WO2006114629A2 - Remote device access control method - Google Patents

Remote device access control method Download PDF

Info

Publication number
WO2006114629A2
WO2006114629A2 PCT/GB2006/001537 GB2006001537W WO2006114629A2 WO 2006114629 A2 WO2006114629 A2 WO 2006114629A2 GB 2006001537 W GB2006001537 W GB 2006001537W WO 2006114629 A2 WO2006114629 A2 WO 2006114629A2
Authority
WO
WIPO (PCT)
Prior art keywords
remote device
user terminal
remote
mobile video
pin
Prior art date
Application number
PCT/GB2006/001537
Other languages
French (fr)
Other versions
WO2006114629A3 (en
Inventor
Francesco Pugliese
Chris Seal
Original Assignee
Hutchison Whampoa Three G Ip (Bahamas) Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hutchison Whampoa Three G Ip (Bahamas) Limited filed Critical Hutchison Whampoa Three G Ip (Bahamas) Limited
Priority to EP06726921A priority Critical patent/EP1880526A2/en
Priority to NZ562672A priority patent/NZ562672A/en
Priority to AU2006238948A priority patent/AU2006238948B2/en
Publication of WO2006114629A2 publication Critical patent/WO2006114629A2/en
Publication of WO2006114629A3 publication Critical patent/WO2006114629A3/en
Priority to IL186760A priority patent/IL186760A/en
Priority to NO20075634A priority patent/NO20075634L/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management

