Patent application number | Description | Published |
20090209259 | System and method for performing handovers, or key management while performing handovers in a wireless communication system - Example embodiments provide a method for performing handovers and key management while performing handovers. The method includes communicating a random handover seed key protected by a secure protocol from a core component of a network to a user equipment. The secure protocol prevents the random handover seed key from being learned by base stations supported by the core component of the network. The secure protocol may be non-access stratum signaling of an evolved packet system environment for wireless communications. | 08-20-2009 |
20090220087 | Systems and method for performing handovers, or key management while performing handovers in a wireless communication system - Example embodiments provide a method for performing handovers and key management while performing handovers. The method includes communicating a random handover seed key protected by a secure protocol from a core component of a network to a user equipment. The secure protocol prevents the random handover seed key from being learned by base stations supported by the core component of the network. The secure protocol may be non-access stratum signaling of an evolved packet system environment for wireless communications. | 09-03-2009 |
20100266107 | EMERGENCY CALL HANDLING IN ACCORDANCE WITH AUTHENTICATION PROCEDURE IN COMMUNICATION NETWORK - Techniques are provided for handling of an emergency call as it affects an authentication procedure in a communication network. For example, it is assumed that, in a communication network, a first computing device comprises user equipment and a second computing device comprises an authentication function. Thus, a method comprises the following steps. A first type call indicator message is received at the second computing device from the first computing device. A decision is made to proceed with or drop an authentication procedure for the first computing device at the second computing device based on the first type call indicator message. The second computing device may enable a first type call to be placed for the first computing device. The first type call may be an emergency call. | 10-21-2010 |
20110170694 | Hierarchical Key Management for Secure Communications in Multimedia Communication System - In a communication system wherein a first computing device is configured to perform a key management function for first user equipment and a second computing device is configured to perform a key management function for second user equipment, wherein the first user equipment seeks to initiate communication with the second user equipment, wherein the first computing device and the second computing device do not have a pre-existing security association there between, and wherein a third computing device is configured to perform a key management function and has a pre-existing security association with the first computing device and a pre-existing security association with the second computing device, the third computing device performing a method comprising steps of: receiving a request from one of the first computing device and the second computing device; and in response to the request, facilitating establishment of a security association between the first computing device and the second computing device such that the first computing device and the second computing device can then facilitate establishment of a security association between the first user equipment and the second user equipment. The first computing device, the second computing device and the third computing device comprise at least a part of a key management hierarchy wherein the first computing device and the second computing device are on a lower level of the hierarchy and the third computing device is on a higher level of the hierarchy. | 07-14-2011 |
20110249609 | Secure Relay Node in Communication System - Techniques are disclosed for use in securing communications in environments such as those employing relay nodes. For example, in a communication network wherein a first computing device comprises a user node, a second computing device comprises a relay node, and a third computing device comprises a network access node, and wherein the relay node comprises: a first module for connecting the user node to the communication network; and a second module for connecting the relay node to the network access node, a method comprises the following steps. At least one packet is received at the first module of the relay node from the user node over an interface established between the user node and the relay node. At least one packet is sent from the first module of the relay node to the second module of the relay node via a secure channel established by the first module in accordance with a secure communication protocol. The at least one packet is sent from the second module of the relay node to the network access node via the secure channel and over an interface established between the relay node and the network access node. | 10-13-2011 |
20120198227 | CIPHER KEY GENERATION IN COMMUNICATION SYSTEM - Techniques are disclosed for generating a cipher key such that an encryption algorithm typically usable in accordance with a first security context can be used in accordance with a second security context. In one example, the first security context is a UMTS security context and the second security context is a GSM security context. | 08-02-2012 |
