TWI223938B - Method and apparatus for preventing access to information stored at a node - Google Patents

Method and apparatus for preventing access to information stored at a node Download PDF

Info

Publication number
TWI223938B
TWI223938B TW090127528A TW90127528A TWI223938B TW I223938 B TWI223938 B TW I223938B TW 090127528 A TW090127528 A TW 090127528A TW 90127528 A TW90127528 A TW 90127528A TW I223938 B TWI223938 B TW I223938B
Authority
TW
Taiwan
Prior art keywords
information
node
scope
patent application
access
Prior art date
Application number
TW090127528A
Other languages
Chinese (zh)
Inventor
Mazen Chmaytelli
Samir K Khazaka
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Application granted granted Critical
Publication of TWI223938B publication Critical patent/TWI223938B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

In one implementation of the present invention, a cellular network for wireless communications (e.g. a cellular telephone network) receives a transmission including an identification token from a mobile unit (e.g. a telephone). Via a service provider, the network also receives a command to prevent access to information stored at the mobile unit. Upon detecting a correspondence between the identification token and the command to prevent access to information stored at the mobile unit, the network instructs the mobile unit to prevent access to local information, which information may include a directory of telephone numbers and other personal and/or confidential items.

Description

1223938 A7 B7 五、發明説明( 背景 發明領域 本發明關於通訊系統。更特定而言,本發明係關於資訊 存取控制。 發明背景1223938 A7 B7 V. DESCRIPTION OF THE INVENTION (BACKGROUND FIELD OF THE INVENTION The present invention relates to communication systems. More specifically, the present invention relates to information access control. BACKGROUND OF THE INVENTION

一通訊系統包含一通訊網路及一組節點,其可與該網路 通訊。在該網路與該節點之間的通訊連結可為有線及/或 無線。該網路也可與其它網路通訊,使得一節點可與在該 網路中的一個體,與連接到該網路的其它節點,及/或與 在其它網路上一個體及/或一節點通訊。 裝 訂A communication system includes a communication network and a group of nodes that can communicate with the network. The communication link between the network and the node may be wired and / or wireless. The network can also communicate with other networks, so that a node can communicate with an entity in the network, with other nodes connected to the network, and / or with an entity and / or a node on other networks. communication. Binding

線 一通訊網路的範例為一區域網路(L A N ),其中在該網路 内的個體可包含一或多個飼服器’而該個別節點可包含工 作站’個人電腦,及/或週邊裝置,例如儲存單元及印表 機。一通訊網路的另一個範例為一無線通訊的蜂巢式網 路,其中.在該網路中的個體可包含一或多個基地台(具有 基地台收發器或”BTSs”),及管理單元(例如基地台控制 器(BSCs) ’行動服務交換中心(MSCs),及本部及來訪者 位置暫存器(分別為HLRS及VLRs ),而該個別節點可為行 動單兀(也稱之為”行動台”),其可在一無線連結上與一或 多個基地台通訊。一行動單元可為一蜂巢式電話,一電腦 或其E連接到一無線數據機的其它處理裝置,一無線局部 迴路(WLL)台,或一無線個人數位助理(pDA)。經由該 基地台’该行動單元可彼此通訊,及/或與在其它網路上 的裝置通訊’該網路例如是網際網路及/或該公共交換電 -4-An example of a line-to-communication network is a local area network (LAN), in which individuals within the network may include one or more feeders' and the individual nodes may include workstations, personal computers, and / or peripheral devices, Examples include storage units and printers. Another example of a communication network is a wireless communication cellular network, in which an individual in the network may include one or more base stations (with base station transceivers or "BTSs"), and a management unit ( For example, base station controllers (BSCs) 'Mobile Service Exchange Centers (MSCs), and headquarters and visitor location registers (HLRS and VLRs, respectively), and the individual nodes can be mobile units (also called "mobiles" Station "), which can communicate with one or more base stations on a wireless link. A mobile unit can be a cellular phone, a computer or other processing device connected to a wireless modem, and a wireless local loop (WLL) station, or a wireless personal digital assistant (pDA). Via the base station 'the mobile units can communicate with each other and / or with devices on other networks' such as the Internet and / or The public exchange electricity -4-

1223938 A7 B7 五、發明説明(2 話網路(PSTN)。 如果一行動單元,例如一蜂巢式電話遺失或被偷,該擁 有者或帳號保有者可指示該服務提供者來拒絕該行動單元 的嘗試來存取該網路。此動作有助於防止一未授權的使用 者得到使用,而計價到結合於該單元的服務帳號。但是, 該行動單元可包含半導體快閃隨機存取記憶體(或” flash RAM”)’其可保持機密資訊,例如電話號碼。因此該趨勢 朝向結合蜂巢式電話能力與其它能力在相同的攜帶式裝置 中(例如電子郵件通訊,個人記事,及網頁瀏覽),該flash RAM可儲存額外的機密資訊,例如電子郵件位址及訊 息、語音信箱訊息、排程及個人接觸資訊、密碼,及/或 銀行或信用帳號。即使該行動單元可在其遗失或被偷時被 拒絕存取到该網路,儲存在該行動單元上的機密資訊可維 持存取到一闖入者及受到誤用。 發明概要 在根據本發明一具體實施例的方法中,一節點被指示來 防止存取儲存在該節點之資訊。此指示係在偵測到一方面 為防止存取到儲存在該節點的資訊(或至少這個指令的一 部份),及另一方面結合於該節點的一識別之間的一致 性。 圖式簡單說明 在圖面中,相同的參考編號在幾個圖面中係代表整個本 發明中類似的部份,其中·· 圖1所示為根據本發明一具體實施例的一通訊系統的方 -5- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公爱)1223938 A7 B7 V. Description of the invention (2-phone network (PSTN). If a mobile unit, such as a cellular telephone, is lost or stolen, the owner or account holder may instruct the service provider to reject the mobile unit. Attempt to access the network. This action helps prevent an unauthorized user from being used and is billed to the service account associated with the unit. However, the mobile unit may include semiconductor flash random access memory ( Or "flash RAM") 'which can hold confidential information, such as phone numbers. So the trend is toward combining cellular phone capabilities with other capabilities in the same portable device (such as email communications, personal notes, and web browsing), The flash RAM can store additional confidential information, such as email addresses and messages, voicemail messages, scheduling and personal contact information, passwords, and / or bank or credit account numbers, even if the mobile unit can be lost or stolen Access to the network was denied at times, and confidential information stored on the mobile unit could maintain access to an intruder and be misused. SUMMARY OF THE INVENTION In a method according to a specific embodiment of the present invention, a node is instructed to prevent access to information stored in the node. This indication is detected on the one hand to prevent access to information stored in the node ( Or at least a part of this instruction), and on the other hand a consistency that is combined with the identification of the node. The drawings are briefly illustrated in the drawings. The same reference number represents the entire copy in several drawings. A similar part of the invention, of which ... Figure 1 shows a formula of a communication system according to a specific embodiment of the present invention.-This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 public love).

裝· 訂Packing

線 I223938Line I223938

五、發明説明( A7 B7V. Description of the invention (A7 B7

塊圖; 圖2所示為防止存取到儲存在節點1 〇 〇之資訊的指令; 圖3所示為根據本發明一具體實施例的一通訊系統的方 塊圖; 圖4所示為根據本發明一具體實施例的方法之流程圖; 圖5所示為根據本發明一具體實施例的網路150之方塊 圖; 圖6所示為根據本發明一具體實施例一無線通訊1 5 2的 蜂巢式網路的方塊圖; 圖7所示為根據本發明一具體實施例一網路15〇a的方塊圖; 圖8所示為根據本發明一具體實施例一無線通訊152a的 蜂巢式網路的方塊圖; 圖9所示為根據本發明一具體實施例一方法的流程圖; 圖1 0所示為根據本發明一具體實施例一節點丨〇〇的方塊 圖, 圖1 1所示為根據本發明一具體實施例一節點1〇2的方塊 TSJ · 圖, 圖1 2所示為根據本發明一具體實施例一節點100a的方塊 rgi ♦ _ , 圖1 3所示為根據本發明一具體實施例一方法的流程圖; 圖1 4所示為根據本發明一具體實施例一方法的流程圖; 圖1 5所示為根據本發明一具體實施例一方法的流程 圖;及 圖1 6所示為根據本發明一具體實施例一方法的流程圖。 -6- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)Block diagram; FIG. 2 shows a command for preventing access to information stored in the node 100; FIG. 3 shows a block diagram of a communication system according to a specific embodiment of the present invention; FIG. 4 shows a block diagram according to the present invention; A flowchart of a method of a specific embodiment of the invention; FIG. 5 shows a block diagram of a network 150 according to a specific embodiment of the invention; FIG. 6 shows a wireless communication 1 5 2 according to a specific embodiment of the invention Block diagram of a cellular network; FIG. 7 shows a block diagram of a network 15a according to a specific embodiment of the present invention; FIG. 8 shows a cellular network of a wireless communication 152a according to a specific embodiment of the present invention FIG. 9 shows a flowchart of a method according to a specific embodiment of the present invention; FIG. 10 shows a block diagram of a node according to a specific embodiment of the present invention; FIG. 11 shows FIG. 12 is a block TSJ diagram of a node 100 according to a specific embodiment of the present invention. FIG. 12 shows a block rgi of a node 100a according to a specific embodiment of the present invention. FIG. 13 shows a block rgi according to the present invention. A specific embodiment of the method flowchart; shown in Figure 14 A flowchart of a method according to a specific embodiment of the present invention; FIG. 15 shows a flowchart of a method according to a specific embodiment of the present invention; and FIG. 16 shows a flowchart of a method according to a specific embodiment of the present invention Illustration. -6- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

