GB2426414A - Transferring media content between a user terminal and a remote device - Google Patents
Transferring media content between a user terminal and a remote device Download PDFInfo
- Publication number
- GB2426414A GB2426414A GB0608355A GB0608355A GB2426414A GB 2426414 A GB2426414 A GB 2426414A GB 0608355 A GB0608355 A GB 0608355A GB 0608355 A GB0608355 A GB 0608355A GB 2426414 A GB2426414 A GB 2426414A
- Authority
- GB
- United Kingdom
- Prior art keywords
- remote device
- user terminal
- remote
- mobile video
- pin
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract description 31
- 238000013475 authorization Methods 0.000 claims abstract description 5
- 238000012546 transfer Methods 0.000 claims abstract description 4
- 238000004891 communication Methods 0.000 claims description 7
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 230000006870 function Effects 0.000 abstract description 4
- 238000005516 engineering process Methods 0.000 description 5
- 230000001413 cellular effect Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 208000034188 Stiff person spectrum disease Diseases 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
- H04N7/141—Systems for two-way working between two video terminals, e.g. videophone
-
- H04Q7/32—
-
- H04Q7/3294—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The present invention discloses a method of transferring media content between a user terminal and a remote device, both mobile terminals being capable of multi-media data transfer. The transfer takes place between the terminals unless the user terminal is authorised to communicate with the remote device. This authorization and other administration functions such as managing and updating the list of authorised users etc. is remotely controlled by the owner of the remote device with the help of a master PIN.
Description
REMOTE DEVICE ACCESS CONTRO iriOD The present invention relates to a
method of controlling access to a remote device in mobile telephony in particular a remote video camera in a mobile telephone handset.
Background to the invention
There are various known systems for transmitting video or still images and audio from remote devices to a user terminal. For example, telephone systems enable users to receive audio or video signals from remote locations. In particular, mobile phones enable users to receive audio signals sent from a mobile telephone. Third generation mobile phone technology (3G) has brought video calling functionality to mobile phones and thus users are able to see each other during a call in addition to hearing the usual audio signal. It is also known to connect video cameras to the Internet via personal computers. So called Web-cams, enable users to remotely view images captured by the Web-cam.
US publication 2005/0181762 defines a method of transmitting images from a surveillance camera to a monitoring device, whereby the camera is capable of triggering an alarm to a predefined wireless device.
A problem with accessing video and audio information from remote devices is that without any restrictions, anyone may access them. This may not always be desirable and there is therefore a need for systems which restrict access to remote devices. There is also a need for systems which allow the restrictions to be easily administered.
US publication 2005/0091332 defines communication over a network wherein initiation of transfer, authentication of the communication and administration functions are performed by a central server that transmits instructions to slave terminals. )
US publication 2004/185925 discloses a technique whereby a mobile telephone may be remotely triggered to take a photograph, based on prior authentication information provided by a user. The user at the mobile terminal manages this authentication information, by keying in the required commands.
However the prior art does not facilitate administration control for managing a white list' from a remote location.
Summary of the invention
In a first aspect, the present invention provides a method of generating a link between a user terminal and a remote device. A link request is sent from the user terminal to the remote device. An identifier is sent from the user terminal to the remote device. The remote device checks the identifier against at least one stored identifier and if there is a match, the link is established.
Thus, a user can only access information from a remote device if the identifier sent with the link request matches the at least one stored identifier. This prevents access by unauthorised users.
Mobile phone technology, preferably cellular phone technology is used to establish the link, in which case the user device may be a first mobile video phone and the remote device may be a second mobile video phone or device fitted with a camera having the required circuitry to communicate with the user device over the cellular network and is capable of being plugged in to a power circuit. The link request is a video telephone call from the first mobile video phone to the telephone number of the second mobile video phone and the first identifier is Caller Line Identification (CLI).
