WO2006090899A1 - Mobile handset security system - Google Patents

Mobile handset security system Download PDF

Info

Publication number
WO2006090899A1
WO2006090899A1 PCT/JP2006/303926 JP2006303926W WO2006090899A1 WO 2006090899 A1 WO2006090899 A1 WO 2006090899A1 JP 2006303926 W JP2006303926 W JP 2006303926W WO 2006090899 A1 WO2006090899 A1 WO 2006090899A1
Authority
WO
WIPO (PCT)
Prior art keywords
master
slave
linked
devices
identifiers
Prior art date
Application number
PCT/JP2006/303926
Other languages
French (fr)
Inventor
Richard Ormson
Original Assignee
Nec Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nec Corporation filed Critical Nec Corporation
Priority to JP2007538210A priority Critical patent/JP2008532336A/en
Priority to EP06715039A priority patent/EP1859641A4/en
Priority to US11/816,031 priority patent/US20090011796A1/en
Publication of WO2006090899A1 publication Critical patent/WO2006090899A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/60Substation equipment, e.g. for use by subscribers including speech amplifiers
    • H04M1/6033Substation equipment, e.g. for use by subscribers including speech amplifiers for providing handsfree use or a loudspeaker mode in telephone sets
    • H04M1/6041Portable telephones adapted for handsfree use
    • H04M1/6058Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone
    • H04M1/6066Portable telephones adapted for handsfree use involving the use of a headset accessory device connected to the portable telephone including a wireless connection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • H04W84/20Master-slave selection or change arrangements

Definitions

  • This invention relates to an improved system and method for providing security in relation to mobile telephone handsets.
  • the operators of mobile communications networks are also interested in reducing revenue loss due to the theft of subsidized handsets.
  • a method and a system for controlling an electronic device comprising means associated with a master electronic device for storing at least one identifier associated with a slave electronic device capable of being linked to the master device and means for controlling the operation of one of the electronic devices in dependence on detection of the master device and at least one slave device being linked when operation of that device is to take place.
  • a plurality of sets of identifiers each associated with a different combination of linked master and slave devices, is stored by the master device; operation of one of the electronic devices being controlled in dependence on detection of the master device being linked to at least one slave device corresponding to one of the plurality of sets of stored identifiers.
  • At least one of the sets of identifiers may include identifiers associated with two or more slave devices.
  • Preferred embodiments of the present invention seek to provide an alternative or additional security system to the conventional architecture and lock systems.
  • the security system need not be restricted to mobile communication devices and their associated accessories. Accordingly, the present invention can advantageously be applied to any electronic devices that are linked together. BRIEF DESCRIPTION OF DRAWING
  • Figure 1 shows a block diagram of apparatus showing part of the mobile handset security system.
  • a mobile handset security system comprising some but not necessarily all of the following components: a headset 1 and a desktop 3 which is part of a personal computer, both of which would be used at the home of the user, a wireless local area network 11 which is also located at the user's home, a hands free car kit 7 which is used in a car, and a laptop 9.
  • a headset 1 and a desktop 3 which is part of a personal computer, both of which would be used at the home of the user
  • a wireless local area network 11 which is also located at the user's home
  • a hands free car kit 7 which is used in a car
  • laptop 9 a laptop 9.
  • other devices or networks could be used instead, for example, a local area network (LAN).
  • LAN local area network
  • These devices can be connected to one another using any means, such as infra red or wireless means.
  • the devices are connected using a cable means.
  • the use of a cable is less satisfactory since it would require a user to physically connect the devices together and carry appropriate connecting wiring.
  • a wireless network can be created for an individual user; a personal area network or PAN. This network ties all of a user's devices into one system. As new peripheral devices are invented, these can also be included in the PAN.
  • the handset has one or more realms or areas of operation in which the user has authorized or will authorize the use of specific combinations of devices. Such realms could for example be “at home”, “at work”, “in the car” or “elsewhere". The realm shown in figure 1 could for example be the "at home” realm.
  • the user has to attach the appropriate accessories in the usual way for each realm.
  • Each of the devices connected by the user carries a unique identifier, so that as the devices are connected, a unique combination of identifiers is created for each realm.
  • this unique identifier could be the Universal unique Identifier (UUI) used by the Service Discovery Protocol (SPD) of BluetoothTM devices.
  • SDP determines which services are available and their characteristics.
  • the UUI is a hard-wired address identity, whose "uniqueness" is determined by the number of bits in the address.
  • the mobile communication device is a master device and determines the combination of the identifiers of the other slave devices by an appropriate interrogation routine. If the detected combination of identifiers does not match that stored in the mobile communication device for one of the configured realms (or alternatively of for the configured realm), the device is rendered inoperative, except for emergency calls.
  • This embodiment has the advantage that if there is more than one realm, the transition between them does not require any action by the user, other than initially configuring the system to store the identifiers associated with the slave devices for each realm.
  • the security measures could be bypasses using a PIN code set by the authorized user. Entering the PIN code might, for example, allow the user to reconfigure that realm so that it is defined without the headset.
  • the bypass security feature could also be made time dependent so that the PIN has to be re-entered after a period of inactivity.
  • the security system is configured so that as long as the current set of devices matches (at least) one of the realms defined by the user during set up, then the handset security restrictions are disabled.
  • each realm may be defined simply by assigning one device uniquely to each realm so that that device identifies the realm in question.
  • the desktop 1 or wireless LAN 1 could be used to identify the at home realm.
  • the car kit can be used to identify an "in car" realm.
  • any of these devices can be used to determine whether the current set of devices is an authorized combination of devices, and to limit the operation of one or more of these devices according to user defined preferences.

