Method, device and system for controlling safe use of machine-to-machine (M2M) terminal

A terminal security and terminal technology, applied in the communication field, can solve problems such as M2M user loss, and achieve the effect of safe use

Inactive Publication Date: 2011-09-21
HUAWEI TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When an M2M terminal is lost or stolen and is moved to an unauthorized area for use, it may be used for malicious acts because it is difficult to find or takes a long time to be found, for example, the data collected by the M2M terminal is maliciously tampered with Or use M2M terminals to carry out illegal self-interested communication, causing losses to M2M users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for controlling safe use of machine-to-machine (M2M) terminal
  • Method, device and system for controlling safe use of machine-to-machine (M2M) terminal
  • Method, device and system for controlling safe use of machine-to-machine (M2M) terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] figure 1 It is a flow chart of Embodiment 1 of the method for controlling the safe use of M2M terminals in the present invention, as shown in figure 1 As shown, the method includes:

[0030] Step 101. Obtain current location information of the M2M terminal.

[0031] The M2M terminal acquires its own current location information; the acqu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method, a device and a system for controlling the safe use of a machine-to-machine (M2M) terminal. The method comprises the following steps of: acquiring the current location information of the M2M terminal; and if the location information is inconsistent with legal location information, transmitting a notification message to a network side. In the method, the device and the system for controlling the safe use of the M2M terminal, the M2M terminal acquires own current location information, compares the location information with the legal location information, detects own illegal service condition if the location information is inconsistent with the legal location information, and transmits the notification message to the network side to notify the network side that the M2M terminal is under the illegal service condition, so the safe use of the M2M terminal is realized.

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular to a method, device and system for controlling safe use of M2M terminals. Background technique [0002] Machine to Machine (M2M) technology organically combines wireless communication and information technology, and can be widely used in automatic data collection, security monitoring, automatic vending, item tracking and other fields. M2M can exist in the following three ways: M2M, machine-to-mobile phone (such as user remote monitoring) and mobile phone-to-machine (such as user remote control). M2M technology uses the existing communication network and access technology to realize the above communication methods. The available communication network and access technology include Global System for Mobile Communications (GSM for short), General Packet Radio Service (General Packet Radio Service, GPRS for short), Universal Mobile Telecommunicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W24/00
CPCH04L63/08H04L63/107H04W12/12H04W4/00H04W12/126
Inventor 王学寰李莉樊光辉
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products