WO2013178022A1 - 一种防止移动终端异常上传信息的系统及方法 - Google Patents
一种防止移动终端异常上传信息的系统及方法 Download PDFInfo
- Publication number
- WO2013178022A1 WO2013178022A1 PCT/CN2013/075891 CN2013075891W WO2013178022A1 WO 2013178022 A1 WO2013178022 A1 WO 2013178022A1 CN 2013075891 W CN2013075891 W CN 2013075891W WO 2013178022 A1 WO2013178022 A1 WO 2013178022A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- standby state
- module
- real
- channel
- Prior art date
Links
- 230000002159 abnormal effect Effects 0.000 title claims abstract description 22
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000012544 monitoring process Methods 0.000 claims abstract description 43
- 230000005540 biological transmission Effects 0.000 claims abstract description 19
- 238000011161 development Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 235000016936 Dendrocalamus strictus Nutrition 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/28—Supervision thereof, e.g. detecting power-supply failure by out of limits supervision
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Definitions
- the present invention relates to the field of communications, and in particular, to a system and method for preventing abnormal uploading information of a mobile terminal.
- Mobile phone security applications will become one of the important applications of mobile phones in the future.
- Mobile phone information security is bound to become a key research topic in the field of information security.
- the embodiments of the present invention provide a system and method for preventing abnormal uploading information of a mobile terminal, so as to overcome the abnormal leakage of user information and improve the security of mobile terminal user information.
- the embodiment of the invention provides a system for preventing abnormal uploading information of a mobile terminal, comprising: a real-time monitoring module, a comparison module and a software prompting module, wherein:
- the real-time monitoring module is configured to: monitor the standby state and the standby state of the mobile terminal in real time.
- the comparing module is configured to: after receiving the notification of the real-time monitoring module, compare the transmit power of the mobile terminal in the standby state with the transmit power of the mobile terminal in a theoretical standby state, and Notifying the software prompt module of the comparison result;
- the software prompting module is configured to: when the comparison result is that the transmitting power of the mobile terminal in the standby state is greater than the transmitting power of the mobile terminal in the theoretical standby state, prompting the user that information is malicious in the current state The risk of disclosure.
- the real-time monitoring module is configured to monitor the standby state of the mobile terminal and the transmit power in a standby state in real time as follows:
- the system also includes a storage module coupled to the real-time monitoring module and the comparison module, respectively:
- the real-time monitoring module is further configured to: notify the storage module of the standby state; the storage module is configured to: store the self-storing module after receiving the notification of the real-time monitoring module
- the comparison module is further configured to: receive the mobile terminal sent by the storage module in the
- the software prompting module is further configured to: when the comparison result is that the mobile terminal in the standby state has a transmit power less than or equal to a transmit power of the mobile terminal provided by the storage module in the theoretical standby state, The user is not prompted to be in danger of malicious disclosure of information in the current state.
- the real-time monitoring module includes: a channel monitoring unit, a register, a standby state determining unit, a power calculating unit, and a transmitting unit, where:
- the channel monitoring unit is configured to: monitor an operating state of each channel of the mobile terminal in real time, and save an operating state of each channel of the mobile terminal in the register;
- the register is configured to: store each letter of the mobile terminal sent by the channel monitoring unit The working state of the road;
- the standby state determining unit is configured to: read an operating state of each channel of the mobile terminal in the register, and determine, according to an operating state of each channel, whether the mobile terminal is in a standby state;
- the power calculation unit is configured to: when the standby state determining unit determines that the mobile terminal is in a standby state, calculate transmit power of the mobile terminal in the standby state; and the transmitting unit is configured to: The standby state of the mobile terminal notifies the comparison module of the comparison module.
- the embodiment of the invention further provides a method for preventing an abnormal uploading information of a mobile terminal, including:
- the transmit power in the standby state is greater than the transmit power of the mobile terminal in the theoretical standby state, and the user is prompted to have a risk of malicious leakage of information in the current state.
- the method further includes: when the transmit power in the theoretical standby state is not prompted, the user is not in danger of malicious leakage of information in the current state.
- the accuracy is high, which not only protects the security of the user information, but also does not promptly pop up the prompt box to cause the user's inconvenience, and can largely overcome the abnormal leakage of the user information, thereby improving the security of the mobile terminal user information, and Enable users to enjoy the great convenience that mobile terminals bring to our lives. At the same time, there will be no worries.
- FIG. 1 is a structural diagram of a system for preventing an abnormal uploading information of a mobile terminal in an embodiment
- FIG. 2 is a structural diagram of a real-time monitoring module in Application Example 1;
- FIG. 3 is a structural diagram of a storage module in Application Example 2;
- FIG. 4 is a flowchart of a method for preventing abnormal uploading information of a mobile terminal in an embodiment. Preferred embodiment of the invention
- a system for preventing abnormal uploading information of a mobile terminal includes: a real-time monitoring module 11, a comparison module 12, and a software prompting module 13.
