WO1992017006A1 - Recepteur d'appel selectif a presentation de message protege - Google Patents
Recepteur d'appel selectif a presentation de message protege Download PDFInfo
- Publication number
- WO1992017006A1 WO1992017006A1 PCT/US1991/005137 US9105137W WO9217006A1 WO 1992017006 A1 WO1992017006 A1 WO 1992017006A1 US 9105137 W US9105137 W US 9105137W WO 9217006 A1 WO9217006 A1 WO 9217006A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- selective call
- call receiver
- message
- password
- key
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B3/00—Audible signalling systems; Audible personal calling systems
- G08B3/10—Audible signalling systems; Audible personal calling systems using electric transmission; using electromagnetic transmission
- G08B3/1008—Personal calling arrangements or devices, i.e. paging systems
- G08B3/1016—Personal calling arrangements or devices, i.e. paging systems using wireless transmission
- G08B3/1025—Paging receivers with audible signalling details
- G08B3/105—Paging receivers with audible signalling details with call or message storage means
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B5/00—Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied
- G08B5/22—Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmission; using electromagnetic transmission
- G08B5/222—Personal calling arrangements or devices, i.e. paging systems
- G08B5/223—Personal calling arrangements or devices, i.e. paging systems using wireless transmission
- G08B5/224—Paging receivers with visible signalling details
- G08B5/227—Paging receivers with visible signalling details with call or message storage means
Definitions
- This invention relates in general to a message security system, and more specifically to a selective call receiver with a password secured message presentation.
- selective call receivers e.g., paging
- selective call receivers are normally personal communication devices that are usually worn on the person, there are other times when selective call receivers (and the information they contain) may be accessed by unauthorized persons (e.g., when selective call receivers are being charged, when left on a desk, theft, etc.).
- unauthorized persons e.g., when selective call receivers are being charged, when left on a desk, theft, etc.
- unauthorized access may be, valuable private information may be compromised.
- Numerours display selective call receivers often contain information that are highly proprietary to their users.
- a selective call receiver comprises a memory that stores received messages.
- the selective call receiver further accepts a password code that is compared to a stored password, and when substantially similar, activates an output device that presents the received message(s).
- FIG. 1 is a block diagram of a selective call receiver in accordance with the present invention.
- FIG. 2 is a flow chart of selective call receiver operation in accordance with the present invention.
- FIG. 3 is a block diagram of a selective call receiver in accordance with a second embodiment of the present invention.
- FIGs. 4A and 4B are a flow diagram illustrating the operation of the selective call receiver according to FIG. 3.
- a selective call radio receiver 100 (e.g., a pager) comprises an antenna 102 that provides an RF carrier signal that is mixed with a local oscillator signal contained within a receiver module 104.
- the receiver module 104 generates a recovered signal suitable for processing by a decoder 106 in a manner well known to those skilled in the art.
- the decoder 106 converts the signal to an address.
- a controller 112 compares the decoded address with one or more predetermined addresses contained in a memory 108. When the addresses are substantially similar, the user is alerted that a signal (message) has been received either by an audio alert (e.g., speaker) 114 or a tactile alert (e.g., vibrator) 116.
- an audio alert e.g., speaker
- a tactile alert e.g., vibrator
- the received signal may also include optional message data directed to some selective call receivers.
- the selective call receiver includes an optional voice output 118
- recovered audio components of the received R.F. signal may be presented.
- the recovered message or voice output is stored in a memory 108 for subsequent "playback" by an optional voice output 118.
- the display 110 will automatically, or when manually selected by controls 122,124,126,128, present the message, such as by displaying the message on a display 110.
- the controller 112 will secure all address associated received messages in memory 108, thus disabling the access to the messages stored in the memory 108 until the user enters the required password.
- control/entry block 130 includes a pointer 134 that can be scrolled in either direction by activating a shift key 128 while simultaneously or sequentially activating a position/read key 122. Aligning the pointer 134 with the appropriate number on a label 136 and activating the shift key 128 while simultaneously activating a enter/lock key 124 will preferably cause the first number of a password code to be entered. Repeating this operation will permit the rest of the password to be entered.
- the preferred number of entry is chosen to be four for convenience and efficiency. It can be appreciated that the chosen number of entry can vary significantly depending on the memory and other pertinent features of the system.
- the message stored in the memory 108 will be displayed on the display 110 or replayed on the optional voice output 118.
