CA2531215A1 - Secure registration for a multicast-broadcast-multimedia system (mbms) - Google Patents
Secure registration for a multicast-broadcast-multimedia system (mbms) Download PDFInfo
- Publication number
- CA2531215A1 CA2531215A1 CA002531215A CA2531215A CA2531215A1 CA 2531215 A1 CA2531215 A1 CA 2531215A1 CA 002531215 A CA002531215 A CA 002531215A CA 2531215 A CA2531215 A CA 2531215A CA 2531215 A1 CA2531215 A1 CA 2531215A1
- Authority
- CA
- Canada
- Prior art keywords
- key
- function
- rgk
- rak
- identification number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/189—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast in combination with wireless systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/081—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying self-generating credentials, e.g. instead of receiving credentials from an authority or from another peer, the credentials are generated at the entity itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/08—User group management
Abstract
A method and an apparatus for secure registration for a multicast-broadcast-multimedia system (MBMS) are disclosed. A random number is generated by a broadcast-multicast-service center (BM-SC) and broadcast to user equipment in the coverage area of a radio access network (RAN). A memory module or smart card (UICC) in the user equipment generates a radio access network key (RAK) which is a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK), and then generates a temporary registration key (RGK) as a function of the RAK, a service identification number and a user identification number, for example, P-TMSI, which may be extracted by the RAN to authenticate the registration as legitimate.
Description
SECURE REGISTRATION FOR A MULTICAST-BROADCAST-MULTIMEDIA
SYSTEM (MBMS) BACKGROUND
Field of the Invention [1001] The present invention relates generally to telecommunications, and more specifically, to security in communication systems.
Background [100] In a wireless communication system which carries non-voice traffic, such as video, data, multimedia, or other types of traffic in addition to voice traffic, a typical cellular base station may broadcast a multimedia traffic service if the number of users demanding the service exceeds a predetermined threshold number within the coverage area of the base station. The multimedia traffic service may be a video stream of an event such as a sporting event or a highlighted portion of a sporting event, for example. If there are not enough users demanding the service in the coverage area, the base station may transmit the service only to the specific users who have demanded the service through dedicated channels instead of broadcasting the service to all users in the coverage area.
[1003] Sometimes a rogue or illegitimate user may attempt to force the base station to broadcast the service to all users in the coverage area by registering multiple times in an idle mode, for example, by assuming a number of different identities. If one or more rogue users use mobile telephones in the idle mode to register multiple times in a coverage area to receive the contents of an event, the base station may count the number of registrations as legitimate user registrations for the event and broadcast the event to all users in the coverage area.
[1004] Therefore, there is a need in the art for a network operator or Content provider to have reliable means to verify that only legitimate registrations for a multimedia event be counted in a coverage area and not be forced to broadcast the event to all users in the coverage area due to fake registrations.
SUN~J'ARY
[1005] Embodiments disclosed herein address the above stated needs by a method and an apparatus of obtaining secure registration in a multicast-broadcast-multimedia system (MBMS) using a temporary registration key (RGK).
SYSTEM (MBMS) BACKGROUND
Field of the Invention [1001] The present invention relates generally to telecommunications, and more specifically, to security in communication systems.
Background [100] In a wireless communication system which carries non-voice traffic, such as video, data, multimedia, or other types of traffic in addition to voice traffic, a typical cellular base station may broadcast a multimedia traffic service if the number of users demanding the service exceeds a predetermined threshold number within the coverage area of the base station. The multimedia traffic service may be a video stream of an event such as a sporting event or a highlighted portion of a sporting event, for example. If there are not enough users demanding the service in the coverage area, the base station may transmit the service only to the specific users who have demanded the service through dedicated channels instead of broadcasting the service to all users in the coverage area.
[1003] Sometimes a rogue or illegitimate user may attempt to force the base station to broadcast the service to all users in the coverage area by registering multiple times in an idle mode, for example, by assuming a number of different identities. If one or more rogue users use mobile telephones in the idle mode to register multiple times in a coverage area to receive the contents of an event, the base station may count the number of registrations as legitimate user registrations for the event and broadcast the event to all users in the coverage area.
[1004] Therefore, there is a need in the art for a network operator or Content provider to have reliable means to verify that only legitimate registrations for a multimedia event be counted in a coverage area and not be forced to broadcast the event to all users in the coverage area due to fake registrations.
SUN~J'ARY
[1005] Embodiments disclosed herein address the above stated needs by a method and an apparatus of obtaining secure registration in a multicast-broadcast-multimedia system (MBMS) using a temporary registration key (RGK).
BRIEF DESCRIPTION OF THE DRAWINGS
[1006] FIG. 1 is an exemplary block diagram illustrating a multicast-broadcast-multimedia system (MBMS) communication link;
[1007] FIG. 2 is a diagram illustrating an embodiment of secure registration in the MBMS; and [1008] FIG. 3 is a diagram illustrating another embodiment of secure registration in the MBMS.
DETAILED DESCRIPTION ' [1009] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. All of the embodiments described in this Detailed Description are exemplary embodiments provided to enable persons skilled in the art to make or use the invention and not to limit the scope of the invention which is defined by the claims.
[1010] A mobile station, also called user equipment (UE), may communicate with one or more base stations. A mobile station transmits and receives data packets through one or more base stations to a base station controller. Base stations and base station controllers are parts of a network called an access network. An access network transports data packets between multiple mobile stations.
The access network may be further connected to additional networks outside the access network, such as a corporate intranet or the Internet, and may transport data packets between each mobile station and such outside networks. A
mobile station that has established an active traffic channel connection with one or more base stations is called an active mobile station, and is said to be in a traffic state. A mobile station that is in the process of establishing an active traffic channel connection with one or more base stations is said to be in a connection setup state. A mobile station that is powered on and capable of receiving signals from a base station but is not in a traffic state or in a connection setup state is said to be in an idle state.
[1011] A communication link through which a mobile station sends signals to a base station is called a reverse link.
A communication link through which a base station sends signals to a mobile station is called a forward link. A
mobile station or user equipment (UE) may be a mobile telephone which includes a mobile telephone handset, also called mobile equipment (ME), and a memory module, such as a physically secure integrated circuit card or smart card called UICC, which may be removable or permanently attached to the ME. In a Global System for Mobile communication (GSM) telephone, the UICC is typically a subscriber identity module (SIM). In a code division multiple access (CDMA) telephone, the UICC is typically a removable user identity module (RUIM).
[1012] FIG. 1 is an exemplary block diagram illustrating a communication link between user equipment (UE) 2, a serving network 4, a home network 6 and a content provider (CP) 8 in a multicast-broadcast-multimedia system (MBMS). The user equipment 2 may be a mobile station which includes mobile equipment (ME) 10 and a memory module or UICC 12.
The UICC 12 may be either a removable memory module attached to the mobile equipment 10 or a permanent part of the mobile equipment 10. The physical implementation of the UICC 12 in the user equipment 2 is not critical to the present invention.
[1013] The serving network 4 may either be owned by the wireless carrier which provides subscription service to the user equipment 2, or be a visited network owned by another carrier which provides service to the user equipment 2 while the user equipment 2 is roaming. The serving network 4 typically includes a radio access network (RAN) 14 and a serving general packet radio service (GPRS) support node (SGSN) 16. The radio access network 14, also known as a base station (BS), a base transceiver station (BTS), or an access point (AP), transmits radio signals to and receives radio signals from the user equipment 2. The SGSN 16 is a core network node which may be part of a public land mobile network (PLMN), for example.
[1014] The home network 6 is the network owned by the wireless carrier which provides subscription service to the user equipment 2, and may or may not be owned by the same carrier as that of the serving network 4 depending upon whether the user equipment 2 is roaming outside the service area of the carrier. The home network 6 typically includes a gateway GPRS support node (GGSN) 18, a broadcast-multicast-service center (BM-SC) 20 and a home subscriber server (HSS) 22. The solid line 22 in FIG. 1 represents a bearer path on which information-bearing signals are carried from the content provider 8 through the home network 6 and the serving network 4 to the mobile equipment 10. The dashed line 24 in FIG. 1 represents a key/authorization path on which encryption and decryption keys are passed between the UICC 12, the serving network 4 and the home network 6.
[1015] The content provider 8 may be a third-party content source that is owned by neither the home network carrier nor the serving network carrier. The home subscriber server 22 in the home network 6 may include a database for holding mobile telephone subscription and collecting billing data for multicast services. In the embodiment shown in FIG. 1, the home network 6 also includes the broadcast-multicast-service center (BM-SC) 20 which schedules multicasting of the multimedia event and performs at least some security functions for the MBMS. The serving network 4 is the network that transmits the content to a single user through a dedicated channel, multicasts the content to a plurality of users through dedicated channels if the number of users demanding the service does not justify broadcasting the service to all users in the coverage area, or broadcasts the content to all users in the coverage area if the number of users demanding the service exceeds a predetermined threshold.
[1016] In an embodiment, the content of the multimedia event is encrypted and decrypted in the multicast-broadcast-multimedia system through several levels of encryption and decryption to provide at least some level of assurance that unauthorized users will not be able to decrypt the data and watch the multimedia event. For example, a permanent, user-specific registration key (RK) may be provided to generate temporary key (TK) values and to authenticate the UICC in the user's mobile telephone.
The TK is a single use, user-specific key used to encrypt broadcast access key (BAK) values. The TK is also used by the UICC to decrypt the BAK values. The BAK is a medium-term, shared key which is used for deriving multiple short-term keys (SK) and distributed to UICCs of subscribed users on a per-user basis. The SK is a frequently changing, shared key which is used to encrypt and decrypt the content. The SK may be generated using a random number (SK RAND) which is sent in the clear with the encrypted content and the BAK. The UICC 12 regenerates the SK from the BAK and SK RAND, and passes the SK to the mobile equipment 10. Examples of schemes for encryption and decryption of data contents in a multicast-broadcast-multimedia system are described in U.S. Patent Application Serial No. 09/933,972, entitled "Method and Apparatus for Security in a Data Processing System," filed August 20, 2001, incorporated herein by reference. Various other embodiments of using public keys or shared-secret keys for encryption and decryption may also be implemented within the scope of the invention. For example, in an alternate embodiment, secure delivery or provisioning of BAK to the UICC may be provided by using public key mechanisms such as RSA or ElGamal, which are known to persons skilled in the art.
[1017 FIG. 2 illustrates an embodiment of secure registration in a multicast-broadcast-multimedia system.
In this embodiment, the broadcast-multicast-service center (BM-SC)~ 20 transmits a provisioning message, which is a function of a public land mobile network (PLMN) key referred to as PK, and the permanent, user-specific registration key referred to as RK. The PK is a temporary, home PLMN specific key used to generate a radio access network (RAN) key referred to as RAK, and to authenticate the UICC 12. The provisioning message is transmitted from the BM-SC 20 to the UICC 12 along a path 26 as illustrated in FIG. 2. The provisioning message, which is a function with arguments PK and RK, may be represented as c1(PK, RK).
Upon receiving the provisioning message, the UICC 12 extracts the PK from the provisioning message and stores the PK value. Other embodiments for implementing the secure delivery or provisioning of PK to the UICC may be provided within the scope of the invention by using public key mechanisms including but not limited to RSA and ElGamal.
