GB2426414A - Transferring media content between a user terminal and a remote device - Google Patents

Transferring media content between a user terminal and a remote device Download PDF

Info

Publication number
GB2426414A
GB2426414A GB0608355A GB0608355A GB2426414A GB 2426414 A GB2426414 A GB 2426414A GB 0608355 A GB0608355 A GB 0608355A GB 0608355 A GB0608355 A GB 0608355A GB 2426414 A GB2426414 A GB 2426414A
Authority
GB
United Kingdom
Prior art keywords
remote device
user terminal
remote
mobile video
pin
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0608355A
Other versions
GB2426414B (en
GB0608355D0 (en
Inventor
Francesco Pugliese
Christopher Henry Seal
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hutchison Whampoa Three G IP Bahamas Ltd
Original Assignee
Hutchison Whampoa Three G IP Bahamas Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hutchison Whampoa Three G IP Bahamas Ltd filed Critical Hutchison Whampoa Three G IP Bahamas Ltd
Publication of GB0608355D0 publication Critical patent/GB0608355D0/en
Publication of GB2426414A publication Critical patent/GB2426414A/en
Application granted granted Critical
Publication of GB2426414B publication Critical patent/GB2426414B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • H04Q7/32
    • H04Q7/3294
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention discloses a method of transferring media content between a user terminal and a remote device, both mobile terminals being capable of multi-media data transfer. The transfer takes place between the terminals unless the user terminal is authorised to communicate with the remote device. This authorization and other administration functions such as managing and updating the list of authorised users etc. is remotely controlled by the owner of the remote device with the help of a master PIN.

Description

REMOTE DEVICE ACCESS CONTRO iriOD The present invention relates to a
method of controlling access to a remote device in mobile telephony in particular a remote video camera in a mobile telephone handset.
Background to the invention
There are various known systems for transmitting video or still images and audio from remote devices to a user terminal. For example, telephone systems enable users to receive audio or video signals from remote locations. In particular, mobile phones enable users to receive audio signals sent from a mobile telephone. Third generation mobile phone technology (3G) has brought video calling functionality to mobile phones and thus users are able to see each other during a call in addition to hearing the usual audio signal. It is also known to connect video cameras to the Internet via personal computers. So called Web-cams, enable users to remotely view images captured by the Web-cam.
US publication 2005/0181762 defines a method of transmitting images from a surveillance camera to a monitoring device, whereby the camera is capable of triggering an alarm to a predefined wireless device.
A problem with accessing video and audio information from remote devices is that without any restrictions, anyone may access them. This may not always be desirable and there is therefore a need for systems which restrict access to remote devices. There is also a need for systems which allow the restrictions to be easily administered.
US publication 2005/0091332 defines communication over a network wherein initiation of transfer, authentication of the communication and administration functions are performed by a central server that transmits instructions to slave terminals. )
US publication 2004/185925 discloses a technique whereby a mobile telephone may be remotely triggered to take a photograph, based on prior authentication information provided by a user. The user at the mobile terminal manages this authentication information, by keying in the required commands.
However the prior art does not facilitate administration control for managing a white list' from a remote location.
Summary of the invention
In a first aspect, the present invention provides a method of generating a link between a user terminal and a remote device. A link request is sent from the user terminal to the remote device. An identifier is sent from the user terminal to the remote device. The remote device checks the identifier against at least one stored identifier and if there is a match, the link is established.
Thus, a user can only access information from a remote device if the identifier sent with the link request matches the at least one stored identifier. This prevents access by unauthorised users.
Mobile phone technology, preferably cellular phone technology is used to establish the link, in which case the user device may be a first mobile video phone and the remote device may be a second mobile video phone or device fitted with a camera having the required circuitry to communicate with the user device over the cellular network and is capable of being plugged in to a power circuit. The link request is a video telephone call from the first mobile video phone to the telephone number of the second mobile video phone and the first identifier is Caller Line Identification (CLI).
The at least one stored identifier is a list of telephone numbers of authorised users which is preferably stored on the SIM card of the second mobile video phone. Video images are sent from the second mobile video phone to the first mobile video phone if the CLI matches a telephone number stored on the SIM card.
in a second aspect, the present invention provides a method of remotely controlling access to the remote device of the first aspect of the present invention. The remote device has stored thereon a master identifier. The method comprises a step of sending a message from a user terminal to the remote device with a command to update the at least one stored identifier. The message includes a master identifier. The command is only acted upon if the master identifier matches that which is stored on the remote device.
Thus, only the owner or administrator of the remote device having the master identifier can update the at least one stored identifier.
Preferably, the master identifier is a PIN number and the message is an SMS text message. The user includes the PIN number and the command in the SMS text message in a predetermined format. The command is only acted upon if the PIN number in the SMS matches the PIN number stored on the second mobile video phone. The command may be to add or remove a telephone number from the list of telephone numbers of authorised users.
In a third aspect, the present invention provides a system, method and device to enable the first and the second aspects of the present invention.
The owner can self-administer access to the mobile video camera and in particular can remotely administer access to the mobile video camera. The system easy to use which helps keep support costs down. For example, there is no need to call a call-centre agent to invoke the changes.
The system is very easy for of use by dial-in users. By pre-authorising users, use of the service is simplified. The solution imposes a small amount of technical skill on the part of the owner of the camera (in composing syntactically correct commands via SMS) but dial-in users need only know how to make a video call.
Brief description of the drawings
So that the present invention may be more readily understood, embodiments thereof will now be described by way of example only and with reference to the accompanying drawings in which: Figure 1 is a flow chart showing an embodiment of the present invention.
Detailed description of the preferred embodiments
In a first aspect the present invention provides a remote mobile video phone which can be dialled into by other mobile video phone users and which allows those users to view images and/or hear sounds at the location of the remote mobile video phone. The remote mobile video phone has a SIM card and a telephone number as per a normal mobile phone. When a user wants to view images at the remote location, they make a video call to the remote mobile video phone in the same way they would make a call to any mobile video phone.
Approved dial-in users have their phone numbers stored in a white-list on the remote mobile video phone. Preferably, the white-list is the memory of the SIM card of the remote mobile video phone. When the user calls the remote mobile video phone, their number is established using, for example, CLI, and if their telephone number matches one in the white-list, the remote mobile video phone answers the call, and images and/or sound captured by the remote mobile video phone are sent to the users mobile phone. No further authentication is required.
Alternatively, for higher security, the dial-in user may be required to enter a user PIN. This would protect against use of the remote mobile video phone if the users mobile phone is stolen. The user PIN could be common to all dial-in users, defined for each users, or even generated by the device (for example, upon being added the white- list) and sent via SMS to that user.
In lower security systems, it may be seen as desirable to allow access only by user PIN even when a dial-in user's phone number is not on the white-list. This would enable a user to call from abroad, in which case the dial-in user's phone number is not always relayed through the mobile networks. (i.e. missing CLI). The user enters a user PIN and the remote mobile video phone cross-references this with a stored user PIN. The call is only answered if there is a match. Preferably, this lower security process of access by user PIN only could have time or count based rules associated therewith. In other words, the administrator or mobile video camera could issue a user PIN that is valid for today only, or only valid for one dial-in call, for ten dial-in calls, etc. Figure 1 is a flowchart showing one procedure for restricted access to the remote mobile enabled device. For the purposes of this example, access to the remote mobile video phone using the white-list is referred to as permanent access' and access to the remote mobile enabled device using a user PIN is referred to as call based access'.