Definitions

  • the present invention relates to a method of controlling access to a remote device in mobile telephony in particular a remote video camera in a mobile telephone handset.
  • US publication 2005/0181762 defines a method of transmitting images from a surveillance camera to a monitoring device, whereby the camera is capable of triggering an alarm to a predefined wireless device.
  • a problem with accessing video and audio information from remote devices is that without any restrictions, anyone may access them. This may not always be desirable and there is therefore a need for systems which restrict access to remote devices. There is also a need for systems which allow the restrictions to be easily administered.
  • US publication 2005/0091332 defines communication over a network wherein initiation of transfer, authentication of the communication and administration functions are performed by a central server that transmits instructions to slave terminals.
  • US publication 2004/185925 discloses a technique whereby a mobile telephone may be remotely triggered to take a photograph , based on prior authentication information provided by a user. The user at the mobile terminal manages this authentication information, by keying in the required commands.
  • the prior art does not facilitate administration control for managing a
  • the present invention provides a method of generating a link between a user terminal and a remote device.
  • a link request is sent from the user terminal to the remote device.
  • An identifier is sent from the user terminal to the remote device.
  • the remote device checks the identifier against at least one stored identifier and if there is a match, the link is established.
  • a user can only access information from a remote device if the identifier sent with the link request matches the at least one stored identifier. This prevents access by unauthorised users.
  • Mobile phone technology preferably cellular phone technology is used to establish the link, in which case the user device may be a first mobile video phone and the remote device may be a second mobile video phone or device fitted with a camera having the required circuitry to communicate with the user device over the cellular network and is capable of being plugged in to a power circuit.
  • the link request is a video telephone call from the first mobile video phone to the telephone number of the second mobile video phone and the first identifier is Caller Line Identification (CLI).
  • the at least one stored identifier is a list of telephone numbers of authorised users which is preferably stored on the SIM card of the second mobile video phone.
  • Video images are sent from the second mobile video phone to the first mobile video phone if the CLI matches a telephone number stored on the SIM card.
  • the present invention provides a method of remotely controlling access to the remote device of the first aspect of the present invention.
  • the remote device has stored thereon a master identifier.
  • the method comprises a step of sending a message from a user terminal to the remote device with a command to update the at least one stored identifier.
  • the message includes a master identifier.
  • the command is only acted upon if the master identifier matches that which is stored on the remote device. Thus, only the owner or administrator of the remote device having the master identifier can update the at least one stored identifier.
  • the master identifier is a PIN number and the message is an SMS text message.
  • the user includes the PIN number and the command in the SMS text message in a predetermined format.
  • the command is only acted upon if the PIN number in the SMS matches the PIN number stored on the second mobile video phone.
  • the command may be to add or remove a telephone number from the list of telephone numbers of authorised users.
  • the present invention provides a system, method and device to enable the first and the second aspects of the present invention.
  • the owner can self-administer access to the mobile video camera and in particular can remotely administer access to the mobile video camera.
  • the system easy to use which helps keep support costs down. For example, there is no need to call a call-centre agent to invoke the changes.
  • the system is very easy for of use by dial-in users. By pre-authorising users, use of the service is simplified.
  • the solution imposes a small amount of technical skill on the part of the owner of the camera (in composing syntactically correct commands via SMS) but dial-in users need only know how to make a video call.
  • FIG. 1 is a flow chart showing an embodiment of the present invention. Detailed description of the preferred embodiments
  • the present invention provides a remote mobile video phone which can be dialled into by other mobile video phone users and which allows those users to view images and/or hear sounds at the location of the remote mobile video phone.
  • the remote mobile video phone has a SIM card and a telephone number as per a normal mobile phone.
  • a user wants to view images at the remote location, they make a video call to the remote mobile video phone in the same way they would make a call to any mobile video phone.
  • Approved dial-in users have their phone numbers stored in a white-list on the remote mobile video phone.
  • the white-list is the memory of the SIM card of the remote mobile video phone.
  • the remote mobile video phone When the user calls the remote mobile video phone, their number is established using, for example, CLI, and if their telephone number matches one in the white-list, the remote mobile video phone answers the call, and images and/or sound captured by the remote mobile video phone are sent to the users mobile phone. No further authentication is required.
  • the dial-in user may be required to enter a user PIN. This would protect against use of the remote mobile video phone if the users mobile phone is stolen.
  • the user PIN could be common to all dial-in users, defined for each users, or even generated by the device (for example, upon being added the white- list) and sent via SMS to that user.
  • Figure 1 is a flow-chart showing one procedure for restricted access to the remote mobile enabled device.
  • access to the remote mobile video phone using the white-list is referred to as 'permanent access' and access to the remote mobile enabled device using a user PIN is referred to as 'call based access'.