裝. 訂Loading. Order

線 1223938 A7 B7Line 1223938 A7 B7

詳細說明 在一些系統中,在一節點及一網路之間的連結是臨時 的。例如在一蜂巢式電話網路或無線lan中,一行動單 元及該網路之間的連結在該行動單元未開啟電源時並不存 在。即使在產生這種連結之後,其關於該網路的位置及特 性可在當該行動單元由位在一網路終端(例如一基地台气 其區段)的範圍中移動到另一個的範圍内而有所改變。因 此,對該網路不可能僅藉由使用一靜態位置或地址來辨識 以此方式連接的節點。 ’ 在其它系統中,一介於一節點與一網路之間的連結可能 短暫但為靜態型。這種網路可包含一或多個終端讓節點^ 用一臨時的基礎來連接。一個範例包含一個人電腦(可能 連接到一 LAN),其可經由一序列或平行埠連接到一或多 個P D A或類似的裝置。雖然以此方式連接一節點的一網 路終端可為固定,超過一個節點可透過該終端(例如在不 同時間)連接到该網路’及/或一單一節點可經由不同終端 (例如在不同時間)連接到該網路,使得該網路不可能僅使 用一靜態位置或地址來辨識一節點。 數個重要的網路功能可根據該網路的能力來辨識或定位 一節點。這種功能的範例包含定位呼叫目的之特殊節點 (例如通知一蜂巢式電話有來電),及結合一活動節點與一 已知的識別或輪廓來用於計費、訊息遞送、服務區別、資 料同步化等。 一辨識標記為一機制可用來辨識經由一臨時連結來連接 本紙張尺度適財® ®家標準(CNS) A4規格(·χ 297公董) 1223938Detailed description In some systems, the connection between a node and a network is temporary. For example, in a cellular telephone network or wireless LAN, the connection between a mobile unit and the network does not exist when the mobile unit is not powered on. Even after such a connection is made, its location and characteristics about the network can be moved within the range when the mobile unit is located within the range of a network terminal (such as a base station and its section) to another And something changed. Therefore, it is impossible for this network to identify nodes connected in this way simply by using a static location or address. ’In other systems, a connection between a node and a network may be short but static. Such a network may contain one or more terminals for nodes ^ to connect on a temporary basis. An example includes a personal computer (possibly connected to a LAN) that can be connected to one or more PD or similar devices via a serial or parallel port. Although a network terminal connected to a node in this manner may be fixed, more than one node may be connected to the network through the terminal (for example at different times) and / or a single node may be connected through different terminals (for example at different times) ) Connected to the network, making it impossible for the network to identify a node using only a static location or address. Several important network functions can identify or locate a node based on its capabilities. Examples of such functions include locating special nodes for call purposes (such as notifying a cellular phone of an incoming call), and combining an active node with a known identity or profile for billing, message delivery, service differentiation, and data synchronization化 etc. An identification mark is a mechanism that can be used to identify the connection through a temporary link. This paper size is suitable for financial ® ® Standards (CNS) A4 (· χ 297 公 董) 1223938

AT B7 五、發明説明(5 ) 到一網路之節點。在使用此機制的系統範例中,該節點儲 存至少一個這種標記,而該網路儲存該標記與一網路識別 之間的一致性(在一些狀況中,該網路可已經指定該標記 到該節點)。在一初始傳輸期間,該節點在一通訊連結上 傳送該標記到該網路。該網路接收該標記,進行辨識,並 結合該對應網路識別與該行動單元。此結合可持續,即使 該連結改變在該網路中的特性(例如在一蜂巢式電話交遞 狀況)。該節點識別結合也可進行後續的重新驗證(例如定 期地及/或在指定的事件時)。 在一 CDMA (分碼多向近接)系統來進行蜂巢式通訊,其 符合 Interim Standard-95B (或” IS-95B” ,名為” MOBILE STATION-BASE STATION COMPATIBILITY STANDARD FOR DUAL-MODE WIDEBAND SPREAD SPECTRUM CELLULAR SYSTEMS”,其由 Telecommunications Industry Association/ Electronics Industries Association (TIA/EIA)發行於 1999 年 2 月 3 日)或符合 Interim Standard_2000 (或” IS-2000 ”,一 6 個 部份標準,其由TIA/EIA於1999年7月發行),例如,一行 動單元被程式化來儲存識別資訊,其為一 1 0位行動識別 號碼(MIN)。該MIN包含來自該行動單元的唯一電子序 號(E S N)的4位及來自於該網路已知的一識別字串的6 位。該Μ IN可儲存在該行動單元中的一非揮發記憶體, 例如唯讀記憶體(,,R〇M,,),可程式ROM ("PROM”),可抹 除PROM(·’EPROM"),及/或電子EPROM(”EEPROM,’)(例 如快閃記憶體)。 -8 - 本紙張尺度適用中國國家標準(CNS) A4規格(210X 297公釐) 1223938 A7AT B7 V. Description of Invention (5) To a node of a network. In an example system using this mechanism, the node stores at least one such tag, and the network stores the consistency between the tag and a network identifier (in some cases, the network may have assigned the tag to The node). During an initial transmission, the node transmits the tag to the network over a communication link. The network receives the tag, performs identification, and combines the corresponding network identification with the mobile unit. This combination can continue even if the link changes characteristics in the network (for example, a cellular telephone delivery situation). This node identification combination can also be followed by re-validation (for example, periodically and / or at specified events). Cellular communication is performed in a CDMA (Divided Code Multi-Directional Proximity) system, which conforms to Interim Standard-95B (or “IS-95B”) and is named “MOBILE STATION-BASE STATION COMPATIBILITY STANDARD FOR DUAL-MODE WIDEBAND SPREAD SPECTRUM CELLULAR SYSTEMS ", Which was issued by the Telecommunications Industry Association / Electronics Industries Association (TIA / EIA) on February 3, 1999) or complies with Interim Standard_2000 (or" IS-2000 "), a six-part standard, which was developed by TIA / EIA in (Issued July 1999), for example, a mobile unit is programmed to store identification information, which is a 10-digit mobile identification number (MIN). The MIN contains 4 bits of the unique electronic serial number (ESN) from the mobile unit and 6 bits from an identification string known to the network. The M IN can be stored in a non-volatile memory in the mobile unit, such as read-only memory (,, ROM ,,), Programmable ROM (" PROM "), and PROM (· 'EPROM "), And / or electronic EPROM ("EEPROM, ') (such as flash memory). -8-This paper size applies to Chinese National Standard (CNS) A4 (210X 297 mm) 1223938 A7

由遠行動單元在與該網路通訊時所存在的M i N (或其一 部份),允許該網路來結合該特殊行動單元與一已知的識 或輪廓,其可包含關於服務選項、計費計劃、所屬區域 等資訊。在一 IS-95B或IS_2000相容系統中,此處理稱之 為”註冊”。此結合亦使得該網路可適當地導引傳輸(例如 電話來電),其係要終止於該行動單元。一旦該節點結合 於讀已知的識別或輪廓,該結合可持續, 網路之間的連結由一個終端(例如一基地 .即始該節點與該 台或其區段)移動 到另一個。至少垓1主冊處理的一部份,其開始時可發生在 孩行動單元的電源開啟時,其可在該連結被建立時來重複 (例如定期地及/或在上述TIA/EIA文件中所指定的其它事 件)。 ” 圖1所示為根據本發明一具體實施例的一系統方塊圖。 節點1 0 0經由通訊連結1 4 0傳送一辨識標記到網路i 5 〇。 在控制連結1 6 0之上,網路1 5 〇也接收一指令來防止存取 到儲存在該節點之資訊。通訊連結i 4 〇及/或控制連結 160可透過中介裝且來進行,也可為有線及/或無線(即承 載於一或多個無線及/或光學頻率)。在如圖2所示的範例 中,防止存取到儲存在節點1 〇 〇之資訊的指令包含一運作 碼(或” opcode”),其對應於該指令動作,及對應於一節點 1 〇 0的識別。在偵測到該辨識標記及至少該指令的一部份 (例如該識別)之間的一致性時,網路丨5 〇傳送一指令到節 點1 0 0來防止存取到當地資訊。 在這種系統的一範例性實施中,如圖3所示,網路1 5 〇 -9- 本紙張尺度適用中國國家標準(CNS) A4規格(210X^7^7 1223938 A7 B7The Mi N (or part of it) that exists when a remote mobile unit communicates with the network, allowing the network to combine the special mobile unit with a known identity or profile, which may include information about service options , Billing plan, region, etc. In an IS-95B or IS_2000 compatible system, this process is called "registration". This combination also allows the network to properly direct transmissions (eg phone calls), which are terminated at the mobile unit. Once the node is combined to read a known identification or profile, the combination can continue, and the connection between the networks is moved from one terminal (eg, a base. That is, the node to the station or its section) to another. At least part of the main book processing, which may start at the moment the child mobile unit is powered on, may be repeated when the link is established (e.g. regularly and / or in the TIA / EIA document above) Other events specified). Figure 1 shows a block diagram of a system according to a specific embodiment of the present invention. Node 100 transmits an identification mark to the network i 50 via the communication link 140. On top of the control link 160, the network The channel 150 also receives a command to prevent access to the information stored in the node. The communication link i 4 and / or the control link 160 can be performed through an intermediary and can also be wired and / or wireless (ie, bearer). At one or more wireless and / or optical frequencies). In the example shown in Figure 2, the instruction to prevent access to the information stored in the node 100 includes an operation code (or "opcode"), which corresponds to When the instruction acts and the identification corresponding to a node 100. When a consistency between the identification mark and at least a part of the instruction (such as the identification) is detected, the network 501 sends a Instruction to the node 100 to prevent access to local information. In an exemplary implementation of this system, as shown in Figure 3, the network 1 5 0-9- This paper standard applies Chinese National Standard (CNS) A4 Specifications (210X ^ 7 ^ 7 1223938 A7 B7

接收該指令來防止經由該公共交換電話網路(ρ§ΤΝ )來存 取到儲存在節點1 〇 〇的資訊。在—特殊實施中,該防止存 取的指令係使用一發信系統7(SS7)協議來連接到網路"Ο (例如詳述於ITU_T Q.701.Q.741,Internatl〇nal Telec〇腿職Receiving the instruction to prevent access to the information stored in the node 100 via the public switched telephone network (ρ§ΤΝ). In a special implementation, the access prevention instruction is connected to the network using a transmission system 7 (SS7) protocol (e.g., detailed in ITU_T Q.701.Q.741, Internatlalnal Telec. Leg job

