IL186760A - Remote device access control method - Google Patents

Remote device access control method

Info

Publication number
IL186760A
IL186760A IL186760A IL18676007A IL186760A IL 186760 A IL186760 A IL 186760A IL 186760 A IL186760 A IL 186760A IL 18676007 A IL18676007 A IL 18676007A IL 186760 A IL186760 A IL 186760A
Authority
IL
Israel
Prior art keywords
remote device
user terminal
remote
authorised
request
Prior art date
Application number
IL186760A
Other languages
Hebrew (he)
Other versions
IL186760A0 (en
Original Assignee
Hutchison Whampoa Three G Ip
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hutchison Whampoa Three G Ip filed Critical Hutchison Whampoa Three G Ip
Publication of IL186760A0 publication Critical patent/IL186760A0/en
Publication of IL186760A publication Critical patent/IL186760A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management

Description

Remote device access control method Hutchison Whampoa Three G IP (Bahamas) Limited C. 178702 REMOTE DEVICE ACCESS CONTROL METHOD The present invention relates to a method of controlling access to a remote device in mobile telephony in particular a remote video camera in a mobile telephone handset.
Background to the invention There are various known systems for transmitting video or still images and audio from remote devices to a user terminal. For example, telephone systems enable users to receive audio or video signals from remote locations. In particular, mobile phones enable users to receive audio signals sent from a mobile telephone. Third generation mobile phone technology (3G) has brought video calling functionality to mobile phones and thus users are able to see each other during a call in addition to hearing the usual audio signal. It is also known to connect video cameras to the Internet via personal computers. So called Web-cams, enable users to remotely view images captured by the Web-cam.
US publication 2005/0181762 defines a method of transmitting images from a surveillance camera to a monitoring device, whereby the camera is capable of triggering an alarm to a predefined wireless device.
A problem with accessing video and audio information from remote devices is that without any restrictions, anyone may access them. This may not always be desirable and there is therefore a need for systems which restrict access to remote devices. There is also a need for systems which allow the restrictions to be easily administered.
US publication 2005/0091332 defines communication over a network wherein initiation of transfer, authentication of the communication and administration functions are performed by a central server that transmits instructions to slave terminals.
US publication 2004/185925 discloses a technique whereby a mobile telephone may be remotely triggered to take a photograph } based on prior authentication information provided by a user. The user at the mobile terminal manages this authentication information, by keying in the required commands.
However the prior art does not facilitate aoministration control for managing a 'white list' from a remote location.
Summary of the invention In a first aspect, the present invention provides a method of generating a link between a user terminal and a remote device. A link request is sent from the user terminal to the remote device. An identifier is sent from the user terminal to the remote device. The remote device checks the identifier against at least one stored identifier and if there is a match, the link is established.
Thus, a user can only access information from a remote device if the identifier sent with the link request matches the at least one stored identifier. This prevents access by unauthorised users.
Mobile phone technology, preferably cellular phone technology is used to establish the link, in which case the user device may be a first mobile video phone and the remote device may be a second mobile video phone or device fitted with a camera having the required circuitry to communicate with the user device over the cellular network and is capable of being plugged in to a power circuit. The link request is a video telephone call from the first mobile video phone to the telephone number of the second mobile video phone and the first identifier is Caller Line Identification (CLI). The at least one stored identifier is a list of telephone numbers of authorised users which is preferably stored on the SIM card of the second mobile video phone. Video images are sent from the second mobile video phone to the first mobile video phone if the CLI matches a telephone number stored on the SIM card- In a second aspect, the present invention provides a method of remotely confr oiling access to the remote device of the first aspect of the present invention. The remote device has stored thereon a master identifier. The method comprises a step of sending a message from a user terminal to the remote device with a command to update the at least one stored identifier. The message includes a master identifier. The command is only acted upon if the master identifier matches that which is stored on the remote device.
Thus, only the owner or administrator of the remote device having the master identifier can update the at least one stored identifier.
Preferably, the master identifier is a PIN number and the message is an SMS text message. The user includes the ΡΓ number and the command in the SMS text message in a predetermined format. The command is only acted upon if the PIN number in the SMS matches the ΡΓΝ number stored on the second mobile video phone. The command may be to add or remove a telephone number from the list of telephone numbers of authorised users.
In a third aspect, the present invention provides a system, method and device to enable the first and the second aspects of the present invention.
The owner can self-administer access to the mobile video camera and in particular can remotely administer access to the mobile video camera. The system easy to use which helps keep support costs down. For example, there is no need to call a call-centre agent to invoke the changes.
The system is very easy for of use by dial-in users. By pre-authorising users, use of the service is simplified. The solution imposes a small amount of technical skill on the part of the owner of the camera (in composing syntactically correct commands via SMS) but dial-in users need only know how to make a video call.
Brief description of the drawings So that the present invention may be more readily understood, embodiments thereof will now be described by way of example only and with reference to the accompanying drawings in which: Figure 1 is a flow chart showing an embodiment of the present invention.
CT/GB2006/001537 4 Detailed description of the preferred embodiments In a first aspect the present invention provides a remote mobile video phone which can be dialled into by other mobile video phone users and which allows those users to view images and/or hear sounds at the location of the remote mobile video phone. The remote mobile video phone has a SIM card and a telephone number as per a normal mobile phone. When a user wants to view images at the remote location, they make a video call to the remote mobile video phone in the same way they would make a call to any mobile video phone.
Approved dial-in users have their phone numbers stored in a white-list on the remote mobile video phone. Preferably, the white-list is the memory of the SIM card of the remote mobile video phone. When the user calls the remote mobile video phone, their number is established using, for example, CLL and if their telephone number matches one in the white-list, the remote mobile video phone answers the call, and images and/or sound captured by the remote mobile video phone are sent to the users mobile phone. No further authentication is required.
Alternatively, for higher security, the dial-in user may be required to enter a user PIN. This would protect against use of the remote mobile video phone if the users mobile phone is stolen. The user PIN could be common to all dial-in users, defined for each users, or even generated by the device (for example, upon being added the white-list) and sent via SMS to that user.
In lower security systems, it may be seen as desirable to allow access only by user PIN even when a dial-in user's phone number is not on the white-list. This would enable a user to call from abroad, in which case the dial-in user's phone number is not always relayed through the mobile networks, (i.e. missing CLI). The user enters a user PIN and the remote mobile video phone cross-references this with a stored user PIN. The call is only answered if there is a match. Preferably, this lower security process of access by user PIN only could have time or count .based rules associated therewith. In other words, the administrator or mobile video camera could issue a user PIN that is valid for today only, or only valid for one dial-in call, for ten dial-in calls, etc.
Figure 1 is a flow-chart showing one procedure for restricted access to the remote mobile enabled device. For the purposes of this example, access to the remote mobile video phone using the white-list is referred to as 'permanent access' and access to the remote mobile enabled device using a user PIN is referred to as 'call based access'.
A user initiates a video call to the telephone number of a remote mobile video phone. If 'free access' is enabled, then a video link is established and the remote mobile video phone begins sending video images to the users mobile phone. If 'free access' is not enabled, the remote mobile video phone checks whether or not 'permanent access' is enabled. If not the remote mobile video phone checks to see if 'call based access' is enabled as will be described below. If 'permanent access' is enabled, the remote mobile video phone checks the CLI against the telephone numbers stored in the white-list. If the user's telephone number is not in the white-list, then remote mobile video phone checks to see if 'call based access' is enabled as will be described below. If the user's telephone number is in the white-list, the remote mobile video phone begins sending video images and/or sounds to the users mobile phone.
If the remote mobile video phone is required to check if 'call based access' is enabled, it does so, and if not, access is denied to the remote mobile video phone. If 'call based access' is enabled, the remote mobile video phone, asks the user for a user PIN. If the PIN is correct, the remote mobile video phone begins sending video images to the users mobile phone. If not, access is denied.
In the case of 'call based access', while the call is being established, the remote mobile video phone sends to the user's telephone a predefined image which prompts the user to enter a user PIN. Alternatively, the remote mobile video phone sends a pre-recorded audio stream which informs the user that a PIN should to be entered.
The remote mobile video phone may also be enabled to be controlled by the user during the video call. For example, the functions, rotate, zoom, switch camera, start/stop recording, etc, may all be enabled through key presses during the video call.
So that video recording may be enabled, the remote mobile video phone may be provided with a memory and preferably a removable external memory.
P T B2006/001537 6 In a second aspect, the present invention provides a method of remotely controlling access to the above- described remote mobile video phone. A master PIN is stored on the remote mobile video phone. The master PIN may be stored either on the SIM or on another memory in the remote phone. The owner may set the master PIN themselves or the remote mobile video phone may be pre-set with a master PIN. This may be done at set-up or may be changed at any time.