20120238245 | PREVENTION OF EAVESDROPPING TYPE OF ATTACK IN HYBRID COMMUNICATION SYSTEM - Techniques are disclosed for use in securing communications in environments comprising hybrid communication systems. For example, a method comprises, in a hybrid communication system wherein at least one computing device is configured to selectively operate in a first communication mode or a second communication mode, preventing the at least one computing device from completing an attachment process in the first communication mode when it is determined that authentication data being used to authenticate the at least one computing device in the first communication mode was generated for an authentication process in the second communication mode. | 09-20-2012 |
20130157673 | NETWORK OPERATOR-NEUTRAL PROVISIONING OF MOBILE DEVICES - Techniques are disclosed for provisioning mobile devices in a network operator-neutral manner in communication networks. For example, a method comprises a mobile device that is operator neutral attaching to a first operator network, and the operator neutral mobile device establishing a provisioning bearer in the first operator network. | 06-20-2013 |
20130185372 | MANAGEMENT OF USER EQUIPMENT SECURITY STATUS FOR PUBLIC WARNING SYSTEM - Techniques are disclosed for making one or more computing devices in a communication network aware of a public warning system security policy of at least one entity. In one example, a method comprises the following steps. An indicator of a public warning system security policy of at least one entity is associated with a control plane message. The control plane message, with the indicator of the public warning system security policy of the at least one entity, is generated by a first computing device of a communication network. The first computing device transmits the control plane message, with the indicator of the public warning system security policy of the at least one entity, to a second computing device of the communication network. The second computing device is made aware of the public warning system security policy of the at least one entity. | 07-18-2013 |
20130185561 | MANAGEMENT OF PUBLIC KEYS FOR VERIFICATION OF PUBLIC WARNING MESSAGES - Techniques are disclosed for managing one or more public keys used for verification of one or more messages transferred over a communication network associated with a public warning system. In one example, a method comprises the following steps. A computing device of a communication network obtains key material for at least one source of a message generated for a public warning system. The computing device also obtains an identity of the source. A public key is computed by the computing device from the key material and the identity of the source. The public key is thus useable by the computing device to verify a message received from the source that is digitally signed using a corresponding private key of the source. In one example, the computing device comprises user equipment. | 07-18-2013 |
20140162587 | EMERGENCY CALL HANDLING IN ACCORDANCE WITH AUTHENTICATION PROCEDURE IN COMMUNICATION NETWORK - Techniques are provided for handling of a first type call as it affects an authentication procedure in a communication network. For example, it is assumed that, in a communication network, a first computing device comprises user equipment and a second computing device comprises an authentication function for authenticating the user equipment. Thus, a method comprises receiving at the second computing device from the first computing device an authentication rejection message, receiving at the second computing device from the first computing device a first type call indicator message, and making a decision regarding proceeding with or dropping an authentication procedure for the first computing device at the second computing device based on the receipt of the authentication rejection message and the first type call indicator message. | 06-12-2014 |
20140184411 | ALARM CONDITION PROCESSING IN NETWORK ELEMENT - Techniques for alarm condition processing in communication networks. In one example, a method comprises the following steps. An alarm condition associated with a network element of a communication network is detected. Alarm indication data is generated based on the alarm condition detected. The alarm indication data is protected using a cryptographic key to generate protected alarm indication data. The protected alarm indication data (e.g., tamper evidence) is stored in a non-volatile memory, and may be reset either autonomously (e.g., timer expiration) or from the communication network. | 07-03-2014 |
20150024714 | PREVENTION OF EAVESDROPPING TYPE OF ATTACK IN HYBRID COMMUNICATION SYSTEM - Techniques are disclosed for use in securing communications in environments comprising hybrid communication systems. For example, a method comprises, in a hybrid communication system wherein at least one computing device is configured to selectively operate in a first communication mode or a second communication mode, preventing the at least one computing device from completing an attachment process in the first communication mode when it is determined that authentication data being used to authenticate the at least one computing device in the first communication mode was generated for an authentication process in the second communication mode. | 01-22-2015 |
Patent application number | Description | Published |
