ATE400963T1 - Ein system und ein verfahren zur steuerung der verwendung einer vorrichtung - Google Patents

Ein system und ein verfahren zur steuerung der verwendung einer vorrichtung

Info

Publication number
ATE400963T1
ATE400963T1 AT06112668T AT06112668T ATE400963T1 AT E400963 T1 ATE400963 T1 AT E400963T1 AT 06112668 T AT06112668 T AT 06112668T AT 06112668 T AT06112668 T AT 06112668T AT E400963 T1 ATE400963 T1 AT E400963T1
Authority
AT
Austria
Prior art keywords
user
events
certain
distractions
enabling
Prior art date
Application number
AT06112668T
Other languages
English (en)
Inventor
Ahmed E Hassan
Daryl Joseph Martin
John F Wilson
Original Assignee
Research In Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research In Motion Ltd filed Critical Research In Motion Ltd
Application granted granted Critical
Publication of ATE400963T1 publication Critical patent/ATE400963T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
    • H04M1/724634With partially locked states, e.g. when some telephonic functional locked states or applications remain accessible in the locked states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Selective Calling Equipment (AREA)
  • Mobile Radio Communication Systems (AREA)
AT06112668T 2006-04-13 2006-04-13 Ein system und ein verfahren zur steuerung der verwendung einer vorrichtung ATE400963T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP06112668A EP1845692B1 (de) 2006-04-13 2006-04-13 Ein System und ein Verfahren zur Steuerung der Verwendung einer Vorrichtung

Publications (1)

Publication Number Publication Date
ATE400963T1 true ATE400963T1 (de) 2008-07-15

Family

ID=36616752

Family Applications (1)

Application Number Title Priority Date Filing Date
AT06112668T ATE400963T1 (de) 2006-04-13 2006-04-13 Ein system und ein verfahren zur steuerung der verwendung einer vorrichtung

Country Status (3)

Country Link
EP (1) EP1845692B1 (de)
AT (1) ATE400963T1 (de)
DE (1) DE602006001730D1 (de)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2293608B1 (de) * 2009-09-02 2017-01-11 BlackBerry Limited Mobilvorrichtungsverwaltung
US8353050B2 (en) * 2009-09-02 2013-01-08 Research In Motion Limited Mobile device management
US20120137301A1 (en) * 2010-11-30 2012-05-31 Symbol Technologies, Inc. Resource utilization management for a communication device
CN105450839A (zh) * 2014-09-22 2016-03-30 中兴通讯股份有限公司 终端应用控制方法及装置
CN106446695A (zh) * 2015-08-04 2017-02-22 中兴通讯股份有限公司 应用管理方法及装置
CN107704281A (zh) * 2017-09-12 2018-02-16 广东小天才科技有限公司 一种电子设备的使用控制方法及电子设备
CN107592425A (zh) * 2017-09-29 2018-01-16 努比亚技术有限公司 应用沉迷监督方法、移动终端及计算机可读存储介质
CN116939092A (zh) 2022-03-31 2023-10-24 北京字跳网络技术有限公司 一种设备控制方法、装置、设备及存储介质

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6587876B1 (en) * 1999-08-24 2003-07-01 Hewlett-Packard Development Company Grouping targets of management policies
JP2001320453A (ja) * 2000-05-08 2001-11-16 Canon Inc 無線通信装置
GB2408174A (en) 2003-11-14 2005-05-18 Nec Technologies External control of operation modes of portable communication devices

Also Published As

Publication number Publication date
DE602006001730D1 (de) 2008-08-21
EP1845692A1 (de) 2007-10-17
EP1845692B1 (de) 2008-07-09

Similar Documents

Publication Publication Date Title
PH12021551089A1 (en) Managing permissions to access user data in a distributed ledger trust network
SG128561A1 (en) System and method for privilege management and revocation
WO2002099556A3 (en) Method and apparatus for managing and enforcing user privacy
WO2003036444A3 (en) Method and apparatus for managing a peer-to-peer collaboration system
DE602004008586D1 (de) Verfahren und vorrichtung mit bedingtem zugang
ATE431657T1 (de) Verfahren zum personalisieren einer standardisierten it-richtlinie
KR20090106541A (ko) 시간 기반 권한부여
WO2008001339A3 (en) Communication network application activity monitoring and control
ATE400963T1 (de) Ein system und ein verfahren zur steuerung der verwendung einer vorrichtung
WO2006088517A3 (en) Business management tool
ATE520088T1 (de) Verfahren zur verwaltung der gleichzeitigen modifikation von datenbankobjekten während der entwicklung
WO2008042318A3 (en) Systems and methods for management of secured networks with distributed keys
Hwang et al. The employee's information security policy compliance intention: Theory of planned behavior, goal setting theory, and deterrence theory applied
CN101860436A (zh) 一项精准控制系统用户数据权限的技术
RU2014102164A (ru) Устройство администрирования лицензий и способ администрирования лицензий
ATE433587T1 (de) System und verfahren zur verwaltung von digitalen rechten für urheberrechtsschutz von dateninhalten
Aldhizer III The Insider Threat.
Lucenius et al. Implementing mobile access to heterogeneous home environment
Heinl A metric to assess the trustworthiness of certificate authorities
Xu et al. UC-RBAC: A usage constrained role-based access control model
Bhatia et al. Trust based privacy preserving access control in web services paradigm
Ye et al. An attribute-based-delegation-model
Azhar et al. Efficient selection of access control systems through multi criteria analytical hierarchy process
Zaini et al. A Comparative Analysis of the Legal Framework and Institutional Approaches to Workplace Stress in Malaysia
Park et al. ui H-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties