摘要:
Provided is a version protection method for a mobile terminal, which includes: monitoring a local event of the mobile terminal and judging whether the mobile phone enters a loss protection state or not; and after the mobile phone is determined to enter the loss protection state, recording a loss state event, switching a current working state to the loss protection state, and limiting a corresponding function. Aversion protection apparatus for a mobile terminal is also provided. Accordingly, a beneficial effect of performing specific version protection on the mobile terminal entering the protection state is achieved, reliability of the mobile terminal is improved, and a user experience is improved by monitoring the local event of the mobile terminal, recording the loss state event after the mobile terminal is determined to enter the loss protection state, switching the current working state to the loss protection state and limiting the corresponding function.
摘要:
The present invention is provides towards a method and system for facilitating roaming tests for an operator in a telecommunication network. The method includes detecting a location update message of a subscriber to an HLR while switching from a first MSG/VLR to a second MSG/VLR, The method further includes holding by a value added module, a cancel location message being sent from the HLR to the first MSG/VLR. The method further includes conducting the roaming tests by the value added module, using the subscriber's profile data obtained from the first MSG/VLR. Further in the method the value added module releases the cancel location message to the first MSC/VLR.
摘要:
The invention discloses an automobile intelligent control instrument and an intelligent management system based on Internet of Things and belongs to an automobile instrument. The automobile intelligent control instrument based on the Internet of Things comprises a master controller of the automobile intelligent control instrument terminal based on the Internet of Things, wherein the master controller of the automobile intelligent control instrument terminal based on the Internet of Things is respectively accessed to many function modules inside an automobile and is further accessed to an information safety management module. The information safety management module is accessed to a signal base station, which is accessed to a remote control terminal. The master controller of the automobile intelligent control instrument terminal based on the Internet of Things transmits various data and control commands to the remote control terminal through the information safety management module and a mobile communication module. The master controller of the automobile intelligent control instrument terminal based on the Internet of Things is accessed to the remote control terminal by the mobile communication module through the signal base station and is remotely controlled and monitored by the remote control terminal. Thus, a convenient management function is provided to automobile owners, national security departments, traffic management departments and public security departments.
摘要:
The present invention discloses a method for remotely controlling working of a communications terminal, the method is applied in a communications terminal having a connection established with a remote server, and the method for remotely controlling working of a communications terminal includes the following steps: receiving, in a push service manner, a management and control instruction actively provided by the server; parsing, according to a predetermined data exchange format, the received management and control instruction, so as to obtain corresponding operation information and acquire a device identifier, where the operation information includes command information and additional information; generating a corresponding working instruction according to the command information and the additional information that are obtained through parsing; and executing, according to the working instruction, work for protecting data security. The present invention further provides a server for remotely controlling working of a communications terminal, and a communications terminal. By means of this manner, the present invention is capable of flexibly and conveniently controlling working of a lost communications terminal through the server for remotely controlling working of a communications terminal, thereby ensuring security of personal data in the communications terminal.
摘要:
The present invention provides a method for collaboratively monitoring by means of MTC devices in a wireless communication network and related MTC devices and system. Each of the MTC devices is connected to a MTC server via said wireless communication network and includes a transceiver having a unique ID and security code, and said transceiver periodically broadcasts its normal or abnormal status information to other MTC devices within a certain range in the vicinity of that MTC device and detects and identifies other MTC devices within said range. Said method comprises that, in case that the MTC device is operated illegally: if its transceiver is not destroyed, then the MTC device will send an alarm message to the MTC server and report information about its current location; if its transceiver is destroyed, then the MTC device will send once to the MTC server an alarm message, and said other MTC device(s) will send to the MTC server an alarm message and report information about their current location since it does not detect a legal broadcast signal sent by the MTC device.
摘要:
The invention relates to the loading process for loading a subscription profile into a permanently soldered-in subscriber identity module such as an eUICC. Using a loading packet, which has an encrypted loading sequence specific to the subscriber identity module, to load a subscription profile is known according to GSMA standards. If a subscription profile is no longer valid and is deactivated by the network operator, it can occur for the user to be successful in loading a new loading packet because the user specifies that the user never received the profile. In order to prevent such multiple loading of a subscription profile, a profile loading counter, according to the invention, is maintained in the loading server (SM-DP) and, when the first download occurs, a corresponding profile loading counter is also generated in the eUICC and is initialized with a counter state that defines how often the loading packet may be loaded. When each further download of the same loading packet occurs, the profile loading counter in the loading server is incremented and included with the loading packet. If a profile loading counter has already been generated in the eUICC, it is checked whether the counter state in the loading packet exceeds the counter state of said profile loading counter, in which case the loading process is terminated.
摘要:
Methods, systems, computer-readable media, and apparatuses may provide a mobile device with the ability to locally detect fraudulent activity by an unauthorized user. A mobile device may include a fraud detection module that may build a historical usage pattern of a user of the mobile device. The fraud detection module may monitor usage of the mobile device for multiple parameters and record events pertaining to the parameters. Periodically or in response to each event, the fraud detection module may compute a current usage pattern using each of the current parameter values. The fraud detection module may compare the current usage pattern with the historical usage pattern and may use the comparison result to compute a confidence score. The fraud detection module may then compare the confidence score with a preset confidence score to determine whether fraudulent activity is occurring at the mobile device.
摘要:
Communication systems, including cellular networks, and the devices that are connected to them, can have both legitimate and illegitimate uses. Such communication systems, including systems that utilize, permit, or leverage machine-type-communications, may benefit from monitoring for suspicious events. A method can include receiving a monitoring request regarding a user equipment or a category of devices. The method can also include performing a monitoring activity regarding the user equipment or the category of devices with respect to at least one suspicious event. The method can further include responding to the monitoring request indicating whether monitoring will be performed for the user equipment or the category of devices.
摘要:
The present invention relates to a mobile communication device for communicating with a cellular network by means of a serving base node, the mobile communication device further being connected to a subscriber identity module, the mobile communication device being configured to operate in a power optimization mode and to set up a communication context with the base node using authentication means of the subscriber identity module, wherein the mobile communication device is further configured, in case of detection of a removal of the subscriber identity module and when the power optimization mode is activated: - to send an removal alert message to the serving base node by means of said communication context, - afterwards to terminate the communication context.
摘要:
A system is provided for facilitating multi-party authentication. During operation, the system receives, via a communication module, an operation request from a primary user. The system then sends an authentication request to the authentication assistance user and receives a response from the authentication assistance user. Subsequently, the system allows or denies the operation request based on the response received from the authentication assistance user.