- Conventional techniques of scrolling may be used to access different received messages. In this way, received messages may not be accessed until the appropriate password is verified by the selective call receiver 100. This also provides a further advantage, in that, if the unit is stolen, it would be useless after its misappropriation.
- important messages may be optionally held in memory 108 by pressing the entry/lock key 124 while the desired message is on the display 110 or being presented by the voice output 118.
- messages may be discarded by similar operations, but instead, activating the shift key 128 while pressing the delete /volume key 126.
- the password may be entered by any of the available conventional techniques.
- a delete/volume key 126 can be used to vary the volume of either a voice message or the volume of a voice recognition system, if used as the password entry system.
- the password secured message display can be activated by several different method (e.g., once the password is entered the system remains opens, remains for a maximum of 24 hours, opens on a hourly basis, opens on a per message basis, or may be open only after a paging event has been received etc.).
- the password secured message presentation may be customized to meet one of the several available security option.
- the password secured message presentation can be designed that when an unread message or a stored message is in memory, the selective call receiver 100 may not be turned off until the password is entered. In this way, a selective call receiver user can obtain message security, and also has the option of preventing accidental message loss by a user inadvertently turning off the power of the selective call receiver 100.
- the selective call receiver 100 receives a page, step 202, with an address substantially similar, the page is stored in memory, step 204. Subsequent to the receipt of the page, the user is alerted of the receipt of a page, step 206, by one of the several conventional means of alerting used by a typical selective call receiver. In step 208, the selective call receiver 100 checks to verify if the password secured message presentation option is currently enabled. If the password secured message presentation is disabled, the received message is enabled and readily displayed or heard at the users request, step 212.
- the access to the message is disabled until the appropriate password is entered, step 210, and verified, step 214.
- the preferred number of characters (numbers) used are four.
- the password (ID) is entered (i.e., four character sequence) and verified to be correct, step 214, the message is enabled and displayed to the user, step 212.
- the password is determined to be incorrect, step 214, the number of attempts are accumulated, step 216, and in step 218, the number of attempts are checked. If there are three attempts, the password entry mode is disabled, step 220, by any conventional techniques. However, if there are less than three attempts, another opportunity is given to reenter the correct password, step 210.
- the selective call receiver can secure a received message in memory 108 until a user enters the correct sequence of numbers.
- the password in not verified until a complete sequence is entered, thus withholding from the user the additional knowledge of which particular number or numbers that are incorrect.
- the invention comprises a selective call receiver including a memory that stores a received message.
- the selective call receiver further accepts a password that is compared to a stored password and when substantially similar activates a display or a voice output device that presents the message to the user.
- the present invention provides a selective call receiver with a password or ID protected message that may only be retrieved from memory when the user enters the correct sequence.
- private message(s) residing in a selective call receiver's memory may not be probed by intrusive persons.
- the selective call receiver's message may not be assessed from memory, thus rendering the selective call receiver useless.
- FIG. 3 a second embodiment of the invention is shown.
- the preferred operation of this embodiment of the selective call receiver is substantially similar to the first embodiment disclosed in FIG. 1, with exceptions to a display 330 and the operations associated with protecting, receiving, storing, and retrieving messages.
- the preferred display 330 is illustrated with a display screen 334 for displaying a menu having a plurality of icons preferably located at the bottom of the display screen 334.
- a function key (or button) 324 is used to select different options or functions by selecting different icons.
- a directional key pad 326 having four directional keys is shown for moving a cursor (not shown) from one icon to the next.
- An icon for example, may represent a particular message stored in memory.
- Stored messages are preferably accessed and displayed on the screen 334 by depressing the read button 322 when the cursor is pointing to the desired message icon.
- the preferred method of identifying a selected icon is by continually turning the icon on and off (i.e., blinking) when the cursor in moved above or pointing to an icon.
- a conventional reset button 336 is shown on the display 330 for resetting the selective call receiver. Operationally, upon receipt and storage of at least one message by the selective call receiver, a user may access the stored message by entering a sequence of user predefined keys.
- a selective call receiver user is required to enter a sequence of key-strokes to access messages stored in memory.
- the user is required to follow the preferred sequence of depressing a function key 324 to display a menu of functions, the menu of functions is preferably positioned to the right and left of a home directional icon 332.
- the menu functions includes a plurality of icons displayed on the screen 334.
- the direction key-pad 326 moves the cursor to a preferred icon, such as a security icon 328, by depressing the appropriate directional keys.
- the security icon 328 may be graphically similar to one of the currently available icon representations.
- the cursor is moved to the appropriate icon.