Umon,Geneva,Switzerland)。在一應用中,該指令係由一 服務提供者回應於來自該使用者之節點已經遺失或被偷的 報告而連接到網路1 5 0。 圖4所示為根據本發明具體實施例之方法的流程圖,其 可在網路150中執行。在一實施中,如圖4所示的方法係 在發生一存取请求或一狂冊事件時來執行,例如描述於上 述的TIA/EIA CDMA標準文件之一的6·6 5節(”註冊")中 (例如在一行動單元開啟電源時,計時器到時,或一行動 單元的區域改變)。在另一實例中,如圖4所示的方法係 在一節點並未註冊嘗試來使用該網路時(如打電話)來執 行。 在指令接收工作Ρ110中,網路150接收一指令來防止存 取儲存在卽點1 0 0的資訊。如上所述,此指令可包含一運 作碼及一識別,其可對應於節點1 0 0。在標記接收工作 Ρ 120中’網路1 5 0經由通訊連結1 4 0而自一節點接收一辨 識標記。此標記可接收成一傳輸的一部份,例如一存取請 求或一註冊請求。該辨識標記包含來自網路丨5 〇可唯一識 別該節點的資訊,且係基於儲存在該節點上的識別資訊。 在對應偵測工作Ρ 130,網路1 5 0決定自節點i 〇 〇接收的 該識別標記及至少該指令的一部份之間的一致性,以防止 -10- 本紙張尺度適用中國國家標準(CNS) A4規格(210X 297公釐) 1223938 A7 B7Umon, Geneva, Switzerland). In an application, the instruction is connected to the network 150 by a service provider in response to a report from a user that a node has been lost or stolen. FIG. 4 shows a flowchart of a method according to a specific embodiment of the present invention, which can be executed in the network 150. In an implementation, the method shown in FIG. 4 is executed when an access request or a random event occurs, such as described in Section 6.65 (“Registration” described in one of the above-mentioned TIA / EIA CDMA standard documents) ") (such as when a mobile unit is powered on, the timer expires, or the area of a mobile unit changes). In another example, the method shown in Figure 4 is an attempt to register a node without When using the network (such as making a phone call) to perform. In the command receiving task P110, the network 150 receives a command to prevent access to the information stored in the point 100. As described above, this command may include an operation Code and an identification, which may correspond to the node 100. In the label receiving work P 120, 'network 1 50 receives an identification label from a node via a communication link 1 40. This label may be received as a transmitted one. Part, such as an access request or a registration request. The identification tag contains information from the network, which uniquely identifies the node, and is based on the identification information stored on the node. The corresponding detection task is P 130 , The network 1 50 0 decides from the node i 〇 〇 Consistency between the identification mark and at least part of the directive received to prevent -10- This paper size applies the Chinese National Standard (CNS) A4 specification (210X 297 mm) 1223938 A7 B7

存取到儲存在節點100之資訊(例如該識別)。在_具體實 施例中,該決策係基於至少該辨識標記的一部份(例如一 MIN的前6位)及該標記之間的一致性。因為有超過_個 指令來防止存取,其可在網路丨5 〇中等待,其有可能工作 P 1 3 0可被重複來決定該辨識標記及一指令的其它例的一 部份之間的一致性,以防止存取。Access to information stored in the node 100 (such as the identification). In a specific embodiment, the decision is based on at least a portion of the identification mark (for example, the first 6 bits of a MIN) and the consistency between the marks. Because there are more than _ instructions to prevent access, it can wait in the network 丨 〇, it may work P 1 3 0 can be repeated to determine between the identification mark and part of other examples of an instruction Consistency to prevent access.

裝- 如果在工作P130中的該決定成功的話(例如如果該識別 標記及該識別對應時)’然後在指令傳輸工作p i 4〇中,網 路1 5 0傳送一指令到節點1 ο 0來防止存取到局部資訊。如 果在工作P130中的決定失敗時,該方法即可終止關於在 工作P120中接收的標記,雖然工作P12〇及pi3〇可對於其 它辨識標記來重複。Equipment-if the decision in work P130 is successful (for example, if the identification mark and the identification correspond) 'then in the instruction transmission work pi 40, the network 1 50 sends an instruction to the node 1 ο 0 to prevent Access to local information. If the decision in job P130 fails, the method can terminate the tag received in job P120, although jobs P12 and pi30 can be repeated for other identifying tags.

線 圖5所示為根據本發明一具體實施例的一網路i 5 〇之方 塊圖。在這種網路的一範例性應用中,終端2丨〇在通訊連 結1 4 0上接收來自節點1 〇 〇的辨識標記。控制單元2 3 〇接 收一指令來防止在控制連結1 6 0存取到儲存在節點1 〇 〇上 的資訊。由終端2 1 0,控制單元2 3 0接收該辨識標記。在 偵測該辨識標記及該指令的至少一部份之間的一致性來防 止存取時,控制單元傳送一指令來防止存取到局部資訊到 終端2 1 〇,用於傳送到節點1 〇 〇。 圖6所示為根據網路1 5 0的一範例性實施的無線通訊 1 5 2的一蜂巢式網路的方塊圖。在此實施中,終端2 1 2包 含一或多個基地台收發器(BTSs) 3 10,其在無線連結上與 行動單元通訊。控制單元2 3 2包含一基地台控制器(b s C ) -11 - 本紙張尺,國家標準(CNS) M规格mQ X 297公釐) 1223938 五、發明説明( A7 B7FIG. 5 is a block diagram of a network i 50 according to a specific embodiment of the present invention. In an exemplary application of such a network, the terminal 21 receives an identification mark from the node 100 on the communication connection 140. The control unit 230 receives a command to prevent the information stored on the node 100 from being accessed on the control link 160. The identification mark is received by the terminal 210 and the control unit 230. When detecting the consistency between the identification mark and at least a part of the instruction to prevent access, the control unit sends an instruction to prevent access to local information to the terminal 2 1 0 for transmission to the node 1 0. 〇. FIG. 6 is a block diagram of a cellular network according to an exemplary implementation of the wireless communication 15 2 of the network 150. In this implementation, the terminal 2 1 2 contains one or more base station transceivers (BTSs) 3 10, which communicate with the mobile unit over a wireless link. The control unit 2 3 2 contains a base station controller (b s C) -11-This paper ruler, national standard (CNS) M size m X X 297 mm) 1223938 V. Description of the invention (A7 B7

3 3 3,其可執行連結管理功能,例如交遞控制,及一行動 服務交換中心(MSC) 336,其與一或多個BSCs,管理單 元’及/或其它網路’例如(及/或透過)該PSTN來執行較 高階功能,例如撥接設定及管理與使用者授權。 雖然此特徵在圖5或6中並未明確顯示,一如此處所述 的網路也可透過一通訊連結耦合到其它網路,例如網際網 路。此通訊連結可包含一或多個有線連接及/或無線連 結’例如微波或衛星連結,及資訊(例如一指令來防止存 取到儲存在節點1 0 0的資訊),其可傳送通過通訊連結做 為一或多個類比及/或數位信號。 在本發明一具體實施例中的一通用實施中,該辨識標 記可為任何適用於辨識節點1 〇 〇到網路丨5 0。在一範例 中,該辨識標記為自我包含,其提供所有必要來唯一特徵 化卽點1 0 0的資訊(例如一行動單元的唯一 E s N )。在另一 實施中遠辨識標記可提供該資訊的部份,其為網路1 5 〇 必須用來唯一特徵化節點1 〇 〇。例如對於一與一 CDMA網 路通訊的節點,該辨識標記可包含或部份的Μ IN,如上 所述。在一特殊實施中,該辨識標記包含該Μ IΝ的前6 位。對於與符合於一 G S Μ標準的網路進行通訊的節點, 该辨識標記可包含所有或一辨識的部份,例如該行動單元 的目前IMSI或TMSI (分別為國際或臨時行動台識別)或 MSRN (行動台漫遊編號)。類似於上述範例的其它狀況及 對應的適當標記,對於其它網路及/或其它具體實施例或 節點1 0 0的變化皆有可能。請注意在某些狀況下,一行動 -12- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)3 3 3, which can perform link management functions, such as handover control, and a mobile service switching center (MSC) 336, which communicates with one or more BSCs, management units 'and / or other networks' such as (and / or Through) the PSTN to perform higher-level functions, such as dial-up settings and management and user authorization. Although this feature is not explicitly shown in Figures 5 or 6, a network as described herein may also be coupled to other networks through a communication link, such as the Internet. This communication link may include one or more wired and / or wireless links, such as microwave or satellite links, and information (such as a command to prevent access to information stored at node 100), which may be transmitted over the communication link As one or more analog and / or digital signals. In a general implementation in a specific embodiment of the present invention, the identification mark may be any suitable for identifying the node 100 to the network 500. In one example, the identification tag is self-contained, which provides all the information necessary to uniquely characterize the point 100 (for example, the unique E s N of a mobile unit). In another implementation, the COSCO identification mark can provide a part of this information, which is the network 150 that must be used to uniquely characterize the node 100. For example, for a node communicating with a CDMA network, the identification mark may include or part of the MIN, as described above. In a special implementation, the identification mark includes the first 6 bits of the M IN. For nodes communicating with a network that complies with a GS M standard, the identification mark may include all or an identified part, such as the current IMSI or TMSI (respectively international or temporary mobile station identification) or MSRN of the mobile unit, respectively. (Mobile roaming number). Other conditions similar to the above examples and corresponding appropriate labels are possible for other networks and / or other specific embodiments or changes in the node 100. Please note that under certain conditions, an action -12- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

裝· 訂Packing

kk

1223938 A71223938 A7

辨識標記,其包 一非法闖入者截 單元,例如一蜂巢式電話,不需要傳送一 含該ESN的部份(例如以防止該esn由 聽)。 m根據本發明一具體實施例中一網路"。a的方 !圖。在這種網,的一實施中,資料庫240接收來自控制 的辨識標並傳回_識別適合比較於該指令的 至v -邵份來防止存取到儲存在節點lGG的資訊(例如你 由控制連結16〇所接收)。在這種網路的另—實施中,ς 料庫240接收至少該指令的—部份來防止存取到儲存在節 點100的資訊(例如如圖2所示的識別),並傳回一識別適 合比較於該辨識標記。一種根據這些實施之一設置的網 路’其可較佳地是支援使用者移動性及/或管理識別相關 的功能,例如安全性、認證、計費等。The identification tag, which includes an intruder interception unit, such as a cellular phone, does not need to transmit a part containing the ESN (for example, to prevent the ESN from being heard). m According to a network " in a specific embodiment of the present invention. a square! In an implementation of this kind of network, the database 240 receives the identifier from the control and returns _identification to v-shares suitable for the command to prevent access to the information stored in the node 1GG (for example, by your Control link 160 received). In another implementation of such a network, the database 240 receives at least part of the instruction to prevent access to the information stored in the node 100 (such as the identification shown in FIG. 2) and returns an identification Suitable for comparison with the identification mark. A network 'according to one of these implementations may preferably support user mobility and / or management identification related functions, such as security, authentication, billing, and the like.

