[go: up one dir, main page]

GB2416956A - Method of testing integrity of a mobile radio communications device and related apparatus - Google Patents

Method of testing integrity of a mobile radio communications device and related apparatus Download PDF

Info

Publication number
GB2416956A
GB2416956A GB0416993A GB0416993A GB2416956A GB 2416956 A GB2416956 A GB 2416956A GB 0416993 A GB0416993 A GB 0416993A GB 0416993 A GB0416993 A GB 0416993A GB 2416956 A GB2416956 A GB 2416956A
Authority
GB
United Kingdom
Prior art keywords
test sequence
mobile radio
radio communications
integrity
test
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0416993A
Other versions
GB0416993D0 (en
GB2416956B (en
Inventor
Martin Ellis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Technologies UK Ltd
Original Assignee
NEC Technologies UK Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Technologies UK Ltd filed Critical NEC Technologies UK Ltd
Priority to GB0416993A priority Critical patent/GB2416956B/en
Publication of GB0416993D0 publication Critical patent/GB0416993D0/en
Publication of GB2416956A publication Critical patent/GB2416956A/en
Application granted granted Critical
Publication of GB2416956B publication Critical patent/GB2416956B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/26Functional testing
    • G06F11/273Tester hardware, i.e. output processing circuits
    • G06F11/277Tester hardware, i.e. output processing circuits with comparison between actual response and known fault-free response
    • H04L29/06
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3223
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • H04Q7/32
    • H04Q7/3294
    • H04Q7/34
    • H04Q7/343
    • H04Q7/38
    • H04Q7/3802
    • H04Q7/3806
    • H04Q7/3881
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides for a method of testing the integrity of operation of at least part of the mobile radio communications device and comprising the steps of transmitting a test sequence generally comprising a hash function to the device, determining and then transmitting the correct result of the test embodied by the test sequence to the device, applying the test sequence to a selected part of the device, and conducting a comparison of the result of the application of the test sequence with the said transmitted correct result so as to identify a potential compromise in the integrity of the said at least one part of the device if the said comparison indicates that the two said results are different.