Abstract

A system and method if provided for controlling an electronic device, the system comprising means associated with a master electronic device for storing at least one identifier associated with a slave electronic capable of being linked to the master device and means for controlling the operation of one of the electronic devices in dependence on detection of the master device and at least one slave device being linked when operation of that device is to take place. The system is advantageously used for a mobile telephone handset security system.

Description

DESCRIPTION
MOBILE HANDSET SECURITY SYSTEM
TECHNICAL FIELD
This invention relates to an improved system and method for providing security in relation to mobile telephone handsets.
BACKGROUND ART
There is currently significant interest in improving the security mechanisms implemented in mobile communication devices. Firstly, following significant recent increases in some types of street crime, the UK government has launched a street crime initiative. One of the elements of this initiative is to reduce mobile phone theft by making stolen mobile phones useless to thieves by rendering them unusable.
Moreover, the operators of mobile communications networks are also interested in reducing revenue loss due to the theft of subsidized handsets.
Currently much of the development has been making handset architecture and locks more secure, but as yet little consideration has been given to the development of new security mechanisms.
Modern mobile communications handsets are increasingly being used with peripheral devices such as headsets for use with the mobile communication device while driving. The introduction of Bluetooth™, a system offered by Bluetooth Sig, Inc., and videophones has also increased the use of handsets with headsets and other peripheral devices. DISCLOSURE OF INVENTION
In accordance with the present invention there is provided both a method and a system for controlling an electronic device, the system comprising means associated with a master electronic device for storing at least one identifier associated with a slave electronic device capable of being linked to the master device and means for controlling the operation of one of the electronic devices in dependence on detection of the master device and at least one slave device being linked when operation of that device is to take place.
In accordance with one aspect of the invention, a plurality of sets of identifiers, each associated with a different combination of linked master and slave devices, is stored by the master device; operation of one of the electronic devices being controlled in dependence on detection of the master device being linked to at least one slave device corresponding to one of the plurality of sets of stored identifiers.
At least one of the sets of identifiers may include identifiers associated with two or more slave devices.
Although it is quite easy to steal a handset on its own, taking both the handset and all or some of its accessories is more difficult. The inventor has appreciated that as the number of accessories increases it is increasingly difficult for a thief to take both the handset and all or some of its accessories.
Preferred embodiments of the present invention seek to provide an alternative or additional security system to the conventional architecture and lock systems.
The security system need not be restricted to mobile communication devices and their associated accessories. Accordingly, the present invention can advantageously be applied to any electronic devices that are linked together. BRIEF DESCRIPTION OF DRAWING
An embodiment of the invention will now be described in detail by way of example with reference to the accompanying drawing in which:
Figure 1 shows a block diagram of apparatus showing part of the mobile handset security system.
BEST MODE FOR CARRYING OUT THE INVENTION
Referring to figure 1 , there is shown a mobile handset security system comprising some but not necessarily all of the following components: a headset 1 and a desktop 3 which is part of a personal computer, both of which would be used at the home of the user, a wireless local area network 11 which is also located at the user's home, a hands free car kit 7 which is used in a car, and a laptop 9. Of course, other devices or networks could be used instead, for example, a local area network (LAN).