The at least one stored identifier is a list of telephone numbers of authorised users which is preferably stored on the SIM card of the second mobile video phone. Video images are sent from the second mobile video phone to the first mobile video phone if the CLI matches a telephone number stored on the SIM card.
in a second aspect, the present invention provides a method of remotely controlling access to the remote device of the first aspect of the present invention. The remote device has stored thereon a master identifier. The method comprises a step of sending a message from a user terminal to the remote device with a command to update the at least one stored identifier. The message includes a master identifier. The command is only acted upon if the master identifier matches that which is stored on the remote device.
Thus, only the owner or administrator of the remote device having the master identifier can update the at least one stored identifier.
Preferably, the master identifier is a PIN number and the message is an SMS text message. The user includes the PIN number and the command in the SMS text message in a predetermined format. The command is only acted upon if the PIN number in the SMS matches the PIN number stored on the second mobile video phone. The command may be to add or remove a telephone number from the list of telephone numbers of authorised users.
In a third aspect, the present invention provides a system, method and device to enable the first and the second aspects of the present invention.
The owner can self-administer access to the mobile video camera and in particular can remotely administer access to the mobile video camera. The system easy to use which helps keep support costs down. For example, there is no need to call a call-centre agent to invoke the changes.
The system is very easy for of use by dial-in users. By pre-authorising users, use of the service is simplified. The solution imposes a small amount of technical skill on the part of the owner of the camera (in composing syntactically correct commands via SMS) but dial-in users need only know how to make a video call.
Brief description of the drawings
So that the present invention may be more readily understood, embodiments thereof will now be described by way of example only and with reference to the accompanying drawings in which: Figure 1 is a flow chart showing an embodiment of the present invention.
Detailed description of the preferred embodiments
In a first aspect the present invention provides a remote mobile video phone which can be dialled into by other mobile video phone users and which allows those users to view images and/or hear sounds at the location of the remote mobile video phone. The remote mobile video phone has a SIM card and a telephone number as per a normal mobile phone. When a user wants to view images at the remote location, they make a video call to the remote mobile video phone in the same way they would make a call to any mobile video phone.
Approved dial-in users have their phone numbers stored in a white-list on the remote mobile video phone. Preferably, the white-list is the memory of the SIM card of the remote mobile video phone. When the user calls the remote mobile video phone, their number is established using, for example, CLI, and if their telephone number matches one in the white-list, the remote mobile video phone answers the call, and images and/or sound captured by the remote mobile video phone are sent to the users mobile phone. No further authentication is required.
Alternatively, for higher security, the dial-in user may be required to enter a user PIN. This would protect against use of the remote mobile video phone if the users mobile phone is stolen. The user PIN could be common to all dial-in users, defined for each users, or even generated by the device (for example, upon being added the white- list) and sent via SMS to that user.
In lower security systems, it may be seen as desirable to allow access only by user PIN even when a dial-in user's phone number is not on the white-list. This would enable a user to call from abroad, in which case the dial-in user's phone number is not always relayed through the mobile networks. (i.e. missing CLI). The user enters a user PIN and the remote mobile video phone cross-references this with a stored user PIN. The call is only answered if there is a match. Preferably, this lower security process of access by user PIN only could have time or count based rules associated therewith. In other words, the administrator or mobile video camera could issue a user PIN that is valid for today only, or only valid for one dial-in call, for ten dial-in calls, etc. Figure 1 is a flowchart showing one procedure for restricted access to the remote mobile enabled device. For the purposes of this example, access to the remote mobile video phone using the white-list is referred to as permanent access' and access to the remote mobile enabled device using a user PIN is referred to as call based access'.
A user initiates a video call to the telephone number of a remote mobile video phone. If free access' is enabled, then a video link is established and the remote mobile video phone begins sending video images to the users mobile phone. If free access' is not enabled, the remote mobile video phone checks whether or not permanent access' is enabled. If not the remote mobile video phone checks to see if call based access' is enabled as will be described below. If permanent access' is enabled, the remote mobile video phone checks the CLI against the telephone numbers stored in the white-list. If the user's telephone number is not in the white-list, then remote mobile video phone checks to see if call based access' is enabled as will be described below. If the user's telephone number is in the white-list, the remote mobile video phone begins sending video images and/or sounds to the users mobile phone.