Description

24 1 6956
METHOD OF TESTING INTEGRITY OF A MOBILE RADIO
COMMUNICATIONS DEVICE AND RELATED
APPARATUS
The present invention relates to a method of testing the integrity of a mobile radio communications device and to a related apparatus.
Mobile radio communication devices such as cellular phones have become such popular and useful accessories that potentially illegal and fraudulent activities relating to an attack on the integrity of one or more operational aspects of the cell phone handset have become identified problems.
In particular, cell phones are becoming increasingly subject to attacks on integrity of their firmware, for example in order to remove the Subscriber Identification Module (SlM)-lock, and to remove Digital Rights Management (DRM) checking components etc. It has therefore become desirable for those with intent to circumvent security mechanisms and revenue protection mechanisms etc found within current cell phones to seek to compromise the integrity of the operation of the handset and, in particular, the configuration, applications, and services of the cell phone.
The present invention seeks to provide for a method of testing the integrity of operation of at least part of the mobile radio communications device and to a related device, network server device and network arrangement, seeking to at least limit the problems and disadvantages currently arising and as discussed above.
In accordance with a first aspect of the present invention, there is provided a method of testing integrity of operation of at least part of a mobile radio communications device comprising the steps of: transmitting a test sequence to the device; transmitting the correct result of the test embodied by the test sequence to the device; applying a test sequence to a selected part of the device; comparing the result of the application of the test sequence with the said transmitted correct result so as to identify potentially comprised integrity of the said at least part of the device if the said comparison indicates that the two results are different.
The invention is advantageous in providing for a relatively simple, and adaptable, method for testing the integrity of the operation of at least part of a mobile radio communications device since the appropriate test, and the correct result, can readily be identified and sent to the device for effective self testing.
Preferably, the said at least part of a mobile radio communications device whose integrity is to be tested comprises at least a portion of the software or firmware of the device.
In particular, a memory segment is tested in accordance with the method of the present invention.
The test sequence transmitted to the device can advantageously comprise a hash function.
Advantageously, the method includes the step of determining the correct result of the test sequence having regard to the particular mobile radio communications device concerned and prior to the transmission of the test sequence.
Also, the method can include the step of identifying the said at least one part relative to the said device for application of the appropriate test sequence.
The method can further include the step of signalling the result of the comparison to a remote location.
Further, the method can then include the step of effectively barring further operation of the mobile radio communications device or, alternatively, initiating steps seeking to offer a fix to the said part of the device.
Advantageously, the transfer of the test sequence can employ a WAP push procedure.
As a further advantage, a form of secure transmission can be employed when transmitting the test sequence to the device.
Alternatively, or in addition, the result of the comparison of the two tests can be transmitted in a manner employing a layer of security and, for example, the transmission can be digitally signed.
The method can also include the step of monitoring for a result of the comparison of the two tests and initiating further control procedure should no response be forthcoming after a determined number of transmissions of the test sequence.
The said control function can comprise disabling use of the device As a further advantage, the method can employ a secure boot mechanism in an attempt to ensure that the test sequence itself is not compromised.
According to another aspect of the present invention, there is provided a mobile radio communications device arranged for the self testing of integrity of operation of at least part thereof, and including means arranged for receiving a test sequence, and a correct result for the test sequence having regard to the said part of the device which is to be tested, means for applying the test sequence to the said part of the device, means for comparing result of the applied test sequence with the said received correct result so as to identify potential compromise in integrity of the said at least part of the device if the said results are different.
Preferably, the said at least part of the device to be tested comprises at least a portion of the firmware within the device and, in particular, the device is then arranged for the self testing of a memory segment thereof.
In particular, the device can be arranged to receive a test sequence including the hash function.
Further, the device can be arranged to provide an output signal to a remote location confirming the result of the comparison between the two test results.
The device advantageously can be arranged to receive a signal seeking to address the identified compromise in integrity.
Yet further, the device can be arranged so as to add a level of security to the output signal serving to indicate the result of the comparison of the test results and, in particular, the device can be arranged so as to digitally sign the said signal.
Also, the device can be arranged so as to employ a secure boot mechanism serving to confirm that the test sequence itself has not been compromised.
According to yet another aspect of the present invention, there is provided a network server device arranged for delivering a test sequence seeking to test the integrity of operation of at least part of a mobile radio communications device and comprising means for transmitting the test sequence to the device for application to the said at least part of the device, means for determining within the network server device the correct result of the test sequence on the basis of at least part of the device to be tested and means for transmitting the said correct result of the test to the device for subsequent comparison with the result of the said application of the test within the mobile radio communications device.
In particular, the network server device can be arranged for testing integrity of at least part of the firmware of the device and, in particular, for testing a memory segment of the device.
The network server device can be arranged to transmit a test sequence including a hash function.
Also, the correct result of the test sequence having regard to the particular mobile radio communications device, and the operation of a part thereof, is determined within the network server device and prior to transmission to the mobile radio communication device.
The network sever device is further advantageously arranged to receive a signal from the mobile radio communications device confirming whether or not the results of the two test are the same.
The network server device can then advantageously be arranged to either disable use of the mobile radio communications device within the network, or offer an appropriate fix to the mobile radio communications device, if it is identified that a potential compromise in the integrity of the mobile radio communications device has occurred.
The network server device is also advantageously arranged to provide a layer of security to the test sequence, and which sequence can be digitally signed.
Also, the network server device can be arranged to repeat the transmission of the test sequence for a predetermined number of times and to initiate a control procedure if a result of a comparison of test results is not received from the mobile radio communications device after the predetermined number of test sequence transmission. The control function can of course include disabling operation of the mobile radio communications device within the network.
According to another aspect of the present invention, there is provided a network arrangement including a mobile device and a network server device such as defined and discussed above.
Thus, as will be appreciated, the concept of the present invention provides for a network based server arrangement arranged to issue a particular task or challenge to a mobile radio communications device, whereby, in one example, the device has to examine a portion of its memory and apply a hash function to the said portion. The result of the application of the hash function is then compared to an expected hash result also sent from the server and, if the two values are identified as different, this is then taken as a ready indication that the firmware within the device has been compromised and/or modified at least in the specific area to which the hash function has been applied. l