  • a user initiates a video call to the telephone number of a remote mobile video phone. If 'free access' is enabled, then a video link is established and the remote mobile video phone begins sending video images to the users mobile phone. If 'free access' is not enabled, the remote mobile video phone checks whether or not 'permanent access' is enabled. If not the remote mobile video phone checks to see if 'call based access' is enabled as will be described below. If 'permanent access' is enabled, the remote mobile video phone checks the CLI against the telephone numbers stored in the white-list. If the user's telephone number is not in the white-list, then remote mobile video phone checks to see if 'call based access' is enabled as will be described below. If the user's telephone number is in the white-list, the remote mobile video phone begins sending video images and/or sounds to the users mobile phone.
  • the remote mobile video phone is required to check if 'call based access' is enabled, it does so, and if not, access is denied to the remote mobile video phone. If
  • the remote mobile video phone asks the user for a user PDSf. If the PIN is correct, the remote mobile video phone begins sending video images to the users mobile phone. If not, access is denied.
  • the remote mobile video phone sends to the user's telephone a predefined image which prompts the user to enter a user PIN.
  • the remote mobile video phone sends a pre- recorded audio stream which informs the user that a PIN should to be entered.
  • the remote mobile video phone may also be enabled to be controlled by the user during the video call.
  • the functions, rotate, zoom, switch camera, start/stop recording, etc may all be enabled through key presses during the video call.
  • the remote mobile video phone may be provided with a memory and preferably a removable external memory.
  • the present invention provides a method of remotely controlling access to the above-described remote mobile video phone.
  • a master PIN is stored on the remote mobile video phone.
  • the master PIN may be stored either on the SIM or on another memory in the remote phone.
  • the owner may set the master PIN themselves or the remote mobile video phone may be pre-set with a master PIN. This may be done at set-up or may be changed at any time.
  • the owner or other approved administrator can send commands via Short
  • SMS Message Service
  • the camera in the remote mobile video phone can be configured to send alarm signals to another authorized mobile terminal.
  • alarm signals Eg: alarm triggered due to certain movement caused at its location or if the mobile video phone itself is moved from its location.
  • further circuitry needs to be incorporated in the mobile phone to allow this application.
  • the mobile video camera may also be enabled to require that remote administration messages containing the master PIN also originate from one or more declared phone numbers, in order for the command or commands to be accepted. This may be in addition to or in place of the master PIN.
  • the message from the owner incorporating the master PIN may be encrypted using existing ciphering techniques. This provides secure communication and prevents a third party from acquiring access to the master PIN, either intentionally or accidentally.
  • a few encryption techniques that could be used include checksum methods (eg: Cyclic redundancy check- CRC), key based methods
  • SMS is the preferred messaging protocol for remote administration as it works in all 2G and 3 G radio conditions, but other messaging protocols may be used.
  • Equally commands could be accepted via a digitally signed email, or if the remote mobile video phone has packet connectivity (GPRS/UMTS) it could host a small web server on it so that it can be accessed via browsers (either on phones or via the Internet).
  • commands could be sent via alternative messaging systems such as email, SIP, MMS, instant messaging, etc. All of these require that the remote mobile video phone has packet connectivity (i.e.
  • IP internet protocol
  • SMS short message service
  • UMTS UMTS cells can 'breathe' and may be heavily loaded, so it is possible that a UMTS camera is covered by patchy UMTS cover for video-calls but consistent radio coverage for SMSs. Also for audio- only mode, the solution can work in 2G cover.
  • the text message commands are based on any suitable syntax.
  • the remote mobile video phone is enabled to read the text content of the SMS message and interpret it in accordance with a pre-arranged syntax.
  • the syntax can be made user friendly by using words corresponding to the desired command.
  • the remote phone may be a mobile phone or a landline based phone and it may have audio or video capabilities or a combination of the two.
  • the remote mobile video phone may be a 3G mobile video phone.
  • the remote mobile video phone may be switched to unrestricted access, such that anyone may call the remote mobile video phone.
  • the present invention has been described above in relation to CLI and PIN authorisation techniques. It will be appreciated that, other authorisation techniques may be used. In particular, voice recognition may be used.
  • Video Interactive Gateway or corresponding technology may be used to allow more than one user to view images captured by the remote mobile video phone.
  • a user dials the number of the
  • VIG and the VIG connects the user through to the remote mobile video phone.
  • the telephone number of the VIG is stored in the white-list so that the VIG can dial the remote mobile video phone.
  • the white-list may be transferred to the VIG. All the functionality described above may then be carried out by the VIG.
  • one-way video may be added during the call by setting up a parallel data connection, using SIP for example.
  • the remote mobile video phone may also be connected to a video recorder or data logger.
  • the remote mobile video phone may then be instructed by a user to record an image being viewed.
  • the video recorder may automatically record this video so that there is a visual record of the user who has dialled into the remote mobile video phone.
  • the data logger may make a record of all the users that have dialled into the remote mobile video phone.
  • the white-list may be stored on the SIM of the remote mobile video phone. It is possible for the network operator to amend the white-list of initiate other commands using Over-the-Air (OTA) provisioning or corresponding technology. Thus, in the event that the administrator forgets their master PIN, they can contact their network operator and have the white-list or master PIN changed.
  • OTA Over-the-Air

