The location data derived from the communications signaling network may be statistically analyzed to reveal potential geographic patterns that may indicate meaningful behaviors of the purported users of the wireless devices.11-29-2012
20120309348ACTIVATION SOLUTION - To securely factory activate a mobile device according to authorized records, factory activation server generates and sends a signed factory activation record including a signed factory activation ticket. Signed factory activation record and ticket are cryptographically signed using factory private key stored in factory activation server. Factory private key is different from customer private key stored in the activation server that provides activation tickets for customer activation. If factory activation record is valid, application processor (AP) included in the device performs factory activation of the device which includes AP activating to allow for factory testing and rebooting at a predetermined reboot time. Wireless communication processor (BB) included in the device verifies the factory activation ticket and if valid, BB performs factory activation including: BB registering to a cellular telephone communications network for factory testing, and unregistering from the network after a predetermined unregistering time. Other embodiments are also described.12-06-2012
20120309349ENTERPRISE MOBILE NETWORK FOR PROVIDING CELLULAR WIRELESS SERVICE USING LICENSED RADIO FREQUENCY SPECTRUM AND THE SESSION INITIATION PROTOCOL - Support for Session Initiation Protocol (SIP) devices is provided in an enterprise mobile network that provides wireless service within a coverage area associated with an enterprise using licensed radio frequency spectrum. In various embodiments, support SIP devices is provided by, for example, incorporating SIP user agent in a mobile switching subsystem or in a base station subsystem or by incorporating SIP server functionality into a mobile switching subsystem.12-06-2012
20120329426SYSTEM AND METHOD FOR MONITORING THE SECURITY OF CELLULAR DEVICE COMMUNICATION - System and method for monitoring security status of an inspected cellular device engaged in a cellular network are disclosed. Status parameters related to the inspected cellular device are gathered and analyzed. A security status of the inspected cellular device is determined based on the analysis.12-27-2012
20130012163APPARATUS AND METHOD OF CIPHERING IN WIRELESS TELECOMMUNICATIONS USER EQUIPMENT OPERATIVE WITH A PLURALITY OF RADIO ACCESS NETWORKS - A method in a wireless telecommunications device operative with a plurality of radio access networks, the method comprising: when operating with a first radio access network reading at least one ciphering variable applicable in the second radio access network (e.g. in UMTS reading the value of a variable START from the USIM of the device). When at least one ciphering variable applicable in the second radio access network renders ciphering in the second radio access network infeasible without further authentication (e.g. in UMTS when the value of START in USIM is equal to a value THRESHOLD), using a substitute value for the ciphering parameter (e.g. START) when establishing a connection with the second radio access network.01-10-2013
20130012164SYSTEM AND METHOD FOR SECURING A BASE STATION USING SIM CARDS - Methods and systems are provided for securing integrated base stations, such as base station routers (BSRs), in which a SIM card is operatively coupled with a secured portion of a base station and a secure association is established therebetween to facilitate encryption key exchange between the secured portion of the base station and a core network.01-10-2013
20130017804EFFICIENT PROCESSING OF RADIO RESOURCE REQUESTSAANM Jun; JerryAACI AustinAAST TXAACO USAAGP Jun; Jerry Austin TX USAANM Liu; HuitaoAACI AustinAAST TXAACO USAAGP Liu; Huitao Austin TX USAANM Parra; DarwinAACI PleasantonAAST CAAACO USAAGP Parra; Darwin Pleasanton CA USAANM Li; YunpengAACI AustinAAST TXAACO USAAGP Li; Yunpeng Austin TX US - A system for efficiently transmitting requests for data access from a wireless communications device to a radio access network. Requests for data access may be aggregated to more efficiently use radio resources. Aggregated requests may not be transmitted until a total number of requests or size of aggregated requests exceeds a threshold. Regardless of aggregation, requests may be stored until a timer expires, and then transmitted to the radio access network. Request priority, environmental data, and device data may be taken into account in determining when to transmit requests for data access.01-17-2013
20130029636METHOD AND APPARATUS FOR GENERATING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a method for broadcasting a wireless signal representing a notice to obtain sensory data, retrieving first sensory information captured by a first sensor device coupled with a first mobile communication device where the first sensory information is associated with an environment of the first mobile communication device, and receiving from a second mobile communication device, second and third sensory information in response to the notice, where the second sensory information is captured by the second mobile communication device, where the third sensory information is captured by a third mobile communication device and provided to the second mobile communication device. Other embodiments are disclosed.01-31-2013
20130035062Secure Mobile Communication System and Method - A security level indicator for a mobile communication device is adapted to alert a user of a device when the weighed combination of security-related parameters reaches a predefined level.02-07-2013
20130035063SYSTEM AND METHOD FOR PREVENTING AND/OR LIMITING USE OF A MOBILE DEVICE - A system and a method for preventing and/or limiting use of mobile devices are provided. The method includes receiving, by a mobile device, a message indicating that the mobile device is in a certain location, and determining a user-configured security policy of the mobile device based on the certain location. The method further includes at least one of disabling and enabling, by the mobile device, one or more functions of the mobile device based on the determined user-configured security policy.02-07-2013
20130040603Wireless access point detection - According to aspects of the present invention there are provided methods and apparatus for detecting a suspect wireless access point in a communication network including a plurality of wireless access points providing access services to client devices. Identity information associated with the wireless access points is collected from a multiplicity of client devices. A reputation request is received from a client device, the request including identity information of an available wireless access point. The received identity information is compared with the collected identity information for determining an indication of trust of the available wireless access point. The indication of trust of the available wireless access point is transmitted to the client device. The wireless access points may include a cellular wireless access point or base station, wireless access point, a Wi-Fi access point, or a femto-cell access point.02-14-2013
20130040604CONTROLLING TEXT MESSAGES ON A MOBILE DEVICE - Methods, systems and devices for controlling access to messaging (SMS, MMS, email, etc.) on mobile devices (e.g., cell phones) during times or in locations in which such activity is prohibited or inhibited by the parental control settings. Parental control settings limit messaging features available to mobile devices to certain times and/or locations. Messages received at restricted times/locations are stored in temporary memory without notifying the mobile device user (i.e., messages are not placed in the inbox), unless the message is received from a pre-approved source (e.g., parent, teachers, etc.). Once the context for restricting access to messaging (e.g., time, location, etc.) no longer applies, the stored messages may be transferred from the temporary memory to the inbox and the user may be alerted regarding the new message.02-14-2013
20130045712Systems, Methods, and Computer Program Products for Managing Access to Femtocell Coverage - Systems, methods, and computer program products are for managing access to a femtocell coverage area. An exemplary method includes storing in a memory component a first identifier corresponding to a subscribed service of a communication device and a second identifier corresponding to a user of the communication device, and granting access to the femtocell coverage area using the second identifier.02-21-2013
20130059563DETECTION OF A REROUTING OF A COMMUNICATION CHANNEL OF A TELECOMMUNICATION DEVICE CONNECTED TO AN NFC CIRCUIT - The invention relates to a method for detecting an attempt to reroute a communication channel between a port of a security module and a port of a near-field communication router, which are in a telecommunication device, wherein, upon receiving a message in a near-field communication format, the security module verifies from which port of the communication router said message originates.03-07-2013
20130065555POLICY MANAGEMENT OF ELECTRONIC DEVICES - A system and method for the management of a device, including the establishment and enforcement of policies/rules associated with feature or functions that may be performed with the device. Modern devices are capable of many things, including making and receiving calls, exchanging data, playing games and music, sending and receiving email, accessing web sites, and paying for goods and services. Depending on who is using the device, such as a child, student, or an employee, there may be a need or desire to regulate how that device can be used and to determine who will pay for what goods or services. In addition to providing all of the features associated with a device, service providers need to be able to establish and enforce rules (policies) regulating how and when that device can be used and who will pay for a good or service requested by the user of the device.03-14-2013
20130072153System and Method for Determining and Communicating Presence Information - A system and method for communicating presence information that can include at a first server of a communication platform, receiving an authorization token of a first client application; verifying at least one permission associated with the authorization token; registering a presence status of the first client application upon verifying the at least one permission of the authorization token; at a second server of the communication platform, accepting an incoming communication request; retrieving communication instructions according to the incoming communication request; identifying an instruction to communicate with a communication destination of the first client application; accessing the presence status resource of the first client application; establishing communication with the first client application according to the accessed presence status resource.03-21-2013
20130078945SYSTEM AND METHOD FOR VEHICLE BASED CELLULAR OFFLOAD - One or more vehicle communication systems associated with one or more vehicles may be activated. The one or more vehicles may, for example, include a gateway vehicle. A backhaul connection between a vehicle communication system associated with the gateway vehicle and a cellular infrastructure may be established. Signals from the cellular infrastructure may be received at the vehicle communication system associated with gateway vehicle. Using the vehicle communication system associated with the gateway vehicle, the signals received from the cellular infrastructure may be transmitted. Signals from one or more mobile devices may be received using the vehicle communication system associated with the gateway vehicle. The signals received from the one or more mobile devices may be transmitted to the cellular infrastructure using the vehicle communication system associated with the gateway vehicle.03-28-2013
20130084828METHOD AND APPARATUS FOR PROVIDING CELLPHONE SERVICE FROM ANY DEVICE - A method, non-transitory computer readable medium and apparatus for providing a cellular communication service for any device via a communications network are disclosed. For example, the method receives a log-in request of a user from a device, if the log-in request is authenticated, synchronizes the device with a configuration associated with the user and provides the cellular communication service via a subscription plan subscribed to by the user.04-04-2013
20130090085COMMUNICATION SYSTEM WITH ACCESS MANAGEMENT MECHANISM AND METHOD OF OPERATION THEREOF - A method of operation of a communication system includes: registering a primary communication identification for identifying a reception device; generating a map communication identification associated with the primary communication identification; generating an authorization condition for the map communication identification for contacting the reception device; and controlling a device access based on the authorization condition for accepting an access request to the reception device with the map communication identification instead of the primary communication identification.04-11-2013
20130090086SYSTEM AND METHOD FOR VALIDATING A USER EQUIPMENT LOCATION IN A TELECOMMUNICATION NETWORK - In a method for validating a location provided by a user equipment requesting a service to a telecommunication network, the network receives (04-11-2013
20130102279MOBILE TERMINAL AND CONTROL METHOD OF THE SAME - A mobile terminal that may be able to access a wireless communication network and a control method thereof are provided. The mobile terminal includes: a wireless communication unit configured to access a wireless communication network; a detection unit configured to detect a connectable wireless communication network through the wireless communication unit; and a controller outputting icons each corresponding to one or more wireless communication networks detected by the detection unit to a locked screen displayed in a locked state in which inputting of a control command with respect to an application is limited, releasing the locked state when selecting of any one of the output icons is detected, and controlling the wireless communication unit to access a wireless communication network corresponding to the selected icon.04-25-2013
20130102280APPARATUS AND METHOD FOR MANAGING CONTROL INFORMATION OF APPLICATION IN PORTABLE TERMINAL - An apparatus and method to control an application in a portable terminal are provided. A method to manage an application includes confirming control information that at least one application installed in the portable terminal requires, selecting the at least one application requiring control information whose use is restricted among a plurality of applications installed in the portable terminal, and restricting a running of the selected at least one application.04-25-2013
20130102281MOBILE TERMINAL AND LOCK CONTROLLING METHOD - A mobile phone includes a display, a touch panel provided on the display, etc., and can be set with a lock state. In a case that the lock state is set, a lock screen including a lock object is displayed on the display. Upon receipt of a mail, notification information of a newly-arrived mail is recorded in a notification table and the notification information of the newly-arrived mail is displayed in a notification area of the lock screen. If a user performs a sliding operation after touching the lock object, and then releases from the lock object within the notification area, the lock state is canceled, and a mail function is performed such that the above-described newly-arrived mail is displayed.04-25-2013
20130115913METHOD AND APPARATUS FOR NOTIFYING ACCESS CONTROL INFORMATION - A method and an apparatus for notifying activations of extended access barring (EAB) and updates of EAB information in the field of Long Term Evolution (LTE) wireless communication systems have been proposed. In accordance with the present disclosure, the eNB notifies MTC devices of EAB changes from a paging message through the paging channel (PCH). The network could use either a single bit EAB status indicator to notify whether the EAB has been enabled or disabled or use multiple bits EAB indicator to represent different EAB parameter changes in addition to whether the EAB has been enabled or disabled. Based on the present disclosure, the network could reduce the paging overhead by require the MTC device to acquire the EAB-SIB only when it needs the EAB information.05-09-2013
20130115914Control Method for Home Base Station Access and Home Base Station Gateway - A control method for H(e)NB access and a H(e)NB gateway are provided in the present invention. The method includes the following steps: a H(e)NB gateway interacting with a Broadband Policy Control Framework (BPCF) through a H(e)NB policy function, and requesting for the admission control of a fixed broadband access network; the BPCF returning the result of the admission control to the H(e)NB gateway through the H(e)NB policy function. The present invention performs policy control for the service access of the User Equipment (UE) accessing via the H(e)NB.05-09-2013
20130122861SYSTEM AND METHOD FOR VERIFYING APPS FOR SMART PHONE - A system and method for verifying apps for a smart phone are provided. The system for verifying apps for a smart phone includes an app auto-verification device and an app self-verification device. The app auto-verification device analyzes the installation tile of an app to be installed in the smart phone, constructs a scenario, executes the app in the smart phone in accordance with the scenario, and determines malicious behavior using the results of the execution. The app self-verification device monitors an installation file corresponding to an app to be installed in the smart phone, and determines malicious behavior by analyzing a behavioral log corresponding to results of the monitoring.05-16-2013
20130130647Method, User Network Equipment and Management System Thereof for Secure Data Transmission - A method for secure data transmission, and the method includes: after a Home (evolved) Node-B (H(e)NB) establishes a connection with a H(e)NB Management System (H(e)MS), data is transmitted between the H(e)NB and the H(e)MS via a secure path; when the H(e)NB or the H(e)MS receives data, verify the integrity and/or the confidentiality of said received data, and if the verification fails, retain or discard said received data. The present invention also provides user network equipment and a user network equipment management system for secure data transmission. The present invention removes various threats caused by the insecure data transmission and a variety of inconveniences caused by improperly handling downloaded data of the H(e)NB in practical applications.05-23-2013
