Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Methods and arrangements in a telecommunications system

A communication system and equipment technology, applied in transmission systems, digital transmission systems, wireless communications, etc., can solve problems such as data virus damage, damage to host operating systems, etc.

Inactive Publication Date: 2003-11-12
OPTIS WIRELESS TECH LLC
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Data viruses can also damage or even destroy the host's operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and arrangements in a telecommunications system
  • Methods and arrangements in a telecommunications system
  • Methods and arrangements in a telecommunications system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] figure 1 The use of the method and apparatus according to the invention is described. Mr Smith is visiting Tokyo as an employee of an international company such as Ericsson. Mr. Smith owns a mobile phone 1030 with a SIM card installed with secure firmware according to the invention. Mr. Smith wishes to communicate with the Intranet 1040 of Ericsson Corporation located in Stockholm, Sweden. Mr. Smith borrows a laptop computer 1010 from the hotel where he is staying while visiting Tokyo. He uses short-range radio communication 1020 to connect the laptop 1010 to his mobile phone. In other applications, cables can be used instead of short-range radio communications. In another embodiment of the present invention, laptop 1010 may be replaced by a stand-alone computer. Infrared light can be utilized to provide communication between the laptop 1010 and the mobile phone 1030 . In another embodiment, a SIM card with security firmware installed may be inserted into the lap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In accordance with the disclosed method and arrangement, for purpose of client authentication, private keys for digital certificates, or in general, any private or secret information that is necessary for client authentication can be stored in a personal SIM-card / smartcard and used in combination with the mobile telephone as a security gateway upon establishment of a IPsec tunnel. An employee staying away from his ordinary office may, by means of a personal independent access unit functioning as a security gateway, communicate with the protected Intranet of his employer. Such a scenario enables the employee to borrow any remote host in order to access the Intranet by means of a mobile communication network or a fix network, e.g. PSTN. The solution is to move the security function to the mobile telephone or the independent access unit, preferably a wireless independent access unit, where a lightweight security gateway or firewall is implemented.

Description

technical field [0001] The present invention relates to methods and devices for data protection (security) for network communications by encryption / decryption. Background technique [0002] Traditionally, the Internet provides no security, and if measures are not taken, communicating parties can be the target of passive and active attacks such as eavesdropping, spoofing, robbery, replay and denial of service. Likewise, computers directly connected to the Internet can be the target of attacks by Internet services exploiting security flaws in the operating system or infected with data viruses or so-called Trojan horses. For security, data is usually protected before being sent over the network. To avoid intrusion, the computers themselves were scoured to close any possible holes. [0003] The Internet Protocol (IP) formally specifies the format of Internet packets, so-called datagrams, and informally embraces the idea of ​​connectionless distribution. Similar to a physical ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G09C1/00H04L9/08H04L9/10H04L9/32H04L12/56H04L12/66H04L29/06H04W88/02
CPCH04L63/1441H04L63/0853H04W12/12H04W88/02H04W12/06H04L63/164H04L63/0272H04W12/02H04W12/43
Inventor R·布洛姆L·巴里加
Owner OPTIS WIRELESS TECH LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products