WO2006066507A1 - Procede et systeme de mise en oeuvre d'une fonction de securite de site - Google Patents
Procede et systeme de mise en oeuvre d'une fonction de securite de site Download PDFInfo
- Publication number
- WO2006066507A1 WO2006066507A1 PCT/CN2005/002271 CN2005002271W WO2006066507A1 WO 2006066507 A1 WO2006066507 A1 WO 2006066507A1 CN 2005002271 W CN2005002271 W CN 2005002271W WO 2006066507 A1 WO2006066507 A1 WO 2006066507A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- restricted area
- restricted
- information
- location
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
Definitions
- the present invention relates to the field of communication technologies, and in particular, to a method and system for implementing a scenario security function. Background of the invention
- the invention provides a method for implementing scene secrecy, the method comprising:
- the step of determining whether the mobile terminal enters the restricted area in the step b includes: bl l, after the mobile terminal is powered on, initiates a registration request to the network side;
- the network side After receiving the registration request, the network side registers the mobile terminal, starts a location location system, and starts tracking the mobile terminal;
- the network side determines whether the current location of the mobile terminal belongs to the area corresponding to the restricted area identifier in step a, and if so, the mobile terminal is considered to enter the restricted area; otherwise, the mobile terminal is considered not to enter the restricted area. Limited area.
- the step of setting the restricted area information in the mobile terminal, the step of determining whether the mobile terminal enters the restricted area in step b includes:
- B21 The network side broadcasts the restricted area information in a restricted area in real time.
- the mobile terminal that enters the area receives the broadcast information, it compares whether the received restricted area information is consistent with the saved information, and if they are consistent, I think that I have entered the restricted area, otherwise I think that I have not entered the restricted area.
- the terminal positioning enable parameter is further set on the network side, and the network side broadcasts the restricted area information and the location location enable parameter in real time in the restricted area.
- the step of determining whether the mobile terminal enters the restricted area in step b includes:
- step B32 after the mobile terminal receives the location information of the mobile terminal sent by the network side, the mobile terminal determines whether the location where the mobile terminal is located is in the restricted area in the received broadcast restricted area information, and if yes, Proactively turn off its limited user features.
- the step of limiting the mobile terminal to perform the user function described in step a in step b is:
- a user function restricted by the network side residence transmitting a notification of prohibiting communication to the mobile terminal side, including the limited user function of the mobile terminal,
- the mobile terminal After receiving the notification, the mobile terminal directly closes the corresponding function by its own software mode according to the limited user function.
- the step of restricting the mobile terminal to perform the user function described in step a in step b is: not establishing a connection for the user, or prohibiting the manner of rejecting the flow of information. User communication.
- the network side sends a prohibition notification to the mobile terminal, and the mobile terminal turns off the corresponding function.
- the restricted user functions include one or a combination of any of the prohibition of taking a picture, recording, rejecting a call, and disabling a connection request.
- the restricted user function is determined by a restricted level.
- a system for implementing a scene security function provided by the present invention includes:
- a mobile communication network configured to save restricted area information, where the restricted area information includes at least a restricted area identifier, a restricted user identifier in the restricted area, and a restricted user function; and, when the mobile terminal is powered on,
- the mobile communication network initiates the positioning system to track the mobile terminal, and when determining the restricted area saved by the mobile terminal in the area where the mobile terminal is located, restricting the mobile terminal from performing the user function.
- a system for implementing a scene security function provided by the present invention includes:
- a mobile communication system configured to broadcast restricted area information in real time in a restricted area, where the restricted area information includes a restricted area identifier, a restricted user identifier in the restricted area, and a Restricted user function;
- the mobile terminal is configured to save the information of the restricted area, and after receiving the broadcast information, the mobile terminal that enters the area compares the received restricted area information with the saved one, and if the information is consistent, Stop the user function.
- a system for implementing a scene security function provided by the present invention includes:
- the limited area information includes a restricted area identifier, a restricted user identifier in the restricted area, and a restricted user function;
- the mobile terminal obtains its own location information from the mobile communication system by using the received location location enable parameter, and determines whether the location where it is located is within the restricted area of the received broadcast restricted area information, and is determined to be in the restricted area. When the area is restricted, the user function is stopped.
- the invention sets the restricted area information on the network side, and when determining that the mobile terminal enters the restricted area, determines whether the mobile terminal belongs to the restricted user, and if so, restricts the mobile terminal from communicating and the mobile terminal is restricted.
- Functions such as communication, camera, recording, photographing, etc., so that the secret of a particular scene is not transmitted through the specific functions of the mobile terminal.
- FIG. 1 is a schematic flow chart of implementing a specific embodiment 1 of the present invention.
- FIG. 2 is a schematic flow chart of implementing a second embodiment of the present invention.
- FIG. 3 is a schematic illustration of the system of the present invention. Mode for carrying out the invention
- the method of the present invention mainly refers to registering a restricted area of the application on the network side, and simultaneously setting a limited user identifier in the area and a function restricted by the mobile terminal; when determining that the mobile terminal enters the restricted area, determining Whether the mobile terminal belongs to a restricted user, and if so, restricts the mobile terminal from communicating and specific functions of the mobile terminal, such as communication, camera, recording, photographing, and the like. Moreover, you can set restricted user functions by setting a restricted level.
- the method for determining whether the mobile terminal enters the restricted area may be implemented in the following manners: First, after the mobile terminal is powered on, registering with the network side, and after registering the mobile terminal, the network side starts the location positioning system, Starting to track the mobile terminal, and then determining whether the mobile terminal enters the restricted area according to the tracked location information; the second is setting the restricted area information in the mobile terminal, for example, the restricted area identifier, where the network side is The restricted area information of the restricted area identifier is broadcasted in the restricted area in real time. When the mobile terminal entering the area receives the broadcast information, it compares whether the received restricted area identifier is consistent with the restricted area identifier saved by itself. If it is consistent, it considers that it has entered the restricted area.
- the third type is similar to the second type, but it is necessary to further set the terminal positioning enable parameter on the network side, and then the network side is subject to Real-time broadcast restricted area information and location location enable parameters in the limited area,
- the broadcast information is received, and then the location information request is sent to the network side according to the received location location enable parameter. Thereafter, after the mobile terminal receives the location information sent by the network side, , then compare whether the location where it is located is in the restricted area, and if it is, actively turn off its limited function.
- the mobile terminal can be restricted from taking pictures, taking pictures, or only calling,
- the method for determining that the mobile terminal leaves the restricted area may include but is limited to the following two types.
- the first type can be determined by the positioning system, which is determined by the network side according to the current location of the mobile terminal, whether it is in the restricted area; secondly, the timer can be set by itself, when it is determined to enter the restricted area Start the timer. If the broadcast message has not been received before the timer expires, it is considered to have exited the restricted area.
- the network side can determine according to the The restricted type sends a notification of prohibiting communication to the mobile terminal side, including the restricted type of the mobile terminal.
- the mobile terminal receives the notification, the mobile terminal directly closes the corresponding function according to the restricted type thereof by its own software mode.
- These functions include disabling camera recording, recording, and rejecting calls, or prohibiting the sending of connection requests.
- Another common situation is: When the network side receives a call request containing the calling number and the called number, it is determined that one of the parties is subject to When the user is restricted, the initiator can directly notify the description of "this call is restricted communication, communication is prohibited". Therefore, communication can be prohibited by not establishing a connection for the user or refusing to send the information flow. This can only limit the communication of the mobile terminal, but cannot directly limit the mobile terminal except communication. Other features, so for some particular function of the mobile terminal, the network side may send a notification prohibiting, by the mobile terminal to disable the corresponding function.
- the core idea of the embodiment is: setting the restricted area information and the authorized user identifier on the network side, and tracking the user who performs the location registration through the location location system. After the mobile terminal enters the restricted area, if the network side determines the user When it belongs to a restricted user, the restricted type of the user is determined, and then the function of the mobile terminal is restricted according to the restricted type.
- Step 100 Set restricted area information on the network side, which specifically includes a restricted area, a limited user identifier, a restricted level, and the like.
- the restricted level here can be set according to the needs of the confidential applicant.
- the restricted level can be divided into three levels: one is to turn off all functions in all mobile terminals; the second is to turn off only the VP phone function, the voice call function; the third level is to turn off the sending of short messages, emails and the like.
