Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


CELLULAR TELEPHONE CRYPTOGRAPHIC AUTHENTICATION

Subclass of:

380 - Cryptography

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
380247000CELLULAR TELEPHONE CRYPTOGRAPHIC AUTHENTICATION71
20080260149Method and System for Mobile Device Credentialing - Methods and systems taught herein allow mobile device manufacturers to preconfigure mobile devices for subscription with any network operator having access to a centralized device directory server. The directory server stores device records, each including a preliminary subscription identity. Manufacturers individually provision new mobile devices with these preliminary subscription identities, and network operators preliminarily register subscribers by submitting requests to the directory server that cause it to link individual device records with the appropriate credential server addresses. Mobile devices gain temporary network access by submitting their preliminary subscription identities, which get passed along to the directory server for verification. In turn, the directory server generates authentication vectors giving the mobile devices temporary network access, and returns the appropriate credential server addresses. The mobile devices use the address information to submit secure requests for permanent subscription credentials, and the involved credential servers securely return permanent subscription credentials responsive to valid requests.10-23-2008
20090041240UPLINK SCRAMBLING DURING RANDOM ACCESS - The technology described in this case facilitates random access by a user terminal with a radio base station. A user terminal determines one of a first type of uplink scrambling sequences and generates a random access message using the determined one of the first type of uplink scrambling sequences. The random access message is transmitted to the base station. The user terminal receives from the base station a second, different type of uplink scrambling sequence and uses it for subsequent communication with the radio base station. For example, the first uplink scrambling sequences may be specifically associated with the radio base station's cell area or a random access radio channel associated with the radio base station, but they are not specifically assigned to any user terminal, and the second uplink scrambling sequence may be selected from a second set of uplink scrambling sequences specifically assignable to individual user terminals.02-12-2009
20090067628TELECOMMUNICATIONS NETWORKS - Various advantageous arrangements for use with the proposed SAE/LTE or 4G mobile telecommunications system are disclosed. An arrangement for allowing a mobile terminal/UE (03-12-2009
20090086971SELECTIVE SECURITY TERMINATION IN NEXT GENERATION MOBILE NETWORKS - Systems and/or methods of selectively terminating security in mobile networks are presented. User equipment (UE) can specify cipher termination location capabilities for encrypting/decrypting data packets to a base station in a mobile network. The mobile network can subsequently determine at which node in the network to terminate the cipher in part according to the capabilities provided and deliver the determined location to the UE. The determined cipher termination location can be provided in response to a request to initiate communications, the initial request can specify the capabilities. The UE can utilize the location to support disparate types of networks and to intelligently deal with hand-offs and other functions of the mobile network.04-02-2009
20090103728Secure wireless communication - In one embodiment, the method performed by mobile equipment to authenticate communication with a network includes generating keys using cellular authentication and voice encryption, and then generating an authentication key based on these keys. The authentication key is used to generate an expected message authentication code used in authenticating the network according to authentication and key agreement security protocol.04-23-2009
20090122984SECURE MOBILE TELEPHONY - An system for and method of providing end-to-end encrypted real-time phone calls using a commodity mobile phone and without requiring service provider cooperation is presented. The system and method improve upon prior art techniques by omitting any requirement for mobile phones that are specially manufactured to include end-to-end encryption functionality.05-14-2009
20090257590SECURE REMOVABLE CARD HAVING A PLURALITY OF INTEGRATED CIRCUIT DIES - A secure removable card has electrical connections for communication therewith. The card comprises a first integrated circuit die, with the first die including a processor. The card has a second integrated circuit die, with the second die including a non-volatile memory for storing a secret key, and a controller for controlling the operation of the non-volatile memory. A bus connects the first die with the second die. The processor can generate a key pair, having a public key portion and a private key portion upon power up, and transfers the public key portion across the bus to the second die. The controller can receive the public key and encrypt the secret key with the public key to generate a first encrypted key, and can transfer the first encrypted key across the bus to the first die. The processor can receive the first encrypted key and can decrypt the first encrypted key to recover the secret key, and can encrypt data with the secret key for communicating along the electrical connections external to the card.10-15-2009
20090296930TECHNIQUES TO PROVISION AND MANAGE A DIGITAL TELEPHONE TO AUTHENTICATE WITH A NETWORK - Techniques to manage digital telephones are described. An apparatus may comprise a digital telephone management component having a telephone interface module operative to receive security information in the form of a personal identification number (PIN) for an operator or device. The digital telephone management component may also comprise a telephone security module communicatively coupled to the telephone interface module, the telephone security module operative to receive encrypted security credentials from a computing device, and decrypt the encrypted security credentials with the PIN. The digital telephone management component may further comprise a telephone authentication module communicatively coupled to the telephone security module, the telephone authentication module operative to authenticate the digital telephone using the security credentials. Other embodiments are described and claimed.12-03-2009
