Patent application number | Description | Published |
20090191621 | Cover Device for a Sample Carrier - The present invention relates to a cover device for a sample carrier, comprising a sticky surface area for connection to the sample carrier, wherein the sticky surface area is configured such that the sample carrier is covered in liquid-tight fashion after connection of the cover device to the sample carrier in the sticky surface area. | 07-30-2009 |
20100291613 | Method of Positioning an Organic, Biological and/or Medical Specimen - The invention relates to a method of positioning an organic, biological and/or medical specimen in a desired partial region of a specimen carrier, comprising the steps arrangement of a gel in a partial region of the specimen carrier, polymerisation or gelification of the gel, by means of which a polymerised gel is obtained, whereby the polymerised gel at least partially, in particular horizontally, delimits the desired partial region and introduction of the specimen into the specimen carrier, in particular into the desired partial region of the specimen carrier. | 11-18-2010 |
20130171043 | Sample Chamber With Parting Plate - The invention comprises a sample chamber for microscopic examinations, comprising a reservoir for receiving a sample, the reservoir being defined by a bottom plate and a side wall, and a parting plate disposed in the reservoir and being parallel to the bottom plate, the parting plate in the reservoir being disposed at a height which is lower than the minimum height of the side wall, so that it divides the reservoir into an upper and a lower partial reservoirs, the lower partial reservoir and the upper partial reservoir being laterally completely bordered by the side wall, and the upper and the lower partial reservoirs being connected by at least one inlet/outlet. | 07-04-2013 |
20140162350 | Method of Manufacturing a Sample Chamber - The invention comprises a method of manufacturing a sample chamber, comprising the steps of: providing a first ( | 06-12-2014 |
Patent application number | Description | Published |
20100111308 | KEY HANDLING IN COMMUNICATION SYSTEMS - In a method for key handling in mobile communication systems, first and second numbers are exchanged between entities of the mobile communication system. The first and second numbers are respectively used only once with respect to the respective system parameters of the communication system and therefore allowing greater security in the communication system. | 05-06-2010 |
20110004757 | Apparatus, Method, System and Program for Secure Communication - Embodiments provide an apparatus, method, product and storage medium for secure communication, wherein a message is sent over a secure signalling path to a recipient, the message including a value indicating a key for encrypting or decrypting information for secure communication, or a key derivation value for deriving a key. The message further includes an indication indicating the type of usage of the value. The receiver of the message may return a message which also includes a key or key derivation value and an indication indicating the type of key or type of usage of the value. | 01-06-2011 |
20110004762 | SECURITY FOR A NON-3GPP ACCESS TO AN EVOLVED PACKET SYSTEM - A home subscriber server ( | 01-06-2011 |
20110145575 | Secure Bootstrapping Architecture Method Based on Password-Based Digest Authentication - The present invention is related to a method, apparatus, and computer program product, in which a password-based digest access authentication procedure is used for performing authentication between a client and a server, wherein the authentication procedure is secured by at least one of modifying a digest-response parameter with a user password and generating a bootstrapped key based on the user password and at least one fresh parameter not used in a previous protocol run between the client and the server. | 06-16-2011 |
20110225632 | TRUSTWORTHINESS DECISION MAKING FOR ACCESS AUTHENTICATION - There are provided measures for trustworthiness decision making for access authentication, for example relating to the trustworthiness of non-3GPP access networks within a 3GPP-compliant packet data system, exemplary comprising receiving an indication about a provisional trustworthiness of an access network, which provides packet data access for a roaming user, with respect to a visited network of said user from a network element of said visited network, determining the applicability of local breakout or home routing for each subscribed access point name of said user, and deciding about a final trustworthiness of said access network based upon the received provisional trustworthiness indication and the determined routing applicability for each subscribed access point name of said user. | 09-15-2011 |
20110314289 | REMOTE VERIFICATION OF ATTRIBUTES IN A COMMUNICATION NETWORK - It is provided an apparatus, comprising property checking means configured to check whether a claimant property information received from a claimant device corresponds to a predefined claimant attribute; obtaining means configured to obtain a result, which is positive only if the claimant property information corresponds to the predefined claimant attribute as checked by the property checking means; key generation means configured to generate a first claimant intermediate key from a predefined claimant permanent key stored in the apparatus; supplying means configured to supply, to the claimant device, the first claimant intermediate key using a secured protocol, wherein at least one of the key generation means and the supplying means is configured to generate and to supply, respectively, the first claimant intermediate key only if the result is positive. | 12-22-2011 |
20120039452 | Communication Connection Establishment Control for Preventing Unsolicited Communication - There is proposed a mechanism for controlling a communication connection establishment to a subscriber using service including blacklisting, whitelisting, authentication request and/or Turing test for unsolicited communications prevention. Furthermore, there is proposed a management system used to configure a corresponding communication connection establishment control on the basis of an interface for the subscriber for defining a personalized communication connection establishment control profile. | 02-16-2012 |