20130130648PROVIDING SUPPORT TO A USER - A system for providing support to a user, the system comprising a server, the server communicatively coupled to a number of mobile devices, in which the server receives a number of sets of voice messages and configuration data from the mobile devices and causes the voice messages and configuration data to be routed to a number of support providers. A method of providing support to a user, the method comprising receiving a data packet from a mobile device containing a voice message and appended user specific configuration data, the voice message containing a service request from the user; routing the voice message and appended user specific configuration data to a customer service provider; and responding to the user's service request.05-23-2013
20130130649PROVIDING ACCESS LEVELS TO SERVICES BASED ON MOBILE DEVICE SECURITY STATE - A mobile device's level of access to services provided by a service provider is based on a current security state assessment of the mobile device. Mobile devices are granted different access levels to services based on the security state of the device. A security component can assess the current security state of the mobile device by processing security data generated by the mobile device. In a specific embodiment, the security component is at the mobile device. In another specific embodiment, the security component is at a server.05-23-2013
20130137397Systems And Methods For Providing A Password Reset Feature - A method for providing a voicemail password reset feature can include receiving a password reset request message from a mobile device at a voicemail system, resetting a current password to a default password at the voicemail system, and sending a response message request to a short message service center. The response message request can include a request to generate a response message that includes the default password. The method can further include generating the response message at the short message center and sending the response message to the mobile device, wherein the response message includes the default password. A system for providing a voicemail password reset feature and a computer-readable medium for initiating a voicemail password reset from a mobile device.05-30-2013
20130143524Mediation Server, Control Method Therefor, Communication Device, Control Method Therefor, Communication System, and Computer Program - A mediation server which is able to communicate with a plurality of account managing servers (06-06-2013
20130157616APPLIANCE IN A MOBILE DATA NETWORK THAT SPANS MULTIPLE ENCLOSURES - Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network.06-20-2013
20130171963Method and Apparatus for Secure Element Management - In accordance with an example embodiment of the present invention, a method includes receiving at a terminal a refresh message sent by a secure element, wherein said refresh message includes a request for a session reset in response to at least one value associated with a current active application on said secure element is changed. The method further includes sending by said terminal a status message to said secure element, wherein said status message notifies said current active application on said secure element that an application session reset procedure will be executed. The method further includes sending by said terminal an application selection message to said secure element, wherein said application selection message instructs said secure element to reactivate said current active application with at least said new value.07-04-2013
20130183931DETECTOR OF UPLINK FREQUENCIES WITH FEEDBACK - An apparatus and method for detection of uplink frequencies from a mobile device, such as a cell phone, may be used as an alarm for people not to use their mobile device, or may signal security personnel when an unauthorized mobile device is being used. The apparatus and method may measure the uplink frequency band and use feedback with the downlink frequencies to gain a better reading of the distance the mobile device being used is from the detection device The apparatus and method has more precision of distance compared to conventional detectors, as the uplink RF power of a mobile device changes depending where it's located from the cell tower transmitting the downlink data to the mobile device monitored.07-18-2013
20130189950INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING DEVICE CONTROLLING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM HAVING INFORMATION PROCESSING DEVICE CONTROLLING PROGRAM RECORDED THEREON - An information processing device includes: a communication module that performs wireless communication with another device using unique information included in an electronic card; an acquiring unit that acquires the unique information included in the electronic card; a registering unit that registers the unique information acquired by the acquiring unit in a first memory unit and a second memory unit that is provided in the communication module; a deciding unit that decides whether or not the unique information registered in the first memory unit matches the unique information registered in the second memory unit and the unique information included in the electronic card, respectively; and an activation controlling unit that allows activation of the information processing device when the deciding unit decides that the unique information registered in the first memory unit matches the unique information registered in the second memory unit and the unique information included in the electronic card.07-25-2013
20130203379SYSTEM AND METHOD FOR IMEI DETECTION AND ALERTING - A system and method for detecting and storing information regarding a mobile communications device within a mobile communications network. Initially, a first data record is received at a subscriber/device database comprising subscriber/device data. Next, a second data record is received at the subscriber/device database comprising additional subscriber/device data. A first data record of a subscriber may then be compared to a second data record of the same subscriber, and if the first data record is different from the second data record a service provider may be notified.08-08-2013
20130203380NETWORK DEVICE, CORE NETWORK, DIRECT MODE COMMUNICATION SYSTEM AND LAWFUL INTERCEPTION METHOD THEREOF - A network device, a core network, a direct mode communication system and a lawful interception method thereof are provided. The direct mode communication system includes the network device and the core network, and connects to a first mobile station and a second mobile station respectively. The network device registers to the core network for intercepting a communication between the first mobile station and the second mobile station and retrieves a communication data by intercepting the communication. The core network receives the communication data from the network device and stores the communication data.08-08-2013
20130203381MOBILE COMMUNICATION METHOD, RELAY NODE, AND RADIO BASE STATION - The present invention relates to a mobile communication method of sending and receiving the signaling of an S1AP/X2AP layer on DRB established between a radio base station DeNB and a relay node RN, the method comprising a step of generating a key K08-08-2013
20130203382MOBILE COMMUNICATION METHOD, MOBILE COMMUNICATION SYSTEM, AND RADIO BASE STATION - The present invention relates to a mobile communication method that sends and receives the signaling of an S1AP/X2AP layer on DRB established between a radio base station DeNB and a relay node RN, the mobile communication method including: a step of setting the above DBR in an attach process of the relay node RN; and a step of notifying the above DRB to the relay node RN and the radio base station DeNB in an attach process of the relay node RN.08-08-2013
20130210384SECURITY OF USER PLANE TRAFFIC BETWEEN RELAY NODE AND RADIO ACCESS NETWORK - A gateway apparatus (08-15-2013
20130225125PROTECTION OF A COMMUNICATION CHANNEL OF A TELECOMMUNICATION DEVICE COUPLED TO AN NFC CIRCUIT AGAINST MISROUTING - A method for protecting data contained in a security module of a telecommunication device equipped with a near-field communication router and with a microcontroller, wherein data relative to the routing between the security module and gates of the router assigned to near-field communications are transmitted over a channel accessible by the router only, or by a control signal which is not generated by the microcontroller for the router.08-29-2013
20130225126SYSTEM AND METHOD FOR PRIVACY-ENABLED MOBILE LOCATOR SERVICES WITH DYNAMIC ENCOUNTER HORIZON - A method and system for managing awareness information relating to a mobile device's visibility with respect to other buddy devices, the system comprising; the mobile device, a mobile application listing one or more buddies, an application listener which tracks the one or more buddies zoom operations and radar zoom factors, and a server, the server comprising an encounter manager, an approach manager and a notification marshalling system.08-29-2013
20130231085METHOD AND APPARATUS FOR PROVIDING MOBILE DEVICE MALWARE DEFENSE - A method and apparatus for protecting a wireless communication network are disclosed. For example, the method identifies an infected mobile endpoint device via at least one audit by a mal-ware defense platform, and performs an anti-malware application update on the infected mobile endpoint device.09-05-2013
20130237185MOBILE RICH MEDIA INFORMATION SYSTEM - A system and method is described for providing an interactive rich media information service to users of mobile devices. The rich media information is presented to users in a plurality of interactive rich media channels. A subscriber-specific data stream is received at the mobile device containing channel data for each of the rich media channel that the user has subscribed to. The channel data is separated and stored corresponding to each such subscribed-to channel. An interactive multimedia runtime container (iMRC). is executed on the mobile device for each subscribed-to channel. The rich media channels are played on the iMRC and displayed on the display of the mobile device. Using the user interface elements of the mobile device, the user may navigate through the information on the channels, navigate between different channels, subscribe or un-subscribe to channels, and enter user preferences for further tailoring the information presented in the subscribed-to channels.09-12-2013
20130252582RADIO ACCESS NETWORK APPARATUS, CONTROLLING METHOD, MOBILE COMMUNICATION SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM EMBODYING INSTRUCTIONS FOR CONTROLLING A DEVICE - A radio access network apparatus is provided including a receiver that receives, from a mobile station, a request signal including context information used to communicate with the mobile station. The apparatus also includes a controller that allocates a sub-section of a first storage area for storing the context information in response to receiving the request signal. The receiver receives, from the mobile station, a completion signal that indicates that the connection is established with the mobile station and includes the context information. The controller allocates a sub-section of a second storage area for storing the context information in response to receiving the completion signal, and the second storage area is different from the first storage area.09-26-2013
20130260716Phone Number Encapsulation Using Token Based Framework - Embodiments of the invention related to a method for encapsulating phone numbers preferably using a token based framework and routing calls between users using such a token based framework, where the method comprises generating a set of tokens by a service provider for a phone number provided by the service provider, wherein the set of tokens comprise a generic token and a privacy token, the generic token maintained by the service provider and the privacy token distributed to a first user. Other embodiments are also disclosed.10-03-2013
20130267199METHOD FOR TRANSMITTING INFORMATION STORED IN A TAMPER-RESISTANT MODULE - A system and method are described in which direct communication between a removable tamper-resistant module in a mobile terminal and a third party server is permitted only after security information is transmitted indirectly through a secure server in a mobile network operator that provides mobile communication services to the mobile terminal. The third party server is logically located outside of the mobile network operator. The secure server is configured to be able to communicate with the removable tamper-resistant module via the secure communication link. The information is transmitted from the removable tamper-resistant module to the third party server or from the third party server to the removable tamper-resistant module and includes a key for encryption or decryption or a certificate for verifying data or program transmissions therebetween.10-10-2013
20130273884METHOD AND APPARATUS FOR MOBILE DEVICE SECURITY - A method, non-transitory computer readable medium and apparatus for providing security on a mobile endpoint device are disclosed. For example, the method scans for a radio frequency signal, determines a state of the mobile endpoint device and triggers an alarm on the mobile endpoint device if the radio frequency signal is not detected for a predefined period of time and the state of the mobile endpoint device is an inactive state.10-17-2013
20130273885INTERFACE FOR ACCESS MANAGEMENT OF FEMTO CELL COVERAGE - Access to femto cell service is managed through access control list(s), or “white list(s).” Such white list(s) can be configured via a networked interface which facilitates access management to a femto cell. White list(s) includes a set of subscriber station(s) identifier numbers, codes or tokens, and can also include additional fields for femto cell access management based on desired complexity. Various interfaces and user profiles are associated with granting different levels of access to requesting UEs.10-17-2013
20130281054MOBILE COMMUNICATION TERMINAL AND INCOMING CALL MANAGEMENT METHOD THEREOF - The invention discloses a mobile communication terminal and an incoming call management method. The mobile communication terminal comprises a master SIM card and an auxiliary SIM card. The method comprises the following steps of: when receiving an incoming call to the auxiliary SIM card, determining whether the auxiliary SIM card is locked; if the auxiliary SIM card is locked, stopping responding to the incoming call, and waiting for receiving from a user an instruction of whether to send a prompt message to inform a caller for the incoming call; and when receiving from the user an instruction of sending a prompt message to inform the caller for the incoming call, transmitting a prompt message that is automatically generated by the system or manually edited by the user to the caller with the master SIM card.10-24-2013
20130288641WIRELESS COMMUNICATION SYSTEM PROVIDING THE VERIFICATION OF THE NETWORK IDENTIFY - There is discussed a wireless communication system in which a mobile communication device communicates with a telephone network using wireless signals, the telephone network operating in accordance with a telecommunications standard which does not provide for the verification of the identity of the network. The telephone network includes a database storing identification information for a plurality of trusted cell sites. The mobile communication device is operable to retrieve identification data for a cell and send the retrieved identification data to a network entity in the telephone network using a data transfer functionality provided by the telephone network, and in response to receiving the retrieved identification data the network entity is operable to verify the identification data using the database of stored identification information. Preferably, the data transfer functionality is the USSI) protocol.10-31-2013
20130288642METHOD AND DEVICE FOR SECURITY ISOLATION - Disclosed are a method and device for security isolation. The method comprises: when a relay device receives a handover request message, if the handover request message contains reestablishment information for another cell, then when a user equipment is successfully handed over to a cell of the relay device or is successfully reestablished in the cell of the relay device, the relay device requesting a piece of key information from core network equipment. In embodiments of the present invention, the probability of successful reestablishment during UE handover is increased, and the probability of handover failure is reduced, also, as the key is isolated, communication security of the user is ensured.10-31-2013
20130295879ADAPTIVE COVERAGE AREA BY BEACON BREATHING - The embodiments disclosed herein relate to a system and method for redirecting unauthorized user equipment (UE) from a femto base station (BS) to a macro network. The system checks whether the UE is authorized or not by comparing the identifier of the UE with a list of authorized UE that are stored in the memory of the femto BS. If the UE is found to be unauthorized, the UE is redirected to the macro network.11-07-2013
20130295880BASE STATION DEVICE FOR USE AS PART OF AN ACCESS NETWORK OF A TELECOMMUNICATIONS NETWORK - A base station apparatus for operation as part of an access network of a mobile telecommunications network includes; a housing; a radio interface unit and a core network interface unit in the housing; a network line section between the radio interface unit and the core network interface unit; and a measuring apparatus, operatively connected to the network line section. The measuring apparatus is configured to detect at least one line parameter of the network line section, the at least one line parameter including a line parameter from the group of line parameters consisting of: the input impedance of the network line section; the insulation value of the network line section; the capacitance of the network line section; and the inductance of the network line section.11-07-2013
20130295881MANAGEMENT OF ACCESS TO SERVICE IN AN ACCESS POINT - System(s) and method(s) are provided to configure access rights to wireless resources and telecommunication service(s) supplied through a set of access points (APs). Access to wireless resources is authorized by access attributes in access control list(s) (ACL(s)) while a profile of service attributes linked to the ACL(s) regulate provision of telecommunication service(s). Access and service attributes can be automatically or dynamically configured, at least in part, in response to changes in data that directly or indirectly affects an operation environment in which the set of APs is deployed. Automatic or dynamic configuration of access or service attributes enable control or coordination of wireless service provided through the set of APs; degree of control or coordination is determined at least in part by enablement or disablement of disparate services for disparate devices at disparate access points at disparate times and with disparate service priority.11-07-2013
20130303118MOBILE DEVICE SECURITY - Systems, methods and procedures are described for thwarting undesirable applications from affecting mobile communication devices. A mobile communication device uses a server to assist in identifying and removing undesirable applications.11-14-2013
20130303119ACCESS CONTROL LISTS AND PROFILES TO MANAGE FEMTO CELL COVERAGE - Access to femto cell service can be managed through access control list(s) (e.g., white list(s), or black list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). Values of attribute fields that determine white list(s), black list(s), or white list profile(s) can be generated through various sources. An access list management component facilitates generation and maintenance of white list(s), black list(s), or white list profile(s). Values for identifier attribute field(s) available for inclusion in a white list are validated prior to inclusion therein. Various example aspects such as white list(s) management, maintenance and dissemination; automatic population or pre-configuration; and inclusion of wireless device(s) or subscriber(s) are also provided.11-14-2013
20130303120COMMUNICATION SYSTEM, BASE STATION, AND COUNTERMEASURE METHOD AGAINST CYBER ATTACK - A communication system according to the present invention includes: a mobile terminal; a base station; an operation/maintenance server; and a gateway that has a DPI function that detects whether or not uplink data received from said mobile terminal is illegal traffic. If said base station detects that an amount of the traffic of said uplink data exceeds a threshold, said base station transmits an alarm, that denotes that the amount of the traffic of said uplink data exceeds the threshold, to said operation/maintenance server. If said operation/maintenance server receives said alarm from said base station, said operation/maintenance server transmits to said gateway an activation command that causes said gateway to activate said DPI function.11-14-2013
20130303121Mobile Phone and Received Information Processing Method Thereof - Disclosed are a mobile phone and a method for processing received information thereof. The method comprises the following steps: determining whether received information under current processing is from a secondary subscriber identity module (SIM) card of the mobile phone, and determining whether the secondary SIM card is locked; if the received information is from the secondary SIM card of the mobile phone and the secondary SIM card is locked, waiting for a subscriber to determine whether to process, through a primary SIM card of the mobile phone, the received information; and if the subscriber determines to process, through the primary SIM card of the mobile phone, the received information, processing the received information through the primary SIM card. In the present invention, when the secondary SIM card in the mobile phone is locked and it is necessary to reply to or forward a short message on the secondary SIM card, received information from the secondary SIM card can be processed in time through the primary SIM card, which is greatly convenient for the use of the subscriber11-14-2013
20130324080MOBILE TERMINAL AND LOCKED STATE CANCELLING METHOD - A mobile phone apparatus is provided with an accelerometer for detecting an attitude and a display for displaying a moving object. Furthermore, a key locked state is set to the mobile phone apparatus for the purpose of preventing an operating error in the key. When an arbitrary key is operated in the key locked state, the moving object and a pocket object representing a predetermined area, etc. are displayed on the display. Then, when the moving object changes in position in correspondence with the change of the attitude of the mobile phone apparatus and is put into the pocket object, the key locked state is cancelled.12-05-2013
20130331061System And Method For Controlling, Monitoring And Recording OF Wireless Communications In Penal Institutions - A system for controlling, monitoring, and recording of wireless telecommunications services associated with penal institutions is provided comprising a portable electronic device and application executing on the device that present a listing of available call destinations based on receiving a first instruction from a first authorized party possessing the device. The application receives a second instruction comprising a choice of a first call destination from the listing. The application transmits a third instruction requesting connection with the destination and joins a second authorized party associated with the first call destination in a first voice session. The application joins the first authorized party to the first session. The application further joins the first party to a second voice session initiated by the second party based on determining that the second party initiated the second session from the first destination. The device originates and receives transmissions solely upon approval of the application.12-12-2013
20130331062MOBILE TERMINAL AND NETWORK UNLOCKING METHOD AND SYSTEM THEREOF - A network unlocking method of a mobile terminal is disclosed in the invention. The method includes: after being used, a mobile terminal whose network is locked transmitting hardware information to a network sever (12-12-2013
20130337770MANAGEMENT OF COMMUNICATION PIPES IN A TELECOMMUNICATION DEVICE COUPLED TO AN NFC CIRCUIT - A method for detecting an attempt of diversion of a communication pipe between a port of a security module and a port of a near-field communication router present in a telecommunication device, wherein the router filters the messages addressed to said security module.12-19-2013
20140011474NON-ACCESS STRATUM ARCHITECTURE AND PROTOCOL ENHANCEMENTS FOR LONG TERM EVOLUTION MOBILE UNITS - A method and apparatus performs processing of the non-access stratus (NAS) layer (layer 3) in long term evolution (LTE) wireless transmit/receive units (WTRUs), which allows the NAS protocol layer to route layer 3 messages to the correct NAS entity, and to encode new NAS message types and information elements. A new architecture is presented that enables NAS security. When a NAS message is generated, a determination is made as to whether or not to cipher, de-cipher and/or integrity check the NAS message based on at least one of a protocol discriminator (PD) of the NAS message, an indicator field in a header of the NAS message, the type of the NAS message, a NAS security state variable, and an indication by an upper layer protocol. The NAS security state variable indicates whether NAS security is currently active or not and may comprise one bit.01-09-2014
20140031008SYSTEM AND METHOD OF SECURE MESSAGE PROCESSING - A system and method for handling message indicator processing on a wireless mobile communications device. Message state data is stored in a cache for use in generating message indicators.01-30-2014
20140031009FRAUD PREVENTION TECHNIQUES - System, apparatus, computer program products and methods for preventing fraud attacks (e.g., on a virtual PBX service provider) are disclosed. In some implementations, a set of fraud evaluation processes are performed, an overall fraud evaluation score is incremented as each of the set of fraud evaluation processes are performed and a step result is obtained. A user request (e.g., account activation) can be denied or accepted based on the overall fraud evaluation score. In some implementations, the set of fraud evaluation processes can include one or more of: an internal fraud evaluation process, a process for checking multiple trial accounts associated with a common account parameter, a process for geolocation verification of multiple account parameters, a process for device type verification for a contact phone number, a process for credit card verification, and a process for placing a contact number verification call.01-30-2014
20140038553RECOGNIZING UNKNOWN ACTORS BASED ON WIRELESS BEHAVIOR - An illustrative behavior analysis system and a corresponding method are designed to analyze telecommunications-event records and other relevant records associated with wireless terminals to infer whether a wireless user's pattern of behavior is substantially similar or even identical to the pattern of behavior of another user, possibly a known actor, A pattern of behavior typically comprises call-related and location attributes over a period of time. Accordingly, the illustrative embodiment infers an identity or a substantial similarity as between two seemingly distinct users of wireless terminals, based on: (i) how precisely a candidate's pattern of behavior matches a pre-defined pattern of behavior, and/or (ii) how precisely a candidate's pattern of behavior matches another candidate's pattern of behavior.02-06-2014
20140038554PUSHING SECURE NOTIFICATIONS TO MOBILE COMPUTING DEVICES - Techniques are provided for pushing secure notifications to a mobile computing device. For example, a method for pushing secure notifications includes a push service platform receiving a push notification message request from an entity registered with the push service platform, processing the push notification message request to generate a secure push notification message, and sending the secure push notification message to a target mobile computing device through a native third-party push service associated with the target mobile computing device. The secure push notification message includes a message ID (identifier) that corresponds to message content associated with the push notification message request. The method further includes the push service platform receiving a pull message request from the target mobile computing device, the pull message request requesting the message content associated with the push notification message corresponding to the message ID, and sending the requested message content associated with the push notification message to the mobile computing device.02-06-2014
20140038555METHOD AND APPARATUS FOR MOBILE DEVICE SECURITY - A method, non-transitory computer readable medium and apparatus for providing security on a mobile endpoint device are disclosed. For example, the method scans for a radio frequency signal, determines a state of the mobile endpoint device and triggers an alarm on the mobile endpoint device if the radio frequency signal is not detected for a predefined period of time and the state of the mobile endpoint device is an inactive state.02-06-2014
20140045456METHOD AND SYSTEM FOR PREVENTING ILLICIT USE OF A TELEPHONY PLATFORM - A system and method for preventing illicit use of a telephony platform that includes enrolling a plurality of accounts on a telecommunications platform, wherein an account includes account configuration; at a fraud detection system of the telecommunications platform, receiving account usage data, wherein the usage data includes at least communication configuration data and billing configuration data of account configuration and further includes communication history of the plurality of accounts; calculating fraud scores of a set of fraud rules from the usage data, wherein at least a sub-set of the fraud rules include conditions of usage data patterns between at least two accounts; detecting when the fraud scores of an account satisfy a fraud threshold; and initiating an action response when a fraud score satisfies the fraud threshold.02-13-2014
20140045457SYSTEMS AND METHODS FOR APPLYING A SECURITY POLICY TO A DEVICE BASED ON A COMPARISON OF LOCATIONS - Location information associated with a computing device may be received by a server. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device is in a location that has been identified in the set of locations. In response to such a determination, a particular security policy may be applied to the computing device. For example, the server may transmit a command to the computing device to apply a security policy associated with the location.02-13-2014
20140051388Communication Method And Infrastructure Supporting Device Security And Tracking Of Mobile And Portable Multimedia Devices - From a laptop and a client server interface, a subscriber securely initiates tracking and/or disabling of a communication device by a server. The subscriber receives location and/or usage reports for the communication device. The subscriber is provided with the capability to modify a profile, device status and/or transfer ownership of the device via a client server interface. Based on the profile, detection of a particular event triggers tracking and/or disabling of the device by the server. The communication device registers with the server utilizing its unique device ID and/or the subscriber identity information when accessing the internet. The server is enabled to communicate a status and/or a request for tracking information, to the communication device. The server is also enabled to receive tracking and/or location information and communicates it to the subscriber's laptop.02-20-2014
20140051389Proximity-Based Authorization - Methods and apparatuses are disclosed for enabling the response to a command from a wireless terminal to be based at least partially on the presence or absence of other users nearby, and possibly the identity of those users. In the illustrated embodiment, a server maintains an updated list of the locations of fixed and wireless terminals within an area (e.g., an IEEE 802.11 wireless access point's area of coverage, a CDMA base station's cell, etc.). When a user issues a command to his or her wireless terminal, the command is transmitted to the server. The server determines whether there are any other nearby wireless terminals (and inferentially, the users associated with these terminals), and then determines whether the command is authorized in that environment.02-20-2014
20140057596AUTHENTICATING USER SESSIONS BASED ON INFORMATION OBTAINED FROM MOBILE DEVICES - An online system determines whether a request for creating a session with the online system is suspicious. The online system associates a user account with a mobile key of a mobile device and geographical locations of the mobile device. The mobile key comprises unique identifier of the mobile device that is permanently stored on the mobile device. Upon receiving a request to create a session for the user account, the online system compares information associated with the user request with information describing the mobile device. For example, information associated with the user request can be a location determined by mapping internet protocol addresses obtained from the request. The online system determines whether the request is suspicious based on the comparison. If the online system determines that the request is suspicious, the online system may require enhanced authentication before granting the request.02-27-2014
20140066009LOCATION-BASED RECOVERY DEVICE AND RISK MANAGEMENT SYSTEM FOR PORTABLE COMPUTING DEVICES AND DATA - A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and system for acquiring such devices, protecting data on such devices, and for compensating owners of devices. A GPS mechanism of the invention provides real time tracking of missing devices that may be coordinated with security agencies to intercept and recover missing computing devices. When a stolen device is unrecoverable, the invention may receive a signal to initiate data recovery where a wireless network is available to recover data for the owner. Alternatively, the GPS mechanism instructs the device to encrypt or destroy stored data files to prevent commercial espionage or privacy violations. The invention discloses a software system and method for computing a purchase price of the GPS mechanism, computing compensation for loss of the device and lost data.03-06-2014
20140066010LOCATION-BASED RECOVERY DEVICE AND RISK MANAGEMENT SYSTEM FOR PORTABLE COMPUTING DEVICES AND DATA - A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and system for acquiring such devices, protecting data on such devices, and for compensating owners of devices. A GPS mechanism of the invention provides real time tracking of missing devices that may be coordinated with security agencies to intercept and recover missing computing devices. When a stolen device is unrecoverable, the invention may receive a signal to initiate data recovery where a wireless network is available to recover data for the owner. Alternatively, the GPS mechanism instructs the device to encrypt or destroy stored data files to prevent commercial espionage or privacy violations. The invention discloses a software system and method for computing a purchase price of the GPS mechanism, computing compensation for loss of the device and lost data.03-06-2014
20140066011METHOD FOR TRANSFERRING SECURELY THE SUBSCRIPTION INFORMATION AND USER DATA FROM A FIRST TERMINAL TO A SECOND TERMINAL - The present invention concerns a method for transferring securely the subscription information and user data from a first terminal to a second terminal, the terminals respectively containing a first and a second UICC. According to the invention, the method consists in:03-06-2014
20140066012SMALL CELL SERVICE DELIVERY PLATFORM USAGE COMPLIANCE - Embodiments of the disclosed invention include an apparatus, method, and computer program product for managing cellular usage in controlled areas. For example, in one embodiment, a method executed by a cellular monitoring system for managing cellular usage in a controlled area is disclosed that includes the steps of configuring a size of the controlled area by varying the signal strengths associated with the one or more small cells; identifying a cellular device within signal range of one or more small cells placed in the controlled area; determining whether the cellular device is an authorized device within the controlled area; and alerting security personnel in response to determination that the cellular device is not an authorized device within the controlled area.03-06-2014
20140073286MOBILE ACCESS IN A DIVERSE ACCESS POINT NETWORK - Facilitating user terminal (UT) access to wireless networks having base stations (BSs) of disparate access types is described herein. In some aspects, BS parameterization is provided to facilitate search and/or access to distinct types of network BSs. For instance, parameters can modify a likelihood of identifying or remaining coupled to restricted access (RA) BSs in a home Node B (HNB) deployment. In other aspects of the subject disclosure, a PLMN ID reserved for HNBs is provided comprising multiple region IDs. Where a UT identifies a home region, HNBs can be given preference over macro BSs. Additionally, the UT can keep track of HNBs and HNB regions that reject access to the UT, and implement a delay time to mitigate rapid signaling to foreign HNBs in a dense HNB deployment. Accordingly, the subject disclosure provides for more efficient UT access in heterogeneous access type networks.03-13-2014
20140080444METHOD FOR UPDATING SECURE ELEMENTS INCLUDED IN TERMINALS OF A TELECOMMUNICATION NETWORK AND CORRESPONDING UPDATE SERVER - The invention relates, in particular, to a method for updating secure elements included in terminals of a telecommunication network. The terminals connect, for recurring updates and according to a first order, to a server of the network such that said server can transmit data thereto. In the context of a process for updating the secure elements, the method comprises transmitting messages requesting connection to the secure elements such that the latter connect to the server. According to the invention, the method comprises the prioritized transmission of the messages requesting connection to the secure elements in an order that is the reverse of the first order, in order to update, on a prioritized basis, the last secure elements that were updated by the recurrent updates from the start of the update process.03-20-2014
20140080445Systems and Methods for Detecting and Controlling Transmission Facilities - A method of detecting, controlling and managing transmission of a transmitting device within a facility is disclosed. The method involves transmitting information to the transmission device, detecting a response transmission from the transmission device by a least one transmission detection facility, extracting identification information associated with the transmission device in response to the transmitted information; and determining a location of the transmission device based on the response transmission received by the at least one received transmission detection facility, wherein the response transmissions are sorted by the identification information, determining an allowability of the located transmission device with the set area and interacting and manipulating transmission of the detected transmitting device03-20-2014
20140080446Security Mechanism for Mobile Users - A wireless communication device for use in a cellular network. The device comprises a radio interface for enabling communication between the device and a base station of the cellular network over a radio link, and a transfer entity for exchanging user data packets with a core network node of said cellular network over a signalling connection within a Non Access Stratum, via said radio link. The device further comprises a data transmission verification entity for using a verifiable acknowledgement, received from said core network node over a signalling connection within a Non Access Stratum, to confirm delivery of a user data packet sent to the core network node over a signalling connection, the data transmission verification entity being configured to selectively include with a user data packet sent to said core network node across a signalling connection, a request to return to the device a verifiable acknowledgement for the sent user data packet.03-20-2014
20140094141Apparatus and Methods for Preventing Information Disclosure - The present application is directed to apparatuses and methods for preventing information disclosure. According to example embodiments of the present application, after a mobile terminal of a user is lost, a first short message may be sent to the mobile terminal through a short message network. When the mobile terminal determines that the received short message is the first short message, user information stored in the mobile terminal may be erased by the mobile terminal.04-03-2014
20140099919METHOD FOR DELIVERING ELECTRONIC DOCUMENTS USING MOBILE TELEPHONY IDENTIFIERS IN A SECURE MANNER IN CONJUNCTION WITH INTERNET PROTOCOLS AND ADDRESS SYSTEMS - Systems, methods, and media for delivering electronic documents using mobile telephony identifiers, such as IMEI, in a secure manner in conjunction with Internet protocols and address systems are provided herein. According to some embodiments, exemplary methods may include receiving a communication, determining a hybrid endpoint identifier associated with a communications device by evaluating the communication for either the hybrid endpoint identifier or routing information, the hybrid endpoint identifier comprising an identifier appended to a telephone number, and routing the communication to the communications device via a telephony network based upon the hybrid endpoint identifier.04-10-2014
20140106707INTER-DEVICE COMMUNICATION AUTHORIZATION AND DATA SNIFFING IN WIRELESS COMMUNICATION SYSTEMS - Systems and methods for user equipment (UE) for inter-device communication authorization and data sniffing in wireless communication systems are provided. A UE may communicate directly with another UE over a direct inter-device communication link when they are located in proximity. The UE may receive data sniffing related parameters corresponding to the inter-device communication link from a network entity, e.g. a mobile management entity (MME). The UE may store data exchanged over the inter-device communication link in a buffer and upload the stored data to a secure server in a network periodically or upon receiving a request from the network. Long term evolution (LTE) downlink or uplink radio resources may be used for the data exchange over the inter-device communication link.04-17-2014
20140106708CONTINUOUS MONITORING OF DATA EXPOSURE AND PROVIDING SERVICE RELATED THERETO - Technologies are disclosed for enabling users to comprehensively determine their exposures to media and to receive services based thereon. For example, an application can be executed on a computing device associated with a user. The application can continuously monitor audio data that the computing device is exposed to and can generate digital signatures thereof. The digital signatures can be transmitted to a server that comprises a database of reference digital signatures and circuitry configured to compare and match the received digital signatures and the reference digital signatures. When a match is found, the server retrieves information associated with the matched reference digital signature and returns, to the device, the retrieved information. The server can also concatenate matches associated with data received from a plurality of computing devices and provide the concatenated data to a third party, who in turn, returns services to the users based on the received data.04-17-2014
20140113587Mobile Security with Associated Vital Function Device - Mobile electronic devices and related methods to achieve an enhanced security level are disclosed. A security module is deeply embedded in a non-open associated vital functions chip of the mobile device, wherein the associated chip controls vital functions of the mobile device. Any security technology can be provided by the security module. The security module can, in case of a security violation, disable vital functions of the associated chip without requiring communicating to other components of the mobile device. The vital functions deployed in the associated chip comprise e.g. system power management, battery, display, and/or audio functions.04-24-2014
20140113588SYSTEM FOR DETECTION OF MOBILE APPLICATIONS NETWORK BEHAVIOR- NETWISE - The invention is a system for protecting mobile devices in cellular networks from unauthorized harmful applications and for protecting cellular network infrastructure from targeted or benign overloads. The system comprises mobile cellular devices and a cellular network infrastructure. Some of the mobile devices comprise an application manager, which is adapted to manage the aggregation and learning processes, and a detection manager, which is adapted to analyze network behavior and detect deviations. The application manager and the detection manager are adapted to monitor the applications running on a device, learn the patterns of mobile applications network behavior and detect meaningful deviations from the application's observed normal behavior. The cellular network infrastructure comprises a services module, a logic module, and a database access unit adapted for aggregation and analysis of an application's network traffic patterns for numerous users.04-24-2014
20140120870OPERATIONS AND MAINTENANCE ARCHITECTURE FOR MULTIPROTOCOL DISTRIBUTED SYSTEM - One embodiment is directed to a system comprising a first unit and remotely located second units. The first unit comprises a transport medium interface to produce a common transport signal from first and second wireless service provider signals and to communicate the common transport signal on a common transport medium. Each second unit comprises first and second equipment associated with first and second wireless service providers, respectively. The first and second equipment in each second unit produces a respective first and second wireless service signal to be radiated from at least one antenna associated with that second unit. The system further comprises a common network management system configured to: receive first and second control messages from first and second wireless service provider network management systems, respectively, and forward the first and second control messages to the first and second equipment, respectively, in the second units using the common transport medium.05-01-2014
20140120871Access Control According to a Policy Defined for a Group of Associated Electronic Devices Comprising a Cellular Modem - Access to a telecommunications network can be controlled according to a policy defined for a plurality of user equipment devices associated with the same user. When two user equipment devices are allowed to operate in parallel under the same subscription, the policy may define a distance between the user equipment devices. When the actual distance between the user equipment devices conforms with the distance defined in the policy, one or more network nodes serving one of the user equipment devices can be assigned to replace a network node serving the other user equipment device to prevent abuse of the end user's subscription or to optimize performance, so as to consolidate service.05-01-2014
20140134977SUBSCRIBER TERMINAL IDENTIFICATION - Subscriber terminal identification is disclosed. An apparatus controls a base station to form an emulated long term evolution LTE cell such that tracking area code and physical cell identity of the emulated LTE cell are unused by real neighbouring LTE cells, and radio frequency power level of the emulated LTE cell within the emulated LTE cell is higher than the radio frequency power levels of the real neighbouring LTE cells within the emulated LTE cell; and controls the base station to receive a connection request from a subscriber terminal residing in the emulated LTE cell, whereupon, in the ensuing exchange of messages, the base station is controlled to receive an international mobile subscriber identity from the subscriber terminal.05-15-2014
20140155026METHOD FOR SETTING SPAM STRING IN MOBILE DEVICE AND DEVICE THEREFOR - The present invention relates to configuring spam strings in a mobile device which receives text messages through a wireless communication network. When a part or all of a received text message is selected on the screen showing the contents of the received text message, a menu for instantly registering the selected portion as a spam string is displayed. Accordingly, a user may avoid an inconvenience caused in memorizing the spam string, opening a spam filtering configuration menu and then manually typing the spam string accurately in the spam filtering configuration menu. Further, since the spam string to be set is directly copied from an actually received spam text message, a recent trend of spam text messages can be taken into consideration setting the spam string.06-05-2014
20140155027ELECTRONIC DEVICE AND A COMPUTER PROGRAM PRODUCT - An electronic device comprises a secured module arranged to store secured data. A component outside the secured module has a normal operating mode with a normal mode operating voltage. An interface is arranged to provide access to the secured module. A voltage monitoring unit is connected to the component and arranged to monitor an operating voltage Vsup of the component. An interface control unit is connected to the voltage monitoring unit and the interface. The interface control unit is arranged to inhibit access to the secured module through the interface when the operating voltage is below a predetermined secure access voltage level, the secure access voltage being higher than the normal mode operating voltage.06-05-2014
20140171023System and Method for Secure Control of Resources of Wireless Mobile Communication Devices - Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles.06-19-2014
20140179269METHOD FOR INTERACTION RECORDING PRODUCT MANAGEMENT, SERVICE DELIVERY AND BILLING - Recording commercial, legal, and other interactions enable organizations and individuals to meet regulatory compliance, improve customer service, and eliminate fraud. The process of recording those interactions is progressively being performed by software products and delivered as an Internet or WAN hosted service by providers. Recording products are further becoming more functional, by adding additional capabilities onto the base process of recording, such as interaction analysis and reporting. The purpose of the invention is to enable providers to customize, fulfill, and invoice the services and capabilities of such a recording function offered to individuals and organizations of variable size and requirement.06-26-2014
20140179270SYSTEM AND METHOD FOR DETECTING ANOMALY IN A HANDHELD DEVICE - The inventive subject matter of the present disclosure provides a system and method for detecting anomalies in a handheld device based on a plurality of parameters that indicate current phone usage context, mobility pattern, or behavior of a handheld device. Anomalies in handheld devices can be a result of, but not limited to, lost or stolen phone, loss of information/data, change in calls being made, change in user mood, change in browsing pattern, sudden change in user location, or other such conditions. One aspect of the inventive subject matter includes detecting anomalies in a handheld device, specifically, detecting whether a phone has been lost or stolen, by considering one or more parameters of the handheld device that are indicative of current phone usage context, mobility pattern, or behavior of a handheld device.06-26-2014
20140179271SMART CARD WITH DOMAIN-TRUST EVALUATION AND DOMAIN POLICY MANAGEMENT FUNCTIONS - Methods and instrumentalities are disclosed that enable one or more domains on one or more devices to be owned or controlled by one or more different local or remote owners, while providing a level of system-wide management of those domains. Each domain may have a different owner, and each owner may specify policies for operation of its domain and for operation of its domain in relation to the platform on which the domain resides, and other domains. A system-wide domain manager may be resident on one of the domains. The system-wide domain manager may enforce the policies of the domain on which it is resident, and it may coordinate the enforcement of the other domains by their respective policies in relation to the domain in which the system-wide domain manager resides. Additionally, the system-wide domain manager may coordinate interaction among the other domains in accordance with their respective policies. A domain application may be resident on one of the domains. The domain application may be ported to the platform based on a relationship between at least one domain owner and at least one other domain owner of the one or more domains.06-26-2014
20140187199METHOD AND SYSTEM TO IMPROVE DEVICE PINGING - A method and system are provided for determining the network status of a mobile device. A wireless connection between the mobile device and a wireless packet data communication network is established. The mobile device sends a data packet through the network and monitors for a response via the network one or more times within a period or until a response via the network is received. If no response is received via the network, a test message is sent to a dummy server a predetermined number of times within a period or until a response from the dummy server is received. Upon determining that a response from the dummy server has been received, the mobile device deactivates or blocks network access requests originating from the mobile device to the network, unless initiated by a user of the mobile device.07-03-2014
20140187200LOCATION-SENSITIVE SECURITY LEVELS AND SETTING PROFILES BASED ON DETECTED LOCATION - The security level and/or other device behavior, configurations, or settings on a mobile device can be modified based on the location of the mobile device. The location of the mobile device can be determined by analyzing location aspects present at a location, where any parameters or attributes of a location that can assist in identifying a particular location may be used as location aspects. In a setup process, the mobile device identifies available aspects at a location and can use the available aspects to determine a location context associated with a location. In a use example, the device identifies available aspects at a location and determines whether the available aspects match a previously defined location context. If the available aspects match the previously defined location context, device behavior, configurations, or settings on a mobile device can be modified.07-03-2014
20140194094DATA LOSS PREVENTION FOR MOBILE COMPUTING DEVICES - System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.07-10-2014
20140199963METHODS AND APPARATUS FOR A NETWORK-AGNOSTIC WIRELESS ROUTER - Apparatus and methods for a network-agnostic wireless router. In one embodiment, the network-agnostic wireless router is configured to provide an access tunnel (e.g., a so-called “Wi-Fi PIPE”) via a first network (e.g., a Wi-Fi network), and convert the data payload for transfer over a second network (e.g., a LTE network). Since the wireless router provides an access tunnel and does not behave as a logical endpoint, the authentication, authorization, and accounting mechanisms are handled directly between the subscriber's identity module (e.g., SIM, USIM, CSIM, RUIM, etc.) and the network operator's authentication process (e.g., Authentication Center or AuC). The disclosed wireless router is free to support multiple different networks to provide access that is “agnostic” to the underlying subscriber device's network preferences.07-17-2014
20140199964METHOD AND APPARATUS FOR INCREMENTALLY DETERMINING LOCATION CONTEXT - Techniques to derive or predict location context for a user of a mobile device include receiving signal data that indicates a set of one or more distinct signal sources from which signals are received at the mobile device for each of multiple different times. The method further comprises determining whether the mobile device is moving outside a specified area at a current time based on the signal data. The method further comprises incrementing a count for a stationary state associated with the set of one or more distinct signal sources at the current time, if the mobile device is determined to be not moving outside the specified area. The method also comprises delivering a service to the mobile device based on the stationary state.07-17-2014
20140220933MOBILE PUSH NOTIFICATION - Systems and methods are described herein that provide a mobile push notification system that sends notifications to various types of mobile devices using a single cloud based interface. One example embodiment includes a registration logic configured to receive device data from a mobile device. A record of the device data is stored in a database. A token generator creates a registration token that identifies the mobile device. The registration logic is facilitates communication between the mobile device and a vendor service when the registration token is received from the mobile device.08-07-2014
20140220934Access Control of Relay Node with Closed Subscriber Group - There are provided measures for access control of a relay node with a closed subscriber group, said measures exemplarily comprising retrieval of setting information relating to a closed subscriber group of a base station function of a relay node, said relay node requesting access to a relay-enhanced cellular system via a donor base station, acquisition of setting information relating to a closed subscriber group of the donor base station, and execution of access control of the base station function of the relay node based on the setting information relating to the closed subscriber groups of the base station function of the relay node and the donor base station.08-07-2014
20140220935Methods And Systems For Injecting Wireless Messages in Cellular Communications Systems - Methods and systems for injecting a wireless message in a cellular communication system. The attacking system receives a synchronization waveform from a base station and synchronizes in time and frequency. The attacking system transmits the correct time and frequency, and also transmits one or more attack messages. The mobile transceiver receives the one or more attack messages and responds. The attacking system then transmits a first wireless message configured to alter a characteristic of a physical layer of the mobile station.08-07-2014
20140235203MULTIPLE-PERSONA ON MOBILE DEVICES - Disclosed is a system and method of allowing multiple customer support organizations to establish virtual mobile management sessions with a mobile device using a multi-persona client on the mobile device that does not have to reconfigured for each of the multiple customer support organizations.08-21-2014
20140235204Software Application for Intercepting Phone Call and Text Messages from Specific Contacts - A method for a software application is used to intercept unwanted phone calls or text messages for a cellular phone. The software application allows a user to manage their blacklist, which contain contacts that the user does not want to communicate with. When the software application receives an incoming or outgoing communication with a telephone number, the software application will compare that telephone number with the telephone numbers of the contacts on the blacklist. If the telephone number of the incoming or outgoing communication matches one of the telephone numbers in blacklist, the incoming or outgoing communication is blocked from its intended destination. The software application will then send an audio or textual intercept message to the sender of the incoming or outgoing communication.08-21-2014
20140242945METHOD AND SYSTEM FOR MONITORING APPLICATION PROGRAM OF MOBILE DEVICE - The present disclosure provides a method and system for monitoring an application. The method comprises creating a simulated system service; establishing a connection with a function in a device driver that manages an Input/Output (I/O) channel of the device; intercepting data transmitted from the application to the function in the device driver that manages the I/O channel of the device; replacing, based on the intercepted data, a system service requested by the application with a corresponding simulated system service; and recording a request received by the simulated system service and forwarding the request to an analysis module for analysis. The present disclosure is advantageous in that the system request is intercepted during the Binder communication process of the system and the simulated system layer service is used for analyzing the behavior features of the application in the Android operating system. In contrast to other application blocking techniques, the method and system according to the present disclosure do not disturb the normal operation of the application.08-28-2014
20140242946Method for Simultaneous Communications with Multiple Base Stations and Related Communication Device - A method of handling simultaneous communications in a communication system comprises a user equipment (UE), a first base station and the second base station, where the UE has been connected to the first base station. The method comprises the first base station determining to allocate a cell of the second base station to the UE; the first base station transmitting a cell addition request message to the second base station in response to the determination, for requesting the second base station to allocate radio resources of the cell of the second base station to communicate with UE; and the first base station transmitting a first radio resource control (RRC) message to the UE, wherein the first RRC message comprises information related to the security key and information related to the security algorithm.08-28-2014
20140256286Intelligent Protocol Selection - Example apparatus and methods concern intelligent protocol selection to facilitate more efficiently establishing secure network connections from known locations. One example method determines that a mobile device is seeking to make a connection to a secure resource from a location through a network and then acquires identifying information associated with the mobile device, the location, or the secure resource. If preferred connection information related to the identifying information is available to the mobile device, then the connection will be made using the preferred connection information. If preferred connection information related to the identifying information is not available, then the connection will be made using discovered protocol information. Once the connection is made, information about the protocols used to make the connection may be recorded or updated to influence the future establishment of secure connections by a similar device in a similar situation.09-11-2014
20140256287MOBILE HANDSET EXTENSION TO A DEVICE - Mobile operation is extended to a device. An extension interface comprises a client component within a mobile that is linked to a client component within the device. Extension of mobile operation is secured via delivery of credentials associated with the mobile to the device. Delivery of credentials is temporary and typically spans the period during which mobile operation is extended to the device. Application(s) and content(s) can be conveyed to the device for utilization therein. An emulation component that can reside at least in part on the client component within the device can emulate mobile operation. Client component within the mobile can include at least in part (i) a component that downloads drivers for communication with, and utilization of, the device to which mobile operation is extended, and (ii) a component that can scan for wireless-capable devices to extend mobile service thereto.09-11-2014
20140273949METHOD AND APPARATUS FOR WIRELESS DEVICE COUNTERMEASURES AGAINST MALICIOUS INFRASTRUCTURE - System, apparatus, and methods are provided for protecting against malicious infrastructure in a wireless communication network. A system determines a trust metric for an access point and decides to avoid communication with the access point based on the trust metric for the access point. The trust metric may, for example, be a numeric value such as a probability of trustworthiness or a categorization of trustworthiness. The system may determine the trust metric by receiving a list of access points and their corresponding trust metrics and matching a potential access point to its listed trust metric. The system may try to avoid using an untrustworthy access point's services unless it deems the services important enough to risk the communication.09-18-2014
20140273950Mobile Application Identification and Control through WiFi Access Points - A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones, tablet computers, and the like, that seek to access the Internet (or another network) via the access point and applying network access policies to data communications by those applications according to application, location, context, device and/or user characteristics.09-18-2014
20140273951MULTI-TIER SERVICE AND SECURE WIRELESS COMMUNICATIONS NETWORKS - The present invention pertains to improved communication quality and security of transmission in cellular communication networks. A customer has the option to pay different fees for different tiers of service relating to voice quality, bandwidth access, and different tiers of service relating to communications security. Higher tiers may guarantee a specific vocoder or bit rate is used, or guarantee a specific encryption protocol is use to ensure secure communications. Different tiers may be associated with customers' records for billing purposes. The network may afford high end devices higher voice quality and/or security via a lookup table indicating what level of service is associated with a given device. Calling or receiving devices may negotiate with each other to change to a more robust vocoder or bit rate to ensure a higher quality and/or security. Furthermore, the user may opt to change the quality and/or security level before or during a call.09-18-2014
20140302815RECOVERY FROM ABORTED INTEGRITY PROTECTION CHANGE - A method, in a wireless communications device, comprising: receiving a new security mode configuration from a radio access network that is to replace an original security mode configuration as part of a security procedure; detecting, prior to completion of said security procedure, that a cell update message is to be sent to the network; transmitting a first cell update message to the network in accordance with the original security mode configuration; transmitting a second cell update message to the network in accordance with the new security mode configuration; receiving a cell update confirm message, the cell update confirm message sent by the network in accordance with a network determined security mode configuration; ascertaining if the network determined security mode configuration is either the original or new security mode configuration; and completing the cell update procedure in accordance with the ascertained security mode configuration.10-09-2014
20140302816Method and apparatus for binding universal integrated circuit card and machine type communication device - The disclosure discloses a method and apparatus for binding a UICC and an MTC device to solve a problem of restriction to a binding relationship imposed by a life cycle of a pre-shared key Ks_local when binding of the MTC device and the UICC is implemented by way of GBA-U. With the disclosure, after a binding relationship between the MTC device and the UICC is established on the UICC, when a stored key shared by the MTC device and the UICC expires, a key Ks_local shared by the UICC and the MTC device can be re-established through a process of establishing the shared key Ks_local based on the GBA-U according to the established binding relationship, such that the binding relationship between the UICC and the MTC device is not restricted by the life cycle of a shared key Ks_local.10-09-2014
20140308919APPLICATION-LEVEL TRUSTED THIRD PARTY SOLUTION BASED ON AN ANTIVIRAL MOBILE CLIENT - An application-level trusted third party solution is provided based on an antiviral mobile client. The system can receive, from an application executing on a mobile device, requests to perform functions controlled by an operating system executing on the mobile device, and send status requests to an antiviral application executing on the mobile device in response to receiving the requests. The system can also receive antiviral status reports associated with the mobile device in response to sending the status request to the antiviral application, and thereafter can forward the antiviral status report to the application, wherein the antiviral status report is employed by the application to perform the functions on the mobile device.10-16-2014
20140308920DISABLING MOBILE DEVICES THAT ORIGINATE MESSAGE SERVICE SPAM - A method performed by a network device may include receiving a mobile directory number (MDN) that has been identified as a mobile spam originator and generating a query for attributes of a mobile device registered with the MDN. The method also includes receiving a query response that include attributes of the mobile device and determining to block the mobile device from access to a network associated with the network device. The method further includes providing, by the network device and to a blacklist system, one or more of the device attributes.10-16-2014
20140308921METHOD AND APPARATUS FOR SECURITY COMMUNICATION OF CARRIER AGGREGATION BETWEEN BASE STATIONS - This invention discloses a method for security communication of carrier aggregation between base stations, which method comprises receiving, by a user equipment, a first message to add a cell controlled by a secondary base station as a service cell sent by a primary base station; and creating, by the user equipment, a security key for communication with cells controlled by the secondary base station according to security context of the primary base station and the first message. This invention further discloses the corresponding user equipment and base stations. Implementation of the method and apparatus according to the present invention makes it possible to effectively protect security of data transmission of the air interface and to avoid attacks on air interface security.10-16-2014
20140315517System and Method for automatic Data Security Back-up and control for Mobile Devices - Systems and methods for providing security and control of mobile communications device activity including at least one mobile communication device with software operable thereon for receiving rules provided by an authorized user of the device(s) and in accordance with those rules administering actions to provide for controlling and security data stored or generated on the device(s), including logging data and activities related to the mobile communications device, blocking and filtering calls, messages, websites, emails, and combinations thereof, via wireless communication with a remote server computer having a corresponding software module operable thereon for managing and implementing the rules.10-23-2014
20140349608SECURE RF COMMUNICATION METHOD, TERMINAL AND SYSTEM - A method, terminal and secure RF communication system are provided. The method for radio frequency secure communication of the invention comprises: generating magnetic channel data, and transmitting the magnetic channel data via a magnetic channel; establishing a radio frequency link with a peer device which feeds back a response information of the magnetic channel data; generating first radio frequency data, encrypting the first radio frequency data using the magnetic channel data, and transmitting the encrypted first radio frequency data to the peer device via the radio frequency link; and/or receiving encrypted second radio frequency data transmitted by the peer device via the radio frequency link, and decrypting the encrypted second radio frequency data using the magnetic channel data. By the above technical solution, the invention avoids the risk that a preset key is intercepted or decrypted, and enhances the security of the radio frequency link data exchanging process.11-27-2014
20140370850DETECTION OF POTENTIALLY FRAUDULENT ACTIVITY BY USERS OF MOBILE COMMUNICATIONS NETWORKS - A mobile communications fraud detection system is provided in which one or more probe devices are deployed to intercept predetermined types of data being carried over selected interfaces within the mobile communications network. In particular, the probe devices are arranged to intercept data being carried between equipment responsible for providing the air interface to mobile communications devices using the network and equipment interfacing with the mobile network's core switching equipment. Fraudulent activity relating to gateway fraud, revenue sharing fraud, credit or debit card fraud, spam generation and fraudulent or other activity indicative of the presence of malware executing on a mobile communications device.12-18-2014
20140378095USER TERMINAL, SECURITY SET SELECTION METHOD, AND USER TERMINAL PROGRAM - Usage scene information such as date, time, and location information acquired by a user terminal 12-25-2014
20140378096UNESTABLISHED COMMUNICATION LINKS IN COMMUNICATION SYSTEMS - A switching entity in a communication system, configured to obtain characteristics of a terminal submitting a request to establish a communication link in the communication system and to start to establish the communication link while preventing a feed-back signal from reaching the terminal based on the obtained characteristics.12-25-2014