- the limited user ID only the unrestricted user ID can be set to indicate that all of the users except the users are restricted users.
- the division of the restricted level and the use of which level of restriction does not respond to the scope of the invention.
- Step 101 ⁇ After the mobile terminal is powered on, a location registration request is made.
- Step 102 After receiving the location registration request, the network side tracks the mobile terminal by using a mobile phone location and location system.
- Step 103 When the network side detects that the mobile terminal enters the restricted area, determining, according to the restricted area information saved by the network side, whether the mobile terminal belongs to the restricted user and the restricted function type. Specifically, the network side determines whether the identity of the mobile terminal is included in the restricted area information. If included, the mobile terminal is considered to be a restricted user. If not, the mobile terminal is considered to be an unrestricted user.
- the restricted function type is to prohibit the call, prohibit the VP phone, prohibit sending short messages, prohibit sending E-MAIL, prohibit sending pictures, and so on.
- Step 104 After receiving the call request by the mobile terminal and including the calling number and the called number, the network side determines, according to the calling number and the called number, whether the calling or called party is a restricted user and a restricted type, if If one of the parties is a restricted user, the two parties are prohibited from communicating using the restricted type. If both the calling party and the called party are not restricted users, communication is allowed.
- the method further includes: in step 101, the mobile terminal includes the user's own capability information in the sent location registration request.
- the user's capability information and restricted area information can be utilized to determine the function that the user really needs to disable.
- the above embodiment mainly controls whether to prohibit communication through the network side.
- the function of prohibiting communication can also be completed by appropriately modifying the mobile phone.
- the main design idea of this embodiment is: Before the mobile terminal enters the restricted area, the restricted area information is set in the terminal, and the wireless service broadcast center broadcasts the restricted area information in the restricted area, for example: limited broadcast
- the area information includes a restricted area identifier and a restricted function of the restricted area, and the like;
- the mobile terminal receives the broadcast restricted area information, and compares it with the stored limited area identifier, if the broadcast includes the mobile terminal itself
- the stored restricted area identifier is considered to enter the restricted area, and then the mobile terminal cancels the function restricted by the restricted area.
- Step 201 Set restricted area information for the application privacy zone.
- the restricted area information includes: a restricted area identifier, a restricted area manager identifier, a restricted area location, and the like.
- Step 202 The network side broadcasts the restricted area information in each restricted area. That is to say, all the mobile terminals entering each restricted area receive the broadcast, and can recognize the restricted area information in the broadcast, but cannot receive the broadcast in the unrestricted area.
- the restricted area information broadcasted in a certain restricted area includes at least the limited area information of the current restricted area itself, and may further include: limited information of the other one or more restricted areas, which may include all at most Restricted area information of the restricted area; and, the restricted area information of each area broadcasted includes, in step 201, the corresponding restricted area Information such as restricted area identification or restricted area manager identification or restricted area location, or any combination of the above.
- the implementation of the broadcast service is generally: a cell broadcast center can be set up in the mobile communication network for authorizing and initiating a cell broadcast service in the mobile network, and transmitting the broadcast content according to a predetermined time schedule; A plurality of cell broadcast entities are set in the communication network, and each cell broadcast entity corresponds to one or more cells, and each cell broadcast entity first submits respective broadcast message content and broadcast parameters to the cell broadcast center, and the cell broadcast center pairs from different cells. The broadcast entity's message is comprehensively scheduled, and then the operation command is sent to the base station controller to further initiate the cell broadcast service.
- the base station controller After receiving the command, the base station controller interprets, stores, and sends the received command to the base station, and the base station performs flow control on the broadcast message, and then sends the message to the mobile terminal.
- the implementation of the broadcast restricted area information is not limited to one, and other broadcast service implementation manners may be used. Since the implementation of the broadcast service is not a problem of the design of the present invention, it will not be described in detail herein.
- Step 203 Before a certain mobile terminal enters a certain restricted area, the mobile terminal is provided with restricted area information, and the setting may be redundant by the administrator of the restricted area currently entered by the mobile terminal.
- the restricted area information set for the mobile terminal may be any combination of several items in the restricted information of the area broadcasted in step 202.
