会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Access Control for a Wireless Network
    • 无线网络的访问控制
    • US20160337858A1
    • 2016-11-17
    • US15110767
    • 2014-01-14
    • TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    • Thomas WeidenfellerRalf Berger
    • H04W12/08H04W12/04H04W4/00H04W12/06
    • H04W12/08H04L63/107H04L63/18H04W4/80H04W12/04H04W12/06H04W88/06H04W88/10
    • The invention relates to techniques for restricting a wireless network access for a mobile device (200). There is provided an additional cross-checking functionality on a comparator (106) of an intermediate node (100). The mobile device (200) receives a user key (88) indicating a general validation to access the WLAN of a third party. The third party operates a key server (300). The key server (300) issues a key pair, consisting of the user key (88) and an operator key (99). The operator key (99) is sent to the intermediate node (100) and is processed by a processor (105). The mobile device (200) applies the received user key (88) to an identification set (200i), identifying the device's user, and sends a reference message (22) to the intermediate node (100) via a second communication channel (2). Thereinafter, the device (200) sends its identification set (200i) via another first communication channel (1) for authentication and for cross checking to the intermediate node (100). The intermediate node (100) in turn applies the received operator key (99) to the received message (22) and compares a validation result (33) thereof with the identification set (200i), received via the first communication channel (1). The WLAN network access for the device is only granted in case of identity.
    • 本发明涉及用于限制移动设备(200)的无线网络接入的技术。 在中间节点(100)的比较器(106)上提供了附加的交叉检查功能。 移动设备(200)接收指示进入第三方WLAN的通用验证的用户密钥(88)。 第三方操作密钥服务器(300)。 密钥服务器(300)发出由用户密钥(88)和操作员密钥(99)组成的密钥对。 操作员键(99)被发送到中间节点(100)并由处理器(105)处理。 移动装置(200)将接收到的用户密钥(88)应用于识别装置的用户的识别集(200i),并经由第二通信信道(2)向中间节点(100)发送参考消息(22) 。 以下,设备(200)经由另一第一通信信道(1)向其中间节点(100)发送其识别集(200i)用于认证和交叉检查。 中间节点(100)又将接收到的操作员密钥(99)应用于接收到的消息(22),并将其验证结果(33)与经由第一通信信道(1)接收的识别集(200i)进行比较。 设备的WLAN网络访问仅在身份认证时才被授予。
    • 3. 发明申请
    • Charging Record Authentication for Anonymized Network Service Utilization
    • US20180324307A1
    • 2018-11-08
    • US15774023
    • 2015-11-24
    • Telefonaktiebolaget LM Ericsson (publ)
    • Thomas Weidenfeller
    • H04M15/00H04W12/04H04W12/06H04M17/00H04W4/24H04M15/04
    • H04M15/41H04M15/04H04M15/06H04M15/48H04M15/857H04M17/103H04W4/24H04W12/04H04W12/06
    • A user device (10) provides a subscriber with access to a network service. The user device (10) determines service-specific key material and charging-specific key material. The user device (10) determines a charging record indicating usage of the network service by the subscriber and associates the charging record with first authentication information based on the charging-specific key material. The user device (10) generates at least one message including the charging record and the associated first authentication information. The user device (10) associates the at least one message with second authentication information based on the service-specific key material. The user device (10) sends the at least one message to a first network node (150) which is incapable of relating the charging-specific key material or the service-specific key material to a subscriber identity of the subscriber. The first network node (150) receives the at least one message and the associated second authentication information from the user device (10) and authenticates the at least one message based on the service-specific key material and the second authentication information. In response to authenticating the at least one message, the first network node forwards the charging record and the associated first authentication information to a second network node (120). The second network node (120) is capable of relating the charging-specific key material to the subscriber identity of the subscriber. The second network node (120) receives the charging record and the associated first authentication information from the first network node (150) and authenticates the charging record based on the charging-specific key material and the first authentication information. In response to authenticating the charging record, the second network node (120) controls charging of the network service.
    • 5. 发明授权
    • Charging record authentication for anonymized network service utilization
    • US10194033B2
    • 2019-01-29
    • US15774023
    • 2015-11-24
    • Telefonaktiebolaget LM Ericsson (publ)
    • Thomas Weidenfeller
    • H04M15/00H04W12/04H04M15/04H04M17/00H04W4/24H04W12/06
    • A user device (10) provides a subscriber with access to a network service. The user device (10) determines service-specific key material and charging-specific key material. The user device (10) determines a charging record indicating usage of the network service by the subscriber and associates the charging record with first authentication information based on the charging-specific key material. The user device (10) generates at least one message including the charging record and the associated first authentication information. The user device (10) associates the at least one message with second authentication information based on the service-specific key material. The user device (10) sends the at least one message to a first network node (150) which is incapable of relating the charging-specific key material or the service-specific key material to a subscriber identity of the subscriber. The first network node (150) receives the at least one message and the associated second authentication information from the user device (10) and authenticates the at least one message based on the service-specific key material and the second authentication information. In response to authenticating the at least one message, the first network node forwards the charging record and the associated first authentication information to a second network node (120). The second network node (120) is capable of relating the charging-specific key material to the subscriber identity of the subscriber. The second network node (120) receives the charging record and the associated first authentication information from the first network node (150) and authenticates the charging record based on the charging-specific key material and the first authentication information. In response to authenticating the charging record, the second network node (120) controls charging of the network service.