- the real-time monitoring module 11 is configured to: monitor the standby state of the mobile terminal and the transmit power in the standby state in real time, and notify the comparison module 12 of the transmit power in the standby state and the standby state; the comparison module 12 is configured to: After receiving the notification from the real-time monitoring module 11, comparing the transmitted powers, and notifying the software prompting module 13 of the comparison result;
- the software prompting module 13 is configured to: when the comparison result is that the mobile terminal has a risk of malicious leakage of information in the current state of the standby user.
- system further includes a storage module 14 connected to the real-time monitoring module 11 and the comparison module 12, respectively:
- the real-time monitoring module 11 is further configured to: notify the storage module 14 of the standby state; the storage module 14 is configured to: after receiving the notification of the real-time monitoring module 11,
- the comparison module 12 is further configured to: receive the transmit power of the mobile terminal sent by the storage module 14 in the theoretical standby state, and send the mobile terminal in the standby state
- the real-time monitoring module 11 is configured to monitor the standby state of the mobile terminal and the transmit power in the standby state in real time as follows:
- the real-time monitoring module 11 includes: a channel monitoring unit 111, a register 112, a standby state determining unit 113, a power calculating unit 114, and a transmitting unit 115, where:
- the channel monitoring unit 111 is configured to: monitor an operating state of each channel of the mobile terminal in real time, and save an operating state of each channel of the mobile terminal in the register 112; the register 112 is configured to: store the The working state of each channel of the mobile terminal sent by the channel monitoring unit 111;
- the standby state determining unit 113 is configured to: read an operating state of each channel of the mobile terminal in the register 112, and determine, according to an operating state of each channel, whether the mobile terminal is in a standby state;
- the power calculation unit 114 is configured to: when the standby state determining unit 113 determines that the mobile terminal is in a standby state, calculate a transmit power of the mobile terminal in the standby state;
- the transmission unit 115 is configured to: notify the comparison module 12 and the storage module 14 of the standby state of the mobile terminal, and send the transmit power of the mobile terminal in the standby state to the comparison module 12.
- the transmission unit 115 further includes a first transmission unit 1151 and a second transmission unit 1152, where: The first transmission unit 1151 is configured to: notify the storage module 14 of the standby state of the mobile terminal;
- the second transmission unit 1152 is configured to notify the comparison module 12 of the standby state of the mobile terminal and the transmission power in the standby state.
- the storage module 14 includes: a reading unit 141, a storage unit 142, and a transmission unit 143, where:
- the reading unit 141 is configured to: after receiving the standby state of the mobile terminal sent by the real-time monitoring module 11, the transmitting mobile terminal stored in the storage unit 142 sends the transmission unit 143 in a theoretical standby state.
- the method is configured to: send the transmit power of the mobile terminal in the theoretical standby state to the comparison module 12.
- the software prompting module 13 is further configured to: when the comparison result is that the mobile terminal's transmit power in the standby state is less than or equal to the mobile terminal provided by the storage module 14 in a theoretical standby state When transmitting power, the user is not prompted to be in danger of malicious disclosure of information in the current state.
- P-CCPCH Primary Common Control Physical Channel
- PICH Paging Indicator Channel
- PICH belongs to the downlink common indicator channel, which is used to provide a paging indication to the mobile phone, and notifies the user equipment (User Equipment, UE) to receive paging information on the S-CCPCH; physical random access channel (Physical) Random Access Channel, PRACH ) , which And transmitting a specific access request information to the base station; and a Dedicated Physical Channel (DPCH), including a Dedicated Physical Control Channel (DPCCH) and a Dedicated Physical Data Channel (DPDCH) ), where the UE registers or updates the location on a dedicated physical channel.
- DPCH Dedicated Physical Channel
- DPCCH Dedicated Physical Control Channel
- DPDCH Dedicated Physical Data Channel
- the real-time monitoring module 11 in the application example 1 monitors the working status of each channel in real time, and determines whether the mobile phone is in the standby state according to the working state of each channel, and the theoretical power value of the storage module 14 when storing the mobile phone standby state in the mobile phone factory phase (
- the 3rd Generation Partnership Project (3rd Generation Partnership Project, 3GPP) requires that the minimum transmit power value of WCDMA is less than -50dBm, but the test result according to the development stage is generally less than this value (for example, -55dBm), and the standby power can be set at this time.
- the upper limit of the value is -55dBm.
- the software prompt module 13 invokes the software program, and the software pops up the prompt box mouth to prompt the user that the mobile phone transmits power abnormally in the current state, prompting the user to take measures to protect the mobile phone information from being leaked.