圖8所示為根據網路15〇a的一特殊實施之無線通訊152& 的一蜂巢式網路之方塊圖。在此實施中,資料庫242包含 一本部位置暫存器(HLR) 34〇及/或一來訪者位置暫存器 (VLR) 3 50。HLR 340儲存辨識標記及識別之間一致性的主 要複本(例如對於使用者的行動單元存在於該地理上的附 近)’而VLR 350儲存這種一致性的暫時複本(例如在該地 理上的附近活動的行動單元,其使用者可存在於他處)。 為配合一或多個HLR 340及VLR 350,MSC 336a接收該辨 識標記’並得到一對應的識別,其可適合比較於來自一指 令的識別來防止存取(例如在控制連結1 6 0上接收的)。在 另一實施中,一或兩個HLR 340及VLR 350可整合到MSC -13- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)FIG. 8 shows a block diagram of a cellular network based on a specially implemented wireless communication 152 & according to the network 15a. In this implementation, the database 242 includes a home location register (HLR) 340 and / or a visitor location register (VLR) 3 50. HLR 340 stores a master copy of the identity between the identification mark and the identity (for example, for a user's mobile unit existing near that geographic location) 'while the VLR 350 stores a temporary copy of this consistency (for example, near the geographic location) An active unit of action whose users can exist elsewhere). In order to cooperate with one or more HLR 340 and VLR 350, the MSC 336a receives the identification mark 'and obtains a corresponding identification, which may be suitable for comparison with identification from a command to prevent access (such as receiving on the control link 160). of). In another implementation, one or two HLR 340 and VLR 350 can be integrated into MSC -13- This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

裝. 訂Loading. Order

線 1223938 A7 B7 五、發明説明(11 336a ° 圖9所示為根據圖3所示的一方法的實施之方法的流程 圖,其可實施在網路150a的一實施中。在一實施中,如圖 9所不的方法係如上述地在一存取請求發生時或一註冊事 件時來執行,例如在上述的該TIA/EIA CDMA標準文件之 一的6.6.5節(”註冊”)(例如一行動單元的開機、計時器到 期、或一行動單元的區域改變)。在另一實施中,如圖9 所不的方法係在當一未註冊的節點嘗試來使用該網路時來 執行(例如打電話)。 在這種實施中,一致性偵測工作p 13〇包含兩個子工作 P150及P160。在查詢子工作pi5〇中,一對應於在工作 P120中接收的該辨識標記的第二識別即可得到(例如藉由 參考如上述的資料庫24〇)。在比較子工作pi6〇*,該第 一識別可比較於在工作ρι 1〇中接收的識別(做為一指令的 一部份來防止存取到儲存在節點丨〇 〇上的資訊)。如果偵 測到一符合時,然後在指令傳輸工作?14〇中,一指令來 防止存取到局部資訊即傳送到節點i Q Q。如果未偵測到符 合,然後該方法可終止關於在工作pi2〇*接收的標記, 雖然工作P12〇&P130可對於其它辨識標記來重複。Line 1223938 A7 B7 V. Description of the invention (11 336a ° Figure 9 shows a flowchart of a method according to the implementation of a method shown in Figure 3, which can be implemented in an implementation of the network 150a. In one implementation, The method shown in FIG. 9 is executed as described above when an access request occurs or a registration event, for example, in section 6.6.5 ("Registration") of one of the TIA / EIA CDMA standard documents mentioned above (" (Such as the activation of a mobile unit, the expiration of a timer, or the change of the area of a mobile unit). In another implementation, the method shown in Figure 9 is when an unregistered node attempts to use the network. Execute (for example, call). In this implementation, the consistency detection job p 13〇 includes two sub-jobs P150 and P160. In the query sub-job pi50, one corresponds to the identification mark received in job P120. The second identification can be obtained (for example, by referring to the database 24 above as described above). In the comparison sub-work pi6〇 *, the first identification can be compared with the identification received in the work ρ 10 (as an instruction Part to prevent access to the node 〇〇 the information). If a match is detected, then in the command transmission work? 14, a command to prevent access to local information is transmitted to the node i QQ. If no match is detected, then the The method can terminate with respect to the markers received at job pi20 *, although jobs P12O & P130 can be repeated for other identifying markers.

-1 0所示 根據本發明具體實施例的節點丨〇 〇包 含一接收器1 1 0,其用來在一通訊連結1 4 〇上接收來自一 網路…的資訊,並镇合到—_致性偵測器12〇。首先儲 存辨識資訊的儲存區域13〇(例如一Mm及/或_ES 其亦搞合到-致性偵測器12〇。一致性偵測器i2〇偵測基 -14- 本紙張尺度適财S S家㈣(CNS了χ 297公€ Ϊ223938 A7 ____B7 五、發明説明(12 ) 於識別資訊的一標記與基於接收自網路i 5 〇的資訊之字率 之間的一致性。如圖1 i所示,一比較器1 2 2可用來在一節 點1 0 0的例子1 〇 2中實施一致性偵測器丨2 〇。如果偵測到 一致性,可防止存取到第二儲存區域1 3 2中的資訊。(請 注意在節點1 0 〇的其它具體實施例中的運作(例如圖1 4所 示),一致性偵測器丨2 〇可不需要,其中存取到在第二儲 存區域1 3 2中的資訊可基於由接收器丨1 〇接收的資訊來防 止)。 請注意第一儲存區域130及第二儲存區域132之一或兩 者可在與節點1〇〇的其它元件不同的實際位置中發現。舉 例而言,節點1 〇 〇的一實施可包含一連接到一無線數據機 的膝上型電腦。在此例中,一或多個節點1 0 0的元件可發 現在該無線數據機中(例如接收器1丨〇 ),而第一儲存區域 130及弟一儲存區域132之一或兩者可發現在該膝上型電 腦中(例如在該電腦的硬碟機上)。 圖1 2所示為一節點1 〇 〇的一實施1ι〇〇&,其包含一節點收 發器110a,一處理器n〇a,及記憶體1 3 4。節點收發器 110a ’其包含一傳送器1 1 2,其允許節點1 l〇a來在通訊連 結1 4 0上傳送資訊到網路丨5 〇。節點收發器i 1〇a也包含一 接收器1 1 4,其允許節點100a來在通訊連結丨4 〇上接收來 自網路1 5 0的資訊。這種在通訊連結1 4 〇上的傳輸及接收 資訊可使用相同或不同的資料率,通訊協異,載波頻率, 及/或調變方式來進行。同樣地,該傳送器1 1 2及接收器 114的運作及/或電路架構可分別完全彼此獨立,或另可 -15- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公董)The node shown in FIG. -10 according to a specific embodiment of the present invention includes a receiver 110, which is used to receive information from a network ... on a communication link 140, and is combined to --- Consistency detector 120. First store the identification information storage area 13 (for example, a Mm and / or _ES which is also compatible with the consistency detector 12. Consistency detector i2〇 detection base -14. SS furniture (CNS x 297 public € Ϊ 223938 A7 ____B7 V. Description of the invention (12) Consistency between a mark identifying the information and the word rate based on the information received from the network i 5 0. Figure 1 i As shown, a comparator 1 2 2 can be used to implement a consistency detector 丨 2 in a node 1 100 example 1. If consistency is detected, access to the second storage area 1 can be prevented Information in 3.2. (Please note the operation in other specific embodiments of node 100 (such as shown in Figure 14). The consistency detector 丨 2 〇 may not be needed, where access to the second storage The information in area 1 3 2 can be prevented based on the information received by the receiver (10). Please note that one or both of the first storage area 130 and the second storage area 132 can be used with other components of node 100. Found in different physical locations. For example, an implementation of node 100 may include a connection to a wireless Modem laptop. In this example, components of one or more nodes 100 can be found in the wireless modem (eg, receiver 1 丨 〇), while the first storage area 130 and the first storage One or both of the areas 132 may be found in the laptop (for example on the hard drive of the computer). Figure 12 shows an implementation of a node 100, which includes A node transceiver 110a, a processor noa, and a memory 134. The node transceiver 110a 'includes a transmitter 1 12 which allows the node 1 10a to transmit on the communication link 140 Information to the network 5 0. The node transceiver i 10a also includes a receiver 1 1 4 that allows the node 100a to receive information from the network 150 on the communication link 4 4. This kind of communication The transmission and reception information on the link 140 can be performed using the same or different data rates, communication protocols, carrier frequencies, and / or modulation methods. Similarly, the operation of the transmitter 1 12 and the receiver 114 And / or the circuit architecture can be completely independent of each other, or another -15- This paper size applies to China Associate (CNS) A4 size (210 X 297 male directors)