20090310781METHOD AND APPARATUS FOR AUTHENTICATION OF PORTABLE ELECTRONIC DEVICES - A mobile communication terminal connected to the portable electronic device encodes a system serial number and an authentication key, generates an integration secrete key, and transmits the integration secrete key to an authentication center computer. The authentication center computer decodes the integration secrete key, performs authentication registration, encodes a temporary service approval key and a temporary integration authentication key, and transmits the temporary service approval key and the temporary integration authentication key to the mobile communication terminal. The mobile communication terminal decodes the temporary integration authentication key, obtains approval for the relay, and transmits the temporary service approval key to the portable electronic device. The portable electronic device decodes the temporary service approval key, performs authentication for utilizing a service, and applies the temporary service approval key to an application service.12-17-2009
20090323951PROCESS, CIRCUITS, DEVICES, AND SYSTEMS FOR ENCRYPTION AND DECRYPTION AND OTHER PURPOSES, AND PROCESS MAKING - A wireless communications device (12-31-2009
20100135491AUTHENTICATION METHOD - A method of providing authentication of a mobile device in a telecommunications network comprising the steps of: providing a user defined first password to an authentication server in the communications network; generating a set of security parameters by an authentication server and provisioning the security parameters to a mobile device, wherein the security parameters are stored at the mobile device and wherein the security parameters comprises an encryption key; authenticating the mobile device by challenging the integrity of the encryption key stored at the mobile device and verifying a first response generated by the mobile device in response to the challenge, wherein verifying comprises comparing by the network whether the first response matches a second response, wherein the first response is based on the encryption key stored at the mobile device and a second password input by the user, and the second response is generated by the network and is based on the encryption key generated by the authentication server and the user defined first password.06-03-2010
20100135492ANTI-THEFT SYSTEM AND METHOD FOR MOBILE PHONE - A mobile phone anti-theft system includes a mobile phone, a SIM card and a real-name card-issuing system. The real-name card-issuing system includes a central processing unit, a first user information storage area, transmission equipment, and a card reader. The SIM card communicates with the central processing unit through the card reader and the transmission equipment. The real-name card-issuing system sends user information stored in the first user information storage area to the SIM card. If the SIM card needs to change the user information, it should verify first cryptographic keys with the real-name card-issuing system. The mobile phone includes a micro control unit, a second user information storage area and a transmission unit. The SIM card communicates with the micro control unit through the transmission unit. After each startup of the mobile phone, the mobile phone verifies second cryptographic keys with the SIM card.06-03-2010
20100150345PURGING OF AUTHENTICATION KEY CONTEXTS BY BASE STATIONS ON HANDOFF - Various embodiments of methods and apparatuses for managing authentication key contexts are described herein. In various embodiments, the methods and apparatuses include purging an authentication key context of a supplicant after handing off the supplicant, even the authentication key has not expired.06-17-2010
20100166179METHODS AND APPARATUS FOR BOOTSTRAPPING MOBILE-FOREIGN AND FOREIGN-HOME AUTHENTICATION KEYS IN MOBILE IP - Methods and apparatus for dynamically generating authentication keys are disclosed. Specifically, a Mobile-Foreign authentication key is separately generated by both the Mobile Node and Foreign Agent. Similarly, a Foreign-Home authentication key is separately generated by the Foreign Agent and the Home Agent. In accordance with one embodiment, generation of the Mobile-Foreign authentication key and Foreign-Home authentication key are accomplished via the Diffie-Hellman key generation scheme.07-01-2010
20100189258METHOD FOR DISTRIBUTING AN AUTHENTICATION KEY, CORRESPONDING TERMINAL, MOBILITY SERVER AND COMPUTER PROGRAMS - A method and apparatus are provided for early distribution of at least one encryption key intended for securing a communication to be set up on the link layer of a cellular network formed of a plurality of cells, each controlled by an attachment point, between a mobile terminal and a set of attachment points, termed the target attachment points. The includes, for at least one target attachment point: creation of an encryption ticket containing an encryption key, enciphered on the basis of at least one authentication key specific to this target attachment point; receipt of the enciphered encryption ticket, by way of a current attachment point to which the mobile terminal is connected; identification, of a means of deciphering the enciphered encryption ticket, with the aid of the at least one authentication key, making it possible to obtain the encryption key.07-29-2010
20100303232Wireless Digital Personal Communications System Having Voice/Data/Image Two-Way Calling and Intercell Hand-Off Provided Through Distributed Logic Resident in Portable Handset Terminals, Fixed Terminals, Radio Cell Base Stations and Switched Telephone Network - A wireless digital personal communications system (or PCS) having a plurality of radio cell base stations, fixed terminals, and portable handset terminals, each having a predetermined radio cell coverage area. The wireless PCS has a full digital network interface. The personal communications system facilitates the interconnection and switching of PCS call traffic through the digital network interface and the public switched telephone network, or any switched network. The personal communications system has voice/data/image (or any combination thereof) and incoming and outgoing calling capability. The PCS is fully operational and compatible with any and all modulation approaches selected for wireless communications. The intercell protocol hand-off being provided through distributed logic which is implemented in software that is resident in the intelligent portable handset terminals, in the intelligent fixed terminals, in the intelligent base stations, and in the public switched telephone network (or any switched network). Alternative embodiments of the present invention include a wireless digital personal communications system having authentication means for authenticating a remote device; a wireless digital personal communications system having a combination of authentication means for authenticating a remote device and security means for securing signal and message content between an intelligent base station and a remote device, the security means including a predetermined encryption and decryption technique; a wireless digital personal communications system having dynamic zone grouping of portable handset terminals or fixed terminals; and a wireless digital personal communications system having call forwarding for unanswered calls.12-02-2010