20150011185MOBILE APPLICATION USING FACILITATING DEDICATED COMMUNICATION BETWEEN SPECIFIC USERS - The present invention relates to a method and system for facilitating dedicated communication between specific users relating to a travel transaction, the system including a travel resource mobile application. The mobile application may be installed on a mobile device, wherein the user of the mobile application and other users are included in a group which participates in the travel transaction, and each such user is assigned a role. The mobile application may also provide travel information and secure communication to each user of the group of users, wherein the group of users may be restricted based on the travel transaction. The mobile application may retrieve user contact information from the mobile device to facilitate communication between the group of users while masking the contact information of each user. The mobile application may also determine a location of at least one user from a group of users.01-08-2015
20150011186METHOD AND APPARATUS FOR DETECTING SMS-BASED MALWARE - There are provided a method and apparatus for detecting and handling a malicious act that performs billing and takes a financial gain using a short message service (SMS) in real time. The apparatus includes an SMS collecting module configured to collect an SMS message sent from or received in a smartphone; an SMS parsing module configured to parse the collected SMS message; an SMS examining module configured to examine at least one field of the parsed SMS message and determine whether the SMS message is a malicious act-related message based on an access control list (ACL) and an SMS signature DB; and an installing app examining module configured to examine SMS message sending permission of an app to be installed in the smartphone and a priority of an SMS receiver process included in the app and determine whether the app has a possibility of being malware.01-08-2015
20150017946METHOD AND APPARATUS FOR LIMITING THE COLLECTION OF CELLULAR IDENTIFYING INFORMATION TO DEFINED AREAS - A system includes an interrogating transceiver that is calibrated using range transceivers. After calibration, the interrogating transceiver may bait cellular devices within a use-prohibited area, identify responding devices, and initiate corrective actions regarding the identified cellular devices.01-15-2015
20150017947SYSTEM AND METHOD FOR IDENTITY PROTECTION USING MOBILE DEVICE SIGNALING NETWORK DERIVED LOCATION PATTERN RECOGNITION - A system and method for recognizing patterns in wireless device locations using wireless device location data derived from a communications signaling network is provided. By using wireless network supported signaling operations and messages, location data concerning the whereabouts of wireless devices, and hence wireless device users, may be obtained. The location data derived from the communications signaling network may be statistically analyzed to reveal potential geographic patterns that may indicate meaningful behaviors of the purported users of the wireless devices.01-15-2015
20150031329APPARATUS AND METHOD FOR DETERMINING A WIRELESS DEVICE'S LOCATION AFTER SHUTDOWN - A wireless data processing device is described which periodically exits an unpowered state and transmits location data. For example, one embodiment of a wireless data processing device comprises: power circuitry for maintaining the wireless data processing device in a powered or unpowered state, the power circuitry causing the wireless data processing device to enter into an unpowered state responsive to user input; a timer to periodically power up the wireless device or portion thereof in response to reaching a predetermined time; a location services module determining a current location of the wireless data processing device using one or more specified location determination techniques; a transmit thread transmitting the current location of the wireless device over one or more specified communication channels; and the power circuitry powering down the wireless data processing device a second time after the current location has been transmitted.01-29-2015
20150031330SYSTEM AND METHOD FOR PREVENTING CELL PHONE USE WHILE DRIVING - A system for monitoring and controlling the use of a mobile computing device is disclosed. The system includes a data server containing a model of a road network specifying traffic routes at a selected location. A mobile wireless computing device is configured o wirelessly communicate with the data server. An embedded accelerometer and a GPS receiver are included in the wireless device. A mobile device control module in communication with the wireless device and the data server provides a motion data cache to record data from the GPS receiver and accelerometer, an activity mode recognition module configured to determine a type of activity based on the motion data cache, and a use permission module in communication with the data server to provide timing and location information at which the wireless device can be used based on the activity mode.01-29-2015
20150031331MOBILE APPLICATION GATEWAY FOR CONNECTING DEVICES ON A CELLULAR NETWORK WITH INDIVIDUAL ENTERPRISE AND DATA NETWORKS - A mobile application gateway for connecting devices on a cellular network with individual networks, such as enterprise voice and data networks and/or residential networks. The effects of the present invention are far reaching in terms of transferring effective call control from the cellular network into the control of the individual network such as the enterprise, and enabling new business models for the purchase of cellular service from a public cellular carrier by an enterprise. The invention may consist of a primarily of core network and services components based on the IMS network architecture, and is backward compatible to support legacy systems in place in current telecom and data networks.01-29-2015
20150038113MOBILE HANDSET EXTENSION TO A DEVICE - Mobile operation is extended to a device. An extension interface comprises a client component within a mobile that is linked to a client component within the device. Extension of mobile operation is secured via delivery of credentials associated with the mobile to the device. Delivery of credentials is temporary and typically spans the period during which mobile operation is extended to the device. Application(s) and content(s) can be conveyed to the device for utilization therein. An emulation component that can reside at least in part on the client component within the device can emulate mobile operation. Client component within the mobile can include at least in part (i) a component that downloads drivers for communication with, and utilization of, the device to which mobile operation is extended, and (ii) a component that can scan for wireless-capable devices to extend mobile service thereto.02-05-2015
20150044993Must Call - The must call optional universal cell phone application is an application that provides better communication between parent(s) and guardian(s) with teenaged children who use cell phones, along with providing safety, by locking cell phone usage with programmed numbers until voice recognition is established even if the cell phone user is on the phone when programmed numbers call into the cell phone. The user has one minute to contact programmed numbers before cell phone locks them out. Also locks out text messaging but allows emergency phone calls i.e. 911 at any time.02-12-2015
20150044994SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM - A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless communications and high speed wireless communications. According to a preferred embodiment of the present invention, various security sensors are scanned to determine the likely presence of an intruder within a predetermined trust zone. If an intruder is likely present, the security level is changed to the highest setting, and consequently a lower data rate, while the intruder is identified. If the identified intruder is in fact a trusted node, the security level is returned to a lower setting. If the identified intruder is not a trusted node, the security level is maintained at an elevated state while the intruder is within the trust zone.02-12-2015
20150044995METHODS FOR PROVISIONING UNIVERSAL INTEGRATED CIRCUIT CARDS - A system is described that can perform a method for receiving a request to modify a universal integrated circuit card, generating a package comprising configuration data for modifying the universal integrated circuit card, instructing an over-the-air system to transmit the package encrypting the package with a transport key to generate an encrypted package, and transmitting the encrypted package to a communication device communicatively coupled to the universal integrated circuit card to provision the universal integrated circuit card. The system can also perform a method of providing a mobile network operator trusted service manager system information relating to the configuration data to enable the mobile network operator trusted service manager system to manage content and memory allocation of the universal integrated circuit card.02-12-2015
20150044996System and Method for Remote Asset Management - A remote asset management system comprising a network of programmable wireless modules, each having an antenna and an identification module and configured to communicate via a radio communication protocol. The system further includes a plurality of assets each linked to one of the wireless modules and configured to be managed by the linked wireless module. A remote system server service platform is configured to receive remote asset data from the wireless modules, pass the remote asset data to and from the wireless modules, send messages to at least one of the wireless modules, monitor the wireless modules by requesting and receiving current mode information, and remotely program the wireless modules. A data processing module located within the wireless module(s) and configured to process messages received by the wireless module, authenticate said message, analyze authenticated messages, and carry out asset management instructions included in the message.02-12-2015
20150050913METHOD AND DEVICE FOR PREVENTING RECORDING DURING A CONVERSATION - There provide a method and device for preventing recording during a conversation and belong to a communication field. The method may include: monitoring a mobile terminal device, obtaining a current state of the mobile terminal device if a monitoring result is that an application for recording is installed on the mobile terminal device and determining that the application is an application illegally used for recording and preventing the application from recording if the current state of the mobile terminal device is a talk state. The device may include: a monitoring module, an obtaining module and a preventing module. With the method, information security of the user may be ensured.02-19-2015
20150079931COMMUNICATIONS METHOD, DEVICE AND SYSTEM IN MOBILE BACKHAUL TRANSPORT NETWORK - A communications method, device, and system in a mobile backhaul transport network are used to resolve a problem in the prior art that communication security in a backhaul transport network cannot be ensured in an LTE scenario. A first network node sends a request message to a control server in the mobile backhaul transport network, where the request message is used to request security information of a second network node in the mobile backhaul transport network; the first network node receives the security information of the second network node, which is returned by the control server; the first network node establishes a secure tunnel with the second network node according to the security information of the second network node to perform communication. This enables two network nodes in a mobile backhaul transport network to perform secure communication and ensures security of communication between network nodes.03-19-2015
20150087263Methods and Apparatus for Promotions and Large Scale Games in Geo-Fenced Venues - A method and apparatus for a system's customer to capture a user's contact information or location during an event uses an application for a personal electronic device that senses a jolt registered by the accelerometer of the device, and/or the user's location based on location sensors within the device. In response, the user receives any combination of text, picture(s), sound, or encrypted barcode, specified by the customer. A method for providing geo-referenced, selective control of wireless, processor-based devices (e.g., smartphones) uses an encrypted software master key that is at least initially assigned to the owner-of-record of real property. The master key functions to enable, disable, activate or otherwise control programs on or features of processor-based devices that are determined to be within the geographic boundaries of the real property. In certain embodiments, a system is linked to real property records to assign the master key to the owner of record.03-26-2015
20150094020METHOD AND APPARATUS FOR NOTIFYING ACCESS CONTROL INFORMATION - A method and an apparatus for notifying activations of extended access barring (EAB) and updates of EAB information in the field of Long Term Evolution (LTE) wireless communication systems have been proposed. In accordance with the present disclosure, the eNB notifies MTC devices of EAB changes from a paging message through the paging channel (PCH). The network could use either a single bit EAB status indicator to notify whether the EAB has been enabled or disabled or use multiple bits EAB indicator to represent different EAB parameter changes in addition to whether the EAB has been enabled or disabled. Based on the present disclosure, the network could reduce the paging overhead by require the MTC device to acquire the EAB-SIB only when it needs the EAB information.04-02-2015
20150111533MONITORING SUSPICIOUS EVENTS IN A CELLULAR NETWORK - Communication systems, including cellular networks, and the devices that are connected to them, can have both legitimate and illegitimate uses. Such communication systems, including systems that utilize, permit, or leverage machine-type-communications, may benefit from monitoring for suspicious events. A method can include receiving a monitoring request regarding a user equipment or a category of devices. The method can also include performing a monitoring activity regarding the user equipment or the category of devices with respect to at least one suspicious event. The method can further include responding to the monitoring request indicating whether monitoring will be performed for the user equipment or the category of devices.04-23-2015
20150118992SYSTEM AND METHOD FOR CREATING AND ASSIGNING A POLICY FOR A MOBILE COMMUNICATIONS DEVICE BASED ON PERSONAL DATA - A system and method to create and assign a policy for a mobile communications device are disclosed. The policy may be created based on personal data associated with the mobile communications device. For example, known sources of personal data on the mobile communications device may be identified and a policy may be created based on the known personal data. The policy may then be used to identify additional personal data associated with the mobile communications device. Thus, the personal data associated with the mobile communications device may be monitored. If an application attempts to access the monitored personal data, the access will be detected.04-30-2015
20150118993Determining a Transition of a Terminal between its Idle State and its Connected State - A method of determining a transition of a terminal (04-30-2015
20150118994CONTROLLING UNREGULATED AGGREGATION OF MOBILE APP USAGE - A technique is presented for controlling behavior tracking by mobile apps executing on a mobile computing device. A set of profiles are managed by a privacy manager, where each profile represents a different isolated execution environment on the mobile computing device and defines a set of privacy rules governing an application while executing in an associated execution environment. Prior to launching the app, a user of the app is prompted by the privacy manager to select a profile for the app from the set of profiles. The privacy manager in turn applies the set of privacy rules associated with the selected profile to the app during execution of the app on the mobile computing device.04-30-2015
20150133082MOBILE POSTURE-BASED POLICY, REMEDIATION AND ACCESS CONTROL FOR ENTERPRISE RESOURCES - A mobile device management system that monitors the security state of one or more mobile devices and sets indicators related to such security state. Enterprise network applications, such as an email application, can access the security state information when making access control decisions with respect to a given mobile device.05-14-2015
20150140964System And Method For Implementing A Two-Person Access Rule Using Mobile Devices - A system using mobile devices and a network provides access authentication, authorization and accounting to computing resources using a two-person access rule solution approach. A central access control server coordinates a rule-based authorization process in which a requesting user and one or more authorizing users are engaged in real-time communications to facilitate approved access to a sensitive resource. The technique utilizes mobile cellular interfaces and location service technologies, while also providing traditional security control measures of voice and visual verification of user identities.05-21-2015
20150140965HOME BASE STATION LOCATION INFORMATION - The embodiments herein relate to a method in a location information node (05-21-2015
20150148005ELECTRONIC DEVICE LOCK SCREEN CONTENT DISTRIBUTION BASED ON ENVIRONMENTAL CONTEXT SYSTEM AND METHOD - A system and method that (i) provide for features that provide assurances to content providers that their content is being viewed in a meaningful manner and (ii) encourage user adoption of dynamic lock screen content. A system and method may include selecting content to display on a mobile electronic device may include tracking, by the mobile electronic device, applications that are actively being utilized by a user of the mobile electronic device. The mobile electronic device may determine an environmental context of the user based at least in part on the applications of which the user has been utilizing. Content to display may be selected based at least in part on the determined environmental context of the user. The selected content may be displayed by the mobile device. The environmental context may be determined based on recently used apps, geographic location, information from apps (e.g., weather), and so on.05-28-2015