- the icon will blink to signify its selection.
- activating the function key 324 again enables an entry mode for entering a user selected sequence of keys, preferably, the keys located on the directional key-pad 326.
- a user may choose to select any combination of keys, such as, depressing the UP-button twice, followed by one push on the DOWN-button, and two pushes on the LEFT- button to enter a key sequence.
- the user may select any combination of key-strokes, and the limitation on the number of key-strokes may be only a function of the capabilities of the particular selective call receiver.
- a final pressing of the function key 324 completes the entry or programming of the message retrieving sequence which is then stored by the selective call receiver. In this way, the stored messages are protected from unauthorized users.
- a user attempting to retrieve a stored message must follow the above delineated steps. Additionally, it may be desirable for the selective call receiver to prompt the user to enter the security code (i.e., same or substantially similar sequence to the previously entered key sequence) and upon entry of the security code, the user will be allowed to access or retrieve the stored messages. In this way, a user has the capability of entering a keyed sequence which forms a security code to protect or prevent unauthorized access to proprietary messages. Furthermore, the user, upon a verified entered security code, can access the stored messages.
- the security code i.e., same or substantially similar sequence to the previously entered key sequence
- the above steps are preferred, but after entering the current security code, and subsequent to its verification by the selective call receiver, the user is permitted to change his security code. This preferably occurs by selecting the security icon again which prompts the user to enter a new keyed sequence which will become the next security code.
- the security code cannot be changed until the user enters the current security code, and subsequent to its verification by the selective call receiver.
- a user has the capability of customizing his keyed sequence which forms a security code to protect or prevent unauthorized access to proprietary messages.
- the user may change his security code as frequently as is necessary to maintain a high level of message protection which furthers the prevention of unauthorized accesses to proprietary information.
- FIGs. 4A and 4B are a flow diagram illustrating the operation of the selective call receiver according to the invention.
- the power-up sequence is executed when the selective call receiver is "turned-on" (step 402).
- the selective call receiver Upon completion of the power-up sequence, the selective call receiver goes into a stand-by-mode (step 404). In this mode, the selective call receiver awaits a user entry or response by continually checking if the function key is activated (step 406). The process remains in the stand-by-mode until a key is activated.
- the operation moves to step 408, which displays a menu of icons.
- a timer is initialized (step 410), and step 412 determines if a security icon has been selected.
- step 414 determines if a program bit is "set" (initialized).
- the program bit is initialized only when a security code (i.e., the key sequence) has been programmed (or stored) within the selective call receiver. In this way, a new selective call receiver, after the user has selected the function key, will offer the user the option to enter a sequence of keys to form a security code for protecting received messages.
- the program bit would not be initialized because the selective call receiver would not have a security code stored in memory.
- Initialized refers to a digital one or zero or any other appropriate value depending on the designer's preference.
- the selective call receiver reads the key inputs (step 416).
- Step 418 decrements the timer, and step 420 determines if the timer is zero. If zero, the flow transfers to the stand-by-mode (step 404). Alternatively, if the timer is not zero, step 422 determines if the function key is activated. An activated function key signifies that the user has completed the entry of the key sequence.
- step 416 If the function key is not activated, the process transfers to step 416 that reads the key inputs again. The process repeats itself until the timer reaches zero (step 420) or the function key is activated (step 422). Thus, if the function key is activated, the key inputs are stored in memory (or a code plug) to form the security code. After the security code is stored, the program bit is complemented (initialized), step 426. The program bit ensures that the selective call receiver will not attempt to store another security codes unless the user deliberately selects the change security code. In this way, the user is allowed to enter a key sequence that constitutes a security code for protecting confidential messages.
- the selective call receiver determines if other icons are selected (step 450), and if yes, the corresponding operation is performed (step 452). Upon completion of this operation, the selective call receiver returns to the stand-by-mode (step 404). Conversely, if no other icons are selected, the timer is decremented (step 454) and step 456 checks if the timer is zero, and if zero, the process again continues to the stand-by-mode (step 404). Alternatively, if the timer is not zero, the control transfers to step 450 where the sequence of steps are repeated as mentioned above until the timer reaches zero, or until an icon is selected (step 450). Thus, when the security icon is selected (step 412),the flow transfers to step 414 where the program bit is checked. As previously discussed, an initialized program bit determines if the selective call receiver has an already stored security code.
- the selective call receiver further checks if the security icon is again selected (step 428).
- the user may change the security code by selecting the security icon a second time, after the verified entry of the current security code.
