KEY MANAGEMENT FOR SECURE COMMUNICATION
    5.
    发明公开
    KEY MANAGEMENT FOR SECURE COMMUNICATION 有权
    密钥管理安全通信

    公开(公告)号:EP2215769A4

    公开(公告)日:2013-10-30

    申请号:EP07852199

    申请日:2007-11-30

    Abstract: A method and arrangement is disclosed for managing session keys for secure communication between a first and at least a second user device in a communications network. The method is independent of what type of credential each user device implements for security operations. A first user receives from a first key management server keying information and a voucher and generates a first session key. The voucher is forwarded to at least a responding user device that, with support from a second key management server communicating with the first key management server, resolves the voucher and determines a second session key. First and second session keys are, thereafter, used for secure communication. In one embodiment the communication traverses an intermediary whereby first and second session keys protect communication in their respective leg to said intermediary.

    METHOD FOR USER PRIVACY PROTECTION
    6.
    发明公开
    METHOD FOR USER PRIVACY PROTECTION 审中-公开
    方法用于用户数据隐私

    公开(公告)号:EP2382574A4

    公开(公告)日:2013-04-24

    申请号:EP09839363

    申请日:2009-01-28

    Abstract: A system for generation of processed data for use in third party relationship monitoring is described. The system includes a communications system providing services to subscribing users. The communications system includes a rules database for storing rules, a data mining agent for mining and storing data relating to subscribing users, a content generator for generating protected user-related data from the mined data and communicating said user-related data over an interface, and a rights object generator for generating a usage rights object in response to the rules stored in the rules database and communicating said usage rights object over the interface. A tamper proof processing arrangement is connected to the interface. The tamper proof processing arrangement receives the user-related data and usage rights object from the communications system and processes the user-related data under control of the usage rights object. A signal output generator generates an output signal representative of processed data received from the processing arrangement.

    METHOD AND APPARATUSES FOR END-TO-EDGE MEDIA PROTECTION IN AN IMS SYSTEM
    8.
    发明申请
    METHOD AND APPARATUSES FOR END-TO-EDGE MEDIA PROTECTION IN AN IMS SYSTEM 审中-公开
    IMS系统中端到端媒体保护的方法和设备

    公开(公告)号:WO2009068985A3

    公开(公告)日:2009-11-26

    申请号:PCT/IB2008003288

    申请日:2008-12-01

    Abstract: An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which receives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S-CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the INVITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept. A method for supporting a call by a telecommunications node.

    Abstract translation: IMS系统包括IMS发起者用户实体。 该系统包括由发起者用户实体调用的IMS应答器用户实体。 该系统包括与主叫实体进行通信的主叫侧S-CSCF,其从呼叫方实体接收具有第一保护报价的INVITE和用于密钥建立的参数,从INVITE中移除第一保护报价并转发INVITE而没有第一保护 提供。 该系统包括与响应者用户实体通信的接收端S-CSCF,以及在没有第一保护提供的情况下接收INVITE的主叫侧S-CSCF,并检查响应者用户实体是否支持保护,将第二保护请求插入到 INVITE并将INVITE转发到响应者用户实体,其中响应者用户实体接受包括第二保护提议的INVITE和具有第一保护接受的确认的应答。 一种用于支持电信节点的呼叫的方法。

    REUSE OF SECURITY ASSOCIATIONS FOR IMPROVING HAND-OVER PERFORMANCE
    9.
    发明申请
    REUSE OF SECURITY ASSOCIATIONS FOR IMPROVING HAND-OVER PERFORMANCE 审中-公开
    重新使用安全协会以提高对手的性能

    公开(公告)号:WO0041427A3

    公开(公告)日:2000-11-02

    申请号:PCT/SE0000020

    申请日:2000-01-07

    Abstract: In a radio telecommunication system, the performance of a mobile unit can be significantly improved during a hand-over procedure by reusing existing security associations that correspond to the mobile unit. By reusing existing security associations, a mobile unit can begin secure communications immediately following the hand-over. Otherwise, and in accordance with conventional practice, the mobile unit will have to undertake the time consuming task of renegotiating the required security associations, before it can begin transmitting and receiving secure communications.

    Abstract translation: 在无线电通信系统中,通过重新使用与移动单元相对应的现有安全关联,移动单元的性能可以在切换过程期间显着提高。 通过重用现有的安全关联,移动设备可以在切换后立即开始安全通信。 否则,按照惯例,移动单元在开始发送和接收安全通信之前将不得不承担耗费重新协商所需安全关联的任务。

Patent Agency Ranking