20100310071APPARATUS AND METHOD FOR EMBEDDING SEARCHABLE INFORMATION INTO A FILE FOR TRANSMISSION, STORAGE AND RETRIEVAL - An apparatus is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from a first source. A stamping device is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. A data processing unit is provided for placing the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to said receiving facility. An encryptor encrypts the augmented captured information for transmission to said receiving facility.12-09-2010
20110058670ARRANGING DATA CIPHERING IN A WIRELESS TELECOMMUNICATION SYSTEM - Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.03-10-2011
20110135091Secure telephone devices, systems and methods - Secure telephone devices, systems and methods are provided for carrying out secure communications utilizing a telephone device that includes cryptographic storage and processing components, the cryptographic processing components including intercepting and injecting capabilities for intercepting an incoming signal, cryptographically processing the signal and injecting the system for delivery to the output of the telephone device, wherein the system and method may utilize the telephone operating system, and wherein embodiments are provided where an exchange component regulates the cryptographic information so that users engaging in secure cryptographic communications do not need to provide encryption key information to each other.06-09-2011
20110142234Multi-Factor Authentication Using a Mobile Phone - The invention described here provides a fully-distributed solution to the problem of confirming the identity of the presenter of a payment card or other credentials, using multiple factors to authenticate the presenter. The invention leverages the wide penetration of mobile phones in modern economies as the basis for the distributed multi-factor authentication. For additional confidence levels biometric data can be incrementally included as part of the multi-factor authentication. The loss of any one of the multiple authentication factors does not compromise the integrity of the system or the individual, and there is no single point of vulnerability for attack or theft. The invention is fully backwards compatible with current payment cards systems and can be extended to almost any situation where the identity of the presenter of credentials needs to be authenticated prior to allowing the individual access to the protected services, systems, or locations. This allows for incremental adoption across a wide range of current and future systems.06-16-2011
20110142235Systems And Methods To Direct a Mobile Communication Device to A Preferred Teleconference Bridge - A telecommunication system includes a processor, interfaces in communication with the public telephone network and a data network, respectively, and a memory. The memory comprises executable instructions that when executed by the processor direct the system to controllably permit access to a teleconference bridge in response to a communication from a mobile-communication device that includes information responsive to a previously communicated license key. Generally, the communication is in the form of a call from the user of the mobile-communication device. Upon receipt of the call, the telecommunication system confirms that the mobile-communication device communicates a pass code that was included in an encrypted form in the license key.06-16-2011
20110170689TERMINAL AND METHOD FOR PROCESSING ENCRYPTED MESSAGE - A terminal may include a memory to store first encryption information applied to the handheld terminal and second encryption information corresponding to a phone number of another party's terminal, and a control unit to encrypt a message using the first encryption information and the second encryption information stored in the memory, when transmitting the message to the other party's terminal.07-14-2011
20110222688ONE VAULT VOICE ENCRYPTION - The present invention provides a secure voice solution for the BlackBerry 9000 (BlackBerry Bold™) Rather than make encrypted voice calls through traditional GSM cellular phone calls, the present invention instead receives voice data from the user using the device microphone and built-in media player software in the device. This data is then encrypted and then sent as an IP packet. The device then receives, as IP packets, encrypted voice communication from the other party in the encrypted call, which in turn are decrypted in the device and then played back on a second media player running on the device. The present invention takes advantage of the device's ability to run two media players simultaneously to in effect, simulate a cellular telephone call. As a result, an encrypted call can be made with PDA-type devices such as the Blackberry@ and also such calls can be made using different data paths (cellular, WiFi, Bluetooth, or the like) as the calls are made by sending and receiving data over the Internet, not as traditional cellular data signals.09-15-2011
20110235802AUTHENTICATION KEY GENERATION ARRANGEMENT - Authentication key generation for local area network communication, including: participating in communication of a message comprising a cipher suite selection type indicating cellular network compatible cipher suite; and creating cellular network compatible authentication keys according to said cipher suite selection type.09-29-2011
20110255691APPARATUS AND METHOD FOR TRANSITIONING ENHANCED SECURITY CONTEXT FROM A UTRAN-BASED SERVING NETWORK TO A GERAN-BASED SERVING NETWORK - Disclosed is a method for transitioning an enhanced security context from a UTRAN-based serving network to a GERAN-based serving network. In the method, the remote station the remote station generates first and second session keys, in accordance with the enhanced security context, using an enhanced security context root key and a first information element. The remote station receives a first message from the UTRAN-based serving network. The first message includes a second information element signaling to the remote station to generate third and fourth session keys for use with the GERAN-based serving network. The remote station generates, in response to the first message, the third and fourth session keys using the second information element and the first and second session keys. The remote station protects wireless communications, on the GERAN-based serving network, based on the third and fourth session keys.10-20-2011
20110299681CIPHERING IN A PACKET-SWITCHED TELECOMMUNICATIONS SYSTEM - A method including generating a plurality of convergence layer protocol data units in a packet-switched telecommunications system protocol stack; ciphering said plurality of convergence layer protocol data units using a ciphering sequence number; transferring said plurality of ciphered convergence layer protocol data units to a link layer of the packet-switched telecommunications system; discarding at least one ciphered convergence layer protocol data unit at the link layer and generating a link layer protocol data unit from at least one of the ciphered convergence layer protocol data units that has not been discarded; and transmitting the link layer protocol data unit and information relating to the discarding for a peer link layer.12-08-2011
20110299682Security Solution For Voice Over LTE Via GAN (VoLGA) - A VoLGA Access Network Controller (VANC), a User Equipment, and methods are described herein for providing security to Voice over Long-Term Evolution via Generic Access (VoLGA) traffic.12-08-2011
20110311047METHOD OF MAKING SECURE A LINK BETWEEN A DATA TERMINAL AND A DATA PROCESSING LOCAL AREA NETWORK, AND A DATA TERMINAL FOR IMPLEMENTING THE METHOD - This method makes secure a link, for example a radio link, between a data terminal (PDA12-22-2011
20120002810SHORT MESSAGE SERVICE CIPHER - A wireless phone system and methods performed thereon for cryptographically processing SMS messages is disclosed. A cryptographic pad is used to replace characters in a payload of a SMS message with coded characters. The cryptographic pad is used by the receiver of the SMS message to decode it. The cryptographic pad is one of two or more possible cryptographic pads stored in the receiver. In one embodiment, the two or more possible cryptographic pads are sent as a key where a particular cryptographic pad is referenced in the key using an index.01-05-2012
20120008775SYSTEM AND METHOD FOR SECURE TRANSACTION OF DATA BETWEEN WIRELESS COMMUNICATION DEVICE AND SERVER - The present application provides a system and method for a set of Extensible Authentication Protocols (EAPs) based on ECC (Elliptic Curve Cryptography) and SKE (Symmetric Key Encryption) mechanisms (with a suitable permutation) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost. According to one embodiment, a method and system of ECC and SKE based EAPs (through a permutation technique) which can avoid replay attacks. The application also provides a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G Applications and no certificates exchanged during the communication.01-12-2012
20120008776WIRELESS COMMUNICATION APPARATUS - Influence on a key used between a user equipment and a base station, which will be imposed by unsecured updating of a key between the base station and a relay node when a relay node is being introduced is diminished. An HO request processing unit (01-12-2012
20120020477METHOD FOR DECRYPTING AN ENCRYPTED PACKET WITHIN A WIRELESS COMMUNICATION DEVICE, AND CORRESPONDING DEVICE - Method for decrypting, within a wireless communication device, a sequence of encrypted packets received via a wireless communication channel between the communication device and a cell assigned to this device, comprising for each packet the following steps:—the computation of an encrypting sequence corresponding to the packet (01-26-2012
20120039468WIRELESS COMMUNICATION APPARATUS - To make it possible for a legacy user equipment to correctly generate and use a common key between a user equipment and a base station and between the user equipment and a relay node when the relay nodes are being introduced. An HO request processing unit (02-16-2012
20120057701MOBILE TERMINAL WITH ENCRYPTION CHIP AND RELATED NETWORK LOCKING/UNLOCKING METHOD - A mobile terminal is provided with a network lock functionality for a network. The mobile terminal includes a subscriber identity module (SIM) slot configured to host a SIM card or an unlocking device, a control chip, an encryption chip, and a network locking module. The control chip is coupled to the SIM slot through a first interface, the encryption chip is coupled to the SIM slot through the first interface to communicate with a module inserted into the SIM slot, and the network locking module is coupled to the encryption chip through a second interface. Further, the network locking module is configured to perform the network lock functionality. The network locking module also has an “open” state supporting a network unlocking operational mode and a “close” state supporting a network locking operational mode. In addition, the encryption chip is configured to determine whether the module inserted into the SIM slot is the SIM card or the unlocking device and, when the encryption chip determines that the inserted module is not the unlock device, to set the “open” state or the “close” state of the network locking module to control the mobile terminal to enter in the network unlocking operational mode or the network locking operational mode, respectively.03-08-2012
20120106734SAFE HANDOVER METHOD AND SYSTEM - The present invention provides a safe handover method and system which are applied in a handover process of a terminal in the next generation network, wherein the next generation network comprises a handover management module, an authentication server and a terminal. The safe handover method comprises: presetting initial safety parameters in the authentication server and the terminal, and generating safety parameters from the initial safety parameters; the handover management module obtaining the safety parameters; and the handover management module and the terminal interacting with each other by using the generated safety parameters to ensure a communication safety between the two communication parties. The present invention can ensure the communication safety between the terminal and the handover management module.05-03-2012
