Security monitoring method in bluetooth device
First Claim
1. A security monitoring method in a Bluetooth device, the method comprising of the steps of:
- a) detecting a transmission or a reception of a predetermined monitor-target message when a user device is in one of a connection-available or an authentication-available scan mode;
b) enabling a user to recognize an occurrence of the monitor-target message; and
c) recording log information about the monitor-target message.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a security monitoring method in a Bluetooth device, the method including detecting transmission or reception of a predetermined monitor-target message when a user device is in a connection-available or authentication-available scan mode enabling a user to recognize the occurrence of the monitor-target message; and recording log information about the monitor-target message. Therefore, a user equipment monitors authentication and connection requests by using the Bluetooth connection feature, so that the user can recognize a connection set up and release between devices by using log record although the connection set up and release is generated without user'"'"'s knowledge. In addition, since the user equipment notifies the user of authentication and connection set up (e.g., by using a beep, a vibration or other alerting means), the user can influence the connection set up and release.
73 Citations
8 Claims
-
1. A security monitoring method in a Bluetooth device, the method comprising of the steps of:
-
a) detecting a transmission or a reception of a predetermined monitor-target message when a user device is in one of a connection-available or an authentication-available scan mode;
b) enabling a user to recognize an occurrence of the monitor-target message; and
c) recording log information about the monitor-target message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification