Patent application number | Description | Published |
20090089872 | Communication network access - A method of routing traffic between external users and a communication network via a private access network. The method comprises establishing a secure outer tunnel between the private network and a gateway of a public access network to which the private network is coupled, based upon authentication of the private network to the public access network, said gateway being coupled to said communication network. For each external user wishing to connect to the communication network via the private network, a secure inner tunnel is established between the user and the gateway based upon authentication of the user to the gateway, the inner tunnel being within said outer tunnel. Traffic is caused to flow between external users and the gateway through the respective inner tunnels. | 04-02-2009 |
20090253411 | Authentication In A Communication Network - A mobile wireless terminal, the terminal comprising a generator configured to generate and store a first numerical chain comprising a series of n values using a one-way coding function such that a given value within the chain is easily obtainable from a subsequent value, but the subsequent value is not easily obtainable from that given value, and an authentication requester configured to disclose a value from the numerical chain to an access node, in order to allow the access node to authenticate the mobile wireless terminal, wherein the disclosed value succeeds any values in the chain already disclosed by the mobile wireless terminal. | 10-08-2009 |
20090285181 | IP Mobility - A method of forwarding IP packets, sent to an old care-of-address of a mobile node, to the mobile node following a handover of the mobile node from a first old access router to a second new access router. The method comprises, prior to completion of said handover, providing said first router or another proxy node with information necessary to determine the new IP care-of address to be used by the mobile node when the mobile node is transferred to the second access router. At said first router or said proxy node, the new care-of-address for the mobile node is determined using said information and ownership of the new care-of-address by the mobile node confirmed, and subsequently packets received at said first access network and destined for said old care-of-address are forwarded to the predicted care-of-address address. | 11-19-2009 |
20090313466 | Managing User Access in a Communications Network - A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a communication session. The identifier is mapped to the first session key, and the mapped identifier and key are stored at the node. A second session key is derived from the first session key and the second session key is sent to an access network, and the identifier sent to a user terminal. When the user subsequently moves to a second access network, the node receives the identifier from the user terminal. The node then retrieves the first session key mapped to the received identifier, derives a third session key and sends the third session key to the second access network. | 12-17-2009 |
20090327721 | Method and Apparatuses for Securing Communications Between a User Terminal and a SIP Proxy Using IPSEC Security Association - A method and user terminal for securing communications between the user terminal and a SIP proxy. The user terminal performs a full authentication procedure with a first SIP proxy to generate an IPSec Security Association, wherein signaling is exchanged between the user terminal and a home network. In response to a change of location of the user terminal or to a handover of the user terminal to a second SIP proxy, a local re-authentication of the user terminal is performed at the first SIP proxy, or at the second SIP proxy in the case of a handover, based upon the pre-existing Security Association in order to establish a new Security Association. | 12-31-2009 |
20110035787 | Access Through Non-3GPP Access Networks - When setting up communication from a user equipment UE ( | 02-10-2011 |
20110274091 | IP Mobility - A method of forwarding IP packets, sent to an old care-of-address of a mobile node, to the mobile node following a handover of the mobile node from a first old access router to a second new access router. The method comprises, prior to completion of said handover, providing said first router or another proxy node with information necessary to determine the new IP care-of address to be used by the mobile node when the mobile node is transferred to the second access router. At said first router or said proxy node, the new care-of-address for the mobile node is determined using said information and ownership of the new care-of-address by the mobile node confirmed, and subsequently packets received at said first access network and destined for said old care-of-address are forwarded to the predicted care-of-address address. | 11-10-2011 |
20130028411 | Simple Group Security for Machine-to-Machine Networking (SGSM2M) - A group identity for a set of devices is generated by acquiring an identity for each one of the devices and joining the identities into a common identity data set. A group identity for the set of devices is created by performing a hash function on the common identity set and using a resulting hash value as the group identity. A group identity for a set of devices is verified by acquiring a first group identity from a trusted party. An identity is acquired from each device in the set and the identities are joined into a common identity data set and a second group identity is created for the set of devices by performing a hash function on the common identity data set. A determination is made whether there is a match between the first group identity and the second group identity. | 01-31-2013 |
20130099896 | Sensor Location and Tagging System - Methods and systems for determining a location of a device and tagging signals from the device with the location involve receiving, by a plurality of positioning devices, a signal sent by the device; determining, by each of the plurality of positioning devices, respective location information based on the signal; determining, based on the respective location information of each of the plurality of positioning devices, the location of the device; and forming, from the signal, a second signal annotated with the location of the device. | 04-25-2013 |
20130101098 | Interaction With a Device via a Communications Network - A gateway apparatus enables interaction with a device that is connected to a network. The gateway receives voice or Dual-Tone Multi-Frequency (DTMF) signals from a user terminal via a circuit-switched connection. The received voice or DTMF signals are used in conjunction with a semantic data document to ascertain an interaction to be carried on with the device. Signals are generated and received via the network in accordance with the ascertained interaction. A user friendly response from the interaction can be formed (e.g., in the form of a voice response) and communicated to the user terminal via the circuit-switched connection. | 04-25-2013 |