- this embodiment provides a method for preventing abnormal uploading information of a mobile terminal, and the method includes the following steps.
- the operating status of each channel of the mobile terminal is monitored in real time, and whether the mobile terminal is in a standby state is determined according to the working state of each channel, and the mobile terminal is calculated when the mobile terminal is in a standby state. Transmit power in standby mode.
- the 360 mobile phone security guard is more popular, which is realized by encrypting the information, that is, if the information of the mobile phone is leaked, it is leaked in an encrypted manner, that is, Said, if the password is cracked after the leak, the information is also leaked, and the password set by the general user is not high, it is easy to be cracked.
- the system and method for preventing abnormal uploading information of a mobile terminal provided in the foregoing embodiments consider information security from a hardware perspective, and prevent information leakage on the terminal side.
- the information on the mobile phone is not sent after confirmation, the information will not be transmitted, so that the problem of information leakage is solved from the source, which is more convenient and safer.
- it not only protects the security of the user information, but also does not promptly pop up the prompt box to cause the user's inconvenience, and can largely overcome the abnormal leakage of the user information, thereby improving the security of the mobile terminal user information and enabling the user to While enjoying the great convenience that mobile terminals bring to our lives, there will be no worries.
- the accuracy is high, which not only protects the security of the user information, but also does not promptly pop up the prompt box to cause the user's inconvenience, and can largely overcome the abnormal leakage of the user information, thereby improving the security of the mobile terminal user information, and It enables users to enjoy the great convenience that mobile terminals bring to our lives without worrying.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020147036386A KR101689764B1 (ko) | 2012-06-01 | 2013-05-20 | 이동 단말이 비정상적으로 정보를 업로딩하는 것을 방지하는 시스템 및 방법 |
US14/404,279 US20150154396A1 (en) | 2012-06-01 | 2013-05-20 | System And Method For Preventing Mobile Terminal From Abnormal Uploading Of Information |
EP13797595.9A EP2858336B1 (en) | 2012-06-01 | 2013-05-20 | System and method for preventing mobile terminal from abnormal uploading of information |
JP2015514337A JP5956069B2 (ja) | 2012-06-01 | 2013-05-20 | 移動端末による情報の異常アップロードを防止するためのシステム及び方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210178879.XA CN103458375B (zh) | 2012-06-01 | 2012-06-01 | 一种防止移动终端异常上传信息的系统及方法 |
CN201210178879.X | 2012-06-01 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013178022A1 true WO2013178022A1 (zh) | 2013-12-05 |
Family
ID=49672402
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/075891 WO2013178022A1 (zh) | 2012-06-01 | 2013-05-20 | 一种防止移动终端异常上传信息的系统及方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20150154396A1 (zh) |
EP (1) | EP2858336B1 (zh) |
JP (1) | JP5956069B2 (zh) |
KR (1) | KR101689764B1 (zh) |
CN (1) | CN103458375B (zh) |
WO (1) | WO2013178022A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109976497A (zh) * | 2019-03-20 | 2019-07-05 | 苏州浪潮智能科技有限公司 | 一种bmc控制模组化psu供电的系统及方法 |
CN111010302B (zh) * | 2019-12-19 | 2021-02-09 | 北京国舜科技股份有限公司 | 移动终端的安全监控方法、装置、电子设备及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010219707A (ja) * | 2009-03-16 | 2010-09-30 | Nec Corp | 携帯端末装置及びその制御方法等 |
CN102158597A (zh) * | 2011-02-28 | 2011-08-17 | 奇智软件(北京)有限公司 | 一种用于移动通讯终端的电磁辐射提示系统及方法 |
CN102244858A (zh) * | 2011-08-01 | 2011-11-16 | 王冬梅 | 移动终端可自行锁定和解锁通信功能的方法及该移动终端 |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3428629B2 (ja) * | 1999-03-26 | 2003-07-22 | 日本電気株式会社 | 携帯電話装置及びその電力制御方法 |
US7111246B2 (en) * | 2004-02-17 | 2006-09-19 | Microsoft Corporation | User interface accorded to tiered object-related trust decisions |
US7877621B2 (en) * | 2004-09-03 | 2011-01-25 | Virginia Tech Intellectual Properties, Inc. | Detecting software attacks by monitoring electric power consumption patterns |