20120114122SOURCE PROGRAMMING AND MANAGEMENT SYSTEM FOR LOCKS COMPRISING CONTACTLESS COMMUNICATION MEANS THAT CAN BE CONTROLLED BY A PORTABLE NFC TELEPHONE - The invention relates to a system comprising a lock (40) provided with NFC circuits, a mobile phone (32) also provided with NFC circuits, a remote lock management site (18), and a mobile network operator (20). For each lock, the management site generates a unique random algorithm, a unique identifier (PUID) and transport keys and transmits the identifier and the transport keys to a lock manufacturer (16). The mobile network operator receives a unique lock identifier (PUID) from the user and transmits same to the handling site which, in return, transmits the unique random algorithm, the cryptographic key, the transport key and the user key corresponding to the lock to the phone. The phone implements the initial programming of the lock, by loading the unique random algorithm, the cryptographic key and the user key onto the lock and, subsequently, the phone activates a secure cryptographic procedure.05-10-2012
20120148043Network Access Via Telephony Services - A network provider can receive a request, via a first mobile device and a mobile wireless telephone network, for access to a wireless network secured with at least one encryption key and implemented by at least one wireless access point. In response to the request, the network provider can associate the first mobile device with a user account of a user and can provide a token to a registrar and to the first mobile device via the mobile wireless telephone network. The registrar can receive, from the first mobile device or a second mobile device associated the user via the wireless access point. After determining, based on the one or more hash values, that the first or second mobile device has possession of the token, the registrar can provide the encryption key to that mobile device.06-14-2012
20120189120SYSTEM AND METHOD FOR PROTECTING DATA OF MOBILE PHONE - In a method for protecting data of a mobile phone, the mobile phone includes a storage system. The storage system stores a plaintext file to be encrypted and an international mobile equipment identification (IMEI) number of the mobile phone. The IMEI number of the mobile phone and the plaintext file are read from the storage system. A ciphertext is generated from the plaintext file according to the IMEI number of the mobile phone using an encryption algorithm. The IMEI number of the mobile phone and the ciphertext are read from the storage system when the ciphertext needs to be decrypted. The plaintext file is recovered from the ciphertext according to the IMEI number of the mobile phone using a decryption algorithm.07-26-2012
20120195427Location Restricted Content Deliver over a Network - Delivering content to a requesting device over a content delivery network, the content being deliverable in only one or more restricted geographic regions and the requesting device being communicatively connected to a cellular communications service provider via a cellular communications network, the method comprising steps of: receiving a network identifier of the requesting device uniquely identifying the requesting device in the cellular communications network; transmitting a verification message over the cellular communications network for receipt by the requesting device; receiving, from the requesting device, an access control submission; receiving, from the cellular communications service provider, location information corresponding to a geographic location of the requesting device; and in response to a determination that the access control submission derives from the transmitted verification message and the location information indicates the requesting device is in one of the one or more restricted geographic regions, delivering the content to the requesting device. 08-02-2012
20120230488AUTHENTICATING NETWORK ELEMENTS IN A COMMUNICATION SYSTEM - A system that incorporates teachings of the present disclosure may include, for example, a computer-readable storage medium in a communication device having computer instructions to establish communications with a cellular base station, generate a message request, and transmit to an authentication device by way of the cellular base station the message request. The computer-readable storage medium can also have computer instructions to receive from the authentication device by way of the cellular base station a message response, authenticate the message response, and determine from the authenticated message response whether the cellular base station is an approved network element of a cellular communication system. Other embodiments are disclosed.09-13-2012
20120300927METHOD OF REGISTERING SMART PHONE WHEN ACCESSING SECURITY AUTHENTICATION DEVICE AND METHOD OF GRANTING ACCESS PERMISSION TO REGISTERED SMART PHONE - A method for registering a Smartphone when accessing security authentication device and a method for access authentication of a registered Smartphone are provided. When a Smartphone based application searches for a device and attempts an access to the found device, the search and access for the device is limited according to a result of authentication using an activation code.11-29-2012
20120308004MASTER CIPHER KEY - A mobile telecommunications network and method of operation that includes establishing a first user plane connection between a telecommunications device registered with the network and a network gateway device of the network via a first access point; providing the telecommunications device with a token using the first user plane connection; establishing a second user plane connection between the telecommunications device and the network gateway device via a second access point by using the token information to validate the telecommunications device; and, subsequent to establishment of and corresponding to the second user plane connection, establishing a control plane connection between the telecommunications device and the network gateway device via the second access point. The token includes information indicative to the network that the telecommunications device has authorization to send a quantity of data to the network gateway device prior to full conventional authentication of the telecommunications device.12-06-2012
20120314859METHOD FOR THE AUTHENTICATION OF APPLICATIONS - Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a network. The control server receives via the network, analyses and verifies identification data comprising at least an identifier of the equipment and an identifier of the security module, generates a cryptogram comprising a digest of the application, the identification data and instructions intended for the security module and transmits the cryptogram, via the network and the equipment, to the security module. The latter verifies the application by comparing the digest extracted from the cryptogram with a calculated digest, wherein, during at least one of initialization and activation of the application, the security module executes the instructions extracted from the cryptogram and either releases or blocks access to certain resources of said security module according to a result of the verification of the application.12-13-2012
20120314860Method and apparatus for communication based on pseudo-contact information - The disclosure discloses a method for communication based on pseudo-contact information, which including: when a call is received, acquiring contact information of a calling party, and encrypting the contact information by using a preset encryption algorithm to acquire pseudo-contact information; when the pseudo-contact information does not match locally stored pseudo-contact information, displaying real contact information of the calling party, wherein the locally stored pseudo-contact information represents the pseudo-contact information generated by encrypting the contact information to be stored according to the preset encryption algorithm and locally stored; and when the pseudo-contact information matches the locally stored pseudo-contact information, displaying a substituted contact information generated by substituting a plurality of bits of the real contact information of the calling party with an identifier. The disclosure further discloses another method for communication based on pseudo-contact information and an apparatus for communication based on pseudo-contact information. The disclosure can solve the problems of higher operation complexity and lower safety performance of the method for protecting contact information stored on a terminal mentioned in the related art.12-13-2012
20130064369LAN-BASED UMA NETWORK CONTROLLER WITH AGGREGATED TRANSPORT - A method for managing UMA communications within a local area network and a network controller are disclosed. The method includes establishing a first connection between a first UMA device and a LAN-based UMA network controller (LAN-UNC) and establishing a second connection between a second UMA device and the LAN-UNC. The first and second connections are carried over the local area network. The first and second UMA devices are connected to the same local area network. The method provides establishing a third connection between the LAN-UNC and a UMA network controller (UNC). The UNC is connected to an external network and the third connection extends over the external network. The method includes transporting packets received using the first and second connections to the UNC using the third connection. Packets received using the third connection are transported to the first UMA device using the first connection and to the second UMA device using the second connection.03-14-2013
20130077787SYSTEM AND METHOD FOR CALL ROUTING FOR EFFICIENT USE OF TELECOMMUNICATION SPECTRUM - The present invention relates to a system and method for routing a data from one or more mobile communication channel to one or more fixed communication channel in a resource efficient manner. The delinking router of the system communicates with the one or more mobile communication channel and with one or more fixed communication channel and transmits the request to a Base Transmitting Station (BTS) for routing the data from the mobile communication channel to the fixed communication channel. The delinking router also reduces energy and spectrum consumption of the mobile communication channel by turning off its radio frequency module after routing its data to the fixed communication channel.03-28-2013
20130195268Call Handover Between Cellular Communication System Nodes That Support Different Security Contexts - In the context of facilitating a circuit switched to packet switched handover of a call in a cellular communication system, a first node (e.g., packet switched target node) generates a security context for a client whose call is being handed over. This involves the first node receiving at least one cryptographic key from a second node (e.g., a circuit switched node supporting the existing connection) and receiving identities of security algorithms supported by the client from a third node (e.g., a packet switched node supporting the existing connection); The first node uses the at least one cryptographic key and the identities to generate the security context for the client.08-01-2013
20130195269METHODS AND SYSTEMS FOR SLOW ASSOCIATED CONTROL CHANNEL SIGNALING - Methods and systems for slow associated control channel signaling are disclosed. An example method for securing communications in a mobile network disclosed herein comprises transmitting a first variant of a message of a first type on a first slow associated control channel (SACCH) before ciphering is started on the first SACCH, and after ciphering is started on the first SACCH, transmitting a second variant of the message of the first type on the first SACCH, and subsequently transmitting the second variant of the message of the first type on the first SACCH, wherein the subsequently transmitted second variant of the message of the first type is the next transmitted message of the first type on the first SACCH.08-01-2013
20130216042ENCRYPTION IN A WIRELESS TELECOMMUNICATIONS - An example of the present invention is a method of transmitting encrypted user data to a mobile terminal in a wireless telecommunications network. The method comprises sending to the mobile terminal a data packet. The data packet comprises both an identifier of encryption information to used in recovering encrypted user data, and user data encrypted using said encryption information.08-22-2013
20130259229USER MANAGED NUMBER PRIVACY AND CALL ACCESSIBILITY - A system and method for maintaining privacy of a user's telephone number is disclosed. The method provides a means by which a user A may prefer to exchange her contact number with another user B. The contact number is encrypted by user A and passed on to the mobile phone of user B. In the phonebook of user B, the contact number of user A is stored in encrypted format. Further, when user B initiates a call to user A, the encrypted number is sent to the network. At the MSC of user B, the number is decrypted and a call is established with user A. When user A calls user B, user A's number is encrypted at user B's MSC. This is transmitted to user B, where it is compared with the already encrypted number in the phonebook. The matching name of user A is then displayed.10-03-2013