20120084451 | Methods, Apparatuses, And Related Computer Program Product For Network Security - It is disclosed a method (and related apparatus) including selecting, at a first endpoint entity, at least one range of protection to be granted, the range of protection relating to one of a plurality of network elements in at least one access network and at least one core network and to a second endpoint entity, and transmitting, to a network element entity, a signaling message including first establishment information indicating the at least one range of protection to be granted; and a method (and related apparatus) including receiving, at the network element entity, the signaling message from the first endpoint entity, obtaining, from a second endpoint entity and based on the first establishment information, second establishment information indicating protection granted by the second endpoint entity, and signaling, from the network element entity to the first endpoint entity, third establishment information indicating the protection granted to the first endpoint entity. | 04-05-2012 |
20140269613 | Integrity protection towards one CN after handovers involving multiple services to be handled by different CNs - A method includes receiving at a UE information indicating different CN domains will be used for first and second data services after handover from a first RAT to a second RAT. Integrity protection is activated for the first and second CN domains but an element in the UE does not have an indication integrity protection is activated for the second CN domain. The UE provides a notification for the element that integrity protection has been activated for the second CN domain. Another method includes receiving at a network node a message indicating a UE has performed a handover involving first and second data services from a first to a second RAT, where the first and second data services will be handled by different core network domains. A security mode control procedure is performed to activate integrity protection towards the second core network domain. Apparatus and program products are disclosed. | 09-18-2014 |
Patent application number | Description | Published |
20090052396 | Telecommunication System and Method for Controlling Switching of User Terminal Between Two Networks - A user terminal is switched between a cellular network and a worldwide interoperability for microwave access radio network within a telecommunication system. An authentication, authorization and accounting (AAA) server which is designed for use with both of these networks is disposed in the telecommunication system in such a way that user data of the user terminal stored in the AAA server can be accessed from both of these networks, thereby advantageously ensuring uninterrupted switching between the two networks free of loss. | 02-26-2009 |
20090132806 | Method for agreeing between at least one first and one second communication subscriber to security key for securing communication link - The use of suitable measures in a method for agreeing on a security key between at least one first and one second communication station to secure a communication link is improved so that the security level for the communication is increased and the improved method can be combined with already available methods. A first parameter is determined from an authentication and key derivation protocol. In addition, an additional parameter is sent securely from the second to the first communications station. A security key is then determined from the first parameter and the additional parameter. | 05-21-2009 |
20090191857 | Universal subscriber identity module provisioning for machine-to-machine communications - The present invention relates to remotely provisioning subscriber identification parameters in a device on a wireless network. A secure connection is established with the device, and a token containing the new subscriber identification parameters is forwarded over the secure connection. The device may verify the received token. In one embodiment, the subscriber identification parameters are updated to change network operators. The secure connection can be with the old network operator or the new network operator. The device on the wireless network may be a machine-to-machine device. The provisioned subscriber identification may be part of a universal subscriber identification module. | 07-30-2009 |
20100034384 | Method for providing a symmetric key for protecting a key management protocol - Cryptographic material is generated for a protocol for the encrypted transmission of media data between a subscriber device and a provider device. A first symmetric key of the subscriber device and the provider device is inserted in a symmetric key protection mechanism of a network protocol of a control layer to establish a communication session between the subscriber device and the provider device. A first time-variable parameter is transmitted from the provider device to the subscriber device. A second symmetric key for protecting the key management protocol is calculated by both the provider device and the subscriber device using a defined function depending at least on the first symmetric key and the first time-variable parameter. | 02-11-2010 |
20110010538 | METHOD AND SYSTEM FOR PROVIDING AN ACCESS SPECIFIC KEY - An access specific key is provided for securing of a data transfer between a mobile terminal and a node of an access net. For authentication of the mobile terminal, a authentication server generates a session key, from which a basic key is derived and transferred to an interworking-proxy-server. The interworking-proxy-server derives the access specific key from the transferred basis key and provides the key to the node of the access net. | 01-13-2011 |
20110092213 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING FRESH SECURITY CONTEXT DURING INTERSYSTEM MOBILITY - A method, apparatus and computer program product are provided to provide fresh security context during intersystem mobility. A method is provided which includes receiving an indication of handover of a remote device from a source system to a target system. The target system may implement a communications standard different from that of the source system. The method also includes determining a current sequence number value of a security context maintained in the source system. The method additionally includes deriving a fresh mapped security context for the target system based at least in part upon the determined sequence number value. The method further includes providing the derived fresh mapped security context to the target system. | 04-21-2011 |
20110202986 | IDENTITY MANAGEMENT SYSTEM - A system comprising an IMS network ( | 08-18-2011 |