-
公开(公告)号:AT546944T
公开(公告)日:2012-03-15
申请号:AT08774079
申请日:2008-06-12
Applicant: ERICSSON TELEFON AB L M
Inventor: CHENG YI , HUANG VINCENT , JOHANSSON MATTIAS
-
公开(公告)号:DE602006018070D1
公开(公告)日:2010-12-16
申请号:DE602006018070
申请日:2006-02-24
Applicant: ERICSSON TELEFON AB L M
Inventor: ASTROEM BO , IVARS IGNACIO MAS , CARLSSON HANS , CHENG YI , NORRMAN KARL
IPC: H04L29/06
-
公开(公告)号:CA2706335A1
公开(公告)日:2009-06-04
申请号:CA2706335
申请日:2008-12-01
Applicant: ERICSSON TELEFON AB L M
Inventor: BARRIGA LUIS , BLOM ROLF , CHENG YI , NÄSLUND MATS , NORRMAN KARL , LINDHOLM FREDRIK
IPC: H04W12/02
Abstract: An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which re-ceives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S--CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the IN-VITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept. A method for supporting a can by a telecommunications node.
-
公开(公告)号:DE60035953T2
公开(公告)日:2008-05-08
申请号:DE60035953
申请日:2000-01-07
Applicant: ERICSSON TELEFON AB L M
Inventor: RINMAN MARTIN , JERRESTAM DAN , CHENG YI , BJOERUP LARS
Abstract: In a radio telecommunication system, the performance of a mobile unit can be significantly improved during a hand-over procedure by reusing existing security associations that correspond to the mobile unit. By reusing existing security associations, a mobile unit can begin secure communications immediately following the hand-over. Otherwise, and in accordance with conventional practice, the mobile unit will have to undertake the time consuming task of renegotiating the required security associations, before it can begin transmitting and receiving secure communications.
-
公开(公告)号:ES2258447T3
公开(公告)日:2006-09-01
申请号:ES00908172
申请日:2000-02-08
Applicant: ERICSSON TELEFON AB L M
Inventor: NOREFORS ARNE , CHENG YI , ALMEHAG LORENS , JERRESTAM DAN
Abstract: Un método para conseguirrealizar en una red de telecomunicación inalámbrica el traspaso seguro de un terminal móvil (MT) desde un primer punto de acceso (APOLD) a un segundo punto de acceso (APNEW), en el que el primer punto de acceso (APOLD) y el segundo punto de acceso (APNEW) están físicamente conectados a través de una red fija, comprendiendo dicho método los pasos de: transmitir una señal de seguridad (S/TOKEN) desde el primer punto de acceso al terminal móvil (MT) a través depor*** un interfaz de radio; transmitir la señal de seguridad (S/TOKEN) desde el terminal móvil (MT) al segundo punto de acceso a través delpor*** el interfaz de radio; transmitir la señal de seguridad (S/TOKEN) desde el primer punto de acceso (APOLD) al segundo punto de acceso (APNEW) a través de la red fija; y establecer un enlace de comunicación entre el terminal móvil (MT) y el segundo punto de acceso (APNEW), para conseguir un traspaso seguro si el segundo punto de acceso (APNEW) determina que la señal de seguridad (S/TOKEN) recibida desde el terminal móvil (MT) coincide*** con la señal de seguridad (S/TOKEN) recibida del primer punto de acceso (APOLD).
-
公开(公告)号:DE602005019337D1
公开(公告)日:2010-03-25
申请号:DE602005019337
申请日:2005-12-13
Applicant: ERICSSON TELEFON AB L M
Inventor: BARRIGA LUIS , CHENG YI
Abstract: A method and arrangement in a multimedia gateway connected to a multimedia service network, for providing access to multimedia services for communication devices connected to a private network. In the multimedia gateway, a communication unit receives a request from a device in the private network for a public identity associated with the multimedia gateway. An identity manager then selects and allocates an associated public identity from a pool of public identities associated with the multimedia gateway which have been predefined as valid in the multimedia service network. The communication unit then registers the device by activating the allocated associated public identity in the multimedia service network. Thereby, the multimedia gateway can establish a multimedia session on behalf of the device, using the allocated associated public identity.
-
公开(公告)号:DE60035953D1
公开(公告)日:2007-09-27
申请号:DE60035953
申请日:2000-01-07
Applicant: ERICSSON TELEFON AB L M
Inventor: RINMAN MARTIN , JERRESTAM DAN , CHENG YI , BJOERUP LARS
Abstract: In a radio telecommunication system, the performance of a mobile unit can be significantly improved during a hand-over procedure by reusing existing security associations that correspond to the mobile unit. By reusing existing security associations, a mobile unit can begin secure communications immediately following the hand-over. Otherwise, and in accordance with conventional practice, the mobile unit will have to undertake the time consuming task of renegotiating the required security associations, before it can begin transmitting and receiving secure communications.
-
公开(公告)号:AT325517T
公开(公告)日:2006-06-15
申请号:AT00908172
申请日:2000-02-08
Applicant: ERICSSON TELEFON AB L M
Inventor: NOREFORS ARNE , CHENG YI , ALMEHAG LORENS , JERRESTAM DAN
Abstract: In a mobile, wireless telecommunications network, communications relating to a mobile terminal can be protected during a handover of the mobile terminal from a first access point to a second access point. This may be accomplished by transmitting a security token from the first access point to the mobile terminal, and then from the mobile terminal to the second access point, over the radio interface. Thereafter, the security token is transmitted from the first access point to the second access point through the fixed network to which both the first and the second access points are connected. The communications link between the mobile terminal and the second access point needed to achieve secure handover is then established only if the second access point determines that the security token received from the mobile terminal matches the security token received from the first access point.
-
公开(公告)号:DE60027701D1
公开(公告)日:2006-06-08
申请号:DE60027701
申请日:2000-02-08
Applicant: ERICSSON TELEFON AB L M
Inventor: NOREFORS ARNE , CHENG YI , ALMEHAG LORENS , JERRESTAM DAN
Abstract: In a mobile, wireless telecommunications network, communications relating to a mobile terminal can be protected during a handover of the mobile terminal from a first access point to a second access point. This may be accomplished by transmitting a security token from the first access point to the mobile terminal, and then from the mobile terminal to the second access point, over the radio interface. Thereafter, the security token is transmitted from the first access point to the second access point through the fixed network to which both the first and the second access points are connected. The communications link between the mobile terminal and the second access point needed to achieve secure handover is then established only if the second access point determines that the security token received from the mobile terminal matches the security token received from the first access point.
-
公开(公告)号:AU2335300A
公开(公告)日:2000-07-24
申请号:AU2335300
申请日:2000-01-07
Applicant: ERICSSON TELEFON AB L M
Inventor: RINMAN MARTIN , JERRESTAM DAN , CHENG YI , BJORUP LARS
Abstract: In a radio telecommunication system, the performance of a mobile unit can be significantly improved during a hand-over procedure by reusing existing security associations that correspond to the mobile unit. By reusing existing security associations, a mobile unit can begin secure communications immediately following the hand-over. Otherwise, and in accordance with conventional practice, the mobile unit will have to undertake the time consuming task of renegotiating the required security associations, before it can begin transmitting and receiving secure communications.
-
-
-
-
-
-
-
-
-