These devices can be connected to one another using any means, such as infra red or wireless means. In one embodiment the devices are connected using a cable means. However, the use of a cable is less satisfactory since it would require a user to physically connect the devices together and carry appropriate connecting wiring.
In a further embodiment a wireless network can be created for an individual user; a personal area network or PAN. This network ties all of a user's devices into one system. As new peripheral devices are invented, these can also be included in the PAN.
The handset has one or more realms or areas of operation in which the user has authorized or will authorize the use of specific combinations of devices. Such realms could for example be "at home", "at work", "in the car" or "elsewhere". The realm shown in figure 1 could for example be the "at home" realm. In order to configure the system, the user has to attach the appropriate accessories in the usual way for each realm. Each of the devices connected by the user carries a unique identifier, so that as the devices are connected, a unique combination of identifiers is created for each realm. In one embodiment, this unique identifier could be the Universal unique Identifier (UUI) used by the Service Discovery Protocol (SPD) of Bluetooth™ devices. The SDP determines which services are available and their characteristics. The UUI is a hard-wired address identity, whose "uniqueness" is determined by the number of bits in the address.
Preferably, the mobile communication device is a master device and determines the combination of the identifiers of the other slave devices by an appropriate interrogation routine. If the detected combination of identifiers does not match that stored in the mobile communication device for one of the configured realms (or alternatively of for the configured realm), the device is rendered inoperative, except for emergency calls.
This embodiment has the advantage that if there is more than one realm, the transition between them does not require any action by the user, other than initially configuring the system to store the identifiers associated with the slave devices for each realm.
In a further embodiment, if a user were to move to an area that did not match any one of the defined realms, for example, if they forgot their headset, the security measures could be bypasses using a PIN code set by the authorized user. Entering the PIN code might, for example, allow the user to reconfigure that realm so that it is defined without the headset. The bypass security feature could also be made time dependent so that the PIN has to be re-entered after a period of inactivity.
After the initial configuration of the system, if the user wishes to add or remove devices in particular realms, this can be achieved in exactly the same way as the initial configuration procedure as long as the device is in a recognized realm. Alternatively, reconfiguration of the realms might require the entry a security PIN. Thus the PIN might only be required if the device is not in a recognized realm or, alternatively, whenever a realm is reconfigured.
The security system is configured so that as long as the current set of devices matches (at least) one of the realms defined by the user during set up, then the handset security restrictions are disabled.
In practice each realm may be defined simply by assigning one device uniquely to each realm so that that device identifies the realm in question. In the case of the home, the desktop 1 or wireless LAN 1 could be used to identify the at home realm. In the car, the car kit can be used to identify an "in car" realm.
Although an embodiment of the invention has been described with reference to mobile communication devices, it will be appreciated by those skilled in the art that the invention can advantageously be applied to any linked electronic devices, each with an identifier. Accordingly, any of these devices can be used to determine whether the current set of devices is an authorized combination of devices, and to limit the operation of one or more of these devices according to user defined preferences.