20150295786HARDWARE-BASED LICENSING FOR WIRELESS NETWORKS - A wireless mesh network is provided with equipment and methods for monitoring and enforcement of license terms. The network includes a plurality of wireless network nodes, a wireless access point, and a network manager in communication with the access point and with the network nodes via the access point. At least one of the network nodes and the access point includes license information embedded in the device hardware, and the network manager provides services to the wireless network subject to license terms determined based on the license information embedded within the network node or access point. Additionally, the network manager is in communication with a user application external to the network, and relays communication between the user application and the wireless network. The network manager modulates communications relayed between the user application and the wireless network subject to the license information embedded within the network node or access point.10-15-2015
20150296066MOBILE TERMINAL DEVICE, LOCK RELEASE METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM - A mobile terminal device and methods are disclosed. A display module is provided on a first surface of the casing. A first detection module is provided to cover the display module and detects a user's operation. A second detection module is provided on a second surface opposed to the first surface and detects a user's operation. A lock control module sets a lock function for preventing the user's wrong operation. The lock control module releases the setting of the lock function, if the lock function is set and if the first detection module has detected a first operation. The lock control module releases the setting of the lock function, if the lock function is set and if the second detection module has detected a second operation.10-15-2015
20150304482MOBILE TELEPHONE ADAPTABLE TO A RESTRICTED-ACCESS AREA AND OPERATING CELL OF SUCH TELEPHONE - A mobile telephone adaptable to a restricted-access area includes an RF transmitter which is intended to operate in a restricted-access area. It further includes a reduced-power transmission element (10-22-2015
20150304839METHOD FOR TRANSMITTING AND RECEIVING FAKE COMMUNICATION DATA AND TERMINAL PERFORMING THE SAME - A technology for preventing leakage of personal information from traffics of terminals by transmitting and receiving fake communication data artificially generated so that an attacker does not identify normal communication between terminals is provided. A method for transmitting fake communication data includes: making a response request to whether or not a fake communication application is presented in an opponent terminal using an address book registered in a terminal; receiving a response corresponding to the response request and selecting targets to and from which the fake communication data are to be transmitted and received in a terminal list corresponding to the received response; controlling a communication amount depending on the selected targets; and transmitting the fake communication data to a corresponding receiving terminal depending on a control result.10-22-2015
20150312758Providing Network Credentials - A method for providing a communication device with credentials to enable it to access communication resources provided by a network operator, the method comprising storing, on the communication device, an indication of (i) an identity associated with the communication device; and (ii) an identity associated with a provisioning agent, transmitting, from the communication device to a communication network, a registration request that identifies the communication device and the provisioning agent, the provisioning agent providing, in response to the registration request, credentials to enable the communication device to access communication resources provided by a network operator and transmitting said credentials from the communication network to the communication device.10-29-2015
20150312767NETWORK ENTITY, COMMUNICATION DEVICE, MOBILE COMMUNICATION DEVICE AND METHOD THEREOF - A communication system is described in which a mobile communication device receives MDT configuration requests from a base station or radio network controller to initiate an MDT measurement session for obtaining measurement data and location related data for identifying a location to which said measurement data relates. The mobile communication device checks a user consent indicator in memory and only provides the location related data if the user consent indicator indicates that a user of the mobile communication device consents to the provision the location related data.10-29-2015
20150319652Methods and Apparatus for Differencitating Security Configurations in a Radio Local Area Network - Methods and apparatus are provided for differentiating security configurations in a radio local area network. A method can comprises: at a base station, sending a handover request to a local access point for initiating a handover of a user equipment from the base station to the local access point, the handover request comprising an indication of a scheme of security configuration to be used for protecting a communication between the base station and the user equipment. The method can further comprise, at the base station, forwarding to the user equipment a handover command received from the local access point, wherein the indication is comprised in the handover command by the local access point. The method can further comprise communicating with the user equipment according to the scheme of security configuration after the user equipment is handover to the local access point.11-05-2015
20150327073Controlling Access of a User Equipment to Services - This invention relates to methods, user equipment, access controller, and equipment identity register for controlling access of a user equipment, UE, (11-12-2015
20150327074System and Method for Facilitating Secure Voice Communication over a Network - The present invention involves providing secure Voice Over IP (VOIP) communications to a mobile communications device. Specifically, the disclosed systems and methods enable a standard remote communications device (e.g., a cellular telephone) to utilize the Secure Communications Interoperability Protocol (SCIP) as designed by the U.S. Department of Defense. The invention provides SCIP access to users without requiring specific hardware configurations to be built into, or added to, the remote communications device. The remote communications device is equipped with software that emulates what was previously accomplished through a hardware configuration in order to facilitate secure VOIP communications over standard mobile communication devices.11-12-2015
20150334571ESTABLISHING WLAN ASSOCIATION - A method of establishing network connection between a network device and a WLAN is disclosed. The method includes: determining whether there is previous security association between the network device and the WLAN at the time of requesting for network association, and establishing a new security association between the client device and the WLAN using security data generated in the course of establishing said previous security association if there is said previous security association.11-19-2015
20150334572RADIO ACCESS NETWORK APPARATUS, MOBILE COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM - A radio access network apparatus (11-19-2015
20150341361Controlling a Mobile Device in a Telecommunications Network - A system is described to control a mobile telecommunication device within a telecommunications network, when the mobile device is suspected of being, or has been found to be, infected by malicious software or viruses causing it to behave maliciously or aggressively within the network. The telecommunications network is arranged to identify the telecommunication device and limit the communication between the mobile telecommunication device and the telecommunications network. This may mean limiting the bandwidth of the bearer between the mobile telecommunications device and the telecommunications network or may mean limiting the communications between the mobile telecommunications device and a specific location. In further embodiments the telecommunications network quarantines the identified device by either transferring an attachment of the mobile telecommunications device to a second network, or, maintaining a list of devices and adding the identified mobile telecommunications device to the list.11-26-2015
20150341484SYSTEM AND METHOD CONTROLLING ACCESS TO APPLICATIONS ON A MOBILE DEVICE - Disclosed are systems and methods for controlling access to applications of a mobile device. An example method includes collecting, by a controlled shell of an OS of the mobile device, information about an application of the user device; determining a category designation of the application based on the collected information; determining, by the controlled shell, whether the category designation of the application complies with one or more rules of a usage policy of the mobile device; blocking user access to the application if it is determined that a rule exists prohibiting use of applications in the designated category or if no rule exists permitting use of the applications in the designated category; and permitting user access to the application if it is determined that a rule exists allowing use of applications in the designated category or if no rule exists prohibiting use of the applications in the designated category.11-26-2015
20150350893METHOD AND APPARATUS FOR EXECUTING AN APPLICATION AUTOMATICALLY ACCORDING TO THE APPROACH OF WIRELESS DEVICE - A home system is provided. In a method of executing an application, information for executing the application is received from a device when accessing of the device is sensed, and the application is executed based on the received information. Accordingly, when a user merely brings a wireless guest device near to or in contact with an access point or a wired home device, it is possible to allow the wireless guest device to simultaneously automatically set an optimum security environment for a wireless network and execute an application that the user desires.12-03-2015
20150350896SECURE RADIO ACCESS WITH INTER-eNB CARRIER AGGREGATION - A system for securing radio access with inter-eNB carrier aggregation including a primary eNB configured to secure transmission with a user equipment. The primary eNB generates a base key and derives a set of derived keys used to secure transmission on a set of radio bearers that correspond to the set of derived keys. The system for securing radio access with inter-eNB carrier aggregation also including a secondary eNB configured to secure transmission with the UE using at least one of the set of derived keys received which corresponds to a radio bearer from the set of radio bearers used by the SeNB.12-03-2015
20150350915CALL VERIFICATION SYSTEM AND METHOD THEREOF AND MOBILE TERMINAL - A call verification system in mobile terminals, including a calling/called unit, and the calling unit includes: a verification code acquiring module, a packaging module, a transmitting module; the called unit comprises a receiving module, a storage module, an analysis module, a verification code module and a call control module. A method includes steps of acquiring and packaging the verification code; transmitting verification code while calling; parsing and acquiring the verification code at the called terminal; matching the verification code with the standard verification code and intercepting the mismatched call establishment request. The effects are achieved without configuration of a mobile network and the service of operators; no delay for the users no effect on existing communication business; intercepting crank calls without answering or hanging up.12-03-2015
20150365822COMMUNICATION SYSTEM - A communication system is described in which user plane communication and control plane communication for a particular mobile communication device can be split between a base station that operates a small cell and a macro base station. Appropriate security for the user plane and control plane communications is safeguarded by ensuring that each base station is able to obtain or derive the correct security parameters for protecting the user plane or control plane communication for which it is responsible.12-17-2015
20150365867TRAFFIC OFFLOAD - A wireless telecommunications method, network nodes and a computer program product are disclosed. The wireless telecommunications method comprises: mapping at least some user plane traffic only from a first transmission path supporting communications between user equipment and a first base station to a second transmission path supporting simultaneous communications between the user equipment and a second base station; providing data protection configuration information used to encode the at least some user plane traffic transmitted over the second transmission path between the user equipment and the second base station; and transmitting the at least some user plane traffic encoded using the data protection configuration information over the second transmission path. In this way, at least some of the user plane traffic may be offloaded from a first transmission path to a second transmission path. That user plane traffic may be transmitted simultaneously with other user plane traffic. Accordingly, traffic can be directed to different network nodes at the same time and encoded using different data protection configuration information which allows separate schedulers to be used to enable simultaneous transmission to occur even with a non-ideal backhaul link between the two base stations.12-17-2015
20150372981System and Method for Automatic Data Security, Back-up and Control for Mobile Devices - Systems and methods for providing security, monitoring, and control of mobile communications device activity including at least one mobile communication device with software operable thereon for receiving rules provided by an authorized user of the device(s) and in accordance with those rules administering actions to provide for controlling, monitoring, and security data stored or generated on the device(s), including logging data and activities related to the mobile communications device, blocking and filtering calls, messages, websites, emails, and combinations thereof, via wireless communication with a remote server computer having a corresponding software module operable thereon for managing and implementing the rules.12-24-2015
20160014596System, Method and Apparatus for Pairing SIM or UICC Cards with Authorized Wireless Devices01-14-2016
20160021529METHOD AND DEVICE FOR UPDATING PROFILE MANAGEMENT SERVER - A method to converge a 501-21-2016
20160029221Methods and Systems for Detecting Malware and Attacks that Target Behavioral Security Mechanisms of a Mobile Device - A behavior-based security system of a computing device may be protected from non-benign behavior, malware, and cyber attacks by configuring the device to work in conjunction with another component (e.g., a server) to monitor the accuracy and performance of the security system, and determine whether the system is working correctly, efficiently, or as expected. This may be accomplished via the server generating artificial attack software, sending the generated artificial attack software to the mobile device to simulate non-benign behavior in the mobile device, such as a cyber attack, and determining whether the behavior-based security system of the mobile device responded adequately to the simulated non-benign behavior. The sever may send a dead-man signal to the mobile device in response to determining that the behavior-based security system of the mobile device did not respond adequately to the simulated non-benign behavior.01-28-2016
20160037349PUSHING SECURE NOTIFICATIONS TO MOBILE COMPUTING DEVICES - Techniques are provided for pushing secure notifications to a mobile computing device. For example, a method for pushing secure notifications includes a push service platform receiving a push notification message request from an entity registered with the push service platform, processing the push notification message request to generate a secure push notification message, and sending the secure push notification message to a target mobile computing device through a native third-party push service associated with the target mobile computing device. The secure push notification message includes a message ID (identifier) that corresponds to message content associated with the push notification message request. The method further includes the push service platform receiving a pull message request from the target mobile computing device, the pull message request requesting the message content associated with the push notification message corresponding to the message ID, and sending the requested message content associated with the push notification message to the mobile computing device.02-04-2016
20160042196LOCATION-BASED RECOVERY DEVICE AND RISK MANAGEMENT SYSTEM FOR PORTABLE COMPUTING DEVICES AND DATA - A device and software utilizing Global Positioning Satellite (GPS) technologies for monitoring and recovering portable computing devices and, a method and system for acquiring such devices, protecting data on such devices, and for compensating owners of devices. A GPS mechanism of the invention provides real time tracking of missing devices that may be coordinated with security agencies to intercept and recover missing computing devices. When a stolen device is unrecoverable, the invention may receive a signal to initiate data recovery where a wireless network is available to recover data for the owner. Alternatively, the GPS mechanism instructs the device to encrypt or destroy stored data files to prevent commercial espionage or privacy violations. The invention discloses a software system and method for computing a purchase price of the GPS mechanism, computing compensation for loss of the device and lost data.02-11-2016
20160044506METHOD AND SYSTEM TO ENABLE SECURE COMMUNICATION FOR INTER-ENB TRANSMISSION - The embodiments herein provide a method and system for creating a secure connection for a User Equipment (UE) in a wireless network including a UE, carrier aggregated with at least one first serving frequency served by a first eNB and at least one second serving frequency served by a second eNB. A unique non-repetitive security base key associated with the second eNB is generated using a freshness parameter and security key associated with the first eNB. The use of a different freshness parameter for each security base key derivation avoids key stream repetition. Further, a user plane encryption key is derived based on the generated unique non-repetitive security base key associated with the second eNB for encrypting data transfer over at least one data radio bearer.02-11-2016