[1018] The radio access network (RAN) 14 transmits a request for the RAK and a random number (RAND) along a path 28 to the BM-SC 20, which in response generates the RAK
which is a function with arguments PK and RAND. The RAK, which may be represented as c2(PK, RAND), is transmitted by the BM-SC 20 to the RAN 14 along a path 30. The RAK is a temporary, RAN specific key used to generate temporary, user-specific registration key (RGK) values and to hide the PK from the RAN 14 which is visited by the UE 2. The RAK
is also used to cipher the MBMS service identification number (Serv_ID) and a user identification number such as P-TMSI, IMSI, electronic serial number (ESN), MIN, or any permanent or temporary user identification number used in the system in which an embodiment of the present invention is implemented. In the embodiments shown in FIGS. 2 and 3, P-TMSI is used as an exemplary user identification number known to a person skilled in the art.
[1019] The RAN may store the RAK and broadcast the RAND to all users including UE 2 within the coverage area of the RAN along a path 32. The UE 2, upon receiving the RAND, sends the RAND as well as the P-TMSI and the Serv ID to the UICC 12 along a path 34. The UICC 12 generates the RAK
which is an exact copy of the RAK generated by the BM-SC
20. After receiving the Serv_ID and the P-TMSI, the UICC
12 concatenates the Serv ID and the P-TMSI to obtain a concatenated result denoted as [Serv_IDI~P-TMSI], and computes a cyclic redundancy code (CRC) based on the Serv_ID and P-TMSI. The CRC is appended to [Serv_IDI~P-TMSI] to generate [Serv_ID~~P-TMSI~~CRC]. The UICC 12 then generates the RGK which is a function of the Serv-ID, P-TMSI, CRC and RAK represented as c3([Serv_IDI~P-TMSI~ICRC], RAK). The RGK is a temporary, user-specific key used to authenticate registration messages.
[1020] After the RGK is generated, the UICC 12 sends the RGK along a path 36 to the UE 2, which in turn transmits a registration/connection request including the RGK to the RAN 14 along a path 38. The RAN 14, upon receiving the registration/connection request, extracts the [Serv_ID~IP-TMSI], verifies the CRC, and counts the user identified by the P-TMSI as a legitimate user who has sent a valid registration message to request the multimedia service. If the registration/connection message transmitted by the~user is not verified by the RAN 14, then the RAN may regard the user as a rogue or illegitimate user and does not count the request as legitimate.
[1021 FIG. 3 illustrates another embodiment of~ secure registration in a multicast-broadcast-multimedia system.
In this embodiment, no provisioning message is transmitted by the broadcast-multicast-service center (BM-SC) 20.
Instead, the radio access network (RAN) 14 transmits a request for the RAK and a random number (RAND) along a path 40 to the BM-SC 20, which in response generates the RAK and the RAND. The RAK is a function with arguments BAK and RAND represented as c2(BAK, RAND). The BAK is the same broadcast access key used as part of the encryption scheme to encrypt the data contents described above. The RAND and RAK are transmitted by the BM-SC 20 to the RAN 14 along a path 42. The RAK is a temporary, RAN specific key used to generate temporary, user-specific registration key (RGK) values. The RAK is also used to cipher the MBMS service identification number (Serv_ID) and a user identification number referred to as P-TMSI.
[1022 The RAN may store the RAK and broadcast the RAND to all users including UE 2 within the coverage area of the RAN along a path 44 . The UE 2 , upon receiving the RAND, sends the RAND as well as the P-TMSI and the Serv_ID to the UICC 12 along a path 46. The UICC 12 generates the RAK
which is an exact copy of the RAK generated by the BM-SC
20. After receiving the Serv_ID and the P-TMSI, the UICC
12 concatenates the Serv_ID and the P-TMSI to obtain a concatenated result denoted as [Serv_IDI~P-TMSI], and computes a cyclic redundancy code (CRC) based on the Serv_ID and P-TMSI. The CRC is appended to [Serv_ID~IP-TMSI] to generate [Serv_IDIIP-TMSI~~CRC]. The UICC 12 then generates the RGK which is a function of the Serv_ID, P-TMSI, CRC and RAK, represented as c3([Serv_ID~IP-TMSI~~CRC], RAK). The RGK is a temporary, user-specific key used to authenticate registration messages.
[1023 After the RGK is generated, the UICC 12 sends the RGK along a path 48 to 'the UE 2, which in turn transmits a registration/connection request including the RGK to the RAN 14 along a path 50. The RAN 14, upon receiving the registration/connection request, extracts the [Serv_IDI~P-TMSI], verifies the CRC, and counts the user identified by the P-TMSI as a legitimate user who has sent a valid registration message to request the multimedia service. If the registration/connection message transmitted by the user is not verified by the RAN 14, then the RAN may regard the user as a rogue or illegitimate user and does not count the request as legitimate.
(1024] The RAN 14 may receive a plurality of registration/connection requests from a plurality of users within the coverage area and decide which requests are valid ones transmitted by legitimate users by verifying the CRC computed from the Serv_ID and P-TMSI of each user. The RAN may ignore those requests with RGKs which include unverifiable CRCs. In this manner, the RAN has a highly reliable means of determining how many registration requests for a certain multimedia event are valid, and would not be forced to broadcast the event if the number of legitimate users is not enough to justify broadcasting the event.
[1025] ZTarious other features may also be added to the temporary registration message (RGK) within the scope of the present invention. For example, a time stamp for system time may be added to the RGK. The RAN 14 may use the P-TMSI extracted from the RGK to determine whether the user who is attempting to register is actually a subscriber, if the RAN has the P-TMSIs of all subscribed users in the coverage area . In a typical GSM system, the P-TMSI may be allocated at the logical link control (LLC) level in the GSM/GPRS, that is, in the core network (CN) .
In another embodiment, a public key may be used in forming the RGK to avoid replay attacks by rogue users. For example, if each UICC has a private key used for provisioning PK or B.AK, the RGK may include a reference to the public key or certificate and a signature of the BAK-hash or PK-hash. Replay attacks by rogue users may be prevented or at least limited by using techniques such as sequence numbers or digital signatures based on public key cryptography. .
[1026] The sequence of the text in any of the claims does not' imply that process steps must be performed in a temporal or logical order according to such sequence unless it is specifically defined by the language of the claim.
The process steps may be interchanged in any order without departing from the scope of the invention as long as such an interchange does not contradict the claim language and is not logically nonsensical. Furthermore, numerical ordinals such as "first," "second," "third," etc. simply denote different singles of a plurality and do not imply any order or sequence unless specifically defined by the claim language.
[1027] Furthermore, words such as "connect," "connected to" and "connection" used in describing a relationship between different elements do not imply that a direct physical connection must be made between these elements.
For example, two elements may be connected to each other physically, electronically, logically, or in any other manner, through one or more additional elements, without departing from the scope of the invention.
[1028] Those of skill in the art would understand that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information-, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
[1029] Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
[1030] The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
(1031 The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A
software module may reside in random access memory (RAM), flash memory, read only memory (ROM), erasable programmable read only memory (EPROM), electrically erasable programmable read only memory (EEPROM), registers, a hard disk, a removable disk, a compact disc-read only memory (CD-ROM), or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such that the processor can read information from, and write information to, the storage medium.
Alternatively, the storage medium may be integral to the processor. The processor and the storage medium may reside in a single ASIC or as separate components in a base station, for example.
(1032 The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
WHAT IS CLAIMED IS:
[1006] FIG. 1 is an exemplary block diagram illustrating a multicast-broadcast-multimedia system (MBMS) communication link;
[1007] FIG. 2 is a diagram illustrating an embodiment of secure registration in the MBMS; and [1008] FIG. 3 is a diagram illustrating another embodiment of secure registration in the MBMS.
DETAILED DESCRIPTION ' [1009] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. All of the embodiments described in this Detailed Description are exemplary embodiments provided to enable persons skilled in the art to make or use the invention and not to limit the scope of the invention which is defined by the claims.
[1010] A mobile station, also called user equipment (UE), may communicate with one or more base stations. A mobile station transmits and receives data packets through one or more base stations to a base station controller. Base stations and base station controllers are parts of a network called an access network. An access network transports data packets between multiple mobile stations.
The access network may be further connected to additional networks outside the access network, such as a corporate intranet or the Internet, and may transport data packets between each mobile station and such outside networks. A
mobile station that has established an active traffic channel connection with one or more base stations is called an active mobile station, and is said to be in a traffic state. A mobile station that is in the process of establishing an active traffic channel connection with one or more base stations is said to be in a connection setup state. A mobile station that is powered on and capable of receiving signals from a base station but is not in a traffic state or in a connection setup state is said to be in an idle state.
[1011] A communication link through which a mobile station sends signals to a base station is called a reverse link.
A communication link through which a base station sends signals to a mobile station is called a forward link. A
mobile station or user equipment (UE) may be a mobile telephone which includes a mobile telephone handset, also called mobile equipment (ME), and a memory module, such as a physically secure integrated circuit card or smart card called UICC, which may be removable or permanently attached to the ME. In a Global System for Mobile communication (GSM) telephone, the UICC is typically a subscriber identity module (SIM). In a code division multiple access (CDMA) telephone, the UICC is typically a removable user identity module (RUIM).
[1012] FIG. 1 is an exemplary block diagram illustrating a communication link between user equipment (UE) 2, a serving network 4, a home network 6 and a content provider (CP) 8 in a multicast-broadcast-multimedia system (MBMS). The user equipment 2 may be a mobile station which includes mobile equipment (ME) 10 and a memory module or UICC 12.
The UICC 12 may be either a removable memory module attached to the mobile equipment 10 or a permanent part of the mobile equipment 10. The physical implementation of the UICC 12 in the user equipment 2 is not critical to the present invention.
[1013] The serving network 4 may either be owned by the wireless carrier which provides subscription service to the user equipment 2, or be a visited network owned by another carrier which provides service to the user equipment 2 while the user equipment 2 is roaming. The serving network 4 typically includes a radio access network (RAN) 14 and a serving general packet radio service (GPRS) support node (SGSN) 16. The radio access network 14, also known as a base station (BS), a base transceiver station (BTS), or an access point (AP), transmits radio signals to and receives radio signals from the user equipment 2. The SGSN 16 is a core network node which may be part of a public land mobile network (PLMN), for example.
[1014] The home network 6 is the network owned by the wireless carrier which provides subscription service to the user equipment 2, and may or may not be owned by the same carrier as that of the serving network 4 depending upon whether the user equipment 2 is roaming outside the service area of the carrier. The home network 6 typically includes a gateway GPRS support node (GGSN) 18, a broadcast-multicast-service center (BM-SC) 20 and a home subscriber server (HSS) 22. The solid line 22 in FIG. 1 represents a bearer path on which information-bearing signals are carried from the content provider 8 through the home network 6 and the serving network 4 to the mobile equipment 10. The dashed line 24 in FIG. 1 represents a key/authorization path on which encryption and decryption keys are passed between the UICC 12, the serving network 4 and the home network 6.
[1015] The content provider 8 may be a third-party content source that is owned by neither the home network carrier nor the serving network carrier. The home subscriber server 22 in the home network 6 may include a database for holding mobile telephone subscription and collecting billing data for multicast services. In the embodiment shown in FIG. 1, the home network 6 also includes the broadcast-multicast-service center (BM-SC) 20 which schedules multicasting of the multimedia event and performs at least some security functions for the MBMS. The serving network 4 is the network that transmits the content to a single user through a dedicated channel, multicasts the content to a plurality of users through dedicated channels if the number of users demanding the service does not justify broadcasting the service to all users in the coverage area, or broadcasts the content to all users in the coverage area if the number of users demanding the service exceeds a predetermined threshold.
[1016] In an embodiment, the content of the multimedia event is encrypted and decrypted in the multicast-broadcast-multimedia system through several levels of encryption and decryption to provide at least some level of assurance that unauthorized users will not be able to decrypt the data and watch the multimedia event. For example, a permanent, user-specific registration key (RK) may be provided to generate temporary key (TK) values and to authenticate the UICC in the user's mobile telephone.
The TK is a single use, user-specific key used to encrypt broadcast access key (BAK) values. The TK is also used by the UICC to decrypt the BAK values. The BAK is a medium-term, shared key which is used for deriving multiple short-term keys (SK) and distributed to UICCs of subscribed users on a per-user basis. The SK is a frequently changing, shared key which is used to encrypt and decrypt the content. The SK may be generated using a random number (SK RAND) which is sent in the clear with the encrypted content and the BAK. The UICC 12 regenerates the SK from the BAK and SK RAND, and passes the SK to the mobile equipment 10. Examples of schemes for encryption and decryption of data contents in a multicast-broadcast-multimedia system are described in U.S. Patent Application Serial No. 09/933,972, entitled "Method and Apparatus for Security in a Data Processing System," filed August 20, 2001, incorporated herein by reference. Various other embodiments of using public keys or shared-secret keys for encryption and decryption may also be implemented within the scope of the invention. For example, in an alternate embodiment, secure delivery or provisioning of BAK to the UICC may be provided by using public key mechanisms such as RSA or ElGamal, which are known to persons skilled in the art.
[1017 FIG. 2 illustrates an embodiment of secure registration in a multicast-broadcast-multimedia system.
In this embodiment, the broadcast-multicast-service center (BM-SC)~ 20 transmits a provisioning message, which is a function of a public land mobile network (PLMN) key referred to as PK, and the permanent, user-specific registration key referred to as RK. The PK is a temporary, home PLMN specific key used to generate a radio access network (RAN) key referred to as RAK, and to authenticate the UICC 12. The provisioning message is transmitted from the BM-SC 20 to the UICC 12 along a path 26 as illustrated in FIG. 2. The provisioning message, which is a function with arguments PK and RK, may be represented as c1(PK, RK).
Upon receiving the provisioning message, the UICC 12 extracts the PK from the provisioning message and stores the PK value. Other embodiments for implementing the secure delivery or provisioning of PK to the UICC may be provided within the scope of the invention by using public key mechanisms including but not limited to RSA and ElGamal.
[1018] The radio access network (RAN) 14 transmits a request for the RAK and a random number (RAND) along a path 28 to the BM-SC 20, which in response generates the RAK
which is a function with arguments PK and RAND. The RAK, which may be represented as c2(PK, RAND), is transmitted by the BM-SC 20 to the RAN 14 along a path 30. The RAK is a temporary, RAN specific key used to generate temporary, user-specific registration key (RGK) values and to hide the PK from the RAN 14 which is visited by the UE 2. The RAK
is also used to cipher the MBMS service identification number (Serv_ID) and a user identification number such as P-TMSI, IMSI, electronic serial number (ESN), MIN, or any permanent or temporary user identification number used in the system in which an embodiment of the present invention is implemented. In the embodiments shown in FIGS. 2 and 3, P-TMSI is used as an exemplary user identification number known to a person skilled in the art.
[1019] The RAN may store the RAK and broadcast the RAND to all users including UE 2 within the coverage area of the RAN along a path 32. The UE 2, upon receiving the RAND, sends the RAND as well as the P-TMSI and the Serv ID to the UICC 12 along a path 34. The UICC 12 generates the RAK
which is an exact copy of the RAK generated by the BM-SC
20. After receiving the Serv_ID and the P-TMSI, the UICC
12 concatenates the Serv ID and the P-TMSI to obtain a concatenated result denoted as [Serv_IDI~P-TMSI], and computes a cyclic redundancy code (CRC) based on the Serv_ID and P-TMSI. The CRC is appended to [Serv_IDI~P-TMSI] to generate [Serv_ID~~P-TMSI~~CRC]. The UICC 12 then generates the RGK which is a function of the Serv-ID, P-TMSI, CRC and RAK represented as c3([Serv_IDI~P-TMSI~ICRC], RAK). The RGK is a temporary, user-specific key used to authenticate registration messages.
[1020] After the RGK is generated, the UICC 12 sends the RGK along a path 36 to the UE 2, which in turn transmits a registration/connection request including the RGK to the RAN 14 along a path 38. The RAN 14, upon receiving the registration/connection request, extracts the [Serv_ID~IP-TMSI], verifies the CRC, and counts the user identified by the P-TMSI as a legitimate user who has sent a valid registration message to request the multimedia service. If the registration/connection message transmitted by the~user is not verified by the RAN 14, then the RAN may regard the user as a rogue or illegitimate user and does not count the request as legitimate.
[1021 FIG. 3 illustrates another embodiment of~ secure registration in a multicast-broadcast-multimedia system.
In this embodiment, no provisioning message is transmitted by the broadcast-multicast-service center (BM-SC) 20.
Instead, the radio access network (RAN) 14 transmits a request for the RAK and a random number (RAND) along a path 40 to the BM-SC 20, which in response generates the RAK and the RAND. The RAK is a function with arguments BAK and RAND represented as c2(BAK, RAND). The BAK is the same broadcast access key used as part of the encryption scheme to encrypt the data contents described above. The RAND and RAK are transmitted by the BM-SC 20 to the RAN 14 along a path 42. The RAK is a temporary, RAN specific key used to generate temporary, user-specific registration key (RGK) values. The RAK is also used to cipher the MBMS service identification number (Serv_ID) and a user identification number referred to as P-TMSI.
[1022 The RAN may store the RAK and broadcast the RAND to all users including UE 2 within the coverage area of the RAN along a path 44 . The UE 2 , upon receiving the RAND, sends the RAND as well as the P-TMSI and the Serv_ID to the UICC 12 along a path 46. The UICC 12 generates the RAK
which is an exact copy of the RAK generated by the BM-SC
20. After receiving the Serv_ID and the P-TMSI, the UICC
12 concatenates the Serv_ID and the P-TMSI to obtain a concatenated result denoted as [Serv_IDI~P-TMSI], and computes a cyclic redundancy code (CRC) based on the Serv_ID and P-TMSI. The CRC is appended to [Serv_ID~IP-TMSI] to generate [Serv_IDIIP-TMSI~~CRC]. The UICC 12 then generates the RGK which is a function of the Serv_ID, P-TMSI, CRC and RAK, represented as c3([Serv_ID~IP-TMSI~~CRC], RAK). The RGK is a temporary, user-specific key used to authenticate registration messages.
[1023 After the RGK is generated, the UICC 12 sends the RGK along a path 48 to 'the UE 2, which in turn transmits a registration/connection request including the RGK to the RAN 14 along a path 50. The RAN 14, upon receiving the registration/connection request, extracts the [Serv_IDI~P-TMSI], verifies the CRC, and counts the user identified by the P-TMSI as a legitimate user who has sent a valid registration message to request the multimedia service. If the registration/connection message transmitted by the user is not verified by the RAN 14, then the RAN may regard the user as a rogue or illegitimate user and does not count the request as legitimate.
(1024] The RAN 14 may receive a plurality of registration/connection requests from a plurality of users within the coverage area and decide which requests are valid ones transmitted by legitimate users by verifying the CRC computed from the Serv_ID and P-TMSI of each user. The RAN may ignore those requests with RGKs which include unverifiable CRCs. In this manner, the RAN has a highly reliable means of determining how many registration requests for a certain multimedia event are valid, and would not be forced to broadcast the event if the number of legitimate users is not enough to justify broadcasting the event.
[1025] ZTarious other features may also be added to the temporary registration message (RGK) within the scope of the present invention. For example, a time stamp for system time may be added to the RGK. The RAN 14 may use the P-TMSI extracted from the RGK to determine whether the user who is attempting to register is actually a subscriber, if the RAN has the P-TMSIs of all subscribed users in the coverage area . In a typical GSM system, the P-TMSI may be allocated at the logical link control (LLC) level in the GSM/GPRS, that is, in the core network (CN) .
In another embodiment, a public key may be used in forming the RGK to avoid replay attacks by rogue users. For example, if each UICC has a private key used for provisioning PK or B.AK, the RGK may include a reference to the public key or certificate and a signature of the BAK-hash or PK-hash. Replay attacks by rogue users may be prevented or at least limited by using techniques such as sequence numbers or digital signatures based on public key cryptography. .
[1026] The sequence of the text in any of the claims does not' imply that process steps must be performed in a temporal or logical order according to such sequence unless it is specifically defined by the language of the claim.
The process steps may be interchanged in any order without departing from the scope of the invention as long as such an interchange does not contradict the claim language and is not logically nonsensical. Furthermore, numerical ordinals such as "first," "second," "third," etc. simply denote different singles of a plurality and do not imply any order or sequence unless specifically defined by the claim language.
[1027] Furthermore, words such as "connect," "connected to" and "connection" used in describing a relationship between different elements do not imply that a direct physical connection must be made between these elements.
For example, two elements may be connected to each other physically, electronically, logically, or in any other manner, through one or more additional elements, without departing from the scope of the invention.
[1028] Those of skill in the art would understand that information and signals may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information-, signals, bits, symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
[1029] Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
[1030] The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
(1031 The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A
software module may reside in random access memory (RAM), flash memory, read only memory (ROM), erasable programmable read only memory (EPROM), electrically erasable programmable read only memory (EEPROM), registers, a hard disk, a removable disk, a compact disc-read only memory (CD-ROM), or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such that the processor can read information from, and write information to, the storage medium.
Alternatively, the storage medium may be integral to the processor. The processor and the storage medium may reside in a single ASIC or as separate components in a base station, for example.
(1032 The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
WHAT IS CLAIMED IS:
Claims (61)
1. A method of obtaining secure registration by a memory module (UICC) in a multicast-broadcast-multimedia system (MBMS), the method comprising:
receiving a random number;
generating a radio access network key (RAK) as a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK); and generating a temporary registration key (RGK) as a function of the RAK.
receiving a random number;
generating a radio access network key (RAK) as a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK); and generating a temporary registration key (RGK) as a function of the RAK.
2. The method of claim 1, further comprising transmitting the RGK to a mobile telephone.
3. The method of claim 1, further comprising receiving a provisioning message from a broadcast-multicast service center.
4. The method of claim 3, wherein the provisioning message is a function of the PK and a permanent registration key (RK).
5. The method of claim 3, further comprising extracting the PK from the provisioning message.
6. The method of claim 1, wherein the RGK is a function of the RAK, a service identification number and a user identification number.
7. The method of claim 6, wherein the RGK is a function of the RAK and a cyclic redundancy code (CRC) computed from the service identification number and the user identification number.
8. The method of claim 1, wherein the UICC comprises a subscriber identity module (SIM) in a Global System for Mobile communication (GSM) system.
9. The method of claim 1, wherein the UICC comprises a removable user identity module (RUIM) in a code division multiple access (CDMA) system.