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention discloses a method of transferring media content between a user terminal and a remote device, both mobile terminals being capable of multi-media data transfer. The transfer takes place between the terminals unless the user terminal is authorised to communicate with the remote device. This authorization and other administration functions such as managing and updating the list of authorised users etc. is remotely controlled by the owner of the remote device with the help of a master PIN.

Description

REMOTE DEVICE ACCESS CONTROL METHOD
The present invention relates to a method of controlling access to a remote device in mobile telephony in particular a remote video camera in a mobile telephone handset.
Background to the invention
There are various known systems for transmitting video or still images and audio from remote devices to a user terminal. For example, telephone systems enable users to receive audio or video signals from remote locations. In particular, mobile phones enable users to receive audio signals sent from a mobile telephone. Third generation mobile phone technology (3G) has brought video calling functionality to mobile phones and thus users are able to see each other during a call in addition to hearing the usual audio signal. It is also known to connect video cameras to the Internet via personal computers. So called Web-cams, enable users to remotely view images captured by the Web-cam.
US publication 2005/0181762 defines a method of transmitting images from a surveillance camera to a monitoring device, whereby the camera is capable of triggering an alarm to a predefined wireless device.
A problem with accessing video and audio information from remote devices is that without any restrictions, anyone may access them. This may not always be desirable and there is therefore a need for systems which restrict access to remote devices. There is also a need for systems which allow the restrictions to be easily administered.
US publication 2005/0091332 defines communication over a network wherein initiation of transfer, authentication of the communication and administration functions are performed by a central server that transmits instructions to slave terminals. US publication 2004/185925 discloses a technique whereby a mobile telephone may be remotely triggered to take a photograph , based on prior authentication information provided by a user. The user at the mobile terminal manages this authentication information, by keying in the required commands. However the prior art does not facilitate administration control for managing a
'white list' from a remote location.
Summary of the invention
In a first aspect, the present invention provides a method of generating a link between a user terminal and a remote device. A link request is sent from the user terminal to the remote device. An identifier is sent from the user terminal to the remote device. The remote device checks the identifier against at least one stored identifier and if there is a match, the link is established. Thus, a user can only access information from a remote device if the identifier sent with the link request matches the at least one stored identifier. This prevents access by unauthorised users.
Mobile phone technology, preferably cellular phone technology is used to establish the link, in which case the user device may be a first mobile video phone and the remote device may be a second mobile video phone or device fitted with a camera having the required circuitry to communicate with the user device over the cellular network and is capable of being plugged in to a power circuit. The link request is a video telephone call from the first mobile video phone to the telephone number of the second mobile video phone and the first identifier is Caller Line Identification (CLI). The at least one stored identifier is a list of telephone numbers of authorised users which is preferably stored on the SIM card of the second mobile video phone. Video images are sent from the second mobile video phone to the first mobile video phone if the CLI matches a telephone number stored on the SIM card.
In a second aspect, the present invention provides a method of remotely controlling access to the remote device of the first aspect of the present invention. The remote device has stored thereon a master identifier. The method comprises a step of sending a message from a user terminal to the remote device with a command to update the at least one stored identifier. The message includes a master identifier. The command is only acted upon if the master identifier matches that which is stored on the remote device. Thus, only the owner or administrator of the remote device having the master identifier can update the at least one stored identifier.
Preferably, the master identifier is a PIN number and the message is an SMS text message. The user includes the PIN number and the command in the SMS text message in a predetermined format. The command is only acted upon if the PIN number in the SMS matches the PIN number stored on the second mobile video phone. The command may be to add or remove a telephone number from the list of telephone numbers of authorised users.
In a third aspect, the present invention provides a system, method and device to enable the first and the second aspects of the present invention. The owner can self-administer access to the mobile video camera and in particular can remotely administer access to the mobile video camera. The system easy to use which helps keep support costs down. For example, there is no need to call a call-centre agent to invoke the changes.
