SECURITY IN A TELECOMMUNICATIONS NETWORK
First Claim
1. A method of controlling a telecommunications terminal requiring an authorised input to perform at least one operation, and including a locking function that locks said at least one operation of the telecommunications terminal, the method comprising selectively transmitting to the telecommunications terminal an unlocking application, receiving the unlocking application at the telecommunications terminal and running the unlocking application to enable said at least one locked operation.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of controlling a telecommunications terminal (1, 11, 13) requiring an authorised input to perform at least one operation, and including a locking function that locks said at least one operation of the telecommunications terminal. The method comprises selectively transmitting to the telecommunications terminal an unlocking application, receiving the unlocking application at the telecommunications terminal and running the unlocking application to enable said at least one locked operation. The operation may be the full use of the terminal with a selected subscriber identity module. In addition, and preferably in combination, a method and system for a telecommunications terminal to securely receive a message in which the telecommunications terminal has a first environment for running an operating system, and a second environment adapted to be substantially secure against third party tampering. The telecommunications terminal is adapted to receive a message and locate a least part of said message in said second environment.
-
Citations
27 Claims
- 1. A method of controlling a telecommunications terminal requiring an authorised input to perform at least one operation, and including a locking function that locks said at least one operation of the telecommunications terminal, the method comprising selectively transmitting to the telecommunications terminal an unlocking application, receiving the unlocking application at the telecommunications terminal and running the unlocking application to enable said at least one locked operation.
-
13. A system for controlling a telecommunications terminal, the telecommunications terminal requiring an authorised input to perform at least one operation, and including:
- a locking function for locking said at least one operation of the telecommunications terminal;
a telecommunications network operable to selectively transmit to the telecommunications terminal an unlocking application; and
the telecommunications terminal being adapted to receive the unlocking application and run the unlocking application to enable said at least one locked operation. - View Dependent Claims (14)
- a locking function for locking said at least one operation of the telecommunications terminal;
- 15. A telecommunications terminal requiring an authorised input to perform at least one operation, and including a locking function that locks said at least one operation of the telecommunications terminal, the telecommunications terminal being adapted to receive an unlocking application transmitted thereto and to run the unlocking application to enable said at least one locked operation.
-
17. A method of securely receiving and storing a received message in a telecommunications terminal, the telecommunications terminal having a first environment for running an operating system, and a second environment that is more secure than the first environment;
- including a message being received at said telecommunications terminal and said telecommunications terminal locating a least part of said message in said second environment.
- View Dependent Claims (18, 19, 20, 21, 22, 23)
-
24. A system for a telecommunications terminal to securely receive and store a received message, comprising a telecommunications terminal having a first environment for running an operating system, and a second environment that is more secure than the first environment, and a server for sending a message;
- wherein the telecommunications terminal is adapted to receive the message and to locate a least part of the message in said second environment.
- View Dependent Claims (25)
- 26. A telecommunications terminal having a first environment for running an operating system, and a second environment that is more secure than the first environment, wherein the telecommunications terminal is adapted to receive a message and to locate a least part of said message in said second environment.
Specification