If the remote mobile video phone is required to check if call based access' is enabled, it does so, and if not, access is denied to the remote mobile video phone. If call based access' is enabled, the remote mobile video phone, asks the user for a user PIN. If the PIN is correct, the remote mobile video phone begins sending video images to the users mobile phone. If not, access is denied.
In the case of call based access', while the call is being established, the remote mobile video phone sends to the user's telephone a predefined image which prompts the user to enter a user PIN. Alternatively, the remote mobile video phone sends a pre- recorded audio stream which informs the user that a PIN should to be entered.
The remote mobile video phone may also be enabled to be controlled by the user during the video call. For example, the functions, rotate, zoom, switch camera, start/stop recording, etc, may all be enabled through key presses during the video call.
So that video recording may be enabled, the remote mobile video phone may be provided with a memory and preferably a removable external memory.
In a second aspect, the present invention provides a method of remotely controlling access to the above-described remote mobile video phone. A master PIN is stored on the remote mobile video phone. The master PIN may be stored either on the SIM or on another memory in the remote phone. The owner may set the master PIN themselves or the remote mobile video phone may be pre-set with a master PIN. This may be done at set-up or may be changed at any time.
The owner or other approved administrator can send commands via Short Message Service (SMS) to the remote mobile video phone that instruct it to add or delete approved dial-in users from the white-list or perform other administrative functions. The remote mobile video phone can respond with an SMS confirming how the requested command was acted upon.
In certain situations, the camera in the remote mobile video phone can be configured to send alarm signals to another authorized mobile terminal. Eg: alarm triggered due to certain movement caused at its location or if the mobile video phone itself is moved from its location. However, further circuitry needs to be incorporated in the mobile phone to allow this application.
For higher security, the mobile video camera may also be enabled to require that remote administration messages containing the master PIN also originate from one or more declared phone numbers, in order for the command or commands to be accepted. This may be in addition to or in place of the master PIN.
Additionally, the message from the owner incorporating the master PIN may be encrypted using existing ciphering techniques. This provides secure communication and prevents a third party from acquiring access to the master PIN, either intentionally or accidentally. A few encryption techniques that could be used include checksum methods (eg: Cyclic redundancy check- CRC), key based methods (eg: Pretty Good Privacy -PGP or Data Encryption Standard -DES) or password protection. The extent of ciphering will depend on the level of security desired by the owner of the mobile video phone.
SMS is the preferred messaging protocol for remote administration as it works in all 2G and 3G radio conditions, but other messaging protocols may be used.
Equally commands could be accepted via a digitally signed email, or if the remote mobile video phone has packet connectivity (GPRS/IJMTS) it could host a small web server on it so that it can be accessed via browsers (either on phones or via the Internet). However, commands could be sent via alternative messaging systems such as email, SIP, MMS, instant messaging, etc. All of these require that the remote mobile video phone has packet comiectivity (i.e. internet protocol(IP)) and that the mobile video camera is in GPRS or UMTS coverage. Use of SMS means that the mobile video camera need only be covered by a basic 2G GSM network for administrative control. The remote mobile video phone itself needs to be covered by a UMTS or equivalent network during a video call. However, IJMTS cells can breathe' and may be heavily loaded, so it is possible that a UIVITS camera is covered by patchy UMTS cover for video-calls but consistent radio coverage for SMSs. Also for audio- only mode, the solution can work in 26 cover.
The text message commands are based on any suitable syntax. The remote mobile video phone is enabled to read the text content of the SMS message and interpret it in accordance with a pre-arranged syntax. The syntax can be made user friendly by using words corresponding to the desired command.