20130329884SYSTEM AND METHOD FOR ENABLING VPN-LESS SESSION SETUP FOR CONNECTING MOBILE DATA DEVICES TO AN ENTERPRISE DATA NETWORK - A mobile application gateway configured to interconnect mobile communication devices on a cellular network with an enterprise network is provided. The mobile application gateway includes a voice and data signaling gateway configured to provide routing functionalities, service functionalities and admission control. A gateway GPRS support node (GGSN) is configured to establish a secure data session between one or more of the mobile communication devices and the enterprise network by establishing a GPRS tunneling protocol (GTP) tunnel between a carrier-hosted serving GPRS support node (SGSN) and the GGSN.12-12-2013
20140003604AUTHENTICATION OF A MOBILE DEVICE BY A NETWORK AND KEY GENERATION01-02-2014
20140003605CIRCUIT ARRANGEMENT AND A METHOD FOR ROAMING BETWEEN A VISITED NETWORK AND A MOBILE STATION01-02-2014
20140112472Geospatial Cryptography - The invention includes methods for cryptographically authenticating access between devices when the devices are within a geospatial boundary comprising the first step of keeping track of the physical position of the devices using both low and, or high fidelity geospatial positioning techniques. Next, a first device determines whether any nearby mobile devices have entered the geospatial boundary. Next, the first device determines if any of the mobile devices are peers eligible for cryptographic authentication. After the first device authenticates that the other device within the geospatial boundary is a trusted peer, the devices may perform various data and, or dynamic policy operations.04-24-2014
20140140507METHOD FOR CHANGING MNO IN EMBEDDED SIM ON BASIS OF DYNAMIC KEY GENERATION AND EMBEDDED SIM AND RECORDING MEDIUM THEREFOR - The present invention Includes using an embedded SIM (eSIM) associated with a newly-opened mobile network operator (MNO) system and a receiving MNO system, the method performs the steps of: generating a security domain (SD) for a receiving MNO on the basis of a request from the newly-opened MNO system; injecting a prior SD key value; installing a secure applet for key generation and secure arithmetic operations, injecting a new SD key value on the basis of a request from the receiving MNO, and transmitting only a public key to the receiving MNO system after generating key pairs for the receiving MNO; and decoding a receiving MNO profile with a private key corresponding to the public key after receiving the receiving MNO profile from the receiving MNO system or the newly-opened MNO system.05-22-2014
20140161256SECURITY FOR NETWORK LOAD BROADCASTS OVER CELLULAR NETWORKS - A method, computer readable medium and apparatus for obtaining cellular network load information in a secure manner are disclosed. For example, the method receives the cellular network load information, where the cellular network load information is encrypted. The method then decrypts the cellular network load information using a decryption key and performs a task responsive to the network load information that is decrypted.06-12-2014
20140219447METHOD FOR MANAGING PROFILE OF EMBEDDED UICC, AND EMBEDDED UICC, EMBEDDED UICC-EQUIPPED TERMINAL, PROVISION METHOD, AND METHOD FOR CHANGING MNO USING SAME - The present invention provides a method wherein an MNO receives a secret key allocated to a corresponding embedded UICC (eUICC) through SM-SR (secure routing) in an environment where SM is divided and implemented as SM-SR and SM-DP (data preparation), that is, provided is a method wherein the MNO dynamically acquires the secret key (public key or the like) from the corresponding eUICC through the SM-SR and uses the acquired secret key. In addition, the present invention allows the eUICC to receive an encrypted profile from the MNO or the SM and decrypts the encrypted profile using profile access credential information (a secret key corresponding to an eUICC public key) stored in the eUICC to use the decrypted profile, thereby securely transmitting important data such as operation profiles, and blocking external entities such as a device or terminal from accessing the important data.08-07-2014
20140321646METHOD FOR THE AUTHENTICATION OF APPLICATIONS - Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a network. The control server receives via the network, analyses and verifies identification data comprising at least an identifier of the equipment and an identifier of the security module, generates a cryptogram comprising a digest of the application, the identification data and instructions intended for the security module and transmits the cryptogram, via the network and the equipment, to the security module. The latter verifies the application by comparing the digest extracted from the cryptogram with a calculated digest, wherein, during at least one of initialization and activation of the application, the security module executes the instructions extracted from the cryptogram and either releases or blocks access to certain resources of said security module according to a result of the verification of the application.10-30-2014
20150016609Authentication In Heterogeneous IP Networks - The invention proposes a system for authenticating and authorizing network services comprising: a mobile device being adapted to, upon receipt of an information message indicating at least one network access type, determine the network access type, to create a start message containing at least a user identity, and to encapsulate the start message in an authentication message compatible with the access network identified in the information message, and an access controller for reading the encapsulated message from the mobile and forwarding the encapsulated message to an authentication server identified in the encapsulated message. The invention also proposes a corresponding method for authenticating and authorizing network services, and an access control device, a subscriber device and a router device.01-15-2015
20150110270Secure Virtualized Mobile Cellular Device - Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance host server contains a virtualized instance of an enterprise environment. Base station controllers are in communication with and control the base transceiver stations. A mobile switching center in communication with the base station controllers contains the virtualized-instance host server. A cellular communication device is in communication with an edge node server, and an auxiliary data display entry device is in communication with the cellular communication device such that the virtualized instance of the enterprise environment is on the edge node server. Communications between the auxiliary display and data entry device are encrypted. In addition, movement of the cellular communication device within the cellular communication network are anticipated so that additional remote virtualized instances of the enterprise environment are provided on candidate future edge servers.04-23-2015