Claims

1. A system for controlling an electronic device, the system comprising: means associated with a master electronic device for storing at least one identifier associated with a slave electronic device capable of being linked to the master device; and means for controlling the operation of one of the electronic devices in dependence on detection of the master device and at least one slave device being linked when operation of that device is to take place.
2. A system according to claim 1 wherein a plurality of sets of identifiers, each associated with a different combination of linked master and slave devices, is stored by the master device; operation of one of the electronic devices being controlled in dependence on detection of the master device being linked to at least one slave device corresponding to one of the plurality of sets of stored identifiers.
3. A system according to claim 2 in which at least one of the sets of identifiers includes identifiers associated with two or more slave devices.
4. A system according to any of claims 1 - 3 in which at least some of the identifiers are Universal unique Identifiers defined by the service discovery protocol of the Bluetooth™ system.
5. A system according to any of claims 1 - 3 in which the master electronic device is a mobile communication device.
6. A system according to claim 5 in which the mobile communication device is a mobile telephone handset and the slave device or devices may be one or more of a headset, a hands free car kit, a computer desktop or a local area network to which the telephone handset may be linked.
7. A method of controlling an electronic device, in which at least one identifier associated with a slave electronic device capable of being linked thereto is stored by a master electronic device; and operation of one of the electronic devices is controlled in dependence on detection of the master device and at least one slave device being linked when operation of that device is to take place.
8. A method according to claim 7 wherein a plurality of sets of identifiers, each associated with a different combination of linked master and slave devices, is stored by the master device; operation of one of the electronic devices being controlled in dependence on detection of the master device being linked to at least one slave device corresponding to one of the plurality of sets of stored identifiers.
9. A method according to claim 8 in which at least one of the sets of identifiers includes identifiers associated with two or more slave devices.
10. A method according to any of claims 7 - 9 in which at least some of the identifiers are Universal Unique Identifiers defined by the service discovery protocol of the Bluetooth™ system.
11. A method according to any of claims 7 - 9 in which the master electronic device is a mobile communication device.
12. A method according to claim 11 in which the mobile communication device is a mobile telephone handset and the slave device or devices may be one or more of a headset, a hands free car kit, a computer desktop or a local area network to which the telephone handset may be linked.
PCT/JP2006/303926 2005-02-23 2006-02-23 Mobile handset security system WO2006090899A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2007538210A JP2008532336A (en) 2005-02-23 2006-02-23 Mobile phone security system
EP06715039A EP1859641A4 (en) 2005-02-23 2006-02-23 Mobile handset security system
US11/816,031 US20090011796A1 (en) 2005-02-23 2006-02-23 Mobile handset security system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0503734A GB2424342A (en) 2005-02-23 2005-02-23 Mobile Handset Security System
GB0503734.6 2005-02-23

Publications (1)

Publication Number Publication Date
WO2006090899A1 true WO2006090899A1 (en) 2006-08-31

Family

ID=34401185

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/303926 WO2006090899A1 (en) 2005-02-23 2006-02-23 Mobile handset security system

Country Status (6)

Country Link
US (1) US20090011796A1 (en)
EP (1) EP1859641A4 (en)
JP (1) JP2008532336A (en)
CN (1) CN101129084A (en)
GB (1) GB2424342A (en)
WO (1) WO2006090899A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009130509A2 (en) * 2008-04-23 2009-10-29 Bigger Than The Wheel Ltd Short range rf monitoring system
EP2378748A1 (en) 2010-02-26 2011-10-19 Research In Motion Limited Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods
US8869263B2 (en) 2010-02-26 2014-10-21 Blackberry Limited Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods
WO2015123208A1 (en) * 2014-02-17 2015-08-20 Kim Seungman Electronic apparatus and method of selectively applying security in mobile device

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8140012B1 (en) * 2007-10-25 2012-03-20 At&T Mobility Ii Llc Bluetooth security profile
US8892036B1 (en) 2007-10-25 2014-11-18 At&T Mobility Ii Llc Providing an indication of a wireless accessory status
US8693977B2 (en) * 2009-08-13 2014-04-08 Novell, Inc. Techniques for personal security via mobile devices