10. The method of claim 1, wherein the PK is provisioned by using a public key.
11. The method of claim 1, wherein the BAK is provisioned by using a public key.
12. A method of obtaining secure registration by a mobile station in a multicast-broadcast-multimedia system (MBMS), the method comprising:
receiving a random number from a radio access network;
transmitting the random number to a memory module (UICC); and receiving from the UICC a temporary registration key (RGK) based on the random number.
receiving a random number from a radio access network;
transmitting the random number to a memory module (UICC); and receiving from the UICC a temporary registration key (RGK) based on the random number.
13. The method of claim 12, wherein the RGK is a function of a radio access network key (RAK) which is a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK).
14. The method of claim 13, wherein the PK is extracted from a provisioning message received from a broadcast-multicast service center.
15. The method of claim 14, wherein the provisioning message is a function of the PK and a permanent registration key (RK).
16. The method of claim 13, wherein the RGK is a function of the RAK, a service identification number and a user identification number.
17. The method of claim 16, wherein the RGK is a function of the RAK and a cyclic redundancy code (CRC) computed from the service identification number and the user identification number.
18. The method of claim 12, wherein the UICC
comprises a subscriber identity module (SIM) in a Global System for Mobile communication (GSM) system.
comprises a subscriber identity module (SIM) in a Global System for Mobile communication (GSM) system.
19. The method of claim 12, wherein the UICC
comprises a removable user identity module (RUIM) in a code division multiple access (CDMA) system.
comprises a removable user identity module (RUIM) in a code division multiple access (CDMA) system.
20. The method of claim 12, wherein the PK is provisioned by using a public key.
21. The method of claim 12, wherein the BAK is provisioned by using a public key.
22. A memory module, comprising:
means for receiving a random number;
means for generating a radio access network key (RAK) as a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK); and means for generating a temporary registration key (RGK) as a function of the RAK.
means for receiving a random number;
means for generating a radio access network key (RAK) as a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK); and means for generating a temporary registration key (RGK) as a function of the RAK.
23. The memory module of claim 22, further comprising means for transmitting the RGK to a mobile telephone.
24. The memory module of claim 22, further comprising means for receiving a provisioning message from a broadcast-multicast service center.
25. The memory module of claim 24, wherein the provisioning message is a function of the PK and a permanent registration key (RK).
26. The memory module of claim 24, further comprising means for extracting the PK from the provisioning message.
27. The memory module of claim 22, wherein the RGK is a function of the RAK, a service identification number and a user identification number.
28. The memory module of claim 27, wherein the RGK is a function of the RAK and a cyclic redundancy code (CRC) computed from the service identification number and the user identification number.
29. The memory module of claim 22, wherein the PK is provisioned by using a public key.
30. The memory module of claim 22, wherein the BAK is provisioned by using a public key.
31. A mobile station apparatus, comprising:
means for receiving a random number from a radio access network;
means for transmitting the random number to a memory module (UICC); and means for receiving from the UICC a temporary registration key (RGK) based on the random number.
means for receiving a random number from a radio access network;
means for transmitting the random number to a memory module (UICC); and means for receiving from the UICC a temporary registration key (RGK) based on the random number.
32. The apparatus of claim 31, wherein the RGK is a function of a radio access network key (RAK) which is a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK).
33. The apparatus of claim 32, wherein the PK is extracted from a provisioning message received from a broadcast-multicast service center.
34. The apparatus of claim 33, wherein the provisioning message is a function of the PK and a permanent registration key (RK).
35. The apparatus of claim 32, wherein the RGK is a function of the reak, a service identification number and a user identification number.
36. The apparatus of claim 35, wherein the RGK is a function of the reak and a cyclic redundancy code (CRC) computed from the service identification number and the user identification number.
37. The apparatus of claim 31, wherein the UICC
comprises a subscriber identity module (SIM) in a Global System for Mobile communication (GSM) system.
comprises a subscriber identity module (SIM) in a Global System for Mobile communication (GSM) system.
38. The apparatus of claim 31, wherein the UICC
comprises a removable user identity module (RUIM) in a code division multiple access (CDMA) system.
comprises a removable user identity module (RUIM) in a code division multiple access (CDMA) system.
39. The apparatus of claim 31, wherein the PK is provisioned by using a public key.
40. The apparatus of claim 31, wherein the BAK is provisioned by using a public key.
41. A computer readable medium embodying a method of obtaining secure registration by a memory module (UICC) in a multicast-broadcast-multimedia system (MBMS), the method comprising:
receiving a random number;
generating a radio access network key (RAK) as a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK); and generating a temporary registration key (RGK) as a function of the RAK.
receiving a random number;
generating a radio access network key (RAK) as a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK); and generating a temporary registration key (RGK) as a function of the RAK.
42. The computer readable medium of claim 41, wherein the method further comprises transmitting the RGK to a mobile telephone.
43. The computer readable medium of claim 41, wherein the method further comprises receiving a provisioning message from a broadcast-multicast service center.
44. The computer readable medium of claim 43, wherein the provisioning message is a function of the PK and a permanent registration key (RK).
45. The computer readable medium of claim 43, wherein the method further comprises extracting the PK from the provisioning message.
46. The computer readable medium of claim 41, wherein the RGK is a function of the RAK, a service identification number and a user identification number.
47. The computer readable medium of claim 46, wherein the RGK is a function of the RAK and a cyclic redundancy code (CRC) computed from the service identification number and the user identification number.
48. The computer readable medium of claim 41, wherein the UICC comprises a subscriber identity module (SIM) in a Global System for Mobile communication (GSM) system.
49. The computer readable medium of claim 41, wherein the UICC comprises a removable user identity module (RUIM) in a code division multiple access (CDMA) system.
50. The computer readable medium of claim 41, wherein the PK is provisioned by using a public key.
51. The computer readable medium of claim 41, wherein the BAK is provisioned by using a public key.
52. A computer readable medium embodying a method of obtaining secure registration by a mobile station in a multicast-broadcast-multimedia system (MBMS), the method comprising:
receiving a random number from a radio access network;
transmitting the random number to a memory module (UICC); and receiving from the UICC a temporary registration key (RGK) based on the random number.
receiving a random number from a radio access network;
transmitting the random number to a memory module (UICC); and receiving from the UICC a temporary registration key (RGK) based on the random number.
53. The computer readable medium of claim 52, wherein the RGK is a function of a radio access network key (RAK) which is a function of the random number and a key selected from the group consisting of a public land mobile network key (PK) and a broadcast access key (BAK).
54. The computer readable medium of claim 53, wherein the PK is extracted from a provisioning message received from a broadcast-multicast service center.
55. The computer readable medium of claim 54, wherein the provisioning message is a function of the PK and a permanent registration key (RK).
56. The computer readable medium of claim 53, wherein the RGK is a function of the RAK, a service identification number and a user identification number.
57. The computer readable medium of claim 56, wherein the RGK is a function of the RAK and a cyclic redundancy code (CRC) computed from the service identification number and the user identification number.
58. The computer readable medium of claim 52, wherein the UICC comprises a subscriber identity module (SIM) in a Global System for Mobile communication (GSM) system.
59. The computer readable medium of claim 52, wherein the UICC comprises a removable user identity module (RUIM) in a code division multiple access (CDMA) system.
60. The computer readable medium of claim 52, wherein the PK is provisioned by using a public key.
61. The computer readable medium of claim 52, wherein the BAK is provisioned by using a public key.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/617,215 US8098818B2 (en) | 2003-07-07 | 2003-07-07 | Secure registration for a multicast-broadcast-multimedia system (MBMS) |
US10/617,215 | 2003-07-07 | ||
PCT/US2004/021530 WO2005009001A1 (en) | 2003-07-07 | 2004-07-01 | Secure registration for a multicast-broadcast-multimedia system (mbms) |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2531215A1 true CA2531215A1 (en) | 2005-01-27 |
Family
ID=33564923
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002531215A Abandoned CA2531215A1 (en) | 2003-07-07 | 2004-07-01 | Secure registration for a multicast-broadcast-multimedia system (mbms) |
Country Status (16)
Country | Link |
---|---|
US (1) | US8098818B2 (en) |
EP (1) | EP1642441B1 (en) |
JP (1) | JP2007527652A (en) |
KR (1) | KR20060031848A (en) |
CN (2) | CN1820480B (en) |
AT (1) | ATE408299T1 (en) |
AU (1) | AU2004301386A1 (en) |
BR (1) | BRPI0412375A (en) |
CA (1) | CA2531215A1 (en) |
DE (1) | DE602004016510D1 (en) |
IL (1) | IL172932A0 (en) |
MX (1) | MXPA06000149A (en) |
RU (1) | RU2363110C2 (en) |
TW (1) | TW200509634A (en) |
UA (1) | UA90454C2 (en) |
WO (1) | WO2005009001A1 (en) |
Families Citing this family (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9100457B2 (en) * | 2001-03-28 | 2015-08-04 | Qualcomm Incorporated | Method and apparatus for transmission framing in a wireless communication system |
UA75125C2 (en) * | 2001-03-28 | 2006-03-15 | Квалкомм Інкорпорейтид | Method for controlling signal power in point-to-multipoint data communication (variants) and a device for the realization of the method (variants) |