The owner or other approved administrator can send commands via Short Message Service (SMS) to the remote mobile video phone that instruct it to add or delete approved dial-in users from the white-list or perform other administrative functions. The remote mobile video phone can respond with an SMS confirming how the requested command was acted upon.
In certain situations, the camera in the remote mobile video phone can be configured to send alarm signals to another authorized mobile terminal. Eg: alarm triggered due to certain movement caused at its location or if the mobile video phone itself is moved from its location. However, further circuitry needs to be incorporated in the mobile phone to allow this application.
For higher security, the mobile video camera may also be enabled to require that remote administration messages containing the master ΡΓΝ also originate from one or more declared phone numbers, in order for the command or commands to be accepted. This may be in addition to or in place of the master ΡΓΝ.
Additionally, the message from the owner incorporating the master ΡΓΝ may be encrypted using existing ciphering techniques. This provides secure communication and prevents a third party from acquiring access to the master PIN, either intentionally or accidentally. A few encryption techniques that could be used include checksum methods (eg: Cyclic redundancy check- CRC), key based methods (eg: Pretty Good Privacy -PGP or Data Encryption Standard -DES ) or password protection . The extent of ciphering will depend on the level of security desired by the owner of the mobile video phone.
SMS is the preferred messaging protocol for remote administration as it works in all 2G and 3G radio conditions, but other messaging protocols may be used. Equally commands could be accepted via a digitally signed email, or if the remote mobile video phone has packet connectivity (GPRS/UMTS) it could host a small web server on it so that it can be accessed via browsers (either on phones or via the Internet). However, commands could be sent via alternative messaging systems such as email, SIP, MMS, instant messaging, etc. All of these require that the remote mobile video phone has packet connectivity (i.e. internet protocol(IP)) and that the mobile video camera is in GPRS or UMTS coverage. Use of SMS means that the mobile video camera need only be covered by a basic 2G GSM network for adrninistrative control. The remote mobile video phone itself needs to be covered by a UMTS or equivalent network during a video call. However, UMTS cells can 'breathe' and may be heavily loaded, so it is possible that a UMTS camera is covered by patchy UMTS cover for video-calls but consistent radio coverage for SMSs. Also for audio-only mode, the solution can work in 2G cover.
The text message commands are based on any suitable syntax. The remote mobile video phone is enabled to read the text content of the SMS message and interpret it in accordance with a pre-arranged syntax. The syntax can be made user friendly by using words corresponding to the desired command.
Although the present invention has been described above in the context of a mobile video phone, it will be appreciated that the authorisation and administration mechanisms described above could be applied to any remote phone. The remote phone may be a mobile phone or a landline based phone and it may have audio or video capabilities or a combination of the two. The remote mobile video phone may be a 3G mobile video phone.
Although the present invention has been described above in relation to restricted access, the remote mobile video phone may be switched to unrestricted access, such that anyone may call the remote mobile video phone.
The present invention has been described above in relation to CLI and PIN authorisation techniques. It will be appreciated that, other authorisation techniques may be used. In particular, voice recognition may be used.
Although the present invention has been described in the context of a single user dialling in to the remote mobile video phone, a Video Interactive Gateway (VIG) or corresponding technology may be used to allow more than one user to view images captured by the remote mobile video phone. In this case, a user dials the number of the VIG and the VIG connects the user through to the remote mobile video phone. The telephone number of the VIG is stored in the white-list so that the VIG can dial the remote mobile video phone. In order that the VIG knows which users to allow access to the remote mobile video phone, the white-list may be transferred to the VIG. All the functionality described above may then be carried out by the VIG.
Furthermore, if a normal voice call is already underway between the two mobile video phones, one-way video may be added during the call by setting up a parallel data connection, using SIP for example.
The remote mobile video phone may also be connected to a video recorder or data logger. The remote mobile video phone may then be instructed by a user to record an image being viewed. Alternatively, as video may be transmitted from the user's mobile to the remote mobile video phone, the video recorder may automatically record this video so that there is a visual record of the user who has dialled into the remote mobile video phone. The data logger may make a record of all the users that have dialled into the remote mobile video phone.
As mentioned above, the white-list may be stored on the SIM of the remote mobile video phone. It is possible for the network operator to amend the white-list of initiate other commands using Over-the-Air (OTA) provisioning or corresponding technology. Thus, in the event that the administrator forgets their master PIN, they can contact their network operator and have the white-list or master ΡΓΝ changed.