Further checks could also be carried out in order to examine the extent of the potential compromise and/or to identify the appropriate fixes that should be sent out.
The invention is described further hereinafter, by way of example only, with reference to the accompanying drawings in which: Fig. 1 is a schematic representation of a network arrangement embodying the present invention; and Fig. 2 is a flow diagram illustrating a method arising in accordance with the present invention.
Turning first to Fig. 1, there is illustrated a schematic representation of a network arrangement 10 embodying the present invention, which comprises a management console 12 arranged to provide overall control of a method in accordance with the invention and for delivering an appropriate test sequence as indicated by arrows A and B. by way of a WAP push-proxy server 14 to a cellular phone handset 16 operating within the network arrangement 10.
As will be described in further detail below, the handset 16 is arranged to run the test sequence and compare it with a test result also delivered from the management console 12 by way of the WAP push-proxy server 14, and to deliver the result of comparison of the two test results as indicated by arrow C to WAP gateway 18 for onward delivery by way of arrow D back to the management console 12.
The management console 12 is arranged to detect a potential compromise in the integrity of, for example, a portion of the firmware of the handset 16 and to identify the correct version of firmware operating within the handset 16 so as to generate an appropriate test sequence relevant to that handset and its firmware.
The operation initially illustrated in Fig. 1 is described further with reference with to Fig. 2 and, of course comprises use of WAR for the transport of the messages required for employment of the method.
Again, turning first to step 20, a compromise is detected within the management console 12 of Fig. 1, or indeed an attack on the integrity of a firmware sector can be predicted, within the management console 12. Since the management console 12 is aware of all the appropriate handsets that might used on the network, primarily since all such devices will be Open Mobile Alliance (OMA) Device Management enabled and configured, the particular handset possessing the potentially compromised firmware is inspected by way of data within the console so as to determine the particular segment whose integrity may have been compromised at step 22. Of course alternatives for identifying the devices for the management console comprise web registration and/or operator specific proprietary means.
At step 24, an appropriate challenge in the form of a test sequence including for example a hash function is applied to the master copy of the relevant firmware memory segment within the measurement console 12 so as to identify a correct result for application of the hash function to that segment.
The test sequence comprising a specific challenge to the memory segment within the handset 16 can then be issued and which can contain a start address, an end address, the hash function to use and the expected hash result. Also, if required, an indication as to where and how to report the result of the test comparison can be provided.
It should be appreciated that there is likely to be a variety of slightly different test sequences required for different software and/or firmware versions arising within the handsets currently in use. However, the appropriate test sequence, as noted above, is identified within the management console 12 prior to transmission to the handset 16 via the WAP push-proxy server 14.
As an alternative, when transferring the particular challenge to the handset 16, OMA Device Management could be used in place of the WAP pushproxy procedure indicated. In any case, the test sequence to be delivered to the handset 16 can advantageously be secured in an appropriate manner if required.
At step 26, the challenge is applied at the device and the result of the application of the test sequence is determined. In this manner, upon receipt of the challenge, the handset 16 is arranged to calculate the hash function of the identified memory segment and compare the result of the application of the function with the expected hash result as indicated within the signal from the management console 12.
From a comparison of the results occurring at step 28, it is identified whether or not the results are the same. If the results are different, this serves to indicate that the integrity of the memory segment has been compromised and an appropriate indication can be issued to the network at step 30.
It should be noted that the challenge offered by the test sequence, and the response arising from the application thereof, could be digitally signed in order to provide extra security if required.
Subsequent to receipt of the response at the management console 12, and as illustrated by step 31, a signal is then indicated to effectively blacklist the device as indicated at step 32 or to send an appropriate patch to fix the apparent problem as indicated at step 34 and dependent upon operator/network requirements.
Should, however, the comparison of the results at step 28 indicate that the results are the same, this can be employed within the management console 12 at step 30 to confirm that the integrity of, for example, the memory segment has not been compromised.
Should a situation of potential compromise however be identified, the management console 12 can operate to effectively blacklist the handset 16 identified. Also, if no response is received from the handset 16 after a predetermined number of challenges have been issued from the management console 12, it can likewise be determined that the handset 16 should be blacklisted.
It should be appreciated that the method of the present invention can be repeated at predetermined, or random, intervals, or indeed initiated in response to known potential threats to the integrity of operation of the handset.
The particular embodiment illustrated by reference to Fig. 2 illustrates clearly how an Individual cell phone handset can be challenged to determine the integrity of at least part thereof once a potential compromise in integrity has been detected and so as to confirm whether or not the handset has in fact been effected.
It should however be appreciated that the method of the present invention can itself be used initially to detect a possible compromise in integrity of a firmware and/or software segment thereof.
In such an alternative embodiment, a firmware and/or software segment is selected at random such that in this alternative embodiment steps 20, 22 of Fig. 2 do not generally arise. Once a particular firmware and/or software segment has been randomly selected, the procedure continues as indicated in accordance with steps 24, 26 and 28.
Once a comparison of the results such as at step 26 has indicated that a potentially new compromise has been identified, this alternative process can continue by way of further investigation in an attempt to identify a particular mobile device having the firmware and/or software segment that has become compromised. These final stages could comprise repetition of steps 20-34 as illustrated in relation to Fig. 2.
The present invention provides for a relatively simple and readily adaptable potential solution to the increasing problem of mobile phone security and could, if required, be employed in combination with other, and potentially more complicated, solutions such as those offered by way of a secure boot procedure.
For example, a secure boot mechanism could advantageously be employed to check whether or not the test sequence itself has been compromised by way, for example, of a code signing technique.
The present invention therefore advantageously provides means for detecting if an attack on the integrity of the operation of a mobile radio communications device such as a cell phone has occurred and readily provides a means to attempt a recovery from the attack and/or to blacklist the mobile against further operation within the network.
It should however be appreciated that the invention is not restricted to the details of the foregoing embodiment since the integrity of operation of any required feature of the mobile radio communications device can be tested in the manner of the present invention. Also, further control and security aspects can be included, for example, based on OMA device management, linkage with firmware update solutions, and generally more complex security protection can be included within the concept of the present invention if appropriate.
Also, the invention can be employed for testing the integrity of device software including downloaded applications assuming means exists for locating the code in memory.