US8077679B2 (en) * | 2001-03-28 | 2011-12-13 | Qualcomm Incorporated | Method and apparatus for providing protocol options in a wireless communication system |
US8121296B2 (en) * | 2001-03-28 | 2012-02-21 | Qualcomm Incorporated | Method and apparatus for security in a data processing system |
US20040120527A1 (en) * | 2001-08-20 | 2004-06-24 | Hawkes Philip Michael | Method and apparatus for security in a data processing system |
US7185362B2 (en) * | 2001-08-20 | 2007-02-27 | Qualcomm, Incorporated | Method and apparatus for security in a data processing system |
US7697523B2 (en) * | 2001-10-03 | 2010-04-13 | Qualcomm Incorporated | Method and apparatus for data packet transport in a wireless communication system using an internet protocol |
US7352868B2 (en) * | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
US7649829B2 (en) | 2001-10-12 | 2010-01-19 | Qualcomm Incorporated | Method and system for reduction of decoding complexity in a communication system |
US7599655B2 (en) * | 2003-01-02 | 2009-10-06 | Qualcomm Incorporated | Method and apparatus for broadcast services in a communication system |
US8098818B2 (en) | 2003-07-07 | 2012-01-17 | Qualcomm Incorporated | Secure registration for a multicast-broadcast-multimedia system (MBMS) |
US8718279B2 (en) * | 2003-07-08 | 2014-05-06 | Qualcomm Incorporated | Apparatus and method for a secure broadcast system |
KR100987207B1 (en) * | 2003-08-02 | 2010-10-12 | 삼성전자주식회사 | Method for ciphering in a mobile communication system of serving multimedia broadcast/multicast service |
US7646762B2 (en) * | 2003-08-06 | 2010-01-12 | Motorola, Inc. | Method and apparatus for providing session data to a subscriber to a multimedia broadcast multicast service |
US8724803B2 (en) * | 2003-09-02 | 2014-05-13 | Qualcomm Incorporated | Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system |
US7330910B2 (en) * | 2004-05-20 | 2008-02-12 | International Business Machines Corporation | Fencing of resources allocated to non-cooperative client computers |
KR100654491B1 (en) * | 2005-04-01 | 2006-12-05 | (주)인트로모바일 | Method of changing template type of idle screen of mobile terminal, computer readable record medium on which program for executing method is recorded and mobile terminal having function thereof |
KR100563553B1 (en) * | 2005-02-17 | 2006-03-27 | (주)인트로모바일 | System of providing contents information on idle-mode screen of mobile terminal using personal computer of functioning as server, method thereof and computer readable record medium on which program for executing method is recorded |
GB2424154A (en) * | 2005-03-07 | 2006-09-13 | Ericsson Telefon Ab L M | Streamlined network logon using Host Identity Protocol (HIP) with broadcast puzzle challenges and home server certificates |
CN100401800C (en) * | 2005-08-31 | 2008-07-09 | 华为技术有限公司 | Method for providing broadcast multicast service to users |
US7783041B2 (en) * | 2005-10-03 | 2010-08-24 | Nokia Corporation | System, method and computer program product for authenticating a data agreement between network entities |
DE102006002892A1 (en) * | 2006-01-20 | 2007-08-02 | Siemens Ag | Method, system, computer program, data carrier and computer program product for transmitting media data of a multicast service |
DE102006006071A1 (en) * | 2006-02-09 | 2007-08-16 | Siemens Ag | Method for transmitting media data, network arrangement with computer program product |
CN100571438C (en) * | 2006-02-22 | 2009-12-16 | 华为技术有限公司 | The method of subscribing purchasing object in the mobile broadcast and multicast service |
WO2007097604A1 (en) * | 2006-02-27 | 2007-08-30 | Samsung Electronics Co., Ltd. | Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor |
KR100765183B1 (en) * | 2006-06-21 | 2007-10-12 | 삼성전자주식회사 | Method and apparatus for plmn reselection in mobile communication terminal |
GB2439369A (en) * | 2006-06-26 | 2007-12-27 | Samsung Electronics Co Ltd | Grouping and transmitting mobile television services available to a mobile device user |
DE102006042554B4 (en) * | 2006-09-11 | 2009-04-16 | Siemens Ag | Method and system for continuously transmitting encrypted data of a broadcast service to a mobile terminal |
US8533454B2 (en) * | 2006-09-25 | 2013-09-10 | Qualcomm Incorporated | Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway |
US8761713B2 (en) | 2007-02-02 | 2014-06-24 | Qualcomm Incorporated | Method and apparatus for emergency broadcast using an emergency broadcast-multicast service |
KR101099814B1 (en) * | 2007-07-11 | 2011-12-27 | 도시바 솔루션 가부시끼가이샤 | GROUP SIGNATURE SYSTEM, DEVICE, AND Recording medium |
US8379854B2 (en) | 2007-10-09 | 2013-02-19 | Alcatel Lucent | Secure wireless communication |
KR101473488B1 (en) | 2007-11-29 | 2014-12-17 | 삼성전자주식회사 | Smart card and method for generating response message transmitted to mobile terminal supporting mobile broadcasting and the mobile terminal thereof |
US8792646B2 (en) * | 2008-03-25 | 2014-07-29 | Qualcomm Incorporated | Systems and methods for group key distribution and management for wireless communications systems |
KR101465263B1 (en) * | 2008-06-11 | 2014-11-26 | 삼성전자주식회사 | Method for security key distrubution in broadcast system and the system therefor |
CN101626374B (en) * | 2008-07-11 | 2013-08-28 | 成都市华为赛门铁克科技有限公司 | Method, system and equipment for negotiating security association (SA) in internet protocol version 6 (IPv6) network |
CN101552973B (en) * | 2009-04-19 | 2011-04-20 | 张晓华 | Public safety prewarning broadcast system |
US8639290B2 (en) * | 2009-09-25 | 2014-01-28 | At&T Intellectual Property I, L.P. | UICC control over devices used to obtain service |
EP2393029A1 (en) * | 2010-06-04 | 2011-12-07 | Nagravision S.A. | Method for activating at least a function on a chipset and chipset for the implementation of the method |
KR101626453B1 (en) * | 2012-02-02 | 2016-06-01 | 노키아 솔루션스 앤드 네트웍스 오와이 | Group based bootstrapping in machine type communication |
US9420456B2 (en) * | 2012-05-03 | 2016-08-16 | Telefonaktiebolaget L M Ericsson (Publ) | Centralized key management in eMBMS |
RU2614369C2 (en) * | 2012-09-17 | 2017-03-24 | Нокиа Текнолоджиз Ой | Protection under provision of mobility between mbms servers |
US8898769B2 (en) | 2012-11-16 | 2014-11-25 | At&T Intellectual Property I, Lp | Methods for provisioning universal integrated circuit cards |
US8959331B2 (en) | 2012-11-19 | 2015-02-17 | At&T Intellectual Property I, Lp | Systems for provisioning universal integrated circuit cards |
US9350550B2 (en) | 2013-09-10 | 2016-05-24 | M2M And Iot Technologies, Llc | Power management and security for wireless modules in “machine-to-machine” communications |
US9100175B2 (en) | 2013-11-19 | 2015-08-04 | M2M And Iot Technologies, Llc | Embedded universal integrated circuit card supporting two-factor authentication |
US9036820B2 (en) | 2013-09-11 | 2015-05-19 | At&T Intellectual Property I, Lp | System and methods for UICC-based secure communication |
US10498530B2 (en) | 2013-09-27 | 2019-12-03 | Network-1 Technologies, Inc. | Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys |
US9124573B2 (en) | 2013-10-04 | 2015-09-01 | At&T Intellectual Property I, Lp | Apparatus and method for managing use of secure tokens |
US20160165423A1 (en) * | 2013-10-16 | 2016-06-09 | Sony Corporation | Application specific congestion control management |
US9208300B2 (en) | 2013-10-23 | 2015-12-08 | At&T Intellectual Property I, Lp | Apparatus and method for secure authentication of a communication device |
US9240994B2 (en) | 2013-10-28 | 2016-01-19 | At&T Intellectual Property I, Lp | Apparatus and method for securely managing the accessibility to content and applications |
US9240989B2 (en) | 2013-11-01 | 2016-01-19 | At&T Intellectual Property I, Lp | Apparatus and method for secure over the air programming of a communication device |
US9313660B2 (en) | 2013-11-01 | 2016-04-12 | At&T Intellectual Property I, Lp | Apparatus and method for secure provisioning of a communication device |
US10700856B2 (en) | 2013-11-19 | 2020-06-30 | Network-1 Technologies, Inc. | Key derivation for a module using an embedded universal integrated circuit card |
US9413759B2 (en) | 2013-11-27 | 2016-08-09 | At&T Intellectual Property I, Lp | Apparatus and method for secure delivery of data from a communication device |
US9713006B2 (en) | 2014-05-01 | 2017-07-18 | At&T Intellectual Property I, Lp | Apparatus and method for managing security domains for a universal integrated circuit card |
US9853977B1 (en) | 2015-01-26 | 2017-12-26 | Winklevoss Ip, Llc | System, method, and program product for processing secure transactions within a cloud computing system |
WO2017009714A1 (en) * | 2015-07-15 | 2017-01-19 | Alcatel Lucent | Establishing a temporary subscription with isolated e-utran network |
CN105260650B (en) * | 2015-10-22 | 2018-12-11 | 广东威创视讯科技股份有限公司 | Mobile device cut-in method and system |
US10291603B2 (en) * | 2016-04-07 | 2019-05-14 | Verizon Patent And Licensing Inc. | Registering a smart device with a registration device using a multicast protocol |
CN107820234B (en) | 2016-09-14 | 2021-02-23 | 华为技术有限公司 | Network roaming protection method, related equipment and system |
WO2019179925A1 (en) * | 2018-03-22 | 2019-09-26 | British Telecommunications Public Limited Company | Wireless communication network authentication |
CN110768808A (en) * | 2018-07-25 | 2020-02-07 | 北京华胜天成科技股份有限公司 | Terminal configuration method, device, server and storage medium |
Family Cites Families (454)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5870474A (en) * | 1995-12-04 | 1999-02-09 | Scientific-Atlanta, Inc. | Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers |
US4163255A (en) | 1976-07-19 | 1979-07-31 | Teleglobe Pay-Tv System, Inc. | Billing method and system for a subscriber of a pay television system |
FR2448825A1 (en) * | 1979-02-06 | 1980-09-05 | Telediffusion Fse | SYSTEM FOR TRANSMITTING INFORMATION BETWEEN A TRANSMISSION CENTER AND RECEIVING STATIONS, WHICH IS PROVIDED WITH A MEANS OF CONTROLLING ACCESS TO THE INFORMATION TRANSMITTED |
USRE33189E (en) * | 1981-11-19 | 1990-03-27 | Communications Satellite Corporation | Security system for SSTV encryption |
US5253294A (en) | 1983-02-22 | 1993-10-12 | At&T Bell Laboratories | Secure transmission system |
ZA862839B (en) | 1985-05-24 | 1986-12-30 | Scientific Atlanta | Method and apparatus for scrambling and descrambling television signals |
US4901307A (en) * | 1986-10-17 | 1990-02-13 | Qualcomm, Inc. | Spread spectrum multiple access communication system using satellite or terrestrial repeaters |
US4750167A (en) | 1986-10-20 | 1988-06-07 | The Grass Valley Group, Inc. | Digital audio transmission system |
US5117457A (en) * | 1986-11-05 | 1992-05-26 | International Business Machines Corp. | Tamper resistant packaging for information protection in electronic circuitry |
US4870408A (en) | 1987-04-30 | 1989-09-26 | Motorola, Inc. | Method for dynamically allocating data channels on a trunked communication system |
US4881263A (en) | 1987-09-25 | 1989-11-14 | Digital Equipment Corporation | Apparatus and method for secure transmission of data over an unsecure transmission channel |