20160044505METHOD TO ESTABLISH A SECURE VOICE COMMUNICATION USING GENERIC BOOTSTRAPPING ARCHITECTURE - The present invention relates to a method to establish a secure voice communication session between two user equipments with the help of a dedicated Network Application Function (NAF) and at least one Bootstrapping Server Function. A session key is calculated from bootstrapping service derived external or internal NAF keys of the first and the second user equipments. A secured voice communication is established using the calculated session key.02-11-2016
20160057619EMBEDDING CLOUD-BASED FUNCTIONALITIES IN A COMMUNICATION DEVICE - Techniques for enhancing the security of a communication device may include providing an application agent that executes in a trusted execution environment of the communication device, and a transaction application that executes in a normal application execution environment of the communication device. The application agent may receive, from the application, a limited-use key (LUK) generated by a remote computer, and store the LUK in a secure storage of the trusted execution environment. When the application agent receives a request to conduct a transaction from the application executing in the normal execution environment, the application agent may generate a transaction cryptogram using the LUK, and provides the transaction cryptogram to an access device.02-25-2016
20160127902MOBILE DEVICE AUTHENTICATION IN HETEROGENEOUS COMMUNICATION NETWORKS SCENARIO - A method and device for authenticating a user of a communication device accessing an online service. The online service is accessible over a data network and is provided through a service platform. The communication device is connected to a mobile phone network and to the data network. The communication device includes an interface software application configured to interact with the service platform through the data network for fruition of the online service, and a messaging function configured to send messages through the mobile phone network. A user-side authentication application is provided at the communication device, a provider-side authentication application is provided at the service platform, and an authentication control function is provided in communication relationship with the provider-side authentication application and with the mobile phone network.05-05-2016
20160173456Dynamic Spectrum Audio Encryption and Decryption Device06-16-2016
380248000 Visiting center 2
20100040230CRYPTOGRAPHIC TECHNIQUES FOR A COMMUNICATIONS NETWORK - Techniques are described for enabling authentication and/or key agreement between communications network stations and service networks. The techniques described include the negotiation and use of a cryptographic primitive shared between a service network and a home environment of a station. The techniques described also feature a key usage indicator, such as a sequence number, maintained by the service network and a station. Comparison of the key usage indicators can, for example, permit efficient authentication of the service network.02-18-2010
20100158248MOBILE COMMUNICATIONS SYSTEM, NEXT GENERATION CORE NETWORK, AND HANDOVER METHOD THEREOF - Data forwarded from forward units (06-24-2010
380249000 Initialization 4
20110158407PROCESS OF MANUFACTURING A HANDHELD DEVICE, INVOLVING KEYS - An electronic circuit includes a more-secure processor having hardware based security for storing data. A less-secure processor eventually utilizes the data. By a data transfer request-response arrangement between the more-secure processor and the less-secure processor, the more-secure processor confers greater security of the data on the less-secure processor. A manufacturing process makes a handheld device having a storage space, a less-secure processor for executing modem software and a more-secure processor having a protected application and a secure storage. A manufacturing process involves generating a per-device private key and public key pair, storing the private key in a secure storage where it can be accessed by the protected application, combining the public key with the modem software to produce a combined software, signing the combined software; and storing the signed combined software into the storage space. Other processes of manufacture, processes of operation, circuits, devices, wireless and wireline communications products, wireless handsets and systems are disclosed and claimed.06-30-2011
20120027209USING A TRUSTED-PLATFORM-BASED SHARED-SECRET DERIVATION AND WWAN INFRASTRUCTURE-BASED ENROLLMENT TO ESTABLISH A SECURE LOCAL CHANNEL - A system and method for establishing a connection on a mobile computing device includes generating a secret on a trusted platform of the mobile computing device. The secret is transported to a subscriber identity module (SIM)/Smartcard on the mobile computing device. A secure local communication channel is established between the trusted platform and the SIM/Smartcard using the secret.02-02-2012
20150071437SYSTEM AND METHODS FOR UICC-BASED SECURE COMMUNICATION - A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.03-12-2015
20160173493APPARATUSES, METHODS AND SYSTEMS FOR CONFIGURING A TRUSTED JAVA CARD VIRTUAL MACHINE USING BIOMETRIC INFORMATION06-16-2016
380250000 Usage pattern detection 1
20090202073Random wave envelope derived random numbers and their use in generating transient keys in communication security applications part II - A random wave envelope is created from a set of bounded random numbers by additively combining a triangle, a square and a sine wave. The random wave envelope is then used to create a sequence of wave random numbers from the wave envelope, which are used to generate random-variant keys for encryption in place of the pre-placed encryption key. An ambiguity envelope is thus created over the transmission of data packets as random-variant-keys are used that are distinct and separate for each packet and may also be distinct and separate for each incoming and outgoing packet. The random-variant keys are only created at the time of the actual use for encrypting or decrypting a data packet and not before and then discarded after one time use. The random-variant keys may be used in wireless network using wireless access points, cellular phone and data networks and ad hoc mobile wireless networks.08-13-2009

Patent applications in class CELLULAR TELEPHONE CRYPTOGRAPHIC AUTHENTICATION

Patent applications in all subclasses CELLULAR TELEPHONE CRYPTOGRAPHIC AUTHENTICATION

Website © 2025 Advameg, Inc.