20140023194 | Managing User Access in a Communications Network - A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a communication session. The identifier is mapped to the first session key, and the mapped identifier and key are stored at the node. A second session key is derived from the first session key and the second session key is sent to an access network, and the identifier sent to a user terminal. When the user subsequently moves to a second access network, the node receives the identifier from the user terminal. The node then retrieves the first session key mapped to the received identifier, derives a third session key and sends the third session key to the second access network. | 01-23-2014 |
20140029515 | Device Connectivity Management for Machine Type Communications - Methods for managing device connectivity of machine type communications devices include receiving a packet data protocol based command addressed to a Machine Type Communication (MTC) device, determining if the MTC device has an active packet data protocol context, in response to determining that the MTC device does not have an active packet data protocol context, activating a packet data protocol context for the MTC device, and forwarding the packet data protocol based command to the MTC device. | 01-30-2014 |
20140096193 | ACCESS THROUGH NON-3GPP ACCESS NETWORKS - When setting up communication from a user equipment UE ( | 04-03-2014 |
20140139315 | VICINITY-BASED MULTI-FACTOR AUTHENTICATION - The invention relates to a wireless device, configured for ensuring authentication of a user, to a reference unit configured for ensuring authentication of a user of the wireless device and to a method for ensuring authentication of a user. The wireless device comprises a checking unit configured for scanning a distance to a reference unit and for checking if the distance scanned lies within a predetermined range such that authentication of the user is ensured. In this way, a wireless device is provided which is simple and cost-effective to realize and increases security by making sure that the rightful owner is available without the need of asking for PIN codes, passwords or other measures, such as biometric recognition, i.e. voice recognition, fingerprint recognition, retina recognition and the like. | 05-22-2014 |
20140169285 | EXTENDING GLOBAL OPERATOR DEVICE IF TO AGGREGATED DEVICES - The disclosure relates to a method of managing aggregated devices being attached to a mobile communication network via at least one aggregating device; said aggregating device being attached directly to a radio base station of said mobile communication network. | 06-19-2014 |
20140171027 | Device Authentication by Tagging - The invention relates to a method for authenticating a device, comprising a network communication unit and tagging circuit, in a mobile communication network, using a mobile entity comprising a tagging circuit and being authenticated to the mobile communication network. The method comprises the following steps; the mobile entity establishing a connection with the device, using said tagging circuit, exchanging authentication data between the mobile entity and the device using the tagging circuit and authenticating the device to the mobile communication network by submission of exchanged authentication data in the mobile communication network. Thereby, the permissions of a mobile entity may be shared with another device by tagging. The invention also relates to a corresponding mobile entity, device, node and computer program product. | 06-19-2014 |
20140171061 | NETWORK ACCESS DELAY FOR EAB-CONFIGURED UES AND/OR GROUP-BASED ADDRESSED UES - The access of a user equipment, UE, ( | 06-19-2014 |
20140177505 | INTEGRATING MULTI-HOP MESH NETWORKS IN MOBILE COMMUNICATION NETWORKS - The invention provides for a method and a node for integrating the devices ( | 06-26-2014 |
20140180960 | Method For Issuing a Ticket to a Customer to a Queue, a Mobile Device and a Queue Ticket Terminal - In one aspect, there is provided a method for issuing a ticket to a customer to a queue of a service function. In some embodiment the method includes: providing a queue ticket terminal in a predetermined space associated with said service function; and enabling a customer to be allocated a queue ticket from said terminal. The method further comprising: detecting, in a mobile device associated with said customer, whether said queue ticket terminal is in the vicinity of said mobile device; transmitting a queue ticket request from said mobile device to said queue ticket terminal; and, receiving, in said mobile device and in response to said queue ticket request, a queue position message comprising information relating to the customer's position in said queue. | 06-26-2014 |
20150026458 | Managing User Access in a Communications Network - A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a communication session. The identifier is mapped to the first session key, and the mapped identifier and key are stored at the node. A second session key is derived from the first session key and the second session key is sent to an access network, and the identifier sent to a user terminal. When the user subsequently moves to a second access network, the node receives the identifier from the user terminal. The node then retrieves the first session key mapped to the received identifier, derives a third session key and sends the third session key to the second access network. | 01-22-2015 |
20150074221 | DNS Server Arrangement And Method - The present invention relates to a Domain Name System (DNS) server and a method for resolving DNS queries from a number of clients. The DNS server comprises multiple virtual DNS server instances servicing different clients. The DNS server further comprises a shared cache for caching records which indicate answers to resolved DNS queries. The shared cache is shared between a set of virtual DNS server instances. The virtual DNS server instances that share the shared cache are able to cache DNS query results in the shared cache as well as resolve a DNS query by retrieving a cached record corresponding to the DNS query from the shared cache. Thus it is possible for a virtual DNS server instance to make use of DNS query results obtained by other virtual DNS server instances. | 03-12-2015 |
20150079941 | Secure Paging - There is described a device for communicating with a network. The device receives a series of paging messages from a serving node in the network, where each paging message includes identification and authentication information sufficient to identify at least one device and authenticate the message, at least some of the information having been protected according to a sequence such that it varies between successive paging messages. The device verifies the protected part of the information using a cryptographic function and knowledge of the sequence and identifies whether the information indicates that message is an authentic message intended for that device. The device may act in response to the received paging message. | 03-19-2015 |