摘要:
A method of arranging data protection in a telecommunication system including a first mobile communication network, a second mobile communication network, and a mobile station supporting both of the mobile communication networks is disclosed. The method includes ciphering traffic between the mobile station and the first mobile communication network using a first cipher key; calculating a second cipher key to be used for ciphering traffic between the mobile station and the second mobile communication network in the first mobile communication network when the mobile station operates in the first mobile communication network; transmitting information necessary for calculating the second cipher key from the first mobile communication network to the mobile station when the mobile station operates in the first mobile communication network; and calculating the second cipher key at the mobile station to be used for ciphering traffic between the mobile station and the second mobile communication network.
摘要:
A smart card (24) for a mobile communications terminal (10) contains a plurality of application programs (60–68) providing various services. A number of different profiles are configured so that certain of the applications are accessible in certain of the profiles. The smart card is changed from one profile to another by changing application identification and selection data in a directory (70) of the applications.
摘要:
The invention relates to a method for storing and informing at least one property of a wireless communication device (MS1–MS4) to a mobile communication network (PLMN). Parameter data of said at least one property of said wireless communication device (MS1–MS4) is stored in said wireless communication device (MS1–MS4), and transmitted from said wireless communication device (MS1–MS4) to the mobile communication network (PLMN).
摘要:
The invention relates to a method for verifying time data in a terminal containing a real-time clock for maintaining time data. In the method certified time data is produced. Said certified time data is transmitted to the terminal and it is stored therein. In the method said certified time data is also compared with the time data of said real-time clock to check the reliability of the time data of the real-time clock.
摘要:
A device and a method for revoking a permission of an access controlled program are provided. The method includes executing an access controlled program by a processor at a device, determining if a permission of the access controlled program at the device needs to be revoked, and requesting a new permission for the access controlled program at the device if the permission is determined to need revocation. For example, revocation of the permission may result when a specified time interval has elapsed during execution of the access controlled program. As another example, revocation of the permission may result when the number of access control program instructions executed by a processor exceeds a predetermined use threshold. The access controlled program may be a Mobile Information Device Profile program also known as a MIDlet.