Although the present invention has been described above in the context of a mobile video phone, it will be appreciated that the authorisation and administration mechanisms described above could be applied to any remote phone. The remote phone may be a mobile phone or a landline based phone and it may have audio or video capabilities or a combination of the two. The remote mobile video phone may be a 36 mobile video phone.
Although the present invention has been described above in relation to restricted access, the remote mobile video phone may be switched to unrestricted access, such that anyone may call the remote mobile video phone.
The present invention has been described above in relation to CLI and PIN authorisation techniques. It will be appreciated that, other authorisation techniques may be used. In particular, voice recognition may be used.
Although the present invention has been described in the context of a single user dialling in to the remote mobile video phone, a Video Interactive Gateway (VIG) or corresponding technology may he used to allow more than one user to view images captured by the remote mobile video phone. In this case, a user dials the number of the VIG and the VIG connects the user through to the remote mobile video phone. The telephone number of the VIG is stored in the white-list so that the VIG can dial the remote mobile video phone. In order that the VIG knows which users to allow access to the remote mobile video phone, the white-list may be transferred to the VIG. All the functionality described above may then be carried out by the VIG.
Furthermore, if a normal voice call is already underway between the two mobile video phones, one-way video may be added during the call by setting up a parallel data connection, using SIP for example.
The remote mobile video phone may also be connected to a video recorder or data logger. The remote mobile video phone may then be instructed by a user to record an image being viewed. Alternatively, as video may be transmitted from the user's mobile to the remote mobile video phone, the video recorder may automatically record this video so that there is a visual record of the user who has dialled into the remote mobile video phone. The data logger may make a record of all the users that have dialled into the remote mobile video phone.
As mentioned above, the white-list may be stored on the SIM of the remote mobile video phone. it is possible for the network operator to amend the white-list of initiate other commands using Over-the-Air (OTA) provisioning or corresponding technology. Thus, in the event that the administrator forgets their master PIN, they can contact their network operator and have the white-list or master PIN changed.
Claims (14)
- Claims 1. A method of transferring media content between a user terminaland a remote device, both being capable of multi-media data transfer, comprising the steps of: - initiating communication between the user terminal and the remote device by sending a request from the user terminal to the remote device; - establishing a communication link between the user terminal and the remote device; - transferring media content from the remote device to the user terminal; wherein, said step of transferring media content takes place only if the user terminal has been previously authorised for communication with the remote device.
- 2. The method as claimed in claim I wherein the user terminal is authorised for communication with the remote device if an identifier embedded in the request sent from the user terminal is indicative of one of a plurality of authorized reference identifiers stored in a memory of the remote device.
- 3. The method as claimed in claimi and 2, wherein the contents of the plurality of authorized reference identifiers stored in the remote device is controlled by the owner of the remote device from a remote location.
- 4. The method as claimed in claim I to 3 wherein identity of the owner of the remote device is established by the owner sending a message incorporating a unique identification to the remote device.
- 5. The method as claimed in claims 3 and 4 wherein, if the unique identification sent corresponds to the unique identification that is stored in a memory of the remote device, authorization is given to the owner of the remote device to add or delete an identifier from the plurality of reference identifiers stored in the remote device.
- 6. The method as claimed in claims 3 to 5 wherein the unique identification is the PIN of the remote device.
- 7. The method as claimed in claim 1 wherein the identifier sent in the request from the user terminal is the telephone number of the user terminal.
- 8. The method as claimed in claim 1 wherein the plurality of authorized references identifiers stored in the remote device are telephone numbers.
- 9. The method as claimed in claim I wherein the identifier sent in the request from the user terminal is a PIN identifier.
- 10. The method as claimed in claim 1 wherein the plurality of authorized references identifiers stored in the remote device are PIN identifiers.
- 11. The method as claimed in claims 9 and 10 wherein the PIN identifiers are valid for a restricted period of time.
