Patent application number | Description | Published |
20110222410 | COMMUNICATION METHOD WITH USER EQUIPMENT AND H(e) NB FOR MINIMIZING ACCESS NETWORK EXTENSION IMPACT - A communication method is adapted to a mobile communication system including a user equipment, a core network, and a small-scale radio base station, namely, a H(e) NB. The H(e) NB relays packets of data between the user equipment and the core network by way of radio communication with the user equipment and by way of wired communication with the core network. The H(e) NB monitors communications of the user equipment so as to compare the user communication information with a threshold value used for discerning unauthenticated communication from received communication, thus reducing the amount of data transferred between the core network and the user equipment performing the unauthenticated communication with exploitation. Thus, it is possible to prevent throughputs of data from decreasing due to unauthenticated exploitation of the H(e) NB with respect to the authenticated subscriber. | 09-15-2011 |
20110265145 | PROTECTION AGAINST UNSOLICITED COMMUNICATION FOR INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM - A PUCI system includes a user equipment (UE) and a PUCI application server holding user policies in connection to a home subscriber server (HSS) holding operator policies. A policy manager establishes the correlation between the user policies and the operator policies, thus determining whether to reject or forward an incoming call originated from a trusted/distrusted source network in accordance with prescribed rules/logics. | 10-27-2011 |
20110286394 | PROTECTION AGAINST UNSOLICITED COMMUNICATION FOR INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM - A protection against an unsolicited communication for an IMS (PUCI) system includes a call session control function (CSCF), and a plurality of PUCE application servers. The PUCI application servers make an evaluation as to whether a communication received from the user equipment is an unsolicited communication; the CSCF makes a decision on routing toward the PUCI application servers based on the evaluation; then, the PUCI application servers execute the routing based on the decision. | 11-24-2011 |
20110289217 | PROTECTION AGAINST UNSOLICITED COMMUNICATION FOR INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM - A PUCI system is designed to process an incoming call originated by the user equipment toward the counterpart user equipment via an EMS node having a PUCI-light functionality, which includes an IBCF/I-CSCF, a S-CSCF, and a database storing the PUCI-light information. Through a query to the database indicating a suspicious session in relation to the incoming call, the IMS node immediately blocks the suspicious session or simply marks the suspicious session for the further processing at a subsequent node. The reason for rejection is included in a SIP BYE/ERROR message of an original session setup message, which is interpreted by a previous IMS node so as to obtain the relevant information from a SIP header. The relevant information is stored in either a global operator policy database or a local database, thus enabling a PUCI-negating IMS node to reject an unsolicited call related to the blocked session. | 11-24-2011 |
20120110170 | MALICIOUS CALL DETECTION APPARATUS, MALICIOUS CALL DETECTING METHOD AND COMPUTER PROGRAM FOR DETECTING MALICIOUS CALLS - To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing portion. A SPIT determination portion evaluates the bind identification information in reference to the gray list and determines whether or not the session start request from the IP phone terminal is allowed. | 05-03-2012 |
20120117619 | SECURE NETWORK CONNECTION ALLOWING CHOICE OF A SUITABLE SECURITY ALGORITHM - The invention provides for a method for use in a mobile radio communications device network connection procedure and including the step of, at a network, sending to a mobile radio communications device a list of a plurality of security algorithms supported in the network and so as to allow choice of a suitable algorithm irrespective of the degree of update that the device may have experienced. | 05-10-2012 |
20120117623 | SECURE NETWORK CONNECTION - The invention provides for a method for use in a mobile radio communications network connection procedure and including the step of rejecting at a mobile radio communications device a handover request from a network responsive to determination of support of the security algorithm associated with the handover, and for a mobile radio communications device arranged to determine support of security algorithms as proposed by the network, preferably at AS level, within a handover command, and to provide notification to the network of rejection of the connection due to non-support of the algorithm. | 05-10-2012 |
20120129491 | METHOD OF PROVIDING TELECOMMUNICATIONS NETWORK SECURITY - Disclosed is a method of providing network security within a mobile radio communications network and including creating a security context for communications between a mobile radio communications device and the network, the security context being created responsive to an input parameter such as the downlink NAS count, and the method further including, as part of each initial handover attempt, controlling the parameter so as to apply a version of the parameter different from a previous version, for example as incremented downlink NAS count, and preferably independently of network signaling messages. | 05-24-2012 |