US4924513A (en) * | 1987-09-25 | 1990-05-08 | Digital Equipment Corporation | Apparatus and method for secure transmission of data over an unsecure transmission channel |
JPH0618368B2 (en) | 1987-10-13 | 1994-03-09 | 日本電気株式会社 | Authentication device |
US5235631A (en) | 1989-07-31 | 1993-08-10 | Motorola, Inc. | Trunked talk-group assignment method |
US5056109A (en) | 1989-11-07 | 1991-10-08 | Qualcomm, Inc. | Method and apparatus for controlling transmission power in a cdma cellular mobile telephone system |
US5101501A (en) * | 1989-11-07 | 1992-03-31 | Qualcomm Incorporated | Method and system for providing a soft handoff in communications in a cdma cellular telephone system |
US5136586A (en) | 1989-12-04 | 1992-08-04 | Academy Of Applied Science | Method and apparatus for telephone line multiplex channeling of toll-quality voice and digital information |
JP3008441B2 (en) | 1990-04-28 | 2000-02-14 | 日本電気株式会社 | Security module |
US5351087A (en) | 1990-06-01 | 1994-09-27 | Thomson Consumer Electronics, Inc. | Two stage interpolation system |
US5103459B1 (en) * | 1990-06-25 | 1999-07-06 | Qualcomm Inc | System and method for generating signal waveforms in a cdma cellular telephone system |
US5511073A (en) * | 1990-06-25 | 1996-04-23 | Qualcomm Incorporated | Method and apparatus for the formatting of data for transmission |
JPH05502539A (en) | 1990-09-19 | 1993-04-28 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Record carrier on which the main data file and control file are recorded, its recording method and device, and its reading device |
US5237612A (en) | 1991-03-29 | 1993-08-17 | Ericsson Ge Mobile Communications Inc. | Cellular verification and validation system |
US5241598A (en) | 1991-05-22 | 1993-08-31 | Ericsson Ge Mobile Communications, Inc. | Rolling key resynchronization in cellular verification and validation system |
US5159447A (en) | 1991-05-23 | 1992-10-27 | At&T Bell Laboratories | Buffer control for variable bit-rate channel |
US6647000B1 (en) | 1999-05-28 | 2003-11-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and apparatus for performing slot hopping of logical control channels in wireless communications systems |
JPH0514342A (en) | 1991-07-02 | 1993-01-22 | Hitachi Ltd | Packet multiple address communication system |
ZA925728B (en) | 1991-08-01 | 1993-04-28 | City Communications Ltd | Improvements in a radio communication system |
US5404563A (en) * | 1991-08-28 | 1995-04-04 | International Business Machines Corporation | Scheduling normally interchangeable facilities in multiprocessor computer systems |
US5257396A (en) | 1991-09-17 | 1993-10-26 | Zenith Electronics Corporation | Dual in-band/out-of-band CATV system |
JP2968099B2 (en) | 1991-09-20 | 1999-10-25 | 明星電気株式会社 | Tenant control method for cordless button telephone system |
US5164988A (en) | 1991-10-31 | 1992-11-17 | International Business Machines Corporation | Method to establish and enforce a network cryptographic security policy in a public key cryptosystem |
US5363379A (en) | 1992-04-30 | 1994-11-08 | International Business Machines Corporation | FDDI network test adaptor error injection circuit |
US5421006A (en) * | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
US6253069B1 (en) | 1992-06-22 | 2001-06-26 | Roy J. Mankovitz | Methods and apparatus for providing information in response to telephonic requests |
US5565909A (en) | 1992-08-31 | 1996-10-15 | Television Computer, Inc. | Method of identifying set-top receivers |
JP2551304B2 (en) | 1992-09-11 | 1996-11-06 | 日本電気株式会社 | Broadcast link control method |
US5353332A (en) | 1992-09-16 | 1994-10-04 | Ericsson Ge Mobile Communications Inc. | Method and apparatus for communication control in a radiotelephone system |
US5603081A (en) | 1993-11-01 | 1997-02-11 | Telefonaktiebolaget Lm Ericsson | Method for communicating in a wireless communication system |
US5768276A (en) | 1992-10-05 | 1998-06-16 | Telefonaktiebolaget Lm Ericsson | Digital control channels having logical channels supporting broadcast SMS |
FI96655C (en) | 1992-12-17 | 1996-07-25 | Nokia Telecommunications Oy | Procedure for Maintaining a Group Call in a Radio Telephone System and System Controller and Subscriber Terminal for the Radio Telephone System |
US5412655A (en) * | 1993-01-29 | 1995-05-02 | Nec Corporation | Multiprocessing system for assembly/disassembly of asynchronous transfer mode cells |
RU2091983C1 (en) | 1993-02-09 | 1997-09-27 | Геннадий Николаевич Чижухин | Method of coding of binary information and device for its realization |
JP3053527B2 (en) | 1993-07-30 | 2000-06-19 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Method and apparatus for validating a password, method and apparatus for generating and preliminary validating a password, method and apparatus for controlling access to resources using an authentication code |
US5410602A (en) * | 1993-09-27 | 1995-04-25 | Motorola, Inc. | Method for key management of point-to-point communications |
US5371794A (en) | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
FI940093A0 (en) | 1994-01-10 | 1994-01-10 | Nokia Mobile Phones Ltd | Foerfarande Foer oeverfoering av data and datagraenssnittenhet |
US5381479A (en) | 1994-02-28 | 1995-01-10 | Motorola, Inc. | Method for over the air rekeying of multiple communication groups |
US5481613A (en) * | 1994-04-15 | 1996-01-02 | Northern Telecom Limited | Computer network cryptographic key distribution system |
US5774496A (en) | 1994-04-26 | 1998-06-30 | Qualcomm Incorporated | Method and apparatus for determining data rate of transmitted variable rate data in a communications receiver |
US5448568A (en) | 1994-04-28 | 1995-09-05 | Thomson Consumer Electronics, Inc. | System of transmitting an interactive TV signal |
US5515441A (en) * | 1994-05-12 | 1996-05-07 | At&T Corp. | Secure communication method and apparatus |
US5473609A (en) | 1994-05-26 | 1995-12-05 | Thomson Consumer Electronics, Inc. | Method and apparatus for processing a conditional access program guide as for a satellite TV service |
US5467398A (en) | 1994-07-05 | 1995-11-14 | Motorola, Inc. | Method of messaging in a communication system |
EP1244306B1 (en) * | 1994-07-08 | 2008-02-06 | Sony Corporation | Receiving controlled-access broadcast signals for more than one playback |
US5537474A (en) | 1994-07-29 | 1996-07-16 | Motorola, Inc. | Method and apparatus for authentication in a communication system |
US5513245A (en) * | 1994-08-29 | 1996-04-30 | Sony Corporation | Automatic generation of private authentication key for wireless communication systems |
US5796829A (en) | 1994-09-09 | 1998-08-18 | The Titan Corporation | Conditional access system |
US5548646A (en) | 1994-09-15 | 1996-08-20 | Sun Microsystems, Inc. | System for signatureless transmission and reception of data packets between computer networks |
NL9401626A (en) | 1994-10-04 | 1996-05-01 | Multihouse Automatisering Bv | Digital communication system. |
US5758291A (en) * | 1994-10-18 | 1998-05-26 | Motorola, Inc. | Method for automatically revising a wireless communication unit scan list |
US5740246A (en) * | 1994-12-13 | 1998-04-14 | Mitsubishi Corporation | Crypt key system |
US6044154A (en) * | 1994-10-31 | 2000-03-28 | Communications Devices, Inc. | Remote generated, device identifier key for use with a dual-key reflexive encryption security system |
US5485577A (en) * | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
US5592470A (en) * | 1994-12-21 | 1997-01-07 | At&T | Broadband wireless system and network architecture providing broadband/narrowband service with optimal static and dynamic bandwidth/channel allocation |
FI98027C (en) | 1995-01-10 | 1997-03-25 | Nokia Telecommunications Oy | Packet radio system and terminal equipment for a packet radio system |
US6272632B1 (en) | 1995-02-21 | 2001-08-07 | Network Associates, Inc. | System and method for controlling access to a user secret using a key recovery field |
US6157719A (en) | 1995-04-03 | 2000-12-05 | Scientific-Atlanta, Inc. | Conditional access system |
US6937729B2 (en) | 1995-04-03 | 2005-08-30 | Scientific-Atlanta, Inc. | Representing entitlements to service in a conditional access system |
US6424717B1 (en) | 1995-04-03 | 2002-07-23 | Scientific-Atlanta, Inc. | Encryption devices for use in a conditional access system |
RU2077113C1 (en) | 1995-04-19 | 1997-04-10 | Военная академия связи | Method for cryptoprotection of telecommunication know-how systems |
US5708961A (en) * | 1995-05-01 | 1998-01-13 | Bell Atlantic Network Services, Inc. | Wireless on-premises video distribution using digital multiplexing |
US5673259A (en) | 1995-05-17 | 1997-09-30 | Qualcomm Incorporated | Random access communications channel for data services |
US6577848B1 (en) | 1995-05-30 | 2003-06-10 | Motorola, Inc. | Dispatch system and method of assigning a shared channel to remote units |
US5898710A (en) | 1995-06-06 | 1999-04-27 | Globespan Technologies, Inc. | Implied interleaving, a family of systematic interleavers and deinterleavers |
US5751707A (en) * | 1995-06-19 | 1998-05-12 | Bell Atlantic Network Services, Inc. | AIN interaction through wireless digital video network |
US5878141A (en) * | 1995-08-25 | 1999-03-02 | Microsoft Corporation | Computerized purchasing system and method for mediating purchase transactions over an interactive network |
US5758068A (en) * | 1995-09-19 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for software license management |
US6058289A (en) * | 1995-09-26 | 2000-05-02 | Pacific Communication Sciences, Inc. | Method and apparatus for low power mobile unit for cellular communications system |
US5991407A (en) | 1995-10-17 | 1999-11-23 | Nokia Telecommunications Oy | Subscriber authentication in a mobile communications system |
US5729540A (en) * | 1995-10-19 | 1998-03-17 | Qualcomm Incorporated | System and method for scheduling messages on a common channel |
US5841764A (en) | 1995-10-30 | 1998-11-24 | Ericsson Inc. | Method and apparatus for permitting a radio to originate and receive data messages in a data communications network |
ES2206594T3 (en) | 1995-10-31 | 2004-05-16 | Koninklijke Philips Electronics N.V. | CONDITIONAL ACCESS DISPLACED IN TIME. |
US6577734B1 (en) | 1995-10-31 | 2003-06-10 | Lucent Technologies Inc. | Data encryption key management system |
FI101581B1 (en) | 1995-11-07 | 1998-07-15 | Nokia Telecommunications Oy | Adaptation of protocols in the fixed network without signaling support to mobile telephone networks |
JPH09135478A (en) | 1995-11-10 | 1997-05-20 | Sanyo Electric Co Ltd | Fm multiplex signal receiver |
US5787347A (en) | 1995-12-11 | 1998-07-28 | Gte Laboratories Incorporated | Method and apparatus for selecting a cellular system for communication with a cellular telephone in a roaming area |
US5686963A (en) | 1995-12-26 | 1997-11-11 | C-Cube Microsystems | Method for performing rate control in a video encoder which provides a bit budget for each frame while employing virtual buffers and virtual buffer verifiers |
FI102235B1 (en) * | 1996-01-24 | 1998-10-30 | Nokia Telecommunications Oy | Management of authentication keys in a mobile communication system |