The system is very easy for of use by dial-in users. By pre-authorising users, use of the service is simplified. The solution imposes a small amount of technical skill on the part of the owner of the camera (in composing syntactically correct commands via SMS) but dial-in users need only know how to make a video call.
Brief description of the drawings
So that the present invention may be more readily understood, embodiments thereof will now be described by way of example only and with reference to the accompanying drawings in which:
Figure 1 is a flow chart showing an embodiment of the present invention. Detailed description of the preferred embodiments
In a first aspect the present invention provides a remote mobile video phone which can be dialled into by other mobile video phone users and which allows those users to view images and/or hear sounds at the location of the remote mobile video phone. The remote mobile video phone has a SIM card and a telephone number as per a normal mobile phone. When a user wants to view images at the remote location, they make a video call to the remote mobile video phone in the same way they would make a call to any mobile video phone. Approved dial-in users have their phone numbers stored in a white-list on the remote mobile video phone. Preferably, the white-list is the memory of the SIM card of the remote mobile video phone. When the user calls the remote mobile video phone, their number is established using, for example, CLI, and if their telephone number matches one in the white-list, the remote mobile video phone answers the call, and images and/or sound captured by the remote mobile video phone are sent to the users mobile phone. No further authentication is required.
Alternatively, for higher security, the dial-in user may be required to enter a user PIN. This would protect against use of the remote mobile video phone if the users mobile phone is stolen. The user PIN could be common to all dial-in users, defined for each users, or even generated by the device (for example, upon being added the white- list) and sent via SMS to that user.
In lower security systems, it may be seen as desirable to allow access only by user PIN even when a dial-in user's phone number is not on the white-list. This would enable a user to call from abroad, in which case the dial-in user's phone number is not always relayed through the mobile networks, (i.e. missing CLI). The user enters a user PIN and the remote mobile video phone cross-references this with a stored user PIN. The call is only answered if there is a match. Preferably, this lower security process of access by user PIN only could have time or count based rules associated therewith. In other words, the administrator or mobile video camera could issue a user PIN that is valid for today only, or only valid for one dial-in call, for ten dial-in calls, etc. Figure 1 is a flow-chart showing one procedure for restricted access to the remote mobile enabled device. For the purposes of this example, access to the remote mobile video phone using the white-list is referred to as 'permanent access' and access to the remote mobile enabled device using a user PIN is referred to as 'call based access'.
A user initiates a video call to the telephone number of a remote mobile video phone. If 'free access' is enabled, then a video link is established and the remote mobile video phone begins sending video images to the users mobile phone. If 'free access' is not enabled, the remote mobile video phone checks whether or not 'permanent access' is enabled. If not the remote mobile video phone checks to see if 'call based access' is enabled as will be described below. If 'permanent access' is enabled, the remote mobile video phone checks the CLI against the telephone numbers stored in the white-list. If the user's telephone number is not in the white-list, then remote mobile video phone checks to see if 'call based access' is enabled as will be described below. If the user's telephone number is in the white-list, the remote mobile video phone begins sending video images and/or sounds to the users mobile phone.
If the remote mobile video phone is required to check if 'call based access' is enabled, it does so, and if not, access is denied to the remote mobile video phone. If
'call based access' is enabled, the remote mobile video phone, asks the user for a user PDSf. If the PIN is correct, the remote mobile video phone begins sending video images to the users mobile phone. If not, access is denied.
In the case of 'call based access', while the call is being established, the remote mobile video phone sends to the user's telephone a predefined image which prompts the user to enter a user PIN. Alternatively, the remote mobile video phone sends a pre- recorded audio stream which informs the user that a PIN should to be entered.
The remote mobile video phone may also be enabled to be controlled by the user during the video call. For example, the functions, rotate, zoom, switch camera, start/stop recording, etc, may all be enabled through key presses during the video call.
So that video recording may be enabled, the remote mobile video phone may be provided with a memory and preferably a removable external memory. In a second aspect, the present invention provides a method of remotely controlling access to the above-described remote mobile video phone. A master PIN is stored on the remote mobile video phone. The master PIN may be stored either on the SIM or on another memory in the remote phone. The owner may set the master PIN themselves or the remote mobile video phone may be pre-set with a master PIN. This may be done at set-up or may be changed at any time.
The owner or other approved administrator can send commands via Short