20120134484 | COMMUNICATION SYSTEM AND PROCESSING METHOD - A communication system shares terminal identification information (TII) used for identifying a terminal that sends a spam phone call, with another communication system belonging to another network provider, and includes: a storage section that stores the TII of a terminal that sends a spam phone call; a transmission section that transmits the TII stored in the storage section to the other communication system; a reception section that receives the TII used for identifying the terminal that sends the spam phone call; a registration section that registers the TII received by the reception section in the storage section; and a spam phone call determination section that determines whether there is a match between terminal information indicating information of an outgoing call terminal that sends a connection request, and the TII stored in the storage section, thereby determining whether the outgoing call terminal sends a spam phone call. | 05-31-2012 |
20130035056 | COMMUNICATIONS SYSTEM - A cellular communications system is provided in which a user device maintains and provides a last non-emergency security context to a core network when moving from a network that provided restricted services to a network that provides unrestricted services. In this way, re-authentication of the user device can be avoided in the network that provided unrestricted services. | 02-07-2013 |
20130136047 | SLEEPING EPC FOR ENERGY SAVING IN LTE - In order to save energy in EPS network, some of the MMEs and/or S-GWs are allowed to sleep (power down), when network's traffic load is decreased. When the traffic load becomes heavier, the network can power up some of the formerly sleeping MMEs and/or S-GWs. | 05-30-2013 |
20130137429 | ACCESS CONTROL FAILURE HANDLING FOR HENB INBOUND MOBILITY - When MME receives Handover required from source eNB/HeNB which contains CSG ID, it verifies whether the CSG subscription data it stores is fresh or expired. If it is expired, or if MME does not have any association data for UE, MME retrieves the latest CSG subscription data from HSS. MME rewrites its stored CSG subscription data with the one retrieved from HSS, if they are different. MME performs access control for the UE according to the CSG ID received from Handover required message and its CSG subscription data. When the access control is failed, a new message List Update Indication is proposed to be sent from source eNB/HeNB to UE. In order to indicate what caused the failure, an appropriate cause in the message is proposed. Upon receiving the message, UE updates its stored CSG whitelist, such that the CSG subscription data in UE and MME are synchronized. | 05-30-2013 |
20130138817 | METHOD FOR GROUP CHANGE ISSUES IN MTC - A gateway (GW) is optimized for security management, when a group member of MTC device changes group. The gateway performs access control to determine if MTC device can move to the target group. When the change is successfully completed, the gateway allocates group key of the target group to MTC devices. | 05-30-2013 |
20130163762 | RELAY NODE DEVICE AUTHENTICATION MECHANISM - A solution of relay node authentication is proposed. The solution includes mutual authentication of relay node and relay UICC, mutual authentication of relay node and network, secure channel establishment between relay UICC and relay node. AKA procedure in TS 33.401 is re-used so that no extra NAS message is needed. IMEI is sent to network in the initial NAS message, according to which MME-RN can retrieve RN's public key from HSS, and perform access control for DeNB. MME-RN will generate a session key based on IMSI, IMEI and Kasme, and encrypt it by RN's public key and send it to RN. UICC will also generate the same key and thus RN can authenticate both UICC and network. When the key or other parameters sent between UICC and RN do not match, UICC or RN will send Authentication Reject message with a new cause to inform network. | 06-27-2013 |
20130312063 | SECURE NETWORK CONNECTION - The invention provides for a method for use in a mobile radio communications network connection procedure and including the step of rejecting at a mobile radio communications device a handover request from a network responsive to determination of support of the security algorithm associated with the handover, and for a mobile radio communications device arranged to determine support of security algorithms as proposed by the network, preferably at AS level, within a handover command, and to provide notification to the network of rejection of the connection due to non-support of the algorithm. | 11-21-2013 |
20130324128 | SLEEPING CORE NETWORK NODES FOR ENERGY SAVING IN 3G NETWORKS - SGSNs in the same pool-arca share their resource information by using O&M messages or GTP-C messages. At least one of the SGSNs (Sleeping SGSN) decides to sleep (shut down or run in a low power state), based on the resource information. Then the Sleeping SGSN sends a power down notification to the connected RNC/BSC and SGSNs, thereby preventing the RNC/BSC from selecting the Sleeping SGSN for new connection and handovers, and transferring the load on the Sleeping SGSN to other SGSNs. | 12-05-2013 |
20140242952 | SECURE METHOD FOR MTC DEVICE TRIGGERING - Upon receiving a triggering message from a MTC server ( | 08-28-2014 |
20140351949 | PRIVACY ISSUES IN M2M - Upon transmitting privacy information to an MTC server ( | 11-27-2014 |
20150074782 | SECURE METHOD FOR SSO SUBSCRIBER ACCESSING SERVICE FROM OUTSIDE OF HOME NETWORK - When a UE ( | 03-12-2015 |