AU726443B2 (en) | 1996-02-02 | 2000-11-09 | Marconi Communications Limited | Cell aligners |
US6055314A (en) * | 1996-03-22 | 2000-04-25 | Microsoft Corporation | System and method for secure purchase and delivery of video content programs |
US5673322A (en) | 1996-03-22 | 1997-09-30 | Bell Communications Research, Inc. | System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networks |
US5778069A (en) | 1996-04-10 | 1998-07-07 | Microsoft Corporation | Non-biased pseudo random number generator |
US5751813A (en) | 1996-04-29 | 1998-05-12 | Motorola, Inc. | Use of an encryption server for encrypting messages |
US5778187A (en) | 1996-05-09 | 1998-07-07 | Netcast Communications Corp. | Multicasting method and apparatus |
US6172972B1 (en) * | 1996-05-28 | 2001-01-09 | Microsoft Corporation | Multi-packet transport structure and method for sending network data over satellite network |
US20050048963A1 (en) * | 1996-06-03 | 2005-03-03 | Kubler Joseph J. | Configurable premises based wireless network and operating protocol |
US5881368A (en) * | 1996-06-06 | 1999-03-09 | Qualcomm Incorporated | Method and apparatus of power control in a CDMA dispatch system |
US5884196A (en) * | 1996-06-06 | 1999-03-16 | Qualcomm Incorporated | Method and apparatus of preserving power of a remote unit in a dispatch system |
FI962381A (en) | 1996-06-07 | 1997-12-08 | Nokia Telecommunications Oy | Compressing data on a communication connection |
US5983099A (en) | 1996-06-11 | 1999-11-09 | Qualcomm Incorporated | Method/apparatus for an accelerated response to resource allocation requests in a CDMA push-to-talk system using a CDMA interconnect subsystem to route calls |
US5719875A (en) | 1996-06-11 | 1998-02-17 | Lucent Technologies Inc. | Systematic convolution interleavers and deinterleavers |
US5748736A (en) * | 1996-06-14 | 1998-05-05 | Mittra; Suvo | System and method for secure group communications via multicast or broadcast |
US6026165A (en) * | 1996-06-20 | 2000-02-15 | Pittway Corporation | Secure communications in a wireless system |
JP3344897B2 (en) | 1996-06-28 | 2002-11-18 | 株式会社エヌ・ティ・ティ・ドコモ | Capacity control method in CDMA mobile communication |
US5936965A (en) | 1996-07-08 | 1999-08-10 | Lucent Technologies, Inc. | Method and apparatus for transmission of asynchronous, synchronous, and variable length mode protocols multiplexed over a common bytestream |
US5835730A (en) | 1996-07-31 | 1998-11-10 | General Instrument Corporation Of Delaware | MPEG packet header compression for television modems |
JP3452447B2 (en) | 1996-08-06 | 2003-09-29 | 三菱電機株式会社 | CDMA system and transmission power control device therefor |
JPH1063598A (en) | 1996-08-22 | 1998-03-06 | Nippon Telegr & Teleph Corp <Ntt> | Method, system, and server for multicast communication |
US5778059A (en) | 1996-08-30 | 1998-07-07 | Digital Technics, Inc. | Distributed predictive and event-driven processing environment |
US6522877B1 (en) | 1996-09-06 | 2003-02-18 | Nokia Mobile Phones Ltd. | Methods and apparatus for providing an interactive cell broadcast service |
US5850444A (en) | 1996-09-09 | 1998-12-15 | Telefonaktienbolaget L/M Ericsson (Publ) | Method and apparatus for encrypting radio traffic in a telecommunications network |
US5887252A (en) * | 1996-09-10 | 1999-03-23 | Nokia Mobile Phones Limited | Multicast transmission for DS-CDMA cellular telephones |
JP3630874B2 (en) | 1996-09-13 | 2005-03-23 | キヤノン株式会社 | Communication apparatus and system and method |
US6201961B1 (en) * | 1996-09-13 | 2001-03-13 | Globalstar L. P. | Use of reference phone in point-to-point satellite communication system |
US5956404A (en) | 1996-09-30 | 1999-09-21 | Schneier; Bruce | Digital signature with auditing bits |
US5751725A (en) * | 1996-10-18 | 1998-05-12 | Qualcomm Incorporated | Method and apparatus for determining the rate of received data in a variable rate communication system |
US5909491A (en) | 1996-11-06 | 1999-06-01 | Nokia Mobile Phones Limited | Method for sending a secure message in a telecommunications system |
DE19646371A1 (en) | 1996-11-09 | 1998-05-14 | Bosch Gmbh Robert | Method and arrangement for improving the transmission quality in a point-to-multipoint radio transmission system |
US5896382A (en) | 1996-11-19 | 1999-04-20 | Scientific-Atlanta, Inc. | Method and apparatus for communicating information between a headend and subscriber over a wide area network |
FI105137B (en) | 1996-12-02 | 2000-06-15 | Nokia Networks Oy | Improved broadcasting in a packet network |
JP3402100B2 (en) | 1996-12-27 | 2003-04-28 | カシオ計算機株式会社 | Voice control host device |
US6069885A (en) | 1996-12-30 | 2000-05-30 | At&T Corp | Method and apparatus for providing high speed services using a wireless communications system |
TW373372B (en) | 1996-12-31 | 1999-11-01 | Heng-Dao Lin | Wireless 3C box |
JPH10200536A (en) | 1997-01-09 | 1998-07-31 | Toshiba Corp | Network system |
US6108424A (en) | 1997-01-09 | 2000-08-22 | U.S. Philips Corporation | Mobile radio telephone station comprising a protection system for at least one authentication number and method of protecting an authentication number |
US5946316A (en) | 1997-01-17 | 1999-08-31 | Lucent Technologies, Inc. | Dynamic distributed multicast routing protocol |
US5850445A (en) | 1997-01-31 | 1998-12-15 | Synacom Technology, Inc. | Authentication key management system and method |
US5940507A (en) | 1997-02-11 | 1999-08-17 | Connected Corporation | Secure file archive through encryption key management |
US6690795B1 (en) | 1997-03-04 | 2004-02-10 | Lucent Technologies Inc. | Multiple keys for decrypting data in restricted-access television system |
WO1998041044A2 (en) * | 1997-03-14 | 1998-09-17 | Northern Telecom Inc. | Method and apparatus for network initiated parameter updating |
US6223028B1 (en) | 1997-03-17 | 2001-04-24 | Nortel Networks Ltd | Enhanced method and system for programming a mobile telephone over the air within a mobile telephone communication network |
KR100260516B1 (en) | 1997-04-01 | 2000-07-01 | 정선종 | Originating call and terminating call service method in asynchronous communication cdma cellular network |
US6047071A (en) * | 1997-04-15 | 2000-04-04 | Nokia Mobile Phones | Network-initiated change of mobile phone parameters |
GB2324934A (en) | 1997-05-02 | 1998-11-04 | Motorola Ltd | Multiplexing data from multi-media sources |
US6128490A (en) | 1997-05-08 | 2000-10-03 | Nortel Networks Limited | Wireless communication system that supports selection of operation from multiple frequency bands and multiple protocols and method of operation therefor |
US5990928A (en) | 1997-05-30 | 1999-11-23 | Rockwell International Corporation | Method and apparatus for receiving broadcast entertainment transmissions at a moving receiver station |
JP2002501707A (en) | 1997-05-30 | 2002-01-15 | クゥアルコム・インコーポレイテッド | Method and apparatus for error protection of wireless file transfer |
US6233234B1 (en) | 1997-06-03 | 2001-05-15 | Bell Atlantic Network Services, Inc. | Secure LAN/internet telephony |
US6081907A (en) | 1997-06-09 | 2000-06-27 | Microsoft Corporation | Data delivery system and method for delivering data and redundant information over a unidirectional network |
US6108706A (en) | 1997-06-09 | 2000-08-22 | Microsoft Corporation | Transmission announcement system and method for announcing upcoming data transmissions over a broadcast network |
FI105306B (en) | 1997-06-10 | 2000-07-14 | Nokia Networks Oy | Radio |
ATE220814T1 (en) | 1997-06-27 | 2002-08-15 | Swisscom Mobile Ag | TRANSACTION METHOD USING A PORTABLE IDENTIFICATION ELEMENT |
FI104667B (en) | 1997-07-14 | 2000-04-14 | Nokia Networks Oy | Implementation of access service |
US6603857B1 (en) | 1997-07-14 | 2003-08-05 | Entrust Technologies Limited | Method and apparatus for controlling release of time sensitive information |
JP2001513587A (en) | 1997-07-31 | 2001-09-04 | サイエンティフィック−アトランタ・インコーポレーテッド | Verification of source of information program in conditional access system |
AU8823698A (en) | 1997-08-01 | 1999-02-22 | Scientific-Atlanta, Inc. | Encryption devices for use in a conditional access system |
BR9815607A (en) | 1997-08-01 | 2001-11-13 | Scientific Atlanta | Representation of authorizations for service in a conditional access system |
JPH1168755A (en) | 1997-08-08 | 1999-03-09 | Fujitsu Ltd | Broadcast control system for atm network, network equipment and exchange node equipment |
US6073122A (en) | 1997-08-15 | 2000-06-06 | Lucent Technologies Inc. | Cryptographic method and apparatus for restricting access to transmitted programming content using extended headers |
US6021124A (en) * | 1997-08-19 | 2000-02-01 | Telefonaktiebolaget Lm Ericsson | Multi-channel automatic retransmission query (ARQ) method |
US6032197A (en) * | 1997-09-25 | 2000-02-29 | Microsoft Corporation | Data packet header compression for unidirectional transmission |
US6608832B2 (en) | 1997-09-25 | 2003-08-19 | Telefonaktiebolaget Lm Ericsson | Common access between a mobile communications network and an external network with selectable packet-switched and circuit-switched and circuit-switched services |
DE19742681C2 (en) | 1997-09-26 | 2003-03-06 | Ericsson Telefon Ab L M | GPRS subscriber selection from several Internet service providers |
IL121862A (en) | 1997-09-29 | 2005-07-25 | Nds Ltd West Drayton | Distributed ird system for pay television systems |
US5970072A (en) | 1997-10-02 | 1999-10-19 | Alcatel Usa Sourcing, L.P. | System and apparatus for telecommunications bus control |
US6480477B1 (en) | 1997-10-14 | 2002-11-12 | Innowave Eci Wireless Systems Ltd. | Method and apparatus for a data transmission rate of multiples of 100 MBPS in a terminal for a wireless metropolitan area network |
US6665718B1 (en) | 1997-10-14 | 2003-12-16 | Lucent Technologies Inc. | Mobility management system |
JPH11127468A (en) * | 1997-10-20 | 1999-05-11 | Fujitsu Ltd | Communication controller and radio communication system |
US6005848A (en) | 1997-10-27 | 1999-12-21 | Motorola, Inc. | Method and apparatus for a talkgroup call in a wireless CDMA system |
JP4820936B2 (en) | 1997-10-28 | 2011-11-24 | モトローラ モビリティ インコーポレイテッド | CDMA dispatch system |
US6044069A (en) | 1997-10-29 | 2000-03-28 | Conexant Systems, Inc. | Power management system for a mobile station |
US6574211B2 (en) | 1997-11-03 | 2003-06-03 | Qualcomm Incorporated | Method and apparatus for high rate packet data transmission |
JPH11136669A (en) | 1997-11-04 | 1999-05-21 | Sony Corp | Device and method for satellite broadcasting |
US6009106A (en) | 1997-11-19 | 1999-12-28 | Digi International, Inc. | Dynamic bandwidth allocation within a communications channel |
US6185430B1 (en) * | 1997-11-26 | 2001-02-06 | Motorola, Inc. | Voice call group function for a satellite based air traffic control system |
FI104133B (en) * | 1997-11-28 | 1999-11-15 | Nokia Mobile Phones Ltd | Coding and modulation method and device for its application |
US6097817A (en) | 1997-12-10 | 2000-08-01 | Omnipoint Corporation | Encryption and decryption in communication system with wireless trunk |
US5966373A (en) | 1997-12-10 | 1999-10-12 | L-3 Communications Corporation | Waveform and frame structure for a fixed wireless loop synchronous CDMA communications system |