20090079565 | SYSTEM AND METHOD FOR TRACKING AN INVENTORY WITHIN AN ASSET - A technique is provided for tracking and/or monitoring an inventory within one or more assets. The technique includes activating a plurality of antennas on each of the one or more assets in turn for a specified period of time, and receiving a response from an RFID tag attached to the inventory through the plurality of antennas located on an asset having the inventory along with a positional information of the asset having the inventory. | 03-26-2009 |
20110054731 | SYSTEM AND METHOD FOR BI-DIRECTIONAL WIRELESS INFORMATION TRANSFER - A system and method a bi-directional wireless information system includes a plurality of sensor nodes spaced along a path of travel of an object, each of the sensor nodes corresponding to a specified location along the path of travel. The system also includes a transceiver associated with the object, the transceiver configured to communicate with the plurality of sensor nodes, such that a location of the object is determinable based on wireless communication between the transceiver and the plurality of sensor nodes. A central database included in the system is configured to receive the location of the object from at least one of the transceiver and the plurality of sensor nodes, receive object-specific data from at least one of the transceiver and the plurality of sensor nodes, and transmit location-specific data to the transceiver. | 03-03-2011 |
20110078024 | SYSTEM AND METHOD FOR PROVISIONING ADVERTISEMENTS TO A VEHICLE USER - A method for provisioning of advertisement to a user of a vehicle is provided. The method comprises determining information comprising attributes associated with behavior of the user, analyzing the information of the user and communicating at least one advertisement to the user wherein the at least one advertisement is based on the analyzed information. | 03-31-2011 |
20110184588 | SYSTEM AND METHOD FOR ESTIMATING AND DETECTING SPEED - A system for determining instances when a vehicle's indicated speed exceeds a governing speed includes a receiver to receive information from which a vehicle's location envelope, indicated direction of travel, and indicated speed can be derived, and a processor. The processer is configured to ascertain a location envelope in which the vehicle is located, an indicated speed of the vehicle, and a direction of travel of the vehicle at a sample time. It is also configured to select the governing speed for the vehicle at the sample time, which includes ascertaining possible road segments with at least a portion within the location envelope, eliminating road segments with a road segment direction of travel inconsistent with the indicated direction of travel, and selecting as the governing speed a speed associated with a remaining road segment. The processor will then determine if the indicated speed exceeds the governing speed. | 07-28-2011 |
20110208667 | SYSTEM AND METHOD FOR EMISSIONS REDUCTION - A method for reducing emissions from a plurality of moving assets includes receiving trip pattern data corresponding to positions and times from the moving assets and the preference data from a plurality of users. A database of trips made by the moving assets is then generated based on the trip pattern data and trip consolidation opportunities for the moving assets are identified based on the generated database. The method also includes ranking the trip consolidation opportunities based on the preference data and utilizing the ranked trip consolidation opportunities to provide shipping recommendations designed to reduce fuel consumption of the moving assets. | 08-25-2011 |
20110246067 | SYSTEM AND METHOD FOR DYNAMIC ROUTING - A dynamic routing system includes a data collection module, a static routing module, an orientation module, a learning module, and a route determination module. The data collection module receives real time trip data corresponding to a moving asset from a remote location, and the static routing module determines candidate routes from a source to a destination for the moving asset. The orientation module is configured to gather publically available information associated with candidate routes, and the learning module is configured to generate a learned route database based on the publically available information from the orientation module and the real time trip data from the data collection module. The route determination module determines an optimized route for the moving asset based on the learned route database. The system further includes a communication interface configured to transmit an optimized route signal. | 10-06-2011 |
20120323404 | SYSTEM AND METHOD FOR ESTIMATING AND DETECTING SPEED - A system for determining instances when a vehicle's indicated speed exceeds a governing speed includes a receiver to receive information from which a vehicle's location envelope, indicated direction of travel, and indicated speed can be derived, and a processor. The processor is configured to ascertain a location envelope in which the vehicle is located, an indicated speed of the vehicle, and a direction of travel of the vehicle at a sample time. It is also configured to and select the governing speed for the vehicle at the sample time, which includes ascertain possible road segments with at least a portion within the location envelope, eliminate road segments with a road segment direction of travel inconsistent with the indicated direction of travel, and select as the governing speed a speed associated with a remaining road segment. The processor will then determine if the indicated speed exceeds the governing speed. | 12-20-2012 |