- 12. The method as claimed in claim 1 wherein the media content that is transferred between the user terminal and the remote devices is a video file.
- 13. The method as claimed in claim I wherein the user terminal and the remote device are provided with camera's capable of capturing video and reproducing the same.
- 14. A system for transferring media content between a user terminal and a remote device, by the method claimed in any of the preceding claims.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0508454.6A GB0508454D0 (en) | 2005-04-26 | 2005-04-26 | Remote device access control method |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0608355D0 GB0608355D0 (en) | 2006-06-07 |
GB2426414A true GB2426414A (en) | 2006-11-22 |
GB2426414B GB2426414B (en) | 2009-11-04 |
Family
ID=34640171
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB0508454.6A Ceased GB0508454D0 (en) | 2005-04-26 | 2005-04-26 | Remote device access control method |
GB0608355A Active GB2426414B (en) | 2005-04-26 | 2006-04-26 | Remote Device Access Control Method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB0508454.6A Ceased GB0508454D0 (en) | 2005-04-26 | 2005-04-26 | Remote device access control method |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP1880526A2 (en) |
AU (1) | AU2006238948B2 (en) |
GB (2) | GB0508454D0 (en) |
HK (1) | HK1095687A1 (en) |
IL (1) | IL186760A (en) |
NO (1) | NO20075634L (en) |
NZ (1) | NZ562672A (en) |
WO (1) | WO2006114629A2 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001099375A1 (en) * | 2000-06-22 | 2001-12-27 | Steven Low | Method and system for communicating visual information |
US20040185925A1 (en) * | 2003-03-18 | 2004-09-23 | Samsung Electronics Co., Ltd. | Mobile communication terminal having remote-controlled camera and photographing method using the same |
US20050091332A1 (en) * | 2003-08-13 | 2005-04-28 | Hitachi, Ltd. | Remote monitoring system |
US20050181762A1 (en) * | 2004-02-13 | 2005-08-18 | Kauppila Edwin A. | System and method for performing wireless remote monitoring |
EP1584898A1 (en) * | 2004-04-08 | 2005-10-12 | Accenture Global Services GmbH | Method and system for remotely monitoring meters |
EP1617639A1 (en) * | 2004-07-12 | 2006-01-18 | OmniVision Technologies, Inc. | Remotely triggering multi-media data delivery in mobile communications devices |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5956715A (en) * | 1994-12-13 | 1999-09-21 | Microsoft Corporation | Method and system for controlling user access to a resource in a networked computing environment |
US20020065778A1 (en) * | 2000-11-30 | 2002-05-30 | Stephane Bouet | Mehtod of and a system for distributing electronic content |
US7421411B2 (en) * | 2001-07-06 | 2008-09-02 | Nokia Corporation | Digital rights management in a mobile communications environment |
US7305230B2 (en) * | 2003-07-01 | 2007-12-04 | Nokia Corporation | System, apparatus, and method for providing a mobile server |
-
2005
- 2005-04-26 GB GBGB0508454.6A patent/GB0508454D0/en not_active Ceased
-
2006
- 2006-04-26 AU AU2006238948A patent/AU2006238948B2/en not_active Ceased
- 2006-04-26 WO PCT/GB2006/001537 patent/WO2006114629A2/en not_active Application Discontinuation
- 2006-04-26 NZ NZ562672A patent/NZ562672A/en not_active IP Right Cessation
- 2006-04-26 GB GB0608355A patent/GB2426414B/en active Active
- 2006-04-26 EP EP06726921A patent/EP1880526A2/en not_active Withdrawn
-
2007
- 2007-02-07 HK HK07101396.1A patent/HK1095687A1/en not_active IP Right Cessation
- 2007-10-18 IL IL186760A patent/IL186760A/en active IP Right Grant
- 2007-11-06 NO NO20075634A patent/NO20075634L/en not_active Application Discontinuation
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001099375A1 (en) * | 2000-06-22 | 2001-12-27 | Steven Low | Method and system for communicating visual information |
US20040185925A1 (en) * | 2003-03-18 | 2004-09-23 | Samsung Electronics Co., Ltd. | Mobile communication terminal having remote-controlled camera and photographing method using the same |