20160044574SYSTEM AND METHOD FOR CONTROL AND MANAGEMENT OF RESOURCES FOR CONSUMERS OF INFORMATION - A system and method is provided for using information broadcast by devices and resources in the immediate vicinity of a mobile device, or by sensors located within the mobile device itself, to ascertain and make a determination of the immediate environment and state of the mobile device. This determination may be used to control and manage the actions that the device is asked to carry out by or on behalf of the user.02-11-2016
20160044575System and Method for Preventing Phone Functionality while Driving - An app designed to prevent using distracting phone functionality, including texting, on a mobile phone while driving a vehicle is disclosed. The app detects and measure attributes including the phone's orientation and change of orientation and expresses them in a coordinate system relative to the direction of motion of the vehicle. If the phone orientation is found to be consistent with a change in direction of the vehicle, or the axis of rotation of the phone is found to be consistent with itself over time, the distracting phone functionality is disabled.02-11-2016
20160057022ACCESS NETWORK MANAGEMENT - Currently, under bitstream access, communications providers are only given limited control over the services they offer. In order to prevent customers being accidently or maliciously reconfigured by a competitor, each communications provider's circuit is isolated from the other communications providers, and dynamic line management profile choice is maintained by the network operator. The present invention proposes allowing greater access to communications providers to configure physical layer configuration parameters associated with a line, through the use of an adaptation gateway. The adaptation gateway is used to manage configuration requests to digital subscriber lines from the communications providers. The adaptation gateway allows configuration of certain DSL line, channel or data path parameters (such as those listed in ITU-T Recommendation G.997.1), but prevents modification to any of those parameters that might affect or cause harm to the service of another line.02-25-2016
20160065717APP SHARING - A method and an apparatus comprising operating a processor of an apparatus as a first processor and/or as a second processor. The method at a first processor comprises recognizing the proximity of a second apparatus; recognizing a first user input and in response to the user input, sending an application share invitation to the second apparatus. The method at a second processor comprises recognizing the proximity of a first apparatus and in response to receiving an application share invitation from the first apparatus, displaying a security prompt for the user on the display.03-03-2016
20160066192Methods and Apparatus for Managing Wireless Spectrum Usage - Improved mechanisms for managing use of shared spectrum resources. A requesting element such as a base station requests authorization for use of shared spectrum resources for one or more base stations. The request suitably includes identification of the cell or cells and the requested resources. A granting element determines if authorization can be granted and sends an authorization acceptance message specifying a grant time or an authorization rejection message specifying a wait time. As an alternative, if no response is received by the requesting element, the requesting element may make further requests separated by a specified timeout time and if no response is received, be inhibited from subsequent requests for a specified response failure time. In addition, a request may be triggered based on the occurrence of specified events.03-03-2016
20160080378IDENTIFYING UNTRUSTED NETWORK ACCESS POINTS - An apparatus, method and program product are provided that determines a location associated with a network access point, the network access point being identified by an access point identifier, receives access point data from a mapping service, the access point data corresponding to the location of the network access point, and connects the network adaptor to the network access point in response to verifying that the access point data comprises an access point identifier that matches the access point identifier associated with the network access point.03-17-2016
20160080382Information Processing Method and Electronic Device - An information processing method is described that is applied to an electronic device capable of running an application. The method includes inserting a first execution module into a target process of the application for triggering a detection for network connection safety; the first execution module acquiring a first network connection from the target process and invoking a second execution module; the second execution module validating safety of the first network connection and feeding back a second network connection, the second network connection is a safe connection corresponding to the same content as the first network connection; the target process acquiring the second network connection. An electronic device corresponding thereto is also disclosed.03-17-2016
20160080944SYSTEM AND METHOD FOR MULTI-FACTOR MOBILE USER AUTHENTICATION - A system and method are disclosed herein leveraging financial networks standards with mobile device data and SIM card chip knowledge to authenticate a device. For instance, a party to a transaction may utilize these elements of information, not traditionally associated with wireless transactions, to achieve a lower probability of fraud and/or a higher confidence associated with the transaction.03-17-2016
20160100292LOCATION-BASED ALERTING - A method may use location information to transmit alert information to a communications device. Such a method may include receiving location information identifying a physical location of a mobile device; responsive to receiving an indication of communication intended for the mobile device, selecting an alerting tone based on the physical location of the mobile device; and providing instructions to adjust an alerting mechanism of the mobile device based on the selecting of the alerting tone. Other methods and systems are also provided.04-07-2016
20160105800METHODS AND APPARATUSES FACILITATING SYNCHRONIZATION OF SECURITY CONFIGURATIONS - Methods and apparatuses are provided for synchronizing security parameters between access terminals and a wireless network. An access terminal and network entity can conduct a security mode procedure where the access terminal sends a security mode complete message to the network entity. On receipt of the security mode complete message, the network entity may update to new security parameters. The access terminal may initiate a mobility procedure while the security mode procedure is ongoing and may, as a result, abort the security mode procedure and revert back to the old security parameters. The access terminal can send a mobility update message to the network entity including a dedicated status indicator adapted to inform the network entity that the access terminal has reverted back to the old security parameters. In response to the mobility update message, the network entity may revert back to the old security parameters.04-14-2016
20160105802DETECTING UNDESIRABLE SIGNALLING TRAFFIC - Undesirable signalling traffic received at a telecommunications network is detected by establishing at least one statistical parameter in respect of signalling traffic received at the telecommunications network from at least one specific source and evaluating the established at least one statistical parameter against one or more predetermined statistical profiles.04-14-2016
20160112373CELL UPDATE MESSAGE MANAGEMENT - Techniques for managing cell update messages are described here. An information element (IE) that indicates the security status of a user equipment (UE) may be included in the cell update message when a cell update procedure is triggered during an ongoing security mode procedure. To ensure the size of the cell update message is equal to or smaller than the transport format size, other IEs may be omitted from the cell update message if the security mode procedure is in progress. Alternatively, if the security mode procedure is not in progress, there may not be a need to update the security status of the UE and, thus, the IE that indicates the security status may be omitted from the cell update message to reduce the size of the cell update message.04-21-2016
20160112868LOCATION IDENTIFICATION - A method comprises receiving an indication of an activity to be performed, obtaining an indication of a current location of a user, transmitting, to a server, information relating to an area in which the location for the activity is to be identified, said information including the current location and one or more criteria relating to activity type and/or required privacy level, receiving, from the server, location information identifying one or more candidate locations for the activity. If a suitable candidate location cannot be identified within the area, further information regarding the candidate locations may be obtained, and comments regarding future conditions or shortcomings of the candidate location may be displayed, or the activity may be divided into two or more sub-tasks to be performed at different locations. The user's progress in performing the activity may be monitored, so that the displayed candidate locations can be updated.04-21-2016
20160112878DETECTION OF SPOOF ATTACKS ON LOCATION BROADCASTING BEACONS - Spoof attacks on location based beacons are detected. A stream of beacons (e.g., iBeacons) comprising at least a unique source identifier is generated. The stream of beacons is broadcast over a wireless communication channel to mobile devices within range. A list of broadcasted beacons is stored in a table along with a time and location of broadcast. Subsequent to broadcasting, a stream of beacons is detected. The detected beacon stream comprises a unique source identifier along with a time and a location of broadcast. The unique source identifier, the time and the location of at least one beacon of the detected beacon stream can be compared to the unique source identifier, the time and the location of at least one beacon of the broadcast beacon stream. Responsive to a match between the unique source identifiers and a mismatch of at least one of the time and locations, it is determined that the broadcast beacon stream has been spoofed by the detected beacon stream. Once a spoof has been detected, various remediation actions can be taken, such as sending alerts to admin, cautioning end users, and other security mode procedures.04-21-2016
20160127893GENERATION OF MULTIPLE SHARED KEYS BY USER EQUIPMENT AND BASE STATION USING KEY EXPANSION MULTIPLIER - In one embodiment, multiple keys are generated in user equipment of a communication system based at least in part on a designated key expansion multiplier. A key identifier is received in the user equipment from a base station of the communication system. The user equipment selects a particular one of the keys as a function of the received key identifier, and utilizes the selected one of the keys to secure data sent from the user equipment to the base station. For example, the keys may comprise respective portions of a key stream generated by the user equipment responsive to a message received from the base station, with the keys being shared by the user equipment and the base station through independent generation of the key stream in the base station. The base station may illustratively comprise an evolved Node B (eNB) of an Evolved Universal Terrestrial Radio Access Network (E-UTRAN).05-05-2016
20160127906Mobile Application Identification and Control through WiFi Access Points - A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones, tablet computers, and the like, that seek to access the Internet (or another network) via the access point and applying network access policies to data communications by those applications according to application, location, context, device and/or user characteristics.05-05-2016
20160127908MONITORING OF SIGNALLING TRAFFIC - Signalling messages may be monitored in a telecommunications network by receiving an indication of a signalling message for a network entity of the telecommunications network, the signalling message comprising a signalling dialogue identifier. The signalling dialogue identifier of the received signalling message is compared with a list of known signalling dialogue identifiers relating to the network entity and the signalling message is categorised based on a result of the step of comparing, for example as suspicious. If a number of signalling messages for a network entity of the telecommunications network categorised as suspicious and having a common additional characteristic is at least a threshold value, an alert may be generated.05-05-2016
20160150365Systems And Methods For Ensuring Data Security For Mobile Computing - Methods and systems for managing sensitive data stored on a wireless computing device associated with a geofence. The system or method identifies sensitive data stored on the wireless computing device, defines a geofence based at least in part on a parameter associated with a user of the wireless computing device, continuously or periodically determines the location of the wireless computing device relative to the first geofence, and modifies, if the wireless computing device is located outside the first geofence, the identified sensitive data on the wireless computing device.05-26-2016
20160150410Securely Accessing Secure Elements - Direct management of secure element data life cycles by backend servers without requiring direct communications between a trusted service manager (TSM) and a secure element is provided. A backend server client application executing on a mobile computing device enables users to request loading of application data on the secure element. A backend server receives the request to load application data. The backend server requests command scripts needed to load application data from the TSM and encrypts the command scripts with data stored on the backend server. The encrypted command scripts and application data are communicated to the backend server client application, which executes the command scripts and loads the application data onto the secure element via an interface of the mobile computing device.05-26-2016
20160150413Detection And Blocking Of Cloned Mobile Devices - A method is disclosed for blocking a cloned mobile device by a processor of a network. The processor receives a first registration from a first mobile device at a first location. The first registration includes a device identifier and a phone number. The processor then confirms that a second registration from a second mobile device at a second location includes the device identifier and the phone number and calculates a first fraud score for the first mobile device and a second fraud score for the second mobile device. The processor then determines that the second mobile device is the cloned mobile device, when the second fraud score exceeds the first score, and blocks the cloned mobile device from registering on the network.05-26-2016
20160156760Mobile terminal alarm method and device, and mobile terminal06-02-2016
20160157101APPARATUS AND METHOD FOR CONTROLLING SECURITY MODE IN WIRELESS COMMUNICATION SYSTEM06-02-2016
20160165451System and Method Of Preventing Unauthorized SIM Card Usage - For security purposes, a limited profile SIM, card which preferably does not permit voice communications is provided. For example, the card might support only SMS-type communications. During installation, when the SIM card is initially inserted, or installed in a respective product, a smart phone, table or laptop computer for example, the SIM card pairs with, or becomes bonded to, the product. That card cannot be used subsequently with any other gsm-type module. Responsive to the evaluation at the server, the server transmits a request to operator services for a selected network, for example a GSM 3G or 4G cellular-type communications network. This request can include information as to the SIM card, product and end user for the network along with a request that the profile of the SIM card be modified to include any and all services to be provided, such as voice and/or data. The end user information can be stored in a communications system data base.06-09-2016
20160174076MATCHING DEVICE AND METHOD FOR ELECTRONIC ATOMIZATION DEVICE BASED ON MOBILE TERMINAL06-16-2016
20160174077SMS Fraud Detection06-16-2016
20160174199SYSTEM AND METHOD FOR TETHERING TO A MOBILE COMMUNICATION DEVICE06-16-2016
20160192199Detecting Fraudulent Traffic in a Telecommunications System - Methods and apparatus for detecting fraudulent traffic associated with a user of a telecommunications system. A system comprises a monitoring network node comprising a traffic monitor configured to monitor traffic transmitted to or from a user in the telecommunications system, a fraud detector configured to apply to the monitored traffic a fraud profile associated with the user to determine whether the monitored traffic comprises fraudulent traffic, a transmitter configured to transmit data to a receiver of a profiling network node notifying whether the monitored traffic comprises fraudulent traffic. The profiling network node further comprises a fraud profiler configured to determine an updated fraud profile associated with the user based at least on the received data and a transmitter configured to transmit data identifying the updated fraud profile to one or both of a receiver of a subscription profile repository and a receiver of the monitoring network node.06-30-2016
20160197965METHOD AND ARRANGEMENT FOR MANAGING SECURITY RECONFIGURATION IN ACELLULAR COMMUNICATION SYSTEM07-07-2016
20160198341Communication Between a Mobile Device and Telecommunications Network07-07-2016
20160255497AREA-BASED LOCATION PRIVACY MANAGEMENT09-01-2016
20160255499Highly-Secure Wireless Communication System09-01-2016
20160255506Mobile Application Identification and Control Through WiFi Access Points09-01-2016
20180027415REDUCING FRAUDULENT ACTIVITY ASSOCIATED WITH MOBILE NETWORKS01-25-2018
20180027445METHOD AND APPARATUS FOR NOTIFYING PARAMETER CHANGES OF ACCESS CONTROL MECHANISM01-25-2018
20180027484REDUCING FRAUDULENT ACTIVITY ASSOCIATED WITH MOBILE NETWORKS01-25-2018
20190149986METHOD FOR PHYSICAL LAYER SECURITY PROTECTION USING PUBLIC KEYS05-16-2019

Patent applications in class Security or fraud prevention

Patent applications in all subclasses Security or fraud prevention

Website © 2023 Advameg, Inc.