A user initiates a video call to the telephone number of a remote mobile video phone. If free access' is enabled, then a video link is established and the remote mobile video phone begins sending video images to the users mobile phone. If free access' is not enabled, the remote mobile video phone checks whether or not permanent access' is enabled. If not the remote mobile video phone checks to see if call based access' is enabled as will be described below. If permanent access' is enabled, the remote mobile video phone checks the CLI against the telephone numbers stored in the white-list. If the user's telephone number is not in the white-list, then remote mobile video phone checks to see if call based access' is enabled as will be described below. If the user's telephone number is in the white-list, the remote mobile video phone begins sending video images and/or sounds to the users mobile phone.
If the remote mobile video phone is required to check if call based access' is enabled, it does so, and if not, access is denied to the remote mobile video phone. If call based access' is enabled, the remote mobile video phone, asks the user for a user PIN. If the PIN is correct, the remote mobile video phone begins sending video images to the users mobile phone. If not, access is denied.
In the case of call based access', while the call is being established, the remote mobile video phone sends to the user's telephone a predefined image which prompts the user to enter a user PIN. Alternatively, the remote mobile video phone sends a pre- recorded audio stream which informs the user that a PIN should to be entered.
The remote mobile video phone may also be enabled to be controlled by the user during the video call. For example, the functions, rotate, zoom, switch camera, start/stop recording, etc, may all be enabled through key presses during the video call.
So that video recording may be enabled, the remote mobile video phone may be provided with a memory and preferably a removable external memory.
In a second aspect, the present invention provides a method of remotely controlling access to the above-described remote mobile video phone. A master PIN is stored on the remote mobile video phone. The master PIN may be stored either on the SIM or on another memory in the remote phone. The owner may set the master PIN themselves or the remote mobile video phone may be pre-set with a master PIN. This may be done at set-up or may be changed at any time.
The owner or other approved administrator can send commands via Short Message Service (SMS) to the remote mobile video phone that instruct it to add or delete approved dial-in users from the white-list or perform other administrative functions. The remote mobile video phone can respond with an SMS confirming how the requested command was acted upon.
In certain situations, the camera in the remote mobile video phone can be configured to send alarm signals to another authorized mobile terminal. Eg: alarm triggered due to certain movement caused at its location or if the mobile video phone itself is moved from its location. However, further circuitry needs to be incorporated in the mobile phone to allow this application.
For higher security, the mobile video camera may also be enabled to require that remote administration messages containing the master PIN also originate from one or more declared phone numbers, in order for the command or commands to be accepted. This may be in addition to or in place of the master PIN.
Additionally, the message from the owner incorporating the master PIN may be encrypted using existing ciphering techniques. This provides secure communication and prevents a third party from acquiring access to the master PIN, either intentionally or accidentally. A few encryption techniques that could be used include checksum methods (eg: Cyclic redundancy check- CRC), key based methods (eg: Pretty Good Privacy -PGP or Data Encryption Standard -DES) or password protection. The extent of ciphering will depend on the level of security desired by the owner of the mobile video phone.
SMS is the preferred messaging protocol for remote administration as it works in all 2G and 3G radio conditions, but other messaging protocols may be used.
Equally commands could be accepted via a digitally signed email, or if the remote mobile video phone has packet connectivity (GPRS/IJMTS) it could host a small web server on it so that it can be accessed via browsers (either on phones or via the Internet). However, commands could be sent via alternative messaging systems such as email, SIP, MMS, instant messaging, etc. All of these require that the remote mobile video phone has packet comiectivity (i.e. internet protocol(IP)) and that the mobile video camera is in GPRS or UMTS coverage. Use of SMS means that the mobile video camera need only be covered by a basic 2G GSM network for administrative control. The remote mobile video phone itself needs to be covered by a UMTS or equivalent network during a video call. However, IJMTS cells can breathe' and may be heavily loaded, so it is possible that a UIVITS camera is covered by patchy UMTS cover for video-calls but consistent radio coverage for SMSs. Also for audio- only mode, the solution can work in 26 cover.
The text message commands are based on any suitable syntax. The remote mobile video phone is enabled to read the text content of the SMS message and interpret it in accordance with a pre-arranged syntax. The syntax can be made user friendly by using words corresponding to the desired command.
Although the present invention has been described above in the context of a mobile video phone, it will be appreciated that the authorisation and administration mechanisms described above could be applied to any remote phone. The remote phone may be a mobile phone or a landline based phone and it may have audio or video capabilities or a combination of the two. The remote mobile video phone may be a 36 mobile video phone.
Although the present invention has been described above in relation to restricted access, the remote mobile video phone may be switched to unrestricted access, such that anyone may call the remote mobile video phone.
The present invention has been described above in relation to CLI and PIN authorisation techniques. It will be appreciated that, other authorisation techniques may be used. In particular, voice recognition may be used.
Although the present invention has been described in the context of a single user dialling in to the remote mobile video phone, a Video Interactive Gateway (VIG) or corresponding technology may he used to allow more than one user to view images captured by the remote mobile video phone. In this case, a user dials the number of the VIG and the VIG connects the user through to the remote mobile video phone. The telephone number of the VIG is stored in the white-list so that the VIG can dial the remote mobile video phone. In order that the VIG knows which users to allow access to the remote mobile video phone, the white-list may be transferred to the VIG. All the functionality described above may then be carried out by the VIG.
Furthermore, if a normal voice call is already underway between the two mobile video phones, one-way video may be added during the call by setting up a parallel data connection, using SIP for example.
The remote mobile video phone may also be connected to a video recorder or data logger. The remote mobile video phone may then be instructed by a user to record an image being viewed. Alternatively, as video may be transmitted from the user's mobile to the remote mobile video phone, the video recorder may automatically record this video so that there is a visual record of the user who has dialled into the remote mobile video phone. The data logger may make a record of all the users that have dialled into the remote mobile video phone.
As mentioned above, the white-list may be stored on the SIM of the remote mobile video phone. it is possible for the network operator to amend the white-list of initiate other commands using Over-the-Air (OTA) provisioning or corresponding technology. Thus, in the event that the administrator forgets their master PIN, they can contact their network operator and have the white-list or master PIN changed.

Claims (14)

  1. Claims 1. A method of transferring media content between a user terminal
    and a remote device, both being capable of multi-media data transfer, comprising the steps of: - initiating communication between the user terminal and the remote device by sending a request from the user terminal to the remote device; - establishing a communication link between the user terminal and the remote device; - transferring media content from the remote device to the user terminal; wherein, said step of transferring media content takes place only if the user terminal has been previously authorised for communication with the remote device.
  2. 2. The method as claimed in claim I wherein the user terminal is authorised for communication with the remote device if an identifier embedded in the request sent from the user terminal is indicative of one of a plurality of authorized reference identifiers stored in a memory of the remote device.
  3. 3. The method as claimed in claimi and 2, wherein the contents of the plurality of authorized reference identifiers stored in the remote device is controlled by the owner of the remote device from a remote location.
  4. 4. The method as claimed in claim I to 3 wherein identity of the owner of the remote device is established by the owner sending a message incorporating a unique identification to the remote device.
  5. 5. The method as claimed in claims 3 and 4 wherein, if the unique identification sent corresponds to the unique identification that is stored in a memory of the remote device, authorization is given to the owner of the remote device to add or delete an identifier from the plurality of reference identifiers stored in the remote device.
  6. 6. The method as claimed in claims 3 to 5 wherein the unique identification is the PIN of the remote device.
  7. 7. The method as claimed in claim 1 wherein the identifier sent in the request from the user terminal is the telephone number of the user terminal.
  8. 8. The method as claimed in claim 1 wherein the plurality of authorized references identifiers stored in the remote device are telephone numbers.
  9. 9. The method as claimed in claim I wherein the identifier sent in the request from the user terminal is a PIN identifier.
  10. 10. The method as claimed in claim 1 wherein the plurality of authorized references identifiers stored in the remote device are PIN identifiers.
  11. 11. The method as claimed in claims 9 and 10 wherein the PIN identifiers are valid for a restricted period of time.
  12. 12. The method as claimed in claim 1 wherein the media content that is transferred between the user terminal and the remote devices is a video file.
  13. 13. The method as claimed in claim I wherein the user terminal and the remote device are provided with camera's capable of capturing video and reproducing the same.
  14. 14. A system for transferring media content between a user terminal and a remote device, by the method claimed in any of the preceding claims.
GB0608355A 2005-04-26 2006-04-26 Remote Device Access Control Method Active GB2426414B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB0508454.6A GB0508454D0 (en) 2005-04-26 2005-04-26 Remote device access control method

Publications (3)

Publication Number Publication Date
GB0608355D0 GB0608355D0 (en) 2006-06-07
GB2426414A true GB2426414A (en) 2006-11-22
GB2426414B GB2426414B (en) 2009-11-04

Family

ID=34640171

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB0508454.6A Ceased GB0508454D0 (en) 2005-04-26 2005-04-26 Remote device access control method
GB0608355A Active GB2426414B (en) 2005-04-26 2006-04-26 Remote Device Access Control Method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB0508454.6A Ceased GB0508454D0 (en) 2005-04-26 2005-04-26 Remote device access control method

Country Status (8)

Country Link
EP (1) EP1880526A2 (en)
AU (1) AU2006238948B2 (en)
GB (2) GB0508454D0 (en)
HK (1) HK1095687A1 (en)
IL (1) IL186760A (en)
NO (1) NO20075634L (en)
NZ (1) NZ562672A (en)
WO (1) WO2006114629A2 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001099375A1 (en) * 2000-06-22 2001-12-27 Steven Low Method and system for communicating visual information
US20040185925A1 (en) * 2003-03-18 2004-09-23 Samsung Electronics Co., Ltd. Mobile communication terminal having remote-controlled camera and photographing method using the same
US20050091332A1 (en) * 2003-08-13 2005-04-28 Hitachi, Ltd. Remote monitoring system
US20050181762A1 (en) * 2004-02-13 2005-08-18 Kauppila Edwin A. System and method for performing wireless remote monitoring
EP1584898A1 (en) * 2004-04-08 2005-10-12 Accenture Global Services GmbH Method and system for remotely monitoring meters
EP1617639A1 (en) * 2004-07-12 2006-01-18 OmniVision Technologies, Inc. Remotely triggering multi-media data delivery in mobile communications devices

