System and method for performing security functions of a mobile station
First Claim
1. A communications system comprising:
- a mobile station adapted to communicate via a communications network, wherein the mobile station comprises;
a ringer capable of generating a ringing tone;
a receiver capable of receiving at least one security message, wherein the at least one security message comprises at least one security function, and wherein at least one security function comprises actuating the ringer to continuously generate the ringing tone; and
a controller coupled to the ringer and the receiver, wherein the controller is capable of interpreting the at least one security message and thereafter performing the at least one security function.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided for performing security functions of a mobile station adapted to communicate via a communications network. The mobile station comprises a receiver, a controller, and can also include a ringer and/or a user identifying device. The ringer is capable of generating a ringing tone. The user identifying device can generate data identifying a user of the mobile station. The receiver is capable of receiving at least one security message, where the at least one security message comprises at least one security function. For example, the security function can comprise actuating the ringer to continuously generate the ringing tone, and/or actuating the user identifying device to generate user-identifying data, and thereafter transmitting a status message including the user-identifying data. The controller is therefore capable of interpreting the at least one security message, and thereafter performing the at least one security function.
-
Citations
43 Claims
-
1. A communications system comprising:
a mobile station adapted to communicate via a communications network, wherein the mobile station comprises;
a ringer capable of generating a ringing tone;
a receiver capable of receiving at least one security message, wherein the at least one security message comprises at least one security function, and wherein at least one security function comprises actuating the ringer to continuously generate the ringing tone; and
a controller coupled to the ringer and the receiver, wherein the controller is capable of interpreting the at least one security message and thereafter performing the at least one security function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A communications system comprising:
a mobile station adapted to communicate via a communications network, wherein the mobile station comprises;
a user identifying device capable of generating data identifying a user of the mobile station;
a receiver capable of receiving at least one security message, wherein the at least one security message comprises at least one security function, and wherein at least one security function comprises actuating the user identifying device to generate user-identifying data, and thereafter transmitting a status message including the user-identifying data; and
a controller coupled to the user identifying device and the receiver, wherein the controller is capable of interpreting the at least one security message and thereafter performing the at least one security function. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
19. A communications system comprising:
-
mobile station adapted to communicate via a communications network, the mobile station comprising;
a user-specific module capable of storing a telephone number, wherein the user-specific module is capable of being removed and replaced with an unauthorized user-specific module;
a controller capable of receiving at least one security message including at least one security function, and thereafter performing the at least one security function; and
a security service center capable of identifying an unauthorized telephone number of an unauthorized user-specific module when the user-specific module has been replaced with the unauthorized user-specific module, and wherein the security service center is capable of transmitting at least one security message to the mobile station based upon the unauthorized telephone number. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of performing security functions of a mobile station adapted to communicate via a communications network, wherein the method comprises:
-
receiving at least one security message at the mobile station, wherein the at least one security message comprises at least one security function, and wherein at least one security function comprises continuously generating a ringing tone;
interpreting the at least one security message based upon the at least one security function; and
performing the at least one security function, wherein performing the at least one security function includes continuously generating the ringing tone. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. A method of performing security functions of a mobile station adapted to communicate via a communications network, wherein the method comprises:
-
receiving at least one security message at the mobile station, wherein the at least one security message comprises at least one security function, and wherein at least one security function comprises generating data identifying a user of the mobile station and thereafter transmitting a status message including the user-identifying data;
interpreting the at least one security message based upon the at least one security function; and
performing the at least one security function, wherein performing the at least one security function includes generating the user-identifying data and thereafter transmitting the status message including the user-identifying data. - View Dependent Claims (34, 35, 36, 37, 38)
-
-
39. A method of performing security functions of a mobile station adapted to communicate via a communications network, wherein the mobile station includes a user-specific module that is capable of storing a telephone number and capable of being removed and replaced with an unauthorized user-specific module, and wherein the method comprises:
-
identifying an unauthorized telephone number of an unauthorized user-specific module when the user-specific module has been replaced with the unauthorized user-specific module;
transmitting at least one security message to the mobile station based upon the unauthorized telephone number, wherein the at least one security message includes at least one security function;
receiving at least one security message, and thereafter interpreting the at least one security message based upon the at least one security function; and
performing the at least one security function. - View Dependent Claims (40, 41, 42, 43)
-
Specification