- the terminal positioning enable parameter may be further set for the mobile terminal.
- the terminal positioning enable parameter may also be set only for the mobile terminal. If the terminal positioning enable parameter is set in the mobile terminal, the existing location process is initiated, and the current location information is obtained. Therefore, the mobile terminal can obtain the current location by using the terminal location enable parameter set for the mobile terminal. Store the location of this area as restricted area information.
- the restricted area information stored in the mobile terminal is: a restricted area identifier, or a restricted area manager identifier, or a restricted area location, or a terminal.
- Information such as the location of the location in which it is located, or any combination of the above.
- the restricted area information and the terminal location enabling parameter may be adopted by the operator through the air interface.
- the (OTA) download mode automatically sends a short message (SMS) or multimedia message (MMS) to the mobile terminal to the mobile terminal, or can be manually set in the mobile terminal by the restricted area manager through the human machine interface.
- the terminal location enable parameter can also be sent to the mobile terminal by means of broadcast.
- the restricted area manager can select one of the two schemes for setting the restricted area information to manage according to the entry mode and the entry characteristics of the restricted area. For example, if there is only one entrance to the restricted area and there are not many managers required, the manager can manually set the restricted area information by means of the human-machine interface; if there are multiple entrances to the restricted area, the entered personnel More, the use of human-machine interface is more difficult to implement, and it is not easy to manage. Therefore, the OTA download method can be used to automatically input restricted area information.
- the mobile terminal is composed of a mobile device (ME) and a universal integrated circuit card (UICC)
- the limited area information described herein may be stored in the ME of the terminal or may be stored in the UICC.
- the UICC is a Universal User Module (UIM) card
- the UICC is a Subscriber Identity Module (SIM) card
- SIM Subscriber Identity Module
- WCDMA WCDMA
- USB Universal Subscriber Identity Module
- the UICC can also be other smart cards according to actual needs, but does not affect the effectiveness of the present invention.
- Step 204 The mobile terminal receives the broadcast information described in step 202 and determines whether it enters the restricted area. If yes, go to step 205; otherwise, return to step 204.
- Step 205 The mobile terminal cancels the corresponding restricted function, and the terminal displays a notification of entering the restricted area, prompting that the restricted function of the terminal has been canceled, and the user can bring the terminal into the restricted area.
- limited functions can be photo, video, recording, and more.
- the camera terminal has a camera function, a communication module, and The input/output device is configured, and the camera module turns off its camera function without affecting the function of the communication module. Therefore, the terminal cannot use the camera function to take pictures, but also has a communication function, thereby ensuring confidential information in the restricted area. It cannot be stolen by taking pictures, and does not affect the communication function of the terminal user to use the terminal normally.
- you cancel the camera or recording function you can turn off the function of the corresponding module.
- the user terminal is configured to set the restricted area information, and the terminal may also set the information such as the modified password.
- the terminal When the user enters the restricted area, the user tries to identify the restricted area, the restricted area manager identifier, and the restricted area.
- the terminal When the location and other information are modified, the terminal will ask the user to input the modification password, thereby protecting the restricted area information set by the restricted area manager, preventing the user from modifying the restricted area information after bringing the terminal into the restricted area. Turn on the camera function.
- Step 206 The mobile terminal continues to receive the broadcast information described in step 202 and decides whether it leaves the restricted area, and if yes, returns to step 206; otherwise, proceeds to step 207.
- Step 207 The mobile terminal automatically resumes its restricted function, and the terminal displays a notification of leaving the restricted area, prompting the terminal user that the restricted function has been restored, and the user can continue to use the limited function of the mobile terminal outside the restricted area. , end processing.
- the mobile terminal has obtained the restricted area information including the restricted area identifier, the restricted area manager identifier, the restricted area position, or the location of the area in step 203. Therefore, in step 204 and step 206, the mobile terminal can know whether it enters or leaves the restricted area by determining whether the restricted area information obtained by itself is consistent with the corresponding item in the restricted area information in the broadcast.