- the process transfers to step 416.
- the function key is checked to determine if it was activated (430). An activated function key signifies that the user has completed the entry of the security code.
- the switch inputs are read (step 432) and checked to determine if the correct sequence was entered (step 434).
- step 438 Upon verification, if the entry is incorrect, the timer is decremented (step 436) and then the timer is checked for a zero value (step 438). If no, the flow returns to step 432 to read another set of switch inputs (key sequences). In this fashion, the user is allowed a limited opportunity to reenter his key sequence after an incorrectly entered sequence. However, a zero value on the timer (step 438) disables the entry mode which signifies that the opportunity to reenter another security code has expired. Conversely, if at step 434 the key sequence was verified to be correct, the screen status is displayed and access is provided to the stored messages (step 440). The user then is allowed to access and read the stored messages by conventional methods (step 442).
- this invention provides a method for entering a user customized security code for preventing unauthorized access of sensitive information. Additionally, periodic changes of security code is provided at the user's option for fostering the continued high security on stored messages. However, before changing the present security code, the user must first enter the present security code, and by selecting the security icon, the user is allowed to re-enter a new sequence of keys to be stored as a new security code.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Electromagnetism (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Un récepteur d'appel sélectif (100) comprend une mémoire (108) qui stocke des messages reçus. Le récepteur d'appel sélectif (100) accepte en outre un mot de passe qui est comparé à un mot de passe mémorisé, et, lorsque les deux sont sensiblement similaires, actionne un affichage (110) ou une sortie vocale (118) qui présente le message.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US67317191A | 1991-03-18 | 1991-03-18 | |
US673,171 | 1991-03-18 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1992017006A1 true WO1992017006A1 (fr) | 1992-10-01 |
Family
ID=24701572
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1991/005137 WO1992017006A1 (fr) | 1991-03-18 | 1991-07-22 | Recepteur d'appel selectif a presentation de message protege |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO1992017006A1 (fr) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2276745A (en) * | 1993-03-30 | 1994-10-05 | Chiang Chin Yung | Beeper circuit |
WO1996008118A1 (fr) * | 1994-09-08 | 1996-03-14 | Jonathan Hugh Douglas Bolton | Recepteur a acces limite |
EP0749102A1 (fr) * | 1995-06-13 | 1996-12-18 | Nec Corporation | Système d'affichage protégé dans un système de téléappel utilisant un code de condifidentialité et un mot de passe |
EP0756253A1 (fr) * | 1995-07-27 | 1997-01-29 | Nec Corporation | Dispositif d'appel radio à commande de l'affichage |
EP0786913A2 (fr) * | 1996-01-26 | 1997-07-30 | Nec Corporation | Récepteur d'appel radio |
EP0817144A1 (fr) * | 1996-07-05 | 1998-01-07 | Gemplus | Procédé de contrÔle de l'utilisation d'un messageur, messageur fonctionnant selon ce procédé et carte à puce pour l'accès conditionné à un messageur |
US5774061A (en) * | 1995-06-06 | 1998-06-30 | Nec Corporation | Radio selective calling receiver with message display capability |
KR20000056730A (ko) * | 1999-02-25 | 2000-09-15 | 윤종용 | 휴대폰에서 개인정보 보호방법 |
EP1042881A1 (fr) * | 1997-12-22 | 2000-10-11 | Motorola, Inc. | Unite radio portable de messagerie financiere a comptes multiples |
EP1048118A1 (fr) * | 1997-12-22 | 2000-11-02 | Motorola, Inc. | Unite radio portable de messagerie financiere protegee bidirectionnelle |
EP1059778A2 (fr) * | 1999-06-08 | 2000-12-13 | Sharp Kabushiki Kaisha | Appareil de communication et médium de stockage pour courrier électronique |