Message Service (SMS) to the remote mobile video phone that instruct it to add or delete approved dial-in users from the white-list or perform other administrative functions. The remote mobile video phone can respond with an SMS confirming how the requested command was acted upon.
In certain situations, the camera in the remote mobile video phone can be configured to send alarm signals to another authorized mobile terminal. Eg: alarm triggered due to certain movement caused at its location or if the mobile video phone itself is moved from its location. However, further circuitry needs to be incorporated in the mobile phone to allow this application.
For higher security, the mobile video camera may also be enabled to require that remote administration messages containing the master PIN also originate from one or more declared phone numbers, in order for the command or commands to be accepted. This may be in addition to or in place of the master PIN.
Additionally, the message from the owner incorporating the master PIN may be encrypted using existing ciphering techniques. This provides secure communication and prevents a third party from acquiring access to the master PIN, either intentionally or accidentally. A few encryption techniques that could be used include checksum methods (eg: Cyclic redundancy check- CRC), key based methods
(eg: Pretty Good Privacy -PGP or Data Encryption Standard -DES ) or password protection . The extent of ciphering will depend on the level of security desired by the owner of the mobile video phone. SMS is the preferred messaging protocol for remote administration as it works in all 2G and 3 G radio conditions, but other messaging protocols may be used. Equally commands could be accepted via a digitally signed email, or if the remote mobile video phone has packet connectivity (GPRS/UMTS) it could host a small web server on it so that it can be accessed via browsers (either on phones or via the Internet). However, commands could be sent via alternative messaging systems such as email, SIP, MMS, instant messaging, etc. All of these require that the remote mobile video phone has packet connectivity (i.e. internet protocol(IP)) and that the mobile video camera is in GPRS or UMTS coverage. Use of SMS means that the mobile video camera need only be covered by a basic 2G GSM network for administrative control. The remote mobile video phone itself needs to be covered by a UMTS or equivalent network during a video call. However, UMTS cells can 'breathe' and may be heavily loaded, so it is possible that a UMTS camera is covered by patchy UMTS cover for video-calls but consistent radio coverage for SMSs. Also for audio- only mode, the solution can work in 2G cover.
The text message commands are based on any suitable syntax. The remote mobile video phone is enabled to read the text content of the SMS message and interpret it in accordance with a pre-arranged syntax. The syntax can be made user friendly by using words corresponding to the desired command.
Although the present invention has been described above in the context of a mobile video phone, it will be appreciated that the authorisation and administration mechanisms described above could be applied to any remote phone. The remote phone may be a mobile phone or a landline based phone and it may have audio or video capabilities or a combination of the two. The remote mobile video phone may be a 3G mobile video phone.
Although the present invention has been described above in relation to restricted access, the remote mobile video phone may be switched to unrestricted access, such that anyone may call the remote mobile video phone. The present invention has been described above in relation to CLI and PIN authorisation techniques. It will be appreciated that, other authorisation techniques may be used. In particular, voice recognition may be used.
Although the present invention has been described in the context of a single user dialling in to the remote mobile video phone, a Video Interactive Gateway (VIG) or corresponding technology may be used to allow more than one user to view images captured by the remote mobile video phone. In this case, a user dials the number of the
VIG and the VIG connects the user through to the remote mobile video phone. The telephone number of the VIG is stored in the white-list so that the VIG can dial the remote mobile video phone. In order that the VIG knows which users to allow access to the remote mobile video phone, the white-list may be transferred to the VIG. All the functionality described above may then be carried out by the VIG.
Furthermore, if a normal voice call is already underway between the two mobile video phones, one-way video may be added during the call by setting up a parallel data connection, using SIP for example.
The remote mobile video phone may also be connected to a video recorder or data logger. The remote mobile video phone may then be instructed by a user to record an image being viewed. Alternatively, as video may be transmitted from the user's mobile to the remote mobile video phone, the video recorder may automatically record this video so that there is a visual record of the user who has dialled into the remote mobile video phone. The data logger may make a record of all the users that have dialled into the remote mobile video phone.
As mentioned above, the white-list may be stored on the SIM of the remote mobile video phone. It is possible for the network operator to amend the white-list of initiate other commands using Over-the-Air (OTA) provisioning or corresponding technology. Thus, in the event that the administrator forgets their master PIN, they can contact their network operator and have the white-list or master PIN changed.