Claims (17)

186760/2 9
1. A method of transferring media content between a user terminal and a remote device, both being capable of multi-media data transfer, comprising the steps of: initiating communication between the user terminal and the remote device by sending a request from the user terminal to the remote device; establishing a communication link between the user terminal and the remote device; - transferring media content from the remote device to the user terminal; wherein, said step of transferring media content takes place only if the user terminal has been previously authorised for communication with the remote device, and wherein the user terminal is authorised for communication with the remote device if an identifier embedded in the request sent from the user terminal is indicative of one of a plurality of authorised reference identifiers stored in a memory of the remote device.
2. The method as claimed in claim 1 wherein contents related to the plurality of authorised reference identifiers stored in the remote device is controlled by the owner of the remote device from a remote location.
3. The method as claimed in claims 1 or 2 wherein identity of the owner of the remote device is established by the owner sending a message incorporating a unique identification to the remote device.
4. The method as claimed in claim 3 wherein, if the unique identification sent corresponds to the unique identification that is stored in a memory of the remote device, authorization is given to the owner of the remote device to add or delete an identifier from the plurality of reference identifiers stored in the remote device.
5. The method as claimed in claim 3 or 4 wherein the unique identification is the PIN of the remote device. 01787027\40-01 186760/2 10
6. The method as claimed in claim 1 wherein the identifier sent in the request from the user terminal is the telephone number of the user terminal.
7. The method as claimed in claim 1 wherein the plurality of authorised references identifiers stored in the remote device are telephone numbers.
8. The method as claimed in claim 1 wherein the identifier sent in the request from the user terminal is a PIN identifier.
9. The method as claimed in claim 1 wherein the plurality of authorised references identifiers stored in the remote device are PIN identifiers.
10. The method as claimed in claim 8 or 9 wherein the PIN identifiers are valid for a restricted period of time.
11. The method as claimed in claim 1 wherein the media content that is transferred between the user terminal and the remote devices is a video file.
12. The method as claimed in claim 1 wherein the user terminal and the remote device are provided with camera's capable of capturing video and reproducing the same.
13. A system for transferring media content between a user terminal and a remote device, comprising: a remote device configured to receive a request for communication from a user terminal, said remote device having a memory configured to store one or more authorised reference identifiers; and a user terminal configured to send a request initiating communication between the user terminal and the remote device, said communication taking place by establishing a communication link between the user terminal and the remote device; wherein said remote device is configured to transfer media content to said user terminal, only if the request from the user terminal includes an identifier indicative of at least one of the one or more authorised reference identifiers in said memory. 01787027\40-01 186760/2 11
14. A remote device comprising: a memory configured to store one or more authorised reference identifiers, the remote device configured to receive a request for communicating from a user terminal; wherein said remote device is further configured to transfer media content to said user terminal only if a request received from the user terminal includes an identifier indicative of at least one of the one or more authorised reference identifiers stored in said memory of the remote device.
15. A method according to any one of claims 1 to 12, as substantially described herein, or with reference to and as illustrated by the accompanying drawings.
16. A system according to claim 13, as substantially described herein, or with reference to and as illustrated by the accompanying drawings.
17. A remote according to claim 14, as substantially described herein, or with reference to and as illustrated by the accompanying drawings. For the Applicants, REINH HOOMDD) CCOOHHNN AND PARTNERS By: 01787027V 0-01
IL186760A 2005-04-26 2007-10-18 Remote device access control method IL186760A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0508454.6A GB0508454D0 (en) 2005-04-26 2005-04-26 Remote device access control method
PCT/GB2006/001537 WO2006114629A2 (en) 2005-04-26 2006-04-26 Remote device access control method

Publications (2)

Publication Number Publication Date
IL186760A0 IL186760A0 (en) 2008-02-09
IL186760A true IL186760A (en) 2014-04-30

Family

ID=34640171

Family Applications (1)

Application Number Title Priority Date Filing Date
IL186760A IL186760A (en) 2005-04-26 2007-10-18 Remote device access control method

Country Status (8)