- the mobile terminal If the information of the restricted area identifier, the restricted area manager identifier, the restricted area location, or the location of the location stored by the mobile terminal is included, there is a restricted area identifier and a restricted area in the broadcast information received by the terminal. Pairs of information such as manager identification or location of restricted areas If the items are the same, the mobile terminal is determined to enter the restricted area; otherwise, the mobile terminal is determined not to enter the restricted area;
- the restricted area identifier and the restricted area manager identifier in the broadcast information received by the terminal If the corresponding item in the information such as the location of the restricted area is different, the mobile terminal is determined to leave the restricted area; otherwise, the mobile terminal is determined not to leave the restricted area.
- the specific judgment of which one or more pieces of information in the judgment is related to the management manner of the actual restricted area manager is not specifically limited.
- at least one of the restricted area information stored by the mobile terminal corresponds to one of the restricted information broadcasted in step 202. Therefore, this embodiment can ensure that an accurate judgment is made as to whether the mobile terminal enters or leaves the restricted area.
- the embodiment may also adopt another manner to implement the function of the mobile terminal in a specific area, including:
- the broadcast restricted area location information may be location information of one or several restricted areas, or location information of all restricted areas; and a restricted area location broadcasted in a restricted area
- the information includes at least the restricted area location information of the restricted area itself.
- the mobile terminal continuously receives the broadcast message carrying the terminal location enable parameter and the location information of the restricted area. After receiving the terminal location enable parameter, the mobile terminal initiates the terminal location process to obtain the current location of the location, and obtains the current location. After the location of the location, the mobile terminal compares the location of the located location with the location information of the restricted area carried in the broadcast message, and determines whether the mobile terminal is in the restricted area according to the comparison result, such as If so, the restricted function of the mobile terminal is disabled; otherwise, the restricted function is restored.
- the system of the present invention comprises: a mobile communication network and a mobile terminal.
- the interaction between the mobile communication network and the mobile terminal can be implemented by the following three schemes:
- the mobile communication system is a mobile communication network with a positioning system, and is configured to save the restricted area information, where the restricted area information includes at least the restricted area identifier, the restricted user identifier in the restricted area, and the And limiting the user function; and, when the mobile terminal is powered on, the mobile communication network starts the positioning system to track the mobile terminal, and when determining the restricted area saved by the mobile terminal in the area, limits the mobile terminal to perform User function described.
- the second solution is: a mobile communication system, configured to broadcast restricted area information in real time in a restricted area, where the restricted area information includes a restricted area identifier, a restricted user identifier in the restricted area, and a restricted user Function; the mobile terminal is configured to save the information of the restricted area, and after receiving the broadcast information, the mobile terminal entering the area compares the received restricted area information with the self-preserved one, and in a consistent situation Next, stop the user function.
- the second solution is: a mobile communication system, configured to broadcast the restricted area information and the preset location enabling parameter in real time in the restricted area, and provide the mobile terminal with the location information according to the location enabling parameter sent by the mobile terminal.
- the restricted area information includes a restricted area identifier, a restricted user identifier in the restricted area, and a restricted user function; and the mobile terminal obtains its own location from the mobile communication system by using the received location location enabling parameter.