Claims (32)

  1. Claims 1. A method of testing integrity of operation of at least part of a
    mobile radio communications device comprising the steps of: transmitting a test sequence to the device; transmitting the correct result of the test embodied by the test sequence to the device; applying a test sequence to a selected part of the device; comparing the result of the application of the test sequence with the said transmitted correct result so as to identify potentially comprised integrity of the said at least part of the device if the said comparison indicates that the two results are different.
  2. 2. A method as claimed in Claim 1, wherein the said at least part of the mobile radio communications device whose integrity is to be tested comprises at least a portion of the firmware of the device.
  3. 3. A method as claimed in Claim 1 or 2, wherein the said at least part of the mobile radio communications device whose integrity is to be tested comprises at least a portion of software within the device.
  4. 4. A method as claimed in Claim 1, 2 or 3, and employed for testing a memory segment of the device.
  5. 5. A method as claimed in Claim 1, 2, 3 or 4, wherein the test sequence transmitted to the device comprises a hash function.
  6. 6. A method as claimed in any one or more of Claims 1 to 5, and including the step of determining the correct result of the test sequence having regard to the said mobile radio communications device and prior to the transmission of the test sequence.
  7. 7. A method as claimed in any one or more of Claims 1 to 6, and including the step of identifying the said at least one part relative to the said device for application of the appropriate test sequence.
  8. 8. A method as claimed in any one or more of the preceding claims and including the step of signalling the result of the comparison to a remote location.
  9. 9. A method as claimed in any one or more of the preceding claims and wherein the transfer of the test sequence employs a WAR push procedure.
  10. 10. A method as claimed in any one or more of the preceding claims and including the step of monitoring for a result of the comparison of the two tests and initiating further control procedure should no response be forthcoming from the device after a determined number of transmissions of the test sequence.
  11. 11. A method as claimed in Claim 10, wherein the said control function can comprise disabling use of the device within the network.
  12. 12. A method as claimed in any one or more of the preceding claims and employing a secure boot mechanism seeking to ensure that the test sequence itself is not compromised.
  13. 13. A mobile radio communications device arranged for the self testing of integrity of operation of at least part thereof, and including means arranged for receiving a test sequence, and a correct result for the test sequence having regard to the said part of the device which is to be tested, means for applying the test sequence to the said part of the device, means for comparing result of the applied test sequence with the said received correct i result so as to identify potential compromise in integrity of the said at least part of the device if the said results are different.
  14. 14. A device as claimed in Claim 13, wherein the said at least part of the device to be tested comprises at least a portion of the firmware within the device.
  15. 15. A device as claimed in Claim 13 or 14, wherein the said at least part of the device to be tested comprises at least a portion of the software within the device.
  16. 16. A device as claimed in Claim 13, 14 or 15, and arranged for the self testing of a memory segment thereof.
  17. 17. A device as claimed in Claim 13, 14, 15 or 16, and arranged to receive a test sequence including a hash function.
  18. 18. A device as claimed in any one or more of Claims 13 to 17, and arranged to provide an output signal to a remote location confirming the result of the comparison between the two test results.
  19. 19. A device as claimed in any one or more of Claims 13 to 18, and arranged to employ a secure boot mechanism serving to confirm that the test sequence itself has not been compromised.
  20. 20. A network server device arranged for delivering a test sequence seeking to test the integrity of operation of at least part of a mobile radio communications device and comprising means for transmitting the test sequence to the device for application to the said at least part of the device, means for determining within the network server device the correct result of the test sequence on the basis of at least part of the device to be tested and means for transmitting the said correct result of the test to the device for subsequent comparison with the result of the said application of the test within the mobile radio communications device.
  21. 21. A network server device as claimed in Claim 20, and arranged for testing the integrity of at least part of the firmware of the mobile radio communications device.
  22. 22. A network server device as claimed in Claim 20 or 21, and arranged for testing the integrity of at least part of the software within the mobile radio communications device.
  23. 23. A device as claimed in Claim 20, 21 or 22, and arranged for testing a memory segment of the mobile radio communication device.
  24. 24. A device as claimed in Claim 20, 21, 22 or 23, and arranged to transmit a test sequence including a hash function.
  25. 25. A device as claimed in Claim 20, 21, 22, 23 or 24, and arranged to determine the correct result of the test sequence having regard to the mobile radio communications device, and the operation of the part thereof prior to transmission to the mobile radio communications device.
  26. 26. A device as claimed in Claim any one or more of Claims 20 to 25, and arranged to receive a signal from the mobile radio communications device confirming whether or not the results of the two test were the same.
  27. 27. A device as claimed in any one or more of Claims 20 to 26, and arranged to repeat the transmission of the test sequence for a predetermined number of times and initiate a control procedure if a result of a comparison of test results not received from the mobile radio communications device after the predetermined number of test sequence transmissions.
  28. 28. A device as claimed in Claim 27, wherein the control function can of course include disabling operation of the device within the network.
  29. 29. A network arrangement including a mobile radio communications device as claimed in any one or more of Claims 13 to 18 and a network server device as claimed in any one or more of Claims 20 to 28.
  30. 30. A method of testing the integrity of the operation of at least part of an mobile radio communications device and substantially as hereinbefore described with reference to, and as illustrated in, Fig. 1 and Fig. 2 of the accompanying drawings.
  31. 31. A mobile radio communications device substantially as hereinbefore described with reference to, and as illustrated in, Fig. 1 of the accompanying drawings.
  32. 32. A network server device arranged for delivering a test sequence seeking to test the integrity of operation of at least part of a mobile radio communications device as substantially as here before described with reference to Fig.1 and Fig. 2 of the accompanying drawings.
GB0416993A 2004-07-29 2004-07-29 Method of testing integrity of a mobile radio communications device and related apparatus Expired - Fee Related GB2416956B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0416993A GB2416956B (en) 2004-07-29 2004-07-29 Method of testing integrity of a mobile radio communications device and related apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0416993A GB2416956B (en) 2004-07-29 2004-07-29 Method of testing integrity of a mobile radio communications device and related apparatus