US20050091332A1 (en) * | 2003-08-13 | 2005-04-28 | Hitachi, Ltd. | Remote monitoring system |
US20050181762A1 (en) * | 2004-02-13 | 2005-08-18 | Kauppila Edwin A. | System and method for performing wireless remote monitoring |
EP1584898A1 (en) * | 2004-04-08 | 2005-10-12 | Accenture Global Services GmbH | Method and system for remotely monitoring meters |
EP1617639A1 (en) * | 2004-07-12 | 2006-01-18 | OmniVision Technologies, Inc. | Remotely triggering multi-media data delivery in mobile communications devices |
Also Published As
Publication number | Publication date |
---|---|
GB2426414B (en) | 2009-11-04 |
WO2006114629A3 (en) | 2006-12-21 |
NO20075634L (en) | 2007-11-26 |
AU2006238948B2 (en) | 2010-03-11 |
GB0508454D0 (en) | 2005-06-01 |
IL186760A (en) | 2014-04-30 |
HK1095687A1 (en) | 2007-05-11 |
NZ562672A (en) | 2010-11-26 |
IL186760A0 (en) | 2008-02-09 |
AU2006238948A1 (en) | 2006-11-02 |
GB0608355D0 (en) | 2006-06-07 |
EP1880526A2 (en) | 2008-01-23 |
WO2006114629A2 (en) | 2006-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7689231B2 (en) | Territorial enforcement of device functionality | |
US8805327B2 (en) | Communication method and infrastructure supporting device security and tracking of mobile and portable multimedia devices | |
JP6313895B1 (en) | System and method for notifying event occurrence | |
CN101227499A (en) | System and method for implementing remote video control based on third generation mobile communication system | |
US20050239504A1 (en) | SIM-based automatic feature activation for mobile phones | |
KR20160145028A (en) | Additional information on a caller | |
EP2107537A1 (en) | Video surveillance and home security apparatus using the UMTS network and a method for the management of said apparatus | |
US7184704B2 (en) | Arrangements and methods for remote configuration of personal equipment via wireless detection of user-id | |
EP1693986A1 (en) | A mobile monitor-collecting terminal for realizing audio/video monitoring service and the related communication system and method | |
EP2088798B1 (en) | A method for processing call and a service control device and a call processing system | |
US20100223465A1 (en) | Method for lending out electronic key and communication terminal | |
JP2000232680A (en) | Mobile communication terminal, communication network and user authentication method | |
US20090129293A1 (en) | Recording a circuit switched call using an ip based control interface | |
JP2008048129A (en) | Method of remotely controlling mobile terminal, radio communication system, mobile terminal and program | |
AU2006238948B2 (en) | Remote device access control method | |
KR20070122379A (en) | Method for tracking the stolen mobile communication terminal | |
KR100711097B1 (en) | Apparatus and method for protecting private information on wireless telecommunication terminal and Apparatus and method for managing private information using remote control | |
KR100970350B1 (en) | Method and Terminal of Processing One-Ring Spam | |
KR100968023B1 (en) | Photograph method for camera type mobile communication device | |
JP4019059B2 (en) | Data line terminator with authentication function and authentication method in data communication | |
KR20070056496A (en) | Method for remote locking function setting/canceling of mobile phone | |
KR20080026469A (en) | A method and system for tracking a mobile communication device using mms | |
KR100590172B1 (en) | apparatus and method of providing home view function in home automation system | |
EP2571301B1 (en) | System and method for urgent information deleting and transferring last location information in secure communication | |
JP2004064509A (en) | Incoming call authenticating image downloading device and image downloading system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1095687 Country of ref document: HK |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1095687 Country of ref document: HK |