裝- 訂Pack-order

線 A7 B7 五、發明説明(13 ) 部份或完全地整合。 處理器120a,其可包含一或多個微處 戋並亡、潘紐-从a 土 處里咨,微控制器, ;“運軏疋件的陣列’控制該節點抓的運作,1係相 據可儲存(A)在記憶體134或在或镇人 " 儲存裝置,(B)由-使用者透過—介面來輸人,例如一資 料登錄裝置(即一鍵盤)(未顯示), '、 、s、 土 )久’AK)由網路150在 通訊連結1 4 0上接收。 $己憶體134 ’其可包含唯讀記憶體(R〇M),隨機存取記 憶體(RAM),及/或非揮發記憶體,儲存可程式參數,並 也可儲存資訊’其包含可執行指令,非可程式化參數,及 ’或一其它資料’例如電話號碼,密碼,帳號,個人聯絡資 訊等(例如,可執行指令,其定義了如圖13_16之一或多 個之中所示之方法,其可儲存在記憶體134中來由處理器 120執行)。識別資訊也可儲存在記憶體134中,及/或可 以存在節.點l〇〇a中的其它地方。在節點1〇〇a的一實施運作 的例子中’接收一指令來防止存取到局部資訊(並決定該 指令係導向到節點l〇0a),其造成節點1〇〇a來防止存取到 儲存在記憶體1 3 4的區域1 3 5之資訊。 在一範例性實施中,節點1 〇 〇為一行動單元,例如一在 一通訊連結140上與一網路150通訊的一蜂巢式電話,其 可符合於上述的該CDMA標準之一。在另一實施中,該通 訊連結1 4 0符合一 TDMA (分時多向近接)標準,例如 GSM(行動通訊全球系統,其係由European Telecommxmications Standards Institute ( ETSI)提出,其位於 Sophie Antipolis, -16- 本紙張尺度適用中國國家標準(CNS) A4規格(210X297公釐) 裝 訂 1223938 A7 _______B7 五、發明説明(14 )Line A7 B7 V. Description of the invention (13) Partially or completely integrated. Processor 120a, which may include one or more micro-processors, and a new controller, a micro-controller; a "controller array" to control the operation of the node, 1 series Data can be stored (A) in the memory 134 or in the town's " storage device, (B) input by the user through the interface, such as a data registration device (ie, a keyboard) (not shown), ' ,, S, d) 'AK) is received by the network 150 on the communication link 140. $ 己 忆 体 134' It may include read-only memory (ROM), random access memory (RAM) , And / or non-volatile memory, which can store programmable parameters, and can also store information 'which contains executable instructions, non-programmable parameters, and' or other information 'such as phone numbers, passwords, account numbers, personal contact information Etc. (eg, executable instructions, which define a method as shown in one or more of FIGS. 13_16, which can be stored in memory 134 for execution by processor 120). Identification information can also be stored in memory 134, and / or may exist elsewhere in point 100a. At node 100a In the implementation example, 'receive a command to prevent access to local information (and determine that the command is directed to node 100a), which causes node 100a to prevent access to the memory 1 3 4 Information of area 1 35. In an exemplary implementation, node 1000 is a mobile unit, such as a cellular phone that communicates with a network 150 on a communication link 140, which can meet the above-mentioned requirements. One of the CDMA standards. In another implementation, the communication link 140 conforms to a TDMA (Time Division Multiple Direction Proximity) standard, such as GSM (Global System for Mobile Communications, which was proposed by the European Telecommxmications Standards Institute (ETSI), which Located in Sophie Antipolis, -16- This paper size applies to Chinese National Standard (CNS) A4 (210X297 mm) Binding 1223938 A7 _______B7 V. Description of the invention (14)

France),或一FDMA(分頻多向近接)標準,例如該先進行 動電話系統(AMPS )。在另一實施中,節點丨〇 〇可根據該 無線Bluetooth™來接收及傳送資訊(如定義在Bluet〇〇th規格 中,ver. 1.0B,由 Bluetooth Special Interest Group,NewFrance), or a FDMA (Frequency Division Multiple Direction Proximity) standard, such as the Advanced Telephone System (AMPS). In another implementation, the node 丨 〇 〇 can receive and transmit information according to the wireless Bluetooth ™ (as defined in the Bluetooth specification, ver. 1.0B, by the Bluetooth Special Interest Group, New

York,NY所發行)。但是請注意,對於通訊連結14〇不需 要疋典線。在進一步實施中,例如節點1 〇 〇可包含一可搞 式裝置(例如一膝上型電腦或PDA ),其可建立一有線,但 臨時通訊連結140到網路150,藉以連接到一網路15〇的 終端(例如符合像是通用序列匯流排(USB) versi〇n 1」或 2.0,FireWire(IEEE 1394),或 RS-232 的標準)。 圖1 3所示為根據本發明另一具體實施例的一方法之流 程圖。這種方法可在一節點1 〇 〇中執行,如上所述。在工 作P3 10中,接收到一指令來防止存取到局部資訊(例如透 過一通訊連結140而來自一網路150)。此指令可回應於 一存取請求或一註冊事件而傳送,例如在上述的tia/eia CDMA標準文件中之一的6.6.5節(”註冊")(例如一行動單 元的開機、計時器到期、或一行動單元的區域改變)。另 外’該指令來防止存取到局部資訊可在節點丨〇 〇的正常使 用期間接收(例如在一關於一正進行的蜂巢式電話呼叫之 專屬控制通道上)。在關於一蜂巢式電話或類似網路的其 它不同實施中,該指令來防止存取到局部資訊可在一非專 屬通道上接收,例如一呼叫通道或廣播通道。 該指令來防止存取到局部資訊包含辨識一節點的識別 (或一指定的節點群組),且可具有如圖2所示的一形式。 -17- 本紙張尺度適用中國國家標準(CNS) A4規格(210X297公釐) 1223938York, NY). Please note, however, that a code line is not required for communication link 140. In a further implementation, for example, the node 100 may include a portable device (such as a laptop or a PDA), which can establish a wired, but temporary communication link 140 to the network 150, thereby connecting to a network 15〇 terminal (for example, conforms to standards such as Universal Serial Bus (USB) versión 1 "or 2.0, FireWire (IEEE 1394), or RS-232). FIG. 13 is a flowchart of a method according to another embodiment of the present invention. This method can be performed in a node 100, as described above. In work P3 10, a command is received to prevent access to local information (e.g., from a network 150 via a communication link 140). This command may be transmitted in response to an access request or a registration event, such as in section 6.6.5 ("Registration ") of one of the tia / eia CDMA standard documents mentioned above (such as the startup of a mobile unit, timer Expired, or the area of a mobile unit is changed). In addition, the command to prevent access to local information can be received during the normal use of the node (for example, a dedicated control on an ongoing cellular phone call) Channel). In different implementations of a cellular phone or similar network, the instruction to prevent access to local information may be received on a non-exclusive channel, such as a call channel or broadcast channel. The instruction prevents Access to local information includes identification of a node (or a specified node group), and may have a form as shown in Figure 2. -17- This paper size is applicable to the Chinese National Standard (CNS) A4 specification (210X297 Mm) 1223938

浚上所述,此指令可關於存在於節點1 〇 〇的第二儲存區域 1 J 2中的S訊’其可實施為在節點1〇〇a上記憶體丨3 4的一 預足區域1 3 5。在一範例性實施中,第二儲存區域〖3 2為 非揮發|± (例如貝訊係保持在區域1 3 2中,即使在移除一 電源供應之後)。As mentioned above, this instruction may be related to the S message existing in the second storage area 1 J 2 of the node 100, which may be implemented as a pre-footing area 1 of the memory on the node 100a. 3 5. In an exemplary implementation, the second storage area [32] is non-volatile | ± (for example, Bexun remains in area 1 32 even after removing a power supply).

在工作P320中,一辨識標記可由第一儲存區域13〇接 收,其可在一節點100a中實施成為記憶體丨3 4的一部份或 一獨互的儲存元件。在一範例中,該辨識標記包含該 MIN的前6位。在工作P33〇*,在該識別及該辨識標記之 間的一致性可決定(例如藉由一致性偵測器12〇,其可實 施在一節點100a成為處理器丨2〇)。In work P320, an identification mark can be received by the first storage area 130, which can be implemented as a part of the memory 314 in a node 100a or a separate storage element. In one example, the identification mark includes the first 6 digits of the MIN. At work P33〇 *, the consistency between the identification and the identification mark can be determined (for example, by the consistency detector 12o, it can be implemented at a node 100a to become a processor 2o).

線 如果一致性在工作P330中偵測到,然後在工作p34〇中 防止存取到局部資訊(例如儲存在第二儲存區域丨3 2中的 資訊’或在記憶體1 3 4的區域1 3 5中)。這種防止可由一 或多個技術來完成。舉例而言,該資訊可被抹除(例如刪 除)或另外改變。這種運作可包含覆寫該資訊。另外,該 資訊所儲存的區域可被改變,使得其成為不能夠儲存資 訊。 ’ 在另一範例中,存取到資訊可藉由改變定位該資訊的 機制來防止。例如在包含一作業系統的儲存系統中,存取 到資訊可由抹除或另由改變關於該資訊的目綠登錄來防 止。存取到資訊也可由改變在一密碼保護的儲存系統中一 儲存的參考密碼來防止。 在進一步範例中,存取到資訊可由抹除或另改變—解 -18- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) ' —------- 1223938 A7 B7 五、發明説明(16 ) 碼或解密機制來防止,其中該資訊係轉換到一智慧型或另 為有用的形式。舉例而言,一必須用來解碼該儲存資訊的 密鑰(例如關於該儲存資訊及該儲存資訊的一未加密形式 之間的一致性之符號串)可被抹除或另外改變。 在一實施中’處理器12〇藉由覆寫具有預設資料的資訊 (如數值0 )來防止存取代儲存在記憶體丨3 4的區域丨3 5上If consistency is detected in job P330, then access to local information (such as the information stored in the second storage area 丨 3 2 'or in the memory 1 3 4 area 1 3 is prevented in work p34〇. 5). This prevention can be accomplished by one or more techniques. For example, the information can be erased (eg, deleted) or otherwise changed. This operation may include overwriting the information. In addition, the area where the information is stored can be changed, making it impossible to store information. ’In another example, access to information can be prevented by changing the mechanism for locating that information. For example, in a storage system containing an operating system, access to information can be prevented by erasing or otherwise changing the green registration of the information. Access to information can also be prevented by changing a stored reference password in a password protected storage system. In a further example, the information accessed can be erased or changed.-18-This paper size applies Chinese National Standard (CNS) A4 (210 X 297 mm) '--------- 1223938 A7 B7 V. Invention Description (16) code or decryption mechanism to prevent, where the information is converted to a smart or another useful form. For example, a key that must be used to decode the stored information (e.g., a string of symbols about the consistency between the stored information and an unencrypted form of the stored information) can be erased or otherwise changed. In an implementation, the processor 12 prevents the memory from being stored in the area of the memory 3, 4 by overwriting the information with the preset data (such as the value 0).

