Matches 1 - 50 out of 123 1 2 3 >


Match Document Document Title
US20130195269 METHODS AND SYSTEMS FOR SLOW ASSOCIATED CONTROL CHANNEL SIGNALING  
Methods and systems for slow associated control channel signaling are disclosed. An example method for securing communications in a mobile network disclosed herein comprises transmitting a first...
US20120002810 SHORT MESSAGE SERVICE CIPHER  
A wireless phone system and methods performed thereon for cryptographically processing SMS messages is disclosed. A cryptographic pad is used to replace characters in a payload of a SMS message...
US20120300927 METHOD OF REGISTERING SMART PHONE WHEN ACCESSING SECURITY AUTHENTICATION DEVICE AND METHOD OF GRANTING ACCESS PERMISSION TO REGISTERED SMART PHONE  
A method for registering a Smartphone when accessing security authentication device and a method for access authentication of a registered Smartphone are provided. When a Smartphone based...
US20120106734 SAFE HANDOVER METHOD AND SYSTEM  
The present invention provides a safe handover method and system which are applied in a handover process of a terminal in the next generation network, wherein the next generation network comprises...
US20110117883 ENCRYPTED TEXT MESSAGING SYSTEM AND METHOD THEREFOR  
A method for securing text messages ads an encryption-decryption module to a pair of cellular phones. A text message is entered on a first of the pair of cellular phones. The text message is...
US20110142234 Multi-Factor Authentication Using a Mobile Phone  
The invention described here provides a fully-distributed solution to the problem of confirming the identity of the presenter of a payment card or other credentials, using multiple factors to...
US20110299682 Security Solution For Voice Over LTE Via GAN (VoLGA)  
A VoLGA Access Network Controller (VANC), a User Equipment, and methods are described herein for providing security to Voice over Long-Term Evolution via Generic Access (VoLGA) traffic.
US20130195268 Call Handover Between Cellular Communication System Nodes That Support Different Security Contexts  
In the context of facilitating a circuit switched to packet switched handover of a call in a cellular communication system, a first node (e.g., packet switched target node) generates a security...
US20110255691 APPARATUS AND METHOD FOR TRANSITIONING ENHANCED SECURITY CONTEXT FROM A UTRAN-BASED SERVING NETWORK TO A GERAN-BASED SERVING NETWORK  
Disclosed is a method for transitioning an enhanced security context from a UTRAN-based serving network to a GERAN-based serving network. In the method, the remote station the remote station...
US20140161256 SECURITY FOR NETWORK LOAD BROADCASTS OVER CELLULAR NETWORKS  
A method, computer readable medium and apparatus for obtaining cellular network load information in a secure manner are disclosed. For example, the method receives the cellular network load...
US20120310840 AUTHENTICATION METHOD, PAYMENT AUTHORISATION METHOD AND CORRESPONDING ELECTRONIC EQUIPMENTS  
The authentication method is based on the exchange of text messages between an User electronic equipment, in the form of a mobile phone terminal, and an Intermediary electronic equipment, and...
US20140321646 METHOD FOR THE AUTHENTICATION OF APPLICATIONS  
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a network. The control server receives...
US20120314859 METHOD FOR THE AUTHENTICATION OF APPLICATIONS  
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a network. The control server receives...
US20120230488 AUTHENTICATING NETWORK ELEMENTS IN A COMMUNICATION SYSTEM  
A system that incorporates teachings of the present disclosure may include, for example, a computer-readable storage medium in a communication device having computer instructions to establish...
US20120148043 Network Access Via Telephony Services  
A network provider can receive a request, via a first mobile device and a mobile wireless telephone network, for access to a wireless network secured with at least one encryption key and...
US20130259229 USER MANAGED NUMBER PRIVACY AND CALL ACCESSIBILITY  
A system and method for maintaining privacy of a user's telephone number is disclosed. The method provides a means by which a user A may prefer to exchange her contact number with another user B....