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010056305A1 (en) * 2000-06-02 2001-12-27 Koichi Moriya Electronic device, user identification assisting device, appliance management device, electronic device management system, and appliance management system
US20020039479A1 (en) * 2000-10-04 2002-04-04 Mikio Watanabe Recording apparatus, communications apparatus, recording system, communications system, and methods therefor
JP2002186022A (en) * 2000-12-08 2002-06-28 Nippon Denki Information Technology Kk Wearable terminal system

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5859522A (en) * 1997-07-16 1999-01-12 Motorola, Inc. Accessory identification apparatus and method
US6725061B1 (en) * 1999-01-12 2004-04-20 Qualcomm, Incorporated System and method for the automatic identification of accessories coupled to a wireless communication device
US6775258B1 (en) * 2000-03-17 2004-08-10 Nokia Corporation Apparatus, and associated method, for routing packet data in an ad hoc, wireless communication system
JP2002024108A (en) * 2000-07-07 2002-01-25 Seiko Instruments Inc Electronic device, device and system for managing equipment
JP4300504B2 (en) * 2000-11-01 2009-07-22 富士フイルム株式会社 Communication device and communication system
DE60234573D1 (en) * 2001-01-30 2010-01-14 Broadcom Corp Method for adding a new device to a wireless network
DE60109049T2 (en) * 2001-12-07 2006-04-06 Sony International (Europe) Gmbh From a previous code value dependent detection of transmission codes sent from an accessory to a mobile terminal
US20040203895A1 (en) * 2002-12-16 2004-10-14 Senaka Balasuriya Locking of communication device based on proximity
SE0300252D0 (en) * 2003-02-03 2003-02-03 Hamid Delalat Blue Guards
KR100530233B1 (en) * 2003-02-17 2005-11-22 삼성전자주식회사 Wireless communication device notifying the connectable device and communication method in the device
US20050240680A1 (en) * 2004-04-27 2005-10-27 Jose Costa-Requena Method and apparatus for a life management server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010056305A1 (en) * 2000-06-02 2001-12-27 Koichi Moriya Electronic device, user identification assisting device, appliance management device, electronic device management system, and appliance management system
US20020039479A1 (en) * 2000-10-04 2002-04-04 Mikio Watanabe Recording apparatus, communications apparatus, recording system, communications system, and methods therefor
JP2002186022A (en) * 2000-12-08 2002-06-28 Nippon Denki Information Technology Kk Wearable terminal system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1859641A4 *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9167548B2 (en) 2008-04-23 2015-10-20 Bigger Than The Wheel Ltd. Short range RF monitoring system
WO2009130509A3 (en) * 2008-04-23 2010-03-25 Bigger Than The Wheel Ltd Short range rf monitoring system
GB2472547A (en) * 2008-04-23 2011-02-09 Bigger Than The Wheel Ltd Short range RF monitoring system
GB2472547B (en) * 2008-04-23 2012-01-04 Bigger Than The Wheel Ltd Short range RF monitoring system
US8929820B2 (en) 2008-04-23 2015-01-06 Bigger Than The Wheel Ltd. Short range RF monitoring system
WO2009130509A2 (en) * 2008-04-23 2009-10-29 Bigger Than The Wheel Ltd Short range rf monitoring system
EP2378748A1 (en) 2010-02-26 2011-10-19 Research In Motion Limited Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods
US8869263B2 (en) 2010-02-26 2014-10-21 Blackberry Limited Wireless communications system providing mobile device authentication bypass based upon user-wearable security device and related methods
US10085151B1 (en) 2014-02-17 2018-09-25 Seungman KIM Electronic apparatus and method of selectively applying security mode according to exceptional condition in mobile device
US11184771B1 (en) 2014-02-17 2021-11-23 Seungman KIM Electronic apparatus and method of selectively applying security mode in mobile device
WO2015123208A1 (en) * 2014-02-17 2015-08-20 Kim Seungman Electronic apparatus and method of selectively applying security in mobile device
US10111098B2 (en) 2014-02-17 2018-10-23 Seungman KIM Electronic apparatus and method of selectively applying security mode according to exceptional condition in mobile device
US10149164B1 (en) 2014-02-17 2018-12-04 Seungman KIM Electronic apparatus and method of selectively applying security mode according to exceptional condition in mobile device
US10299133B2 (en) 2014-02-17 2019-05-21 Seungman KIM Electronic apparatus and method of selectively applying security mode according to exceptional condition in mobile device
US10511975B2 (en) 2014-02-17 2019-12-17 Seungman KIM Electronic apparatus and method of selectively applying security mode in mobile device
US9509822B2 (en) 2014-02-17 2016-11-29 Seungman KIM Electronic apparatus and method of selectively applying security in mobile device
US11184473B2 (en) 2014-02-17 2021-11-23 Seungman KIM Electronic apparatus and method of selectively applying security mode in mobile device
US11212382B2 (en) 2014-02-17 2021-12-28 Seungman KIM Electronic apparatus and method of selectively applying security mode in mobile device
US11234127B1 (en) 2014-02-17 2022-01-25 Seungman KIM Electronic apparatus and method of selectively applying security mode in mobile device
US11553072B2 (en) 2014-02-17 2023-01-10 Seungman KIM Electronic apparatus and method of selectively applying security mode in mobile device
US11595507B2 (en) 2014-02-17 2023-02-28 Seungman KIM Electronic apparatus and method of selectively applying security mode in mobile device
US11811963B2 (en) 2014-02-17 2023-11-07 Seungman KIM Electronic apparatus and method of selectively applying security mode in mobile device
US11838437B2 (en) 2014-02-17 2023-12-05 Seungman KIM Electronic apparatus and method of selectively applying security mode in mobile device