KR20030006694A (ko) * | 2001-07-14 | 2003-01-23 | 에스케이텔레텍주식회사 | 이동통신단말기에서 비밀속성을 가진 단문메시지의 전송및 수신방법 |
KR20030058710A (ko) * | 2001-12-31 | 2003-07-07 | 엘지전자 주식회사 | 이동통신 단말기의 단문 메시지 처리 방법 |
WO2003063528A2 (fr) * | 2002-01-16 | 2003-07-31 | Sure On Sight Ltd | Messagerie securisee par l'intermediaire d'un reseau de communications mobile |
GB2384396B (en) * | 2002-01-16 | 2007-01-03 | Sure On Sight Ltd | Secure messaging via a mobile communications network |
KR100702514B1 (ko) * | 2005-12-21 | 2007-04-02 | 삼성전자주식회사 | 이동통신단말기에 있어서 개인 비밀 메시지 보호방법 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4117542A (en) * | 1977-07-07 | 1978-09-26 | Judah Klausner | Electronic pocket directory |
JPS60189577A (ja) * | 1984-03-09 | 1985-09-27 | Canon Inc | 金融計算機 |
US4644347A (en) * | 1983-08-10 | 1987-02-17 | Motorola, Inc. | Multiple frequency message system |
JPS6439130A (en) * | 1987-08-04 | 1989-02-09 | Matsushita Electric Ind Co Ltd | Private radio paging system |
US4839641A (en) * | 1984-10-12 | 1989-06-13 | Nec Corporation | Pager receiver capable of controlling an internal state by a call signal |
US4839640A (en) * | 1984-09-24 | 1989-06-13 | Adt Inc. | Access control system having centralized/distributed control |
US4843385A (en) * | 1986-07-02 | 1989-06-27 | Motorola, Inc. | Electronic lock system for a two-way radio |
GB2222287A (en) * | 1988-06-30 | 1990-02-28 | Nec Corp | Paging receiver preventing unauthorised access to message |
-
1991
- 1991-07-22 WO PCT/US1991/005137 patent/WO1992017006A1/fr active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4117542A (en) * | 1977-07-07 | 1978-09-26 | Judah Klausner | Electronic pocket directory |
US4644347A (en) * | 1983-08-10 | 1987-02-17 | Motorola, Inc. | Multiple frequency message system |
JPS60189577A (ja) * | 1984-03-09 | 1985-09-27 | Canon Inc | 金融計算機 |
US4839640A (en) * | 1984-09-24 | 1989-06-13 | Adt Inc. | Access control system having centralized/distributed control |
US4839641A (en) * | 1984-10-12 | 1989-06-13 | Nec Corporation | Pager receiver capable of controlling an internal state by a call signal |
US4843385A (en) * | 1986-07-02 | 1989-06-27 | Motorola, Inc. | Electronic lock system for a two-way radio |
JPS6439130A (en) * | 1987-08-04 | 1989-02-09 | Matsushita Electric Ind Co Ltd | Private radio paging system |
GB2222287A (en) * | 1988-06-30 | 1990-02-28 | Nec Corp | Paging receiver preventing unauthorised access to message |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2276745A (en) * | 1993-03-30 | 1994-10-05 | Chiang Chin Yung | Beeper circuit |
WO1996008118A1 (fr) * | 1994-09-08 | 1996-03-14 | Jonathan Hugh Douglas Bolton | Recepteur a acces limite |
US5774061A (en) * | 1995-06-06 | 1998-06-30 | Nec Corporation | Radio selective calling receiver with message display capability |
EP0749102A1 (fr) * | 1995-06-13 | 1996-12-18 | Nec Corporation | Système d'affichage protégé dans un système de téléappel utilisant un code de condifidentialité et un mot de passe |
US5798708A (en) * | 1995-06-13 | 1998-08-25 | Nec Corporation | Message protection radio display paging using confidential code and password |
EP0756253A1 (fr) * | 1995-07-27 | 1997-01-29 | Nec Corporation | Dispositif d'appel radio à commande de l'affichage |
US5805707A (en) * | 1995-07-27 | 1998-09-08 | Nec Corporation | Radio pager with a display control capability |
EP0786913A2 (fr) * | 1996-01-26 | 1997-07-30 | Nec Corporation | Récepteur d'appel radio |
EP0786913A3 (fr) * | 1996-01-26 | 1999-09-15 | Nec Corporation | Récepteur d'appel radio |
EP0817144A1 (fr) * | 1996-07-05 | 1998-01-07 | Gemplus | Procédé de contrÔle de l'utilisation d'un messageur, messageur fonctionnant selon ce procédé et carte à puce pour l'accès conditionné à un messageur |
WO1998001836A1 (fr) * | 1996-07-05 | 1998-01-15 | Gemplus | Procede de controle de l'utilisation d'un messageur, messageur fonctionnant selon ce procede et carte a puce pour l'acces conditionne a un messageur |
EP1042881A1 (fr) * | 1997-12-22 | 2000-10-11 | Motorola, Inc. | Unite radio portable de messagerie financiere a comptes multiples |