- the information, and determining whether the location where it is located is within the restricted area of the received broadcast restricted area information, and stopping the user function when it is determined to be in the restricted area.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Geophysics And Detection Of Objects (AREA)
- Air Bags (AREA)
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05820621A EP1830513B1 (en) | 2004-12-23 | 2005-12-21 | A method for implementing the function of the scene security and a system thereof |
AT05820621T ATE456213T1 (de) | 2004-12-23 | 2005-12-21 | Verfahren zur implementierung der ortssicherheitsfunktion und system dafür |
DE602005019096T DE602005019096D1 (de) | 2004-12-23 | 2005-12-21 | Verfahren zur implementierung der ortssicherheitsfunktion und system dafür |
US11/638,230 US20070155374A1 (en) | 2004-12-23 | 2006-12-13 | Method and system for keeping a scene secret |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200410102484.7 | 2004-12-23 | ||
CN2004101024847A CN100407863C (zh) | 2004-12-23 | 2004-12-23 | 一种实现场景保密功能的方法 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/638,230 Continuation US20070155374A1 (en) | 2004-12-23 | 2006-12-13 | Method and system for keeping a scene secret |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006066507A1 true WO2006066507A1 (fr) | 2006-06-29 |
Family
ID=36601388
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2005/002271 WO2006066507A1 (fr) | 2004-12-23 | 2005-12-21 | Procede et systeme de mise en oeuvre d'une fonction de securite de site |
Country Status (6)
Country | Link |
---|---|
US (1) | US20070155374A1 (zh) |
EP (1) | EP1830513B1 (zh) |
CN (1) | CN100407863C (zh) |
AT (1) | ATE456213T1 (zh) |
DE (1) | DE602005019096D1 (zh) |
WO (1) | WO2006066507A1 (zh) |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE60036731T2 (de) * | 2000-06-14 | 2008-07-17 | Nokia Corp. | Verfahren und vorrichtung zur durchführung der positionsregistrierung |
CN101247581B (zh) * | 2007-02-15 | 2011-12-07 | 联想(北京)有限公司 | 一种控制移动终端状态的方法及其系统 |
US8675553B2 (en) * | 2009-03-26 | 2014-03-18 | Qualcomm Incorporated | Regulating the scope of service geographically in wireless networks based on priority |
CN102223595A (zh) * | 2010-04-19 | 2011-10-19 | 大唐移动通信设备有限公司 | 用于特殊区域安全需求的通信方法及装置 |
CN102238688A (zh) * | 2010-04-26 | 2011-11-09 | 大唐移动通信设备有限公司 | 基于用户身份信息访问控制的方法及装置 |
CN102244917A (zh) * | 2010-05-14 | 2011-11-16 | 北京信威通信技术股份有限公司 | 一种用于无线信号受限环境的通信方法 |
CN101860988A (zh) * | 2010-05-17 | 2010-10-13 | 中兴通讯股份有限公司 | 一种基于位置区域的无线通信终端业务控制方法和装置 |
KR20120114964A (ko) * | 2011-04-08 | 2012-10-17 | 엘지전자 주식회사 | 다중 안테나 무선 통신 시스템에서 단말의 신호 송수신 방법 및 이를 위한 장치 |
CN102448084B (zh) * | 2011-09-29 | 2015-01-14 | 厦门盛华电子科技有限公司 | 基于无线射频技术的移动终端控制方法 |
CN103312676B (zh) * | 2012-03-15 | 2017-06-20 | 宇龙计算机通信科技(深圳)有限公司 | 终端、服务器和终端安全管理方法 |
EP2832131A4 (en) * | 2012-03-30 | 2015-11-25 | Hewlett Packard Development Co | DEFINING A PERIOD OF SURVEILLANCE OF A WIRELESS DEVICE TO DETECT A VIOLATION OF THE PERIMETER |
CN102801780A (zh) * | 2012-06-27 | 2012-11-28 | 宇龙计算机通信科技(深圳)有限公司 | 拍照装置的拍照提醒方法及拍照装置 |
CN104010304B (zh) * | 2013-02-22 | 2017-11-21 | 株式会社理光 | 在受限区域内进行认证的移动设备和系统及其方法 |
CN103607730A (zh) * | 2013-11-19 | 2014-02-26 | 成都西科微波通讯有限公司 | 一种移动设备通信的区域管控方法及系统 |
CN103813310B (zh) * | 2014-02-28 | 2015-09-02 | 宇龙计算机通信科技(深圳)有限公司 | 锁小区装置和方法以及控制装置和方法 |
CN103885827B (zh) * | 2014-03-28 | 2019-10-15 | 努比亚技术有限公司 | 自动切换运行模式的方法和智能终端 |