Claims

Claims
1. A method of transferring media content between a user terminal and a remote device, both being capable of multi-media data transfer, comprising the steps of:
initiating communication between the user terminal and the remote device by sending a request from the user terminal to the remote device;
establishing a communication link between the user terminal and the remote device;
transferring media content from the remote device to the user terminal;
wherein,
said step of transferring media content takes place only if the user terminal has been previously authorised for communication with the remote device.
2. The method as claimed in claim 1 wherein the user terminal is authorised for communication with the remote device if an identifier embedded in the request sent from the user terminal is indicative of one of a plurality of authorized reference identifiers stored in a memory of the remote device.
3. The method as claimed in claiml and 2, wherein the contents of the plurality of authorized reference identifiers stored in the remote device is controlled by the owner of the remote device from a remote location.
4. The method as claimed in claim 1 to 3 wherein identity of the owner of the remote device is established by the owner sending a message incorporating a unique identification to the remote device.
5. The method as claimed in claims 3 and 4 wherein, if the unique identification sent corresponds to the unique identification that is stored in a memory of the remote device, authorization is given to the owner of the remote device to add or delete an identifier from the plurality of reference identifiers stored in the remote device.
6. The method as claimed in claims 3 to 5 wherein the unique identification is the PIN of the remote device.
7. The method as claimed in claim 1 wherein the identifier sent in the request from the user terminal is the telephone number of the user terminal.
8. The method as claimed in claim 1 wherein the plurality of authorized references identifiers stored in the remote device are telephone numbers.
9. The method as claimed in claim 1 wherein the identifier sent in the request from the user terminal is a PIN identifier.
10. The method as claimed in claim 1 wherein the plurality of authorized references identifiers stored in the remote device are PIN identifiers.
11. The method as claimed in claims 9 and 10 wherein the PIN identifiers are valid for a restricted period of time.
12. The method as claimed in claim 1 wherein the media content that is transferred between the user terminal and the remote devices is a video file.
13. The method as claimed in claim 1 wherein the user terminal and the remote device are provided with camera's capable of capturing video and reproducing the same.
14. A system for transferring media content between a user terminal and a remote device, by the method claimed in any of the preceding claims.
PCT/GB2006/001537 2005-04-26 2006-04-26 Remote device access control method WO2006114629A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP06726921A EP1880526A2 (en) 2005-04-26 2006-04-26 Remote device access control method
NZ562672A NZ562672A (en) 2005-04-26 2006-04-26 Transferring media over a mobile network only if identifiers in a request are matched to those in a remote device memory
AU2006238948A AU2006238948B2 (en) 2005-04-26 2006-04-26 Remote device access control method
IL186760A IL186760A (en) 2005-04-26 2007-10-18 Remote device access control method
NO20075634A NO20075634L (en) 2005-04-26 2007-11-06 Procedure for access control for remote devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0508454.6A GB0508454D0 (en) 2005-04-26 2005-04-26 Remote device access control method
GB0508454.6 2005-04-26

Publications (2)

Publication Number Publication Date
WO2006114629A2 true WO2006114629A2 (en) 2006-11-02
WO2006114629A3 WO2006114629A3 (en) 2006-12-21

Family

ID=34640171

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2006/001537 WO2006114629A2 (en) 2005-04-26 2006-04-26 Remote device access control method

Country Status (8)

Country Link
EP (1) EP1880526A2 (en)
AU (1) AU2006238948B2 (en)
GB (2) GB0508454D0 (en)
HK (1) HK1095687A1 (en)
IL (1) IL186760A (en)
NO (1) NO20075634L (en)
NZ (1) NZ562672A (en)
WO (1) WO2006114629A2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020065778A1 (en) 2000-11-30 2002-05-30 Stephane Bouet Mehtod of and a system for distributing electronic content
WO2003005145A2 (en) 2001-07-06 2003-01-16 Nokia Corporation Digital rights management in a mobile communications environment
US20050014489A1 (en) 2003-07-01 2005-01-20 Qu Zhigang System, apparatus, and method for providing a mobile server

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956715A (en) * 1994-12-13 1999-09-21 Microsoft Corporation Method and system for controlling user access to a resource in a networked computing environment
AU5984100A (en) * 2000-06-22 2002-01-02 Steven Low Method and system for communicating visual information
KR100713354B1 (en) * 2003-03-18 2007-05-04 삼성전자주식회사 mobile communication terminal with remote controllable camera and method for taking pictures thereof
JP2005064885A (en) * 2003-08-13 2005-03-10 Hitachi Ltd Remote monitoring system
US7680484B2 (en) * 2004-02-13 2010-03-16 Edwin A. Kauppila System and method for performing wireless remote monitoring
DE602004016115D1 (en) * 2004-04-08 2008-10-09 Accenture Global Services Gmbh Method and device for remote monitoring of a measuring device
US20060026649A1 (en) * 2004-07-12 2006-02-02 Shieh Peter F Remotely triggering multi-media data delivery in mobile communications devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020065778A1 (en) 2000-11-30 2002-05-30 Stephane Bouet Mehtod of and a system for distributing electronic content
WO2003005145A2 (en) 2001-07-06 2003-01-16 Nokia Corporation Digital rights management in a mobile communications environment
US20050014489A1 (en) 2003-07-01 2005-01-20 Qu Zhigang System, apparatus, and method for providing a mobile server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1880526A2

Also Published As

Publication number Publication date
GB0608355D0 (en) 2006-06-07
AU2006238948B2 (en) 2010-03-11
NO20075634L (en) 2007-11-26
AU2006238948A1 (en) 2006-11-02
GB2426414B (en) 2009-11-04
HK1095687A1 (en) 2007-05-11
IL186760A0 (en) 2008-02-09
GB0508454D0 (en) 2005-06-01
NZ562672A (en) 2010-11-26
WO2006114629A3 (en) 2006-12-21
IL186760A (en) 2014-04-30
GB2426414A (en) 2006-11-22
EP1880526A2 (en) 2008-01-23

Similar Documents

Publication Publication Date Title
US7689231B2 (en) Territorial enforcement of device functionality
JP6313895B1 (en) System and method for notifying event occurrence
US8805327B2 (en) Communication method and infrastructure supporting device security and tracking of mobile and portable multimedia devices
CN101227499A (en) System and method for implementing remote video control based on third generation mobile communication system
EP2107537A1 (en) Video surveillance and home security apparatus using the UMTS network and a method for the management of said apparatus
KR20160145028A (en) Additional information on a caller
WO2009003387A1 (en) A system and a method for video and audio monitoring
JP2012516089A (en) Emergency call handling
US20100223465A1 (en) Method for lending out electronic key and communication terminal
EP2088798B1 (en) A method for processing call and a service control device and a call processing system
CA2550865A1 (en) Mobile monitor-collecting terminal and communication system for realizing audio/video monitoring service and method therof
WO2012075755A1 (en) Mobile terminal and anti-theft method thereof
JP2000232680A (en) Mobile communication terminal, communication network and user authentication method
US20090129293A1 (en) Recording a circuit switched call using an ip based control interface
JP2008048129A (en) Method of remotely controlling mobile terminal, radio communication system, mobile terminal and program
US20070142086A1 (en) Method of securing a mobile telephone identifier and corresponding mobile telephone
AU2006238948B2 (en) Remote device access control method
KR20070122379A (en) Method for tracking the stolen mobile communication terminal
KR20130073801A (en) Method for remote controlling an user equipment and an user equipment thereof
KR100711097B1 (en) Apparatus and method for protecting private information on wireless telecommunication terminal and Apparatus and method for managing private information using remote control
JP4019059B2 (en) Data line terminator with authentication function and authentication method in data communication
KR20070056496A (en) Method for remote locking function setting/canceling of mobile phone
KR20080026469A (en) A method and system for tracking a mobile communication device using mms
KR20050028538A (en) Photograph method for camera type mobile communication device
EP2571301B1 (en) System and method for urgent information deleting and transferring last location information in secure communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 186760

Country of ref document: IL

WWE Wipo information: entry into national phase

Ref document number: 562672

Country of ref document: NZ

WWE Wipo information: entry into national phase

Ref document number: 12007502352

Country of ref document: PH

WWE Wipo information: entry into national phase

Ref document number: 2006238948

Country of ref document: AU

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Ref document number: DE

WWE Wipo information: entry into national phase

Ref document number: 1200702327

Country of ref document: VN

ENP Entry into the national phase

Ref document number: 2006238948

Country of ref document: AU

Date of ref document: 20060426

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 2006238948

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 2006726921

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: RU

WWW Wipo information: withdrawn in national office

Ref document number: RU

WWP Wipo information: published in national office

Ref document number: 2006726921

Country of ref document: EP