US20120114122 SOURCE PROGRAMMING AND MANAGEMENT SYSTEM FOR LOCKS COMPRISING CONTACTLESS COMMUNICATION MEANS THAT CAN BE CONTROLLED BY A PORTABLE NFC TELEPHONE  
The invention relates to a system comprising a lock (40) provided with NFC circuits, a mobile phone (32) also provided with NFC circuits, a remote lock management site (18), and a mobile network...
US20120195427 Location Restricted Content Deliver over a Network  
Delivering content to a requesting device over a content delivery network, the content being deliverable in only one or more restricted geographic regions and the requesting device being...
US20120008776 WIRELESS COMMUNICATION APPARATUS  
Influence on a key used between a user equipment and a base station, which will be imposed by unsecured updating of a key between the base station and a relay node when a relay node is being...
US20060198520 Secure transmission of digital audio signals  
In a headset audio speech signals are picked up by the microphone, where they are digitally sampled before being encoded by a vocoder. The coded speech data is then provided to a CRC module, where...
US20120020477 METHOD FOR DECRYPTING AN ENCRYPTED PACKET WITHIN A WIRELESS COMMUNICATION DEVICE, AND CORRESPONDING DEVICE  
Method for decrypting, within a wireless communication device, a sequence of encrypted packets received via a wireless communication channel between the communication device and a cell assigned to...
US20150016609 Authentication In Heterogeneous IP Networks  
The invention proposes a system for authenticating and authorizing network services comprising: a mobile device being adapted to, upon receipt of an information message indicating at least one...
US20120308004 MASTER CIPHER KEY  
A mobile telecommunications network and method of operation that includes establishing a first user plane connection between a telecommunications device registered with the network and a network...
US20130064369 LAN-BASED UMA NETWORK CONTROLLER WITH AGGREGATED TRANSPORT  
A method for managing UMA communications within a local area network and a network controller are disclosed. The method includes establishing a first connection between a first UMA device and a...
US20120189120 SYSTEM AND METHOD FOR PROTECTING DATA OF MOBILE PHONE  
In a method for protecting data of a mobile phone, the mobile phone includes a storage system. The storage system stores a plaintext file to be encrypted and an international mobile equipment...
US20120057701 MOBILE TERMINAL WITH ENCRYPTION CHIP AND RELATED NETWORK LOCKING/UNLOCKING METHOD  
A mobile terminal is provided with a network lock functionality for a network. The mobile terminal includes a subscriber identity module (SIM) slot configured to host a SIM card or an unlocking...
US20070177734 FAST CHANNEL SWITCHING IN A MULTIMEDIA BROADCAST SYSTEM  
A wireless broadcast system is disclosed. The wireless broadcast system includes a transmitter for broadcasting to a wireless communications device. The transmitter receives a plurality of streams...
US20100303232 Wireless Digital Personal Communications System Having Voice/Data/Image Two-Way Calling and Intercell Hand-Off Provided Through Distributed Logic Resident in Portable Handset Terminals, Fixed Terminals, Radio Cell Base Stations and Switched Telephone Network  
A wireless digital personal communications system (or PCS) having a plurality of radio cell base stations, fixed terminals, and portable handset terminals, each having a predetermined radio cell...
US20140003604 AUTHENTICATION OF A MOBILE DEVICE BY A NETWORK AND KEY GENERATION  
There are disclosed systems and methods for authenticating a mobile device by a network and/or for generating one or more keys that can be used for securely transmitting data between the mobile...
US20090327703 METHOD FOR PAYLOAD ENCRYPTION OF DIGITAL VOICE OR DATA COMMUNICATIONS  
A security platform or network for transmitting end-to-end encrypted voice or data communications between at least a first digital device and a second device is disclosed. The network includes a...
US20060045267 Device and process for wireless local area network association and corresponding products  
The present invention concerns WLAN association device and process for associating a new station to a WLAN, via a central apparatus. The association device comprises receiving and sending means...
US20070009101 Method for allocating secured resources in a security module  
The aim of this invention is to provide a method to allocate resources on a security module of a portable apparatus such as a telephone, taking into account the security imperatives of the...
US20100135491 AUTHENTICATION METHOD  
A method of providing authentication of a mobile device in a telecommunications network comprising the steps of: providing a user defined first password to an authentication server in the...