CN105205875B (zh) * | 2014-06-11 | 2018-11-02 | 中国移动通信集团公司 | 一种终端设备管理方法、装置、系统和相关设备 |
CN105355012A (zh) * | 2014-08-19 | 2016-02-24 | 中兴通讯股份有限公司 | 一种对终端进行管理的系统和方法 |
CN104185160A (zh) * | 2014-09-05 | 2014-12-03 | 广州杰赛科技股份有限公司 | 一种移动业务应用迁移系统及其代理终端 |
US9756173B2 (en) * | 2015-03-28 | 2017-09-05 | International Business Machines Corporation | Leveraging mobile devices to enforce restricted area security |
CN106162822B (zh) * | 2015-04-28 | 2020-01-10 | 南京酷派软件技术有限公司 | 一种区域范围内限制终端联网的方法、装置及终端 |
CN107579947A (zh) * | 2016-07-05 | 2018-01-12 | 中兴通讯股份有限公司 | 一种访客终端的控制方法、装置、服务器及移动终端 |
CN106506450B (zh) * | 2016-09-27 | 2020-01-21 | 北京安云世纪科技有限公司 | 保密通话的方法和系统 |
GB2554946A (en) * | 2016-10-17 | 2018-04-18 | Habyts Ltd | Controlling electronic computer devices |
CN106658497B (zh) * | 2016-12-02 | 2022-07-22 | 北京握奇智能科技有限公司 | 一种终端设备的权限控制方法及系统 |
CN108512804A (zh) * | 2017-02-24 | 2018-09-07 | 美的智慧家居科技有限公司 | 安全摄录方法和装置 |
CN107481358B (zh) * | 2017-07-13 | 2020-07-03 | 安徽声讯信息技术有限公司 | 基于app的动态二维码管理系统及其方法 |
CN107682433A (zh) * | 2017-09-30 | 2018-02-09 | 北京金山安全软件有限公司 | 信息推送方法、装置、设备和介质 |
CN114501320A (zh) * | 2021-12-29 | 2022-05-13 | 浙江百应科技有限公司 | 一种设备管控方法、装置以及系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040002310A (ko) * | 2002-06-29 | 2004-01-07 | 엘지.필립스 엘시디 주식회사 | 터치패널 및 그의 구동장치 |
CN1543115A (zh) * | 2003-04-30 | 2004-11-03 | ��Ϊ��������˾ | 一种防止网络用户对网络地址转换(nat)设备攻击的方法 |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6011973A (en) * | 1996-12-05 | 2000-01-04 | Ericsson Inc. | Method and apparatus for restricting operation of cellular telephones to well delineated geographical areas |
WO1998034421A2 (de) * | 1997-01-31 | 1998-08-06 | Maz Mikroelektronik Anwendungszentrum Hamburg Gmbh | Verfahren zum detektieren von mobilfunkstationen |
US6721542B1 (en) * | 1999-05-28 | 2004-04-13 | Nokia Corporation | System for location specific, automatic mobile station behavior control |
CN1135048C (zh) * | 1999-06-28 | 2004-01-14 | 西门子公司 | 运行移动终端机和相应的移动无线系统的方法 |
US6591102B1 (en) * | 2000-02-03 | 2003-07-08 | Avaya Technology Corp. | Method and system for transmitting feature and authentication information for wireless communication services |
WO2002045449A1 (en) * | 2000-11-28 | 2002-06-06 | Nokia Corporation | System and method for authentication of a roaming subscriber |
US20030008662A1 (en) * | 2001-07-09 | 2003-01-09 | Stern Edith H. | Systems and methods wherein a mobile user device operates in accordance with a location policy and user device information |
US6937868B2 (en) * | 2002-01-16 | 2005-08-30 | International Business Machines Corporation | Apparatus and method for managing a mobile phone answering mode and outgoing message based on a location of the mobile phone |
US20040203667A1 (en) * | 2002-03-14 | 2004-10-14 | Thaddeus Schroeder | System for locally restricting use of cellphones and other electronic devices |
US6750813B2 (en) * | 2002-07-24 | 2004-06-15 | Mcnc Research & Development Institute | Position optimized wireless communication |
US7574731B2 (en) * | 2002-10-08 | 2009-08-11 | Koolspan, Inc. | Self-managed network access using localized access management |
KR100520618B1 (ko) * | 2003-01-14 | 2005-10-10 | 삼성전자주식회사 | 다기능 이동 통신 단말의 사용 제한 방법 |
WO2004089021A2 (en) * | 2003-04-01 | 2004-10-14 | Iceberg Intellectual Property Limited | Portable digital devices |