EP1042881A4 (fr) * | 1997-12-22 | 2004-07-21 | Motorola Inc | Unite radio portable de messagerie financiere a comptes multiples |
EP1048118A1 (fr) * | 1997-12-22 | 2000-11-02 | Motorola, Inc. | Unite radio portable de messagerie financiere protegee bidirectionnelle |
EP1048118A4 (fr) * | 1997-12-22 | 2004-07-21 | Motorola Inc | Unite radio portable de messagerie financiere protegee bidirectionnelle |
KR20000056730A (ko) * | 1999-02-25 | 2000-09-15 | 윤종용 | 휴대폰에서 개인정보 보호방법 |
EP1059778A2 (fr) * | 1999-06-08 | 2000-12-13 | Sharp Kabushiki Kaisha | Appareil de communication et médium de stockage pour courrier électronique |
EP1059778A3 (fr) * | 1999-06-08 | 2003-04-16 | Sharp Kabushiki Kaisha | Appareil de communication et médium de stockage pour courrier électronique |
KR20030006694A (ko) * | 2001-07-14 | 2003-01-23 | 에스케이텔레텍주식회사 | 이동통신단말기에서 비밀속성을 가진 단문메시지의 전송및 수신방법 |
KR20030058710A (ko) * | 2001-12-31 | 2003-07-07 | 엘지전자 주식회사 | 이동통신 단말기의 단문 메시지 처리 방법 |
WO2003063528A3 (fr) * | 2002-01-16 | 2003-10-16 | Sure On Sight Ltd | Messagerie securisee par l'intermediaire d'un reseau de communications mobile |
WO2003063528A2 (fr) * | 2002-01-16 | 2003-07-31 | Sure On Sight Ltd | Messagerie securisee par l'intermediaire d'un reseau de communications mobile |
GB2384396B (en) * | 2002-01-16 | 2007-01-03 | Sure On Sight Ltd | Secure messaging via a mobile communications network |
US7245902B2 (en) | 2002-01-16 | 2007-07-17 | 2 Ergo Limited | Secure messaging via a mobile communications network |
KR100702514B1 (ko) * | 2005-12-21 | 2007-04-02 | 삼성전자주식회사 | 이동통신단말기에 있어서 개인 비밀 메시지 보호방법 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1992017006A1 (fr) | Recepteur d'appel selectif a presentation de message protege | |
US5146217A (en) | Selective call receiver having confidential message read protection | |
US5073767A (en) | Selective call receiver theft protection device | |
CA2736494C (fr) | Procede, systeme et appareil destines a editer des donnees de maniere sure | |
US5406261A (en) | Computer security apparatus and method | |
US8693989B2 (en) | Method of making phone calls from a locked out handheld electronic device and a handheld electronic device incorporating the same | |
EP0551289B1 (fr) | Recepteur de communications comprenant un systeme d'affichage des instructions de fonctionnement | |
US7058391B2 (en) | Cellular telephone set, dial lock releasing method used in the same and program therefor | |
EP1107623A2 (fr) | Station mobile permettant la définition par l'utilisateur d'une zone privée pour limiter l'accès aux données de programmes utilisateurs | |
US20080246584A1 (en) | Locking digital pen | |
US20060152340A1 (en) | Portable computer supporting paging instructions | |
US5430439A (en) | Selective call receiver having user defined message information in memory and presentation methods thereof | |
CA2459780A1 (fr) | Selection de livret electronique et systeme de livraison telechargeant le texte a partir d'un support d'enregistrement portatif | |
US6125273A (en) | Apparatus and method for operating a cellular or portable telephone | |
EP0520514B1 (fr) | Procédé pour inhiber sélectivement l'affichage des messages dans un récepteur radio d'appel | |
US6064877A (en) | Portable radio terminal | |
JPH09251371A (ja) | 電子機器 | |
US6144314A (en) | Selective call receiver with motion detector | |
JPH06152497A (ja) | 無線選択呼出受信機 | |
US6522242B1 (en) | Method for information reception in a portable computer | |
EP0989714B1 (fr) | Méthode de gestion de pièces d'informations d'usager et de données stockées dans un appareil téléphonique électronique | |
AU732772B2 (en) | Password-protected pager | |
KR940003929B1 (ko) | 선택호출 수신기에서 수신된 메시지로의 접근 제어방법 | |
KR100778363B1 (ko) | 단문 서비스의 수신 메시지 표시 방법 | |
US20050021520A1 (en) | Method for controlling access rights to data stored in a hand portable device and a hand portable device for providing access to stored data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA JP KR |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FR GB GR IT LU NL SE |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: CA |