Publications (3)

Publication Number Publication Date
GB0416993D0 GB0416993D0 (en) 2004-09-01
GB2416956A true GB2416956A (en) 2006-02-08
GB2416956B GB2416956B (en) 2007-09-19

Family

ID=32947690

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0416993A Expired - Fee Related GB2416956B (en) 2004-07-29 2004-07-29 Method of testing integrity of a mobile radio communications device and related apparatus

Country Status (1)

Country Link
GB (1) GB2416956B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008040377A1 (en) * 2006-10-06 2008-04-10 Agere Systems Inc. Protecting secret information in a programmed electronic device
WO2008001322A3 (en) * 2006-06-30 2008-06-19 Ibm Message handling at a mobile device
EP2237590A1 (en) * 2009-04-01 2010-10-06 Vodafone Holding GmbH Methods and apparatuses for testing of terminals which are operated in communication networks and/or programs running on these terminals
EP2262259A1 (en) * 2009-06-08 2010-12-15 Nagravision S.A. Method for monitoring execution of data processing program instructions in a security module
CN103309795A (en) * 2012-03-08 2013-09-18 百度在线网络技术(北京)有限公司 Software testing method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998010611A2 (en) * 1996-09-05 1998-03-12 Ericsson Inc. System for preventing electronic memory tampering
WO2000018162A1 (en) * 1998-09-18 2000-03-30 Qualcomm Incorporated Method and apparatus for authenticating embedded software in a remote unit over a communications channel
GB2366938A (en) * 2000-08-03 2002-03-20 Orange Personal Comm Serv Ltd Method of authentication in a mobile communication network
WO2002033525A2 (en) * 2000-10-17 2002-04-25 Chuang Shyne Song A method and system for detecting rogue software