KR100801649B1 (ko) * | 2006-10-12 | 2008-02-05 | 삼성전자주식회사 | 휴대 단말의 대기모드 절전 방법 |
CN101166216A (zh) * | 2006-10-20 | 2008-04-23 | 乐金电子(中国)研究开发中心有限公司 | 一种具辐射功率监测告警功能的手机及其监测告警方法 |
JP4850288B2 (ja) * | 2007-08-27 | 2012-01-11 | 富士通株式会社 | ネットワーク管理システム、中継装置及び方法 |
KR100969567B1 (ko) * | 2008-07-04 | 2010-07-12 | 포항공과대학교 산학협력단 | 이동 통신 단말기의 비정상적인 배터리 소모 검출 방법 및장치 |
CN101656969B (zh) * | 2008-08-21 | 2013-01-23 | 中国移动通信集团公司 | 一种针对辐射的预警方法、装置及系统 |
US8984628B2 (en) * | 2008-10-21 | 2015-03-17 | Lookout, Inc. | System and method for adverse mobile application identification |
WO2010141826A2 (en) * | 2009-06-05 | 2010-12-09 | The Regents Of The University Of Michigan | System and method for detecting energy consumption anomalies and mobile malware variants |
US9264914B2 (en) * | 2009-11-30 | 2016-02-16 | Mediatek Inc. | Methods for monitoring paging messages with reduced power consumption and communications apparatuses utilizing the same |
US8818740B2 (en) * | 2010-02-17 | 2014-08-26 | Pentair Thermal Management Llc | Sensor-powered wireless cable leak detection |
US8797933B2 (en) * | 2010-12-27 | 2014-08-05 | Via Telecom Co., Ltd. | Apparatuses and methods for saving power in paging operations |
US8965718B2 (en) * | 2011-11-01 | 2015-02-24 | Microsoft Technology Licensing, Llc | Analyzing power consumption in mobile computing devices |
-
2012
- 2012-06-01 CN CN201210178879.XA patent/CN103458375B/zh not_active Expired - Fee Related
-
2013
- 2013-05-20 US US14/404,279 patent/US20150154396A1/en not_active Abandoned
- 2013-05-20 KR KR1020147036386A patent/KR101689764B1/ko active IP Right Grant
- 2013-05-20 JP JP2015514337A patent/JP5956069B2/ja not_active Expired - Fee Related
- 2013-05-20 WO PCT/CN2013/075891 patent/WO2013178022A1/zh active Application Filing
- 2013-05-20 EP EP13797595.9A patent/EP2858336B1/en not_active Not-in-force
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010219707A (ja) * | 2009-03-16 | 2010-09-30 | Nec Corp | 携帯端末装置及びその制御方法等 |
CN102158597A (zh) * | 2011-02-28 | 2011-08-17 | 奇智软件(北京)有限公司 | 一种用于移动通讯终端的电磁辐射提示系统及方法 |
CN102244858A (zh) * | 2011-08-01 | 2011-11-16 | 王冬梅 | 移动终端可自行锁定和解锁通信功能的方法及该移动终端 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2858336A4 * |
Also Published As
Publication number | Publication date |
---|---|
CN103458375B (zh) | 2018-05-04 |
US20150154396A1 (en) | 2015-06-04 |
JP2015525508A (ja) | 2015-09-03 |
KR101689764B1 (ko) | 2016-12-26 |
KR20150021078A (ko) | 2015-02-27 |
EP2858336A1 (en) | 2015-04-08 |
CN103458375A (zh) | 2013-12-18 |
JP5956069B2 (ja) | 2016-07-20 |
EP2858336B1 (en) | 2018-01-31 |
EP2858336A4 (en) | 2015-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10609646B2 (en) | Intelligent management of a plurality of communications links | |
TWI228005B (en) | Authentication of termination messages in telecommunications system | |
US9654981B2 (en) | Data integrity for proximity-based communication | |
US9615257B2 (en) | Data integrity for proximity-based communication | |
US20230292116A1 (en) | Methods supporting authentication in wireless communication networks and related network nodes and wireless terminals | |
US20120036362A1 (en) | Secret-Key Exchange for Wireless and Sensor Networks | |
CN113302962A (zh) | 无线装置的无线电接入能力 | |
US20110305338A1 (en) | Method and system for secure provisioning of a wireless device | |
KR102339529B1 (ko) | 무선 리소스의 구성 | |
US20160134610A1 (en) | Privacy during re-authentication of a wireless station with an authentication server | |
US11916925B2 (en) | Method for improving data transmission security | |
CN112335213A (zh) | 用于对早期数据传输的安全处理的方法 | |
WO2013178022A1 (zh) | 一种防止移动终端异常上传信息的系统及方法 | |
JP2015529408A (ja) | 電力消費を低減する無線端末および無線端末の電力消費を低減するための方法 | |
US20200163151A1 (en) | Handling rrc connection release | |
WO2022257876A1 (zh) | 密钥材料的处理方法、获取方法、信息传输方法及设备 | |
CA2742363C (en) | Method and system for secure provisioning of a wireless device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13797595 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14404279 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2015514337 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20147036386 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013797595 Country of ref document: EP |