US20040228460A1 (en) * | 2003-05-15 | 2004-11-18 | Cherif Keramane | Portable communications devices providing selective inhibition of functionalities and related control devices and methods |
US20050064856A1 (en) * | 2003-09-18 | 2005-03-24 | International Business Machines Corporation | Method and apparatus for managing functions in a camera phone |
CN100393165C (zh) * | 2004-10-11 | 2008-06-04 | 中兴通讯股份有限公司 | 一种基于phs智能网的呼叫权限的实现方法及其系统 |
-
2004
- 2004-12-23 CN CN2004101024847A patent/CN100407863C/zh active Active
-
2005
- 2005-12-21 DE DE602005019096T patent/DE602005019096D1/de active Active
- 2005-12-21 EP EP05820621A patent/EP1830513B1/en active Active
- 2005-12-21 AT AT05820621T patent/ATE456213T1/de not_active IP Right Cessation
- 2005-12-21 WO PCT/CN2005/002271 patent/WO2006066507A1/zh active Application Filing
-
2006
- 2006-12-13 US US11/638,230 patent/US20070155374A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040002310A (ko) * | 2002-06-29 | 2004-01-07 | 엘지.필립스 엘시디 주식회사 | 터치패널 및 그의 구동장치 |
CN1543115A (zh) * | 2003-04-30 | 2004-11-03 | ��Ϊ��������˾ | 一种防止网络用户对网络地址转换(nat)设备攻击的方法 |
Also Published As
Publication number | Publication date |
---|---|
EP1830513A1 (en) | 2007-09-05 |
US20070155374A1 (en) | 2007-07-05 |
EP1830513A4 (en) | 2008-03-19 |
EP1830513B1 (en) | 2010-01-20 |
ATE456213T1 (de) | 2010-02-15 |
CN100407863C (zh) | 2008-07-30 |
DE602005019096D1 (de) | 2010-03-11 |
CN1798433A (zh) | 2006-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006066507A1 (fr) | Procede et systeme de mise en oeuvre d'une fonction de securite de site | |
US9345052B2 (en) | Method and system for allowing incoming emergency communications on a disabled device | |
CN100433845C (zh) | 在分组数据网络中为具有无效用户标识的无线设备建立紧急会话 | |
US7689231B2 (en) | Territorial enforcement of device functionality | |
US8682281B2 (en) | Monitoring application and method for establishing emergency communication sessions with disabled devices based on transmitted messages | |
US7275695B2 (en) | Portable terminal and function limiting method | |
KR100671377B1 (ko) | 반이중 무선 통신 방법 및 시스템, 컴퓨터 판독가능 기록 매체 | |
CN104660809B (zh) | 私密联系人来电的接听管理方法及装置 | |
WO2005104571A1 (fr) | Procede permettant de mettre en oeuvre une fonction de protection de secret dans une zone donnee | |
JP2000270376A (ja) | 携帯電話保守サービスシステム及び保守サービス方法 | |
US6470082B1 (en) | Communications system using portable recording medium | |
JP5347864B2 (ja) | 移動体通信サービス処理方法、携帯電話端末及び移動体通信網側装置 | |
KR100548394B1 (ko) | 휴대 단말기에 적용되는 디지털 카메라의 사용 제한시스템 및 방법 | |
KR100732482B1 (ko) | 인증을 통한 단말기 분실관리 서비스 방법 및 시스템 | |
KR101048190B1 (ko) | 화상제한구역 내에서 화상 전송을 자동으로 차단하는 방법및 장치 | |
EP2571301B1 (en) | System and method for urgent information deleting and transferring last location information in secure communication | |
KR100851580B1 (ko) | 지역 기반의 화상 전송 제어 방법 및 장치 | |
JP3120834B2 (ja) | 携帯電話端末の不正使用防御方式 | |
JPH06105366A (ja) | デジタル方式移動通信システム | |
JP2001298530A (ja) | 通信システム、その通信方法及び受信装置 | |
JP2002027561A (ja) | 無線通信システム | |
KR20090097023A (ko) | 스마트 카드를 이용한 단말기 서비스 제어 방법 및 그 장치 | |
JPH05130031A (ja) | 移動体端末のセキユリテイ制御方法 | |
JP2001326963A (ja) | 無線通信システム及び携帯端末 | |
KR20040100154A (ko) | 단문 메세지 서비스를 이용한 특정번호 차단 시스템 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005820621 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 4549/CHENP/2006 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11638230 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 11638230 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2005820621 Country of ref document: EP |