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998010611A2 (en) * 1996-09-05 1998-03-12 Ericsson Inc. System for preventing electronic memory tampering
WO2000018162A1 (en) * 1998-09-18 2000-03-30 Qualcomm Incorporated Method and apparatus for authenticating embedded software in a remote unit over a communications channel
GB2366938A (en) * 2000-08-03 2002-03-20 Orange Personal Comm Serv Ltd Method of authentication in a mobile communication network
WO2002033525A2 (en) * 2000-10-17 2002-04-25 Chuang Shyne Song A method and system for detecting rogue software

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008001322A3 (en) * 2006-06-30 2008-06-19 Ibm Message handling at a mobile device
KR101055712B1 (en) * 2006-06-30 2011-08-11 인터내셔널 비지네스 머신즈 코포레이션 Message handling on mobile devices
CN101410847B (en) * 2006-06-30 2011-11-09 国际商业机器公司 Message handling method at a mobile device, mobile device and smart card
WO2008040377A1 (en) * 2006-10-06 2008-04-10 Agere Systems Inc. Protecting secret information in a programmed electronic device
US8528108B2 (en) 2006-10-06 2013-09-03 Agere Systems Llc Protecting secret information in a programmed electronic device
EP2237590A1 (en) * 2009-04-01 2010-10-06 Vodafone Holding GmbH Methods and apparatuses for testing of terminals which are operated in communication networks and/or programs running on these terminals
EP2262259A1 (en) * 2009-06-08 2010-12-15 Nagravision S.A. Method for monitoring execution of data processing program instructions in a security module
WO2010142622A1 (en) * 2009-06-08 2010-12-16 Nagravision S.A. Method for monitoring execution of data processing program instructions in a security module
US8315382B2 (en) 2009-06-08 2012-11-20 Nagravision S.A. Method for monitoring execution of data processing program instructions in a security module
CN103309795A (en) * 2012-03-08 2013-09-18 百度在线网络技术(北京)有限公司 Software testing method and system

Also Published As

Publication number Publication date
GB0416993D0 (en) 2004-09-01
GB2416956B (en) 2007-09-19

Similar Documents

Publication Publication Date Title
JP4685876B2 (en) System and method for providing multiple credential authentication protocols
EP2163986B1 (en) Safe application distribution and execution in a wireless environment
JP5743227B2 (en) Method and apparatus for improving code and data signatures
KR100576956B1 (en) Method and system for checking authentication of a first communication subscriber in a communication network
RU2418387C2 (en) Method to disable mobile device
US6973305B2 (en) Methods and apparatus for determining device integrity
CN104751049A (en) Application program installation method and mobile terminal
TW201129129A (en) Platform validation and management of wireless devices
CN101494854B (en) Method, system and equipment for preventing SIM LOCK from being unlocked illegally
CN101426049B (en) Data card and method, equipment, system for using equipment binding
CN104767713A (en) Account binding method, server and account binding system
US7437563B2 (en) Software integrity test
CN101909279A (en) Authentication method for mobile phone video monitoring
US20120225692A1 (en) Control device and control method
WO2009071735A1 (en) Management of mobile station
GB2416956A (en) Method of testing integrity of a mobile radio communications device and related apparatus
CN109474924A (en) A kind of restoration methods, device, computer equipment and the storage medium of lock network file
CN110856168A (en) Network data safety transmission method
Ziayi et al. Yaicd: Yet another imsi catcher detector in gsm
CN115002779B (en) Pseudo base station prevention and control method and system based on block chain and security chip
US7287161B2 (en) Method and system for testing a program, and a device
CN107066874A (en) Method and device for interactively verifying information between container systems
CN108280343A (en) The method, apparatus and system of application security are detected under Android environment
CN104683996B (en) A kind of mobile application security management-control method and equipment
Onwuama et al. MOBILE PHONE CLONING-A CONCEPTUAL REVIEW

Legal Events

Date Code Title Description
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20141023 AND 20141029

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20170729