的資訊。如果在工作p33〇中的決定失敗,該方法即終 止。Information. If the decision in work p33o fails, the method is terminated.

圖1 4所示為根據本發明的另一個具體實施例之方法的 流程圖’其可在上述的節點丨〇 〇中來執行。在工作p3 i5 中,即在一專屬通道上(例如關於一進行中的蜂巢式電話 撥接之專屬控制通遒)接收到指令來防止存取到局部資訊 (例如經由一通訊連結1 4 〇而來自一網路丨5 〇 )。此指令可 在後續由一存取請求來傳送(例如由節點丨〇 〇 ),或回應於 一存取請求或一註冊事件而傳送,例如在上述的tia/eia CDMA標準文件中之一的6 6 5節(”註冊”)(例如一行動單 元的開機、计時器到期、或一行動單元的區域改變)。在 一 CDMA系統中,例如該專屬通道可部份由一或多個該指 令的傳送器(例如網路丨5 〇)及該指令的接收器(例如節點 10 0)所已知的展開及/或覆蓋碼來部份地定義。由於建立 了該專屬通道,在該指令及一接收節點之間的一致性已經 存在,藉此可避免重新建立這種一致性的需要,及/或需 要在該指令中包含辨識該節點的資訊。在工作p34〇中, 存取到局部資訊(例如儲存在第二儲存區域丨3 2或在記憶 -19-Fig. 14 shows a flow chart of a method according to another embodiment of the present invention, which can be executed in the above-mentioned node. In work p3 i5, that is, on a dedicated channel (for example, a dedicated control card for an ongoing cellular telephone call), a command is received to prevent access to local information (for example, via a communication link 1 4 0 and From a network 丨 5 〇). This instruction may be transmitted subsequently by an access request (for example, by a node), or in response to an access request or a registration event, such as 6 6 Section 5 ("Registration") (such as the activation of a mobile unit, the expiration of a timer, or the change of area of a mobile unit). In a CDMA system, for example, the dedicated channel may be partially unfolded by one or more transmitters of the instruction (eg, network 5) and receivers of the instruction (eg, node 10 0) as known and / Or coverage code to partially define it. Since the dedicated channel is established, the consistency between the instruction and a receiving node already exists, thereby avoiding the need to re-establish this consistency, and / or the need to include information identifying the node in the instruction. In task p34〇, access to local information (such as stored in the second storage area 3 2 or in memory -19-

1223938 A7 B7 五、發明説明(17 體1 3 4的區域1 3 5中的節點i 〇 〇之資訊),其可根據該指令 而防止。 圖1 5所示為根據本發明另一具體實施例之方法4 0 〇的 流程圖。在此方法的工作P340中,存取局部資訊可如上 述地防止。在工作P332中,接收一指令(如上述的工作 P315)或偵測一致性(如上述工作P3 30 ),其皆發生來透過 邏輯OR工作P480來造成執行工作P34〇。但是,此方法也 包含執行工作P340所可造成的另一個機制(藉由邏輯〇 r 工作P480)。 在圖1 5的範例中,工作P340的執行可在一計時器到期 時造成。根據一範例,一計時器可實施成在一記憶體中的 位置,其可定期地更新(如遞減),直到該記憶體位置的内 容到達一預定值(如零)。在工作P470中,剩餘的時間量被 測試來決定该預足時段是否已經到期。在工作P450中, 剩餘的時間量被重置到一開始或預設值。在圖1 5之方法 的另一實施中,一計時器追跡一些其它事件(例如一裝置 開啟電源的次數)的發生,而非僅是時間經過。 圖1 5所示的方法可用來提供一有限時段的存取到局部 資訊。例如在出差之前,一使用者可經由與一固接電腦 (例如辦公室桌上型或膝上型電腦)同步化來儲存資訊在節 點1 0 0中,例如一 P D A或蜂巢式電話。當該資訊現在為攜 帶式時,其也可遭到侵入,如果其所存在的節點遺失或被 偷時。如圖1 5所示的方法,其可用來在一指定的時段之 後來防止存取到該資訊,即使該節點並未發現遺失咬被 -20- 本紙張尺度it ifl巾g ®家標準(CNS)纟4祕(21() χ 297公g ' 一_1223938 A7 B7 V. Description of the invention (information on node i 〇 〇 in area 1 35 of 17 body 1 3 4), which can be prevented according to this instruction. FIG. 15 shows a flowchart of a method 400 according to another embodiment of the present invention. In work P340 of this method, access to local information can be prevented as described above. In job P332, receiving an instruction (such as the aforementioned job P315) or detecting consistency (such as the aforementioned job P3 30), both of which occur to cause the execution of the job P34 through the logical OR job P480. However, this method also includes another mechanism that can be caused by performing task P340 (through logic OR task P480). In the example of Fig. 15, the execution of job P340 may be caused when a timer expires. According to an example, a timer may be implemented as a position in a memory, which may be periodically updated (eg, decremented) until the content of the memory position reaches a predetermined value (eg, zero). In work P470, the amount of time remaining is tested to determine whether the pre-foot period has expired. In work P450, the amount of time remaining is reset to a start or preset value. In another implementation of the method of FIG. 15, a timer tracks the occurrence of other events (such as the number of times a device is powered on), rather than just elapsed time. The method shown in Figure 15 can be used to provide a limited period of access to local information. For example, before a business trip, a user may store information in a node 100 by synchronizing with a fixed computer (such as an office desktop or laptop), such as a PD or a cellular phone. When the information is now portable, it can also be hacked if the nodes where it exists are lost or stolen. The method shown in FIG. 15 can be used to prevent access to the information after a specified period of time, even if the node has not found a missing bite. ) 4 secrets (21 () χ 297g g 'a_

ηn

1223938 A7 B7 五、發明説明(18 ) 竊。 圖1 6所示為根據本發明另一具體實施例之方法的流程 圖。在此方法中,重置剩餘的時間量僅在一驗證程序之後 執行。一符號串在工作P 4 10中被輸入(例如由節點1 0 0的 一按鈕盤或鍵盤)。在工作P420中,該輸入字串與一儲存 的驗證字串之間的一致性被測試(例如由一比較器)。如果 偵測到一致性,在工作P450中即將剩餘的時間量重置到 一開始或預設值。否則,該驗證失敗會在工作P430中記 錄(例如藉由更新一失敗計數值)。在工作P440中,失敗的 次數被比較於一預定的臨界值T。如果超過該臨界值,即 造成執行工作P340 (經由邏輯OR工作P480)。否則,即允 許在工作P4 10中嘗試進一步的驗證。在另一實施中,驗 證測試P420可包含比較參數特徵化一使用者的聲音,眼 角膜樣式,指紋,或一或多個其它辨識特徵來儲存參數 值。此處所述的時間及驗證運作(如工作P420、P430、 P440、P450及P470 )可由一或多個邏輯元件的陣列來執 行,例如處理器12 0 a,其有可能結合於其它工作。 前述具體實施例的說明係提供給本技藝專業人士來製 作或使用本發明。其有可能對這些具體實施例進行修正, 且此處所揭示的基本原理也可應用到其它具體實施例。舉. 例而言,本發明可部份或整體實施成一硬體電路,例如一 電路架構製作於一特定應用積體電路,或做為一韌體程式 來載入到非揮發記憶體,或一軟體程式由一資料儲存媒體 載入或取得成為機器可讀取碼,這種碼為可由一邏輯元件 -21 - 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)1223938 A7 B7 V. Description of Invention (18) Theft. Figure 16 shows a flowchart of a method according to another embodiment of the invention. In this method, the amount of time remaining for the reset is performed only after a verification procedure. A string of symbols is entered in work P 4 10 (for example by a button pad or keyboard of node 100). In work P420, the consistency between the input string and a stored verification string is tested (e.g. by a comparator). If consistency is detected, the remaining amount of time is reset to the start or preset value in work P450. Otherwise, the verification failure is recorded in work P430 (for example, by updating a failure count value). In job P440, the number of failures is compared to a predetermined threshold T. If this threshold is exceeded, work P340 is executed (via logical OR work P480). Otherwise, further verification is allowed in work P4 10. In another implementation, the verification test P420 may include comparing parameters to characterize a user's voice, corneal pattern, fingerprints, or one or more other identifying features to store parameter values. The timing and verification operations described here (such as work P420, P430, P440, P450, and P470) can be performed by an array of one or more logic elements, such as processor 120a, which may be combined with other work. The foregoing description of specific embodiments is provided to those skilled in the art to make or use the present invention. It is possible to modify these specific embodiments, and the basic principles disclosed herein can also be applied to other specific embodiments. For example, the present invention can be partially or entirely implemented as a hardware circuit, such as a circuit architecture fabricated in a specific application integrated circuit, or a firmware program loaded into non-volatile memory, or a The software program is loaded or obtained from a data storage medium into a machine-readable code, which can be read by a logic element-21-This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)

Claims (1)

12239381223938 A BCDA BCD 正年 第090127528號專利申請案 中文申請專利範圍替換本(93年3月) 六、申請專利範圍 :~ - 1· 一種指示一節點來防止存取儲存在該節點之資訊之方法 ,該方法包含: 偵測(1)關於該節點的一第一識別及(2)至少一指令的 一部份之間的一致性,以防止存取儲存在該節點之資訊 :及 根據該偵測’指示該節點來防止存取該資訊。 2·如申請專利範圍第1項之方法,其中指示該節點發生在 一無線通訊連結之至少一部份上。 3·如申請專利範圍第1項之方法,其中指示該節點發生在 關於無線通訊的一蜂巢式網路之無線通訊連結之至少一 部份上。 4·如申請專利範圍第1項之方法,其中指示該節點係由無 線通訊的一蜂巢式網路的至少一部份來執行。 5. 如申請專利範圍第1項之方法,其中該資訊包含一系列 儲存透過一裝置的電話號碼,其被設定及配置來透過一 無線通訊連結與無線通訊的蜂巢式網路進行通訊。 6. 如申請專利範圍第1項之方法,該方法進一步包含: 在該偵測之前,接收來自該節點之一傳輸, 其中該傳輸包含一辨識標記,及 其中該辨識標記係與該第一識別相關。 7. 如申請專利範圍第6項之方法,其中接收來自該節點之一 傳輸包含接收存取無線通訊的一蜂巢式網路之一請求。 8. 如申請專利範圍第6項之方法,其中接收來自該節點之一 傳輸包含接收一註冊請求到無線通訊的一蜂巢式網路。 -1 - O:\74\74883-930309. DOC 本紙張尺度適财0_1_準(⑽)A4_21G x 297公i _ ' 1223938No. 090127528 patent application in the Chinese version of the patent application replacement (March 1993) 6. Patent application scope: ~-1 · A method of instructing a node to prevent access to information stored in the node, the method includes : Detect (1) a first identification of the node and (2) consistency between parts of at least one instruction to prevent access to the information stored in the node: and instruct the Node to prevent access to that information. 2. The method according to item 1 of the patent application scope, wherein the node is instructed to occur on at least a part of a wireless communication link. 3. The method according to item 1 of the patent application scope, wherein the node is instructed to occur on at least a part of a wireless communication link of a cellular network regarding wireless communication. 4. The method according to item 1 of the scope of patent application, wherein the node is instructed to be executed by at least a part of a cellular network of wireless communication. 5. The method according to item 1 of the patent application scope, wherein the information includes a series of phone numbers stored through a device, which are set and configured to communicate with a wireless cellular network through a wireless communication link. 6. If the method of claim 1 is applied, the method further comprises: before the detecting, receiving a transmission from the node, wherein the transmission includes an identification mark, and wherein the identification mark is related to the first identification Related. 7. The method of claim 6, wherein receiving a transmission from one of the nodes includes receiving a request for access to one of a cellular network. 8. The method of claim 6 wherein receiving a transmission from one of the nodes includes receiving a registration request to a cellular network for wireless communication. -1-O: \ 74 \ 74883-930309. DOC This paper is suitable for financial purposes 0_1 __ (⑽) A4_21G x 297 male i _ '1223938 A8 B8 C8 D8_ 六、申請專利範圍 ^ ---- 9·如申請專利範圍第6項之方法’其中該辨識標記係至少 部份基於指定給一行動單元的一識別碼,並與無線通訊 的一蜂巢式網路相關。 10·如申凊專利範圍弟6項之方法’其中該辨識標記係至少 邵份基於該節點的一序號。 11·如申請專利範圍第1項之方法,其中該指令來防止存取 儲存在該節點的資訊係包含一第二識別,及 其中該偵測一致性包含比較該第一識別及該第二識別 〇 12· —種防止存取儲存在一節點之資訊之方法,該方法包含: 由該節點傳送一請求到一網路; 接收一回應到該請求,該回應包含一指令來防止存取 儲存在該節點之資訊;及 根據該接收一回應,防止存取到該資訊, 其中該請求包含一辨識標記。 13.如申清專利範圍弟1 2項之方法’其中該網路包含一無線 通訊的蜂巢式網路。 14·如申請專利範圍第丨2項之方法,其中該請求包含在請求 存取到該網路及一註冊請求之中的至少一個。 15·如申請專利範圍第1 2項之方法,其中防止存取儲存在該 節點之資訊之指令包含對應於該節點的資訊。 16.如申請專利範圍第1 2項之方法,其中防止存取儲存在該 節點之資訊之指令包含對應於儲存在該節點之辨識資訊 之資訊。 -2- O:\74\74883-930309.DOC© 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)A8 B8 C8 D8_ VI. Scope of patent application ^ ---- 9 · If the method of patent scope item 6 is applied, 'The identification mark is based at least in part on an identification code assigned to a mobile unit and communicates with the wireless A honeycomb network related. 10. The method according to claim 6 of the patent scope, wherein the identification mark is based on at least a serial number of the node. 11. The method according to item 1 of the scope of patent application, wherein the instruction to prevent access to the information stored in the node includes a second identification, and wherein the detection consistency includes comparing the first identification and the second identification 〇12 · —A method for preventing access to information stored in a node, the method includes: sending a request from the node to a network; receiving a response to the request, the response including a command to prevent access to the storage in Information of the node; and preventing a response to the information according to the receiving, wherein the request includes an identification mark. 13. The method according to claim 12 of the patent scope, wherein the network includes a cellular network of wireless communication. 14. The method of claim 2 in the scope of patent application, wherein the request includes at least one of requesting access to the network and a registration request. 15. The method according to item 12 of the scope of patent application, wherein the instruction for preventing access to the information stored in the node includes information corresponding to the node. 16. The method according to item 12 of the scope of patent application, wherein the instruction for preventing access to the information stored in the node includes information corresponding to the identification information stored in the node. -2- O: \ 74 \ 74883-930309.DOC © This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 申請專利範圍 17·如申請專利範圍第1 2項之方法,其中防止存取到儲存在 琢節點之資訊之指令透過至少一部份無線通訊連結上接 收。 18·如申請專利範圍第1 2項之方法,其中防止存取該資訊包 含改變該資訊。 19·如申請專利範圍第丨8項之方法,其中該改變該資訊包含 覆寫該資訊的至少一部份。 20·如申請專利範圍第1 2項之方法,其中防止存取該資訊包 含改變關於該資訊的至少一目錄登錄。 21.如申睛專利範圍第1 2項之方法,其中防止存取該資訊包 含改變一關鍵,其中該關鍵係關於該資訊的儲存與未加 金形式之間的一致性。 22· —種防止存取儲存在一節點之資訊之方法,該方法包含: 接收一指令來防止存取儲存在該節點之資訊;及 根據該接收,防止存取該資訊, 其中防止存取到資訊之指令透過至少一部份無線通訊 連結到無線通訊的一蜂巢式網路上所接收。 23·如申請專利範圍第2 2項之方法,其中該指令包含一第一 識別,該方法進一步包含偵測該第一識別及儲存在該節 點的一辨識標記之間的一致性。 24·如申請專利範圍第2 3項之方法,其中該防止存取該資訊 發生在該偵測之後。 25·如申請專利範圍第2 2項之方法,其中該防止存取該資訊 -3- O:\74\74883-930309.DOC© 本紙張尺度適用中國國家標準(CNS) A4規格(210X297公釐) 1223938 A B c D 六、申請專利範圍 包含改變該資訊。 26· —種防正存取儲存在一節點之資訊之裝置,其包含: 接收器’其設置及安排透過一通訊連結接收指令資 訊; 一第一儲存區域,其設置及安排來儲存辨識資訊; 致性偵測器,其耦合到該接收器及該第一儲存區 域;及 一第二儲存區域, 其中該一致性偵測器係設置及安排來偵測(A)至少部 份基於該辨識資訊的一標記,及(B )至少部份一基於透 過該通訊連結接收該資訊之一字串之間的一致性,及 其中在該一致性偵測器的偵測後會避免存取在該第二 儲存區域中的資訊。 27·如申請專利範圍第2 6項之裝置,其中該一致性偵測器包 含一第一比較器。 28·如申請專利範圍第2 7項之裝置,該裝置進一步包含一第 二比較器,其設置及安排來偵測一輸入字寧與一儲存字 爭之間的一致性,其中在該一致性偵測器的偵測及該第 二比較器的偵測至少其中之一後會避免存取在該第二儲 存區域中的資訊。 29·如申請專利範圍第2 7項之裝置,該裝置進一步包含一計 時器’其中在一致性偵測器的偵測,該第二比較器的偵 測,及該計時器的到期至少其中之一後會避免存取在該 第二儲存區域中的資訊。 O:\74\74883-930309.DOC© . 4 - 本紙張尺度適用中國國豕標準(CNS) A4規格(210 X 297公羡) 1223 93 8r :修 A B c D -5- 申請專利範圍 3〇·如申請專利範圍第2 6項之裝置,該裝置進一步包含〜計 時器,其中在該一致性偵測器的偵測及由該計時器的到 期至少其中一後會避免存取在該第二儲存區域中的資訊 〇 3L —種防止存取儲存在一節點之資訊之裝置,其包含: 一接收器,其設置及安排接收來自無線通訊的一蜂巢 式網路之一指令; 一記憶體,該記憶體的至少一部份具有資訊;及 一處理器,其設置及安排響應該指令以防止一使用者 存取該資訊。 32·如申請專利範圍第3 1項之裝置,該裝置進’步包含一傳 送器,其設置及安排來傳送一請求到無線通訊的琢蜂巢 式網路, 其中接收該指令以響應該請求。 33,如申請專利範圍第3 2項之裝置,其中該請求包含存取该 無線通訊的該蜂巢式網路的一請求及一拉冊巧求至^ ” 中之一。 O:\74\74883-930309.DOC© 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐)Scope of patent application 17. The method according to item 12 of the patent application scope, wherein the instruction for preventing access to the information stored in the node is received through at least a part of the wireless communication link. 18. The method of claim 12 in the scope of patent application, wherein preventing access to the information includes changing the information. 19. The method according to item 8 of the patent application scope, wherein the changing the information includes overwriting at least a part of the information. 20. The method of claim 12 in the scope of patent application, wherein preventing access to the information includes changing at least one directory entry regarding the information. 21. The method of claim 12, wherein preventing access to the information includes changing a key, where the key is about the consistency between the storage of the information and the ungilded form. 22 · —A method for preventing access to information stored at a node, the method comprising: receiving an instruction to prevent access to information stored at the node; and preventing access to the information according to the receiving, wherein preventing access to The information command is received through a cellular network connected to the wireless communication through at least a part of the wireless communication. 23. The method of claim 22, wherein the instruction includes a first identification, and the method further includes detecting the consistency between the first identification and an identification mark stored in the node. 24. The method of claim 23 in the scope of patent application, wherein the preventing access to the information occurs after the detection. 25. If the method of the 22nd item of the scope of patent application is applied, the access to the information is to be prevented ) 1223938 AB c D 6. The scope of patent application includes changes to this information. 26 · —A device for preventing positive access to information stored at a node, including: a receiver 'whose settings and arrangements receive command information through a communication link; a first storage area whose settings and arrangements store identification information; A consistency detector coupled to the receiver and the first storage area; and a second storage area, wherein the consistency detector is set and arranged to detect (A) based at least in part on the identification information A mark of, and (B) at least partly based on the consistency between a string of the information received through the communication link, and in which access to the first Information in the storage area. 27. The device as claimed in claim 26, wherein the consistency detector comprises a first comparator. 28. The device according to item 27 of the scope of patent application, the device further includes a second comparator, which is arranged and arranged to detect the consistency between an input word and a stored word content, where the consistency At least one of the detection by the detector and the detection by the second comparator will prevent access to the information in the second storage area. 29. The device according to item 27 of the scope of patent application, the device further includes a timer, wherein the detection by the consistency detector, the detection by the second comparator, and the expiration of the timer are at least one of them. After one, access to the information in the second storage area is avoided. O: \ 74 \ 74883-930309.DOC ©. 4-This paper size is applicable to China National Standard (CNS) A4 (210 X 297 public envy) 1223 93 8r: Repair AB c D -5- Application for patent scope 30. · If the device in the 26th scope of the patent application, the device further includes a ~ timer, in which the access will be avoided after the consistency detector detects and at least one of the timer expires. Information in the storage area 03L—A device for preventing access to information stored in a node, including: a receiver, which is arranged and arranged to receive a command from a cellular network from wireless communication; a memory , At least a part of the memory has information; and a processor, which is arranged and arranged to respond to the instruction to prevent a user from accessing the information. 32. The device according to item 31 of the scope of patent application, the device further includes a transmitter configured and arranged to transmit a request to the wireless cellular network, wherein the instruction is received in response to the request. 33. The device according to item 32 of the scope of patent application, wherein the request includes a request for accessing the wireless communication of the cellular network and a pull request to one of ^ ". O: \ 74 \ 74883 -930309.DOC © This paper size applies to China National Standard (CNS) A4 (210 X 297 mm)
TW090127528A 2000-11-06 2001-11-06 Method and apparatus for preventing access to information stored at a node TWI223938B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US70756500A 2000-11-06 2000-11-06

Publications (1)

Publication Number Publication Date
TWI223938B true TWI223938B (en) 2004-11-11

Family

ID=24842212

Family Applications (1)

Application Number Title Priority Date Filing Date
TW090127528A TWI223938B (en) 2000-11-06 2001-11-06 Method and apparatus for preventing access to information stored at a node

Country Status (7)

Country Link
EP (1) EP1338168A2 (en)
JP (1) JP2004530178A (en)
KR (1) KR20030048125A (en)
AU (1) AU2002248912A1 (en)
BR (1) BR0115146A (en)
TW (1) TWI223938B (en)
WO (1) WO2002041661A2 (en)

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100661271B1 (en) * 2005-03-10 2006-12-26 주식회사 코원시스템 a portable media playing apparatus
JP2009003622A (en) * 2007-06-20 2009-01-08 Toshiba Corp Information processor
US9390369B1 (en) * 2011-09-21 2016-07-12 Brain Corporation Multithreaded apparatus and methods for implementing parallel networks
US8713646B2 (en) 2011-12-09 2014-04-29 Erich Stuntebeck Controlling access to resources on a network
US9680763B2 (en) 2012-02-14 2017-06-13 Airwatch, Llc Controlling distribution of resources in a network
US10404615B2 (en) 2012-02-14 2019-09-03 Airwatch, Llc Controlling distribution of resources on a network
US9208432B2 (en) 2012-06-01 2015-12-08 Brain Corporation Neural network learning and collaboration apparatus and methods
US9247432B2 (en) 2012-10-19 2016-01-26 Airwatch Llc Systems and methods for controlling network access
US8862868B2 (en) 2012-12-06 2014-10-14 Airwatch, Llc Systems and methods for controlling email access
US9021037B2 (en) 2012-12-06 2015-04-28 Airwatch Llc Systems and methods for controlling email access
US8826432B2 (en) 2012-12-06 2014-09-02 Airwatch, Llc Systems and methods for controlling email access
US8978110B2 (en) 2012-12-06 2015-03-10 Airwatch Llc Systems and methods for controlling email access
US8832785B2 (en) 2012-12-06 2014-09-09 Airwatch, Llc Systems and methods for controlling email access
US9401915B2 (en) 2013-03-15 2016-07-26 Airwatch Llc Secondary device as key for authorizing access to resources
US8997187B2 (en) 2013-03-15 2015-03-31 Airwatch Llc Delegating authorization to applications on a client device in a networked environment
US10652242B2 (en) 2013-03-15 2020-05-12 Airwatch, Llc Incremental compliance remediation
US9275245B2 (en) 2013-03-15 2016-03-01 Airwatch Llc Data access sharing
US9148416B2 (en) 2013-03-15 2015-09-29 Airwatch Llc Controlling physical access to secure areas via client devices in a networked environment
US9203820B2 (en) 2013-03-15 2015-12-01 Airwatch Llc Application program as key for authorizing access to resources
US9819682B2 (en) 2013-03-15 2017-11-14 Airwatch Llc Certificate based profile confirmation
US9787686B2 (en) 2013-04-12 2017-10-10 Airwatch Llc On-demand security policy activation
US10754966B2 (en) 2013-04-13 2020-08-25 Airwatch Llc Time-based functionality restrictions
US9426162B2 (en) 2013-05-02 2016-08-23 Airwatch Llc Location-based configuration policy toggling
US9246918B2 (en) 2013-05-10 2016-01-26 Airwatch Llc Secure application leveraging of web filter proxy services
US9058495B2 (en) 2013-05-16 2015-06-16 Airwatch Llc Rights management services integration with mobile device management
US9584437B2 (en) 2013-06-02 2017-02-28 Airwatch Llc Resource watermarking and management
US9900261B2 (en) 2013-06-02 2018-02-20 Airwatch Llc Shared resource watermarking and management
US8756426B2 (en) 2013-07-03 2014-06-17 Sky Socket, Llc Functionality watermarking and management
US8806217B2 (en) 2013-07-03 2014-08-12 Sky Socket, Llc Functionality watermarking and management
US8775815B2 (en) 2013-07-03 2014-07-08 Sky Socket, Llc Enterprise-specific functionality watermarking and management
US9226155B2 (en) 2013-07-25 2015-12-29 Airwatch Llc Data communications management
US9112749B2 (en) 2013-07-25 2015-08-18 Airwatch Llc Functionality management via application modification
US9665723B2 (en) 2013-08-15 2017-05-30 Airwatch, Llc Watermarking detection and management
US9516005B2 (en) 2013-08-20 2016-12-06 Airwatch Llc Individual-specific content management
US9258301B2 (en) 2013-10-29 2016-02-09 Airwatch Llc Advanced authentication techniques
US9544306B2 (en) 2013-10-29 2017-01-10 Airwatch Llc Attempted security breach remediation
EP2963886A1 (en) * 2014-07-02 2016-01-06 Gemalto SA Method for execution of remote command in a wireless terminal
US9584964B2 (en) 2014-12-22 2017-02-28 Airwatch Llc Enforcement of proximity based policies
US9413754B2 (en) 2014-12-23 2016-08-09 Airwatch Llc Authenticator device facilitating file security
US9917862B2 (en) 2016-04-14 2018-03-13 Airwatch Llc Integrated application scanning and mobile enterprise computing management system
US9916446B2 (en) 2016-04-14 2018-03-13 Airwatch Llc Anonymized application scanning for mobile devices

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0748135B1 (en) * 1993-06-15 1998-10-28 Celltrace Communications Limited Telecommunications system
US5673317A (en) * 1995-03-22 1997-09-30 Ora Electronics, Inc. System and method for preventing unauthorized programming of wireless network access devices
GB2328843B (en) * 1997-08-29 2002-08-14 Nokia Mobile Phones Ltd A system for remotely accessing data stored in a radiotelephone

Also Published As

Publication number Publication date
BR0115146A (en) 2004-08-03
WO2002041661A2 (en) 2002-05-23
KR20030048125A (en) 2003-06-18
JP2004530178A (en) 2004-09-30
EP1338168A2 (en) 2003-08-27
WO2002041661A3 (en) 2003-01-23
AU2002248912A1 (en) 2002-05-27

Similar Documents

Publication Publication Date Title
TWI223938B (en) Method and apparatus for preventing access to information stored at a node
KR101504855B1 (en) Method for exporting on a secure server data comprised on a uicc comprised in a terminal
US8078145B2 (en) Mobile communication system and mobile terminal having function of inactivating mobile communication viruses, and method thereof
RU2391796C2 (en) Limited access to functional sets of mobile terminal
TWI252701B (en) Safe application distribution and execution in a wireless environment
US20060141987A1 (en) Identification of a terminal with a server
US7929947B2 (en) Communication apparatus and method for setting communication parameters
TW200400728A (en) Provisioning a mobile device in a wireless communication system
US9769780B2 (en) Remote smart card personalization without third party
JP2005223900A (en) Service restriction setting device of mobile communication terminal equipment and its method
CN105101349A (en) Access control method, device and terminal for wireless local area network
KR100819678B1 (en) Authentification Method of Public Wireless LAN Service using CDMA authentification information
WO2007058024A1 (en) Mobile communication system, core network, radio network system, and method for selecting network for containing the system
US6618584B1 (en) Terminal authentication procedure timing for data calls
JP5138314B2 (en) Base station equipment
US20080227432A1 (en) Activating the Unlocking of a Mobile Terminal
US7636845B2 (en) System for preventing IP allocation to cloned mobile communication terminal
JP2011254484A (en) Method and apparatus for controlling registration activity
JP6010637B2 (en) Smart card personalization
KR20030037057A (en) Method for updating of Subscriber Identity Module card using a Public Land Mobile Network
KR19990068870A (en) System that prevents use after copying information of authentication terminal by using non-authentication terminal
CN100442940C (en) Method for eliminating same wireless terminal
KR100982575B1 (en) Apparatus and Method for Changing Sim Lock Information
KR100756122B1 (en) Authentication service initialization apparatus of mobile phone and method thereof
KR20090085472A (en) Secure method of terminal device using smart card and device thereof

Legal Events

Date Code Title Description
MK4A Expiration of patent term of an invention patent