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956715A (en) * 1994-12-13 1999-09-21 Microsoft Corporation Method and system for controlling user access to a resource in a networked computing environment
US20020065778A1 (en) * 2000-11-30 2002-05-30 Stephane Bouet Mehtod of and a system for distributing electronic content
US7421411B2 (en) * 2001-07-06 2008-09-02 Nokia Corporation Digital rights management in a mobile communications environment
US7305230B2 (en) * 2003-07-01 2007-12-04 Nokia Corporation System, apparatus, and method for providing a mobile server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001099375A1 (en) * 2000-06-22 2001-12-27 Steven Low Method and system for communicating visual information
US20040185925A1 (en) * 2003-03-18 2004-09-23 Samsung Electronics Co., Ltd. Mobile communication terminal having remote-controlled camera and photographing method using the same
US20050091332A1 (en) * 2003-08-13 2005-04-28 Hitachi, Ltd. Remote monitoring system
US20050181762A1 (en) * 2004-02-13 2005-08-18 Kauppila Edwin A. System and method for performing wireless remote monitoring
EP1584898A1 (en) * 2004-04-08 2005-10-12 Accenture Global Services GmbH Method and system for remotely monitoring meters
EP1617639A1 (en) * 2004-07-12 2006-01-18 OmniVision Technologies, Inc. Remotely triggering multi-media data delivery in mobile communications devices

Also Published As

Publication number Publication date
GB2426414B (en) 2009-11-04
WO2006114629A3 (en) 2006-12-21
NO20075634L (en) 2007-11-26
AU2006238948B2 (en) 2010-03-11
GB0508454D0 (en) 2005-06-01
IL186760A (en) 2014-04-30
HK1095687A1 (en) 2007-05-11
NZ562672A (en) 2010-11-26
IL186760A0 (en) 2008-02-09
AU2006238948A1 (en) 2006-11-02
GB0608355D0 (en) 2006-06-07
EP1880526A2 (en) 2008-01-23
WO2006114629A2 (en) 2006-11-02

Similar Documents

Publication Publication Date Title
US7689231B2 (en) Territorial enforcement of device functionality
US8805327B2 (en) Communication method and infrastructure supporting device security and tracking of mobile and portable multimedia devices
JP6313895B1 (en) System and method for notifying event occurrence
CN101227499A (en) System and method for implementing remote video control based on third generation mobile communication system
US20050239504A1 (en) SIM-based automatic feature activation for mobile phones
KR20160145028A (en) Additional information on a caller
EP2107537A1 (en) Video surveillance and home security apparatus using the UMTS network and a method for the management of said apparatus
US7184704B2 (en) Arrangements and methods for remote configuration of personal equipment via wireless detection of user-id
EP1693986A1 (en) A mobile monitor-collecting terminal for realizing audio/video monitoring service and the related communication system and method
EP2088798B1 (en) A method for processing call and a service control device and a call processing system
US20100223465A1 (en) Method for lending out electronic key and communication terminal
JP2000232680A (en) Mobile communication terminal, communication network and user authentication method
US20090129293A1 (en) Recording a circuit switched call using an ip based control interface
JP2008048129A (en) Method of remotely controlling mobile terminal, radio communication system, mobile terminal and program
AU2006238948B2 (en) Remote device access control method
KR20070122379A (en) Method for tracking the stolen mobile communication terminal
KR100711097B1 (en) Apparatus and method for protecting private information on wireless telecommunication terminal and Apparatus and method for managing private information using remote control
KR100970350B1 (en) Method and Terminal of Processing One-Ring Spam
KR100968023B1 (en) Photograph method for camera type mobile communication device
JP4019059B2 (en) Data line terminator with authentication function and authentication method in data communication
KR20070056496A (en) Method for remote locking function setting/canceling of mobile phone
KR20080026469A (en) A method and system for tracking a mobile communication device using mms
KR100590172B1 (en) apparatus and method of providing home view function in home automation system
EP2571301B1 (en) System and method for urgent information deleting and transferring last location information in secure communication
JP2004064509A (en) Incoming call authenticating image downloading device and image downloading system

Legal Events

Date Code Title Description
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1095687

Country of ref document: HK

REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1095687

Country of ref document: HK