Country Link
EP (1) EP1880526A2 (en)
AU (1) AU2006238948B2 (en)
GB (2) GB0508454D0 (en)
HK (1) HK1095687A1 (en)
IL (1) IL186760A (en)
NO (1) NO20075634L (en)
NZ (1) NZ562672A (en)
WO (1) WO2006114629A2 (en)

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956715A (en) * 1994-12-13 1999-09-21 Microsoft Corporation Method and system for controlling user access to a resource in a networked computing environment
WO2001099375A1 (en) * 2000-06-22 2001-12-27 Steven Low Method and system for communicating visual information
US20020065778A1 (en) * 2000-11-30 2002-05-30 Stephane Bouet Mehtod of and a system for distributing electronic content
US7421411B2 (en) * 2001-07-06 2008-09-02 Nokia Corporation Digital rights management in a mobile communications environment
KR100713354B1 (en) * 2003-03-18 2007-05-04 삼성전자주식회사 mobile communication terminal with remote controllable camera and method for taking pictures thereof
US7305230B2 (en) * 2003-07-01 2007-12-04 Nokia Corporation System, apparatus, and method for providing a mobile server
JP2005064885A (en) * 2003-08-13 2005-03-10 Hitachi Ltd Remote monitoring system
US7680484B2 (en) * 2004-02-13 2010-03-16 Edwin A. Kauppila System and method for performing wireless remote monitoring
DE602004016115D1 (en) * 2004-04-08 2008-10-09 Accenture Global Services Gmbh Method and device for remote monitoring of a measuring device
US20060026649A1 (en) * 2004-07-12 2006-02-02 Shieh Peter F Remotely triggering multi-media data delivery in mobile communications devices

Also Published As

Publication number Publication date
WO2006114629A3 (en) 2006-12-21
NO20075634L (en) 2007-11-26
IL186760A0 (en) 2008-02-09
GB0608355D0 (en) 2006-06-07
AU2006238948B2 (en) 2010-03-11
HK1095687A1 (en) 2007-05-11
NZ562672A (en) 2010-11-26
GB2426414B (en) 2009-11-04
GB0508454D0 (en) 2005-06-01
WO2006114629A2 (en) 2006-11-02
GB2426414A (en) 2006-11-22
AU2006238948A1 (en) 2006-11-02
EP1880526A2 (en) 2008-01-23

Similar Documents

Publication Publication Date Title
US7689231B2 (en) Territorial enforcement of device functionality
US8805327B2 (en) Communication method and infrastructure supporting device security and tracking of mobile and portable multimedia devices
CN101227499A (en) System and method for implementing remote video control based on third generation mobile communication system
JP6313895B1 (en) System and method for notifying event occurrence
KR20160145028A (en) Additional information on a caller
EP2107537A1 (en) Video surveillance and home security apparatus using the UMTS network and a method for the management of said apparatus
WO2006066507A1 (en) A method for implementing the function of the scene security and a system thereof
CN103179504A (en) Method and device for judging user legality, and method and system for accessing user to mailbox
WO2009003387A1 (en) A system and a method for video and audio monitoring
EP1693986A1 (en) A mobile monitor-collecting terminal for realizing audio/video monitoring service and the related communication system and method
US20100223465A1 (en) Method for lending out electronic key and communication terminal
EP2088798B1 (en) A method for processing call and a service control device and a call processing system
WO2012075755A1 (en) Mobile terminal and anti-theft method thereof
JP2000232680A (en) Mobile communication terminal, communication network and user authentication method
KR100647819B1 (en) System and method for monitoring home using the IP phone
JP2008048129A (en) Method of remotely controlling mobile terminal, radio communication system, mobile terminal and program
US20090129293A1 (en) Recording a circuit switched call using an ip based control interface
AU2006238948B2 (en) Remote device access control method
KR20070122379A (en) Method for tracking the stolen mobile communication terminal
KR100711097B1 (en) Apparatus and method for protecting private information on wireless telecommunication terminal and Apparatus and method for managing private information using remote control
JP4019059B2 (en) Data line terminator with authentication function and authentication method in data communication
KR20080026469A (en) A method and system for tracking a mobile communication device using mms
JP3774179B2 (en) Internet video phone system
KR20050028538A (en) Photograph method for camera type mobile communication device
KR20070056496A (en) Method for remote locking function setting/canceling of mobile phone

Legal Events

Date Code Title Description
FF Patent granted
KB Patent renewed
KB Patent renewed
KB Patent renewed