Also Published As

Publication number Publication date
GB2424342A (en) 2006-09-20
US20090011796A1 (en) 2009-01-08
GB0503734D0 (en) 2005-03-30
EP1859641A4 (en) 2012-06-13
JP2008532336A (en) 2008-08-14
EP1859641A1 (en) 2007-11-28
CN101129084A (en) 2008-02-20

Similar Documents

Publication Publication Date Title
US6697638B1 (en) Intelligent portable phone with dual mode operation for automobile use
US20090011796A1 (en) Mobile handset security system
JP2011501791A (en) Locking system, especially the key for automobiles with Bluetooth
US7024478B1 (en) Method and system for providing secure user access to public or private telephone and internet systems
CA2748695C (en) System and method for unlocking a device
RU2558670C2 (en) Method and system of wireless communication for vehicle
CN101141721B (en) Safety mobile telephone based communication custom
JP4762660B2 (en) Wireless LAN system, wireless LAN terminal, and initial setting method of wireless LAN terminal
KR101278974B1 (en) Door lock system
US20130225086A1 (en) Controlling device functions of a mobile terminal in a restricted area
KR20020057262A (en) Method for locking mobile station using voice recognition
CN109391732A (en) Method and apparatus for remote vehicle function control
US9866665B2 (en) Method for operating a communication system, and communication system
CN111314897A (en) Method for recording white list of vehicle Bluetooth keys
US20140266631A1 (en) Using a Communication Protocol to Provide Security Services
US7336933B2 (en) Method of maintaining communication with a device
CN103856247A (en) Method for switching call mode of Bluetooth hands-free device
JP2004515933A (en) Call processing equipment
JPWO2002071786A1 (en) Mobile communication system and apparatus constituting the system
CN106341506A (en) Dialing method for dialing equipment, dialing device, dialing equipment and communication system
CN108540974B (en) Communication method and device based on physical address
CN101026525A (en) Combination modes for network connection management
JP2008538198A (en) Electronic devices to be incorporated into automobiles to help rediscover electronic devices after theft
CN100383695C (en) Safety turn-on method in visual range
JPH10304446A (en) Communication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 11816031

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2007538210

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 200680005624.6

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2006715039

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2006715039

Country of ref document: EP