US20060078119 Bootstrapping method and system in mobile network using diameter-based protocol  
A bootstrapping method and system in a mobile network using a Diameter-based protocol are provided. The bootstrapping system includes; a mobile node, connecting to a local network, which creates...
US20150110270 Secure Virtualized Mobile Cellular Device  
Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance host server contains a virtualized...
US20140003605 CIRCUIT ARRANGEMENT AND A METHOD FOR ROAMING BETWEEN A VISITED NETWORK AND A MOBILE STATION  
According to various aspects of this disclosure, a circuit arrangement is provided. The circuit arrangement may include: a memory configured to store a first encryption key for generating a first...
US20070133805 Method for transmitting/receiving encryption information in a mobile broadcast system, and system therefor  
A system and method for transmitting/receiving encryption information in a mobile broadcast system supporting broadcast service (BCAST) are provided. In the mobile broadcast system, a BCAST...
US20100150345 PURGING OF AUTHENTICATION KEY CONTEXTS BY BASE STATIONS ON HANDOFF  
Various embodiments of methods and apparatuses for managing authentication key contexts are described herein. In various embodiments, the methods and apparatuses include purging an authentication...
US20110235802 AUTHENTICATION KEY GENERATION ARRANGEMENT  
Authentication key generation for local area network communication, including: participating in communication of a message comprising a cipher suite selection type indicating cellular network...
US20100166179 METHODS AND APPARATUS FOR BOOTSTRAPPING MOBILE-FOREIGN AND FOREIGN-HOME AUTHENTICATION KEYS IN MOBILE IP  
Methods and apparatus for dynamically generating authentication keys are disclosed. Specifically, a Mobile-Foreign authentication key is separately generated by both the Mobile Node and Foreign...
US20080002829 IDENTIFIERS IN A COMMUNICATION SYSTEM  
An identifier containing at least one encrypted part is received at a first network entity. A second network entity may then be determined based on the identifier. A request for assistance in...
US20090086971 SELECTIVE SECURITY TERMINATION IN NEXT GENERATION MOBILE NETWORKS  
Systems and/or methods of selectively terminating security in mobile networks are presented. User equipment (UE) can specify cipher termination location capabilities for encrypting/decrypting data...
US20060115084 Conditional access for a multimedia broadcast service using a wireless terminal  
The present invention relates to conditional access for receiving a broadcast service. The present invention comprises requesting reception of a service from a wireless cellular communication...
US20050078824 Authentication in heterogeneous IP networks  
The invention proposes a system for authenticating and authorizing network services comprising: a mobile device being adapted to, upon receipt of an information message indicating at least one...
US20070098172 Digital Watermarking Applications  
Methods and systems include, e.g.,: (1) steganographically embedding location information in images, where the location information is obtained from remote sources like a cell phone network or...
US20080019521 Apparatus and method for encrypting security key in mobile communication terminal  
Provided is an apparatus and method for storing a security key in a mobile communication terminal. In the method, the security key is generated randomly. The generated security key is encrypted in...
US20100135492 ANTI-THEFT SYSTEM AND METHOD FOR MOBILE PHONE  
A mobile phone anti-theft system includes a mobile phone, a SIM card and a real-name card-issuing system. The real-name card-issuing system includes a central processing unit, a first user...
US20070116293 Method for establishing a communication key between subscribers of a wirelessly operating communication system  
A method for agreeing a communication key between communication subscribers of a wirelessly operating communication system is provided. The method for agreeing a communication key includes using a...
US20150223060 MEDIATION OF INFORMATION CARRIED VIA A COMMON PUBLIC RADIO INTERFACE  
A device may receive first common public radio interface (CPRI) information associated with a first CPRI format. The device may determine a translation key associated with the first CPRI format....
US20090041240 UPLINK SCRAMBLING DURING RANDOM ACCESS  
The technology described in this case facilitates random access by a user terminal with a radio base station. A user terminal determines one of a first type of uplink scrambling sequences and...

Matches 1 - 50 out of 123 1 2 3 >