FR2772533B1 (en) | 1997-12-15 | 2001-09-28 | Inst Nat Rech Inf Automat | DEVICE FOR INTERCONNECTING BETWEEN NETWORK SEGMENTS COMMUNICATING ACCORDING TO DIFFERENT FORMAT PROTOCOLS, AND CORRESPONDING METHOD |
US6065061A (en) * | 1997-12-16 | 2000-05-16 | Lucent Technologies Inc. | Internet protocol based network architecture for cable television access with switched fallback |
US7079523B2 (en) | 2000-02-07 | 2006-07-18 | Ipr Licensing, Inc. | Maintenance link using active/standby request channels |
KR100241783B1 (en) * | 1997-12-19 | 2000-02-01 | 윤종용 | Method for generating call termination alert and display according service option in multi mobile terminal |
KR100269339B1 (en) | 1997-12-24 | 2000-10-16 | 서평원 | Home Location Register Management System in Mobile Communication System And database Management Method using the same |
JP3561154B2 (en) | 1997-12-26 | 2004-09-02 | 株式会社東芝 | Broadcast receiving device and contract management device |
US6192070B1 (en) | 1998-01-02 | 2001-02-20 | Mitsubishi Electric Research Laboratories, Inc. | Universal modem for digital video, audio and data communications |
US6990680B1 (en) * | 1998-01-05 | 2006-01-24 | Gateway Inc. | System for scheduled caching of in-band data services |
US6519266B1 (en) | 1998-01-05 | 2003-02-11 | Nortel Networks Limited | Layering of wireless packet data service |
US6052812A (en) * | 1998-01-07 | 2000-04-18 | Pocketscience, Inc. | Messaging communication protocol |
FI106172B (en) | 1998-01-29 | 2000-11-30 | Nokia Networks Oy | A method for reconfiguring a connection in a cellular radio network |
US6047395A (en) * | 1998-01-30 | 2000-04-04 | Cirrus Logic, Inc. | Error correction processor for correcting a multi-dimensional code by generating an erasure polynomial over one dimension for correcting multiple codewords in another dimension |
EP0936774A1 (en) | 1998-02-13 | 1999-08-18 | CANAL+ Société Anonyme | Recording of scrambled digital data |
EP0936812A1 (en) | 1998-02-13 | 1999-08-18 | CANAL+ Société Anonyme | Method and apparatus for recording of encrypted digital data |
JPH11243569A (en) | 1998-02-25 | 1999-09-07 | Kokusai Electric Co Ltd | Message receiver |
FI980427A (en) | 1998-02-25 | 1999-08-26 | Ericsson Telefon Ab L M | Procedure, arrangement and device for verification |
US6081508A (en) | 1998-02-25 | 2000-06-27 | Indus River Networks, Inc. | Remote computer communication |
KR100315641B1 (en) | 1999-03-03 | 2001-12-12 | 서평원 | Mutual Authentication Method Of Mobile Station And System For OTAPA |
US6055236A (en) * | 1998-03-05 | 2000-04-25 | 3Com Corporation | Method and system for locating network services with distributed network address translation |
US6353614B1 (en) * | 1998-03-05 | 2002-03-05 | 3Com Corporation | Method and protocol for distributed network address translation |
JP3822997B2 (en) | 1998-03-19 | 2006-09-20 | 株式会社日立製作所 | Broadcast information distribution system |
KR100566040B1 (en) | 1998-03-19 | 2006-03-30 | 가부시끼가이샤 히다치 세이사꾸쇼 | Broadcast information delivering system |
JP2002508620A (en) | 1998-03-23 | 2002-03-19 | サムスン エレクトロニクス カンパニー リミテッド | Power control apparatus and method for reverse link common channel in code division multiple access communication system |
US6473419B1 (en) | 1998-03-26 | 2002-10-29 | Nokia Corporation | State apparatus, and associated methods, for controlling packet data communications in a radio communication system |
US6208634B1 (en) * | 1998-03-30 | 2001-03-27 | Nortel Networks Limited | Methods and apparatus for CDMA wireless call setup time/service negotiation optimization |
EP0951198A2 (en) | 1998-04-14 | 1999-10-20 | Nec Corporation | IP multicast over a wireless ATM network |
US6373829B1 (en) | 1998-04-23 | 2002-04-16 | Motorola, Inc. | Method and apparatus for group calls in a wireless CDMA communication system using outbound traffic channels for individual group members |
JPH11313059A (en) | 1998-04-27 | 1999-11-09 | Nippon Telegr & Teleph Corp <Ntt> | Multicasting communication method/system and storage medium recording multicasting communication program |
US6098878A (en) | 1998-04-30 | 2000-08-08 | Ericsson Inc. | Tariff management apparatus and method for communications terminals using smart cards |
US6230024B1 (en) | 1998-05-12 | 2001-05-08 | Nortel Networks Limited | Voice to digital fax transmission |
JPH11331150A (en) | 1998-05-13 | 1999-11-30 | Sony Corp | Certifying/charging method for information user, method for distributing information for information restoration to information user, radio calling device and reproducing or receiving device |
FI106600B (en) | 1998-05-13 | 2001-02-28 | Nokia Networks Oy | Multi-Point Transmission |
US6233341B1 (en) | 1998-05-19 | 2001-05-15 | Visto Corporation | System and method for installing and using a temporary certificate at a remote site |
US6477377B2 (en) | 1998-05-29 | 2002-11-05 | Ericsson Inc. | Cellular radiotelephone systems and methods that broadcast a common control channel over multiple radio frequencies |
US6253326B1 (en) | 1998-05-29 | 2001-06-26 | Palm, Inc. | Method and system for secure communications |
JPH11355460A (en) | 1998-06-03 | 1999-12-24 | Meidensha Corp | Connection method for isdn line |
JP3640237B2 (en) | 1998-06-11 | 2005-04-20 | 株式会社エヌ・ティ・ティ・ドコモ | Information distribution method in mobile communication network |
US6510515B1 (en) | 1998-06-15 | 2003-01-21 | Telefonaktlebolaget Lm Ericsson | Broadcast service access control |
US6536041B1 (en) | 1998-06-16 | 2003-03-18 | United Video Properties, Inc. | Program guide system with real-time data sources |
KR20000002254A (en) | 1998-06-18 | 2000-01-15 | 윤종용 | Mobile communication transmitting and receiving system device and method |
US6148010A (en) | 1998-06-24 | 2000-11-14 | Qualcomm Incorporated | Method and apparatus for distributing and consolidating data packets onto multiple network interfaces |
US6295361B1 (en) | 1998-06-30 | 2001-09-25 | Sun Microsystems, Inc. | Method and apparatus for multicast indication of group key change |
FI105966B (en) | 1998-07-07 | 2000-10-31 | Nokia Networks Oy | Authentication in a telecommunications network |
JO2117B1 (en) | 1998-07-15 | 2000-05-21 | كانال + تيكنولوجيز سوسيته انونيم | method and apparatus for secure communication of information between aplurality of digital audiovisual devices |
US6567914B1 (en) | 1998-07-22 | 2003-05-20 | Entrust Technologies Limited | Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system |
US6918035B1 (en) * | 1998-07-31 | 2005-07-12 | Lucent Technologies Inc. | Method for two-party authentication and key agreement |
US6148198A (en) | 1998-08-05 | 2000-11-14 | Ericsson Inc. | Method and apparatus for selecting a service provider |
US6310661B1 (en) | 1998-08-07 | 2001-10-30 | Hughes Electronics Corporation | Method of broadcasting controlling data streams and apparatus for receiving the same |
US6141347A (en) | 1998-08-26 | 2000-10-31 | Motorola, Inc. | Wireless communication system incorporating multicast addressing and method for use |
KR100330241B1 (en) | 1998-08-26 | 2002-10-04 | 삼성전자 주식회사 | Apparatus and method for communicating wireless packet voice data |
JP2000078555A (en) | 1998-08-28 | 2000-03-14 | Sony Corp | Charging method and device for data transmission system |
DE69835670T2 (en) | 1998-09-01 | 2007-09-06 | Irdeto Access B.V. | Data transfer system |
US6018360A (en) * | 1998-09-09 | 2000-01-25 | Motorola, Inc. | Method of switching a call to a multipoint conference call in a H.323 communication compliant environment |
US6438612B1 (en) | 1998-09-11 | 2002-08-20 | Ssh Communications Security, Ltd. | Method and arrangement for secure tunneling of data between virtual routers |
US6374103B1 (en) | 1998-09-30 | 2002-04-16 | Lucent Technologies, Inc. | Method and system for overhead message updates |
EP0993128A1 (en) | 1998-10-05 | 2000-04-12 | Motorola, Inc. | Power control in communications systems |
US6266420B1 (en) | 1998-10-08 | 2001-07-24 | Entrust Technologies Limited | Method and apparatus for secure group communications |
JP3644579B2 (en) | 1998-10-29 | 2005-04-27 | 富士通株式会社 | Security enhancement method and apparatus |
JP3248498B2 (en) | 1998-10-30 | 2002-01-21 | 日本電気株式会社 | Mobile communication system |
JP2000137551A (en) | 1998-11-02 | 2000-05-16 | Mitsubishi Electric Corp | Terminal equipment |
CA2282942A1 (en) | 1998-11-09 | 2000-05-09 | Lucent Technologies Inc. | Efficient authentication with key update |
US6721805B1 (en) | 1998-11-12 | 2004-04-13 | International Business Machines Corporation | Providing shared-medium multiple access capability in point-to-point communications |
US6385461B1 (en) | 1998-11-16 | 2002-05-07 | Ericsson Inc. | User group indication and status change in radiocommunications systems |
JP2000151708A (en) | 1998-11-18 | 2000-05-30 | Nec Corp | Broadcast communication method and its device |
EP1133861A1 (en) | 1998-11-27 | 2001-09-19 | BRITISH TELECOMMUNICATIONS public limited company | Session announcement for adaptive component configuration |
JP3197526B2 (en) | 1998-11-27 | 2001-08-13 | 株式会社ワイ・アール・ピー移動通信基盤技術研究所 | Decryption device |
GB9826158D0 (en) | 1998-11-27 | 1999-01-20 | British Telecomm | Anounced session control |
JP3022530B1 (en) | 1998-12-07 | 2000-03-21 | 日本電気株式会社 | Multicast communication system in CDMA wireless communication system |
EP1009140A3 (en) | 1998-12-11 | 2005-12-07 | Matsushita Electric Industrial Co., Ltd. | Data transmission method, data transmission system, data receiving method, and data receiving apparatus |
KR100331864B1 (en) | 1998-12-15 | 2002-05-09 | 서평원 | Communication System for FAX Serviceand FAX Data Service Method |
US6343280B2 (en) * | 1998-12-15 | 2002-01-29 | Jonathan Clark | Distributed execution software license server |
JP2000196546A (en) | 1998-12-25 | 2000-07-14 | Jisedai Joho Hoso System Kenkyusho:Kk | Method for transmitting/receiving broadcast, broadcast transmitter, broadcast receiver, and broadcast transmitting/receiving system |
JP2000196673A (en) | 1998-12-28 | 2000-07-14 | Toshiba Corp | Hybrid mobile communication system, hybrid mobile communication equipment and hybrid mobile communicating method |
PL342519A1 (en) | 1998-12-28 | 2001-06-18 | Ntt Docomo Inc | Method of monitoring communication, communication method, terminal equipment, relay apparatus and communication system |
US6363242B1 (en) * | 1999-01-11 | 2002-03-26 | Lucent Technologies Inc. | Identifying alternative service options |
EP1024661A3 (en) | 1999-01-27 | 2002-07-17 | Hughes Electronics Corporation | Pictographic electronic program guide |
US6415312B1 (en) | 1999-01-29 | 2002-07-02 | International Business Machines Corporation | Reliable multicast for small groups |
US6542490B1 (en) | 1999-01-29 | 2003-04-01 | Nortel Networks Limited | Data link control proctocol for 3G wireless system |
EP1030484B1 (en) | 1999-01-29 | 2013-07-17 | Alcatel Lucent | Data link layer quality of service for UMTS |
US6502140B1 (en) | 1999-01-29 | 2002-12-31 | International Business Machines Corporation | Multicast support for small groups |
US6606706B1 (en) | 1999-02-08 | 2003-08-12 | Nortel Networks Limited | Hierarchical multicast traffic security system in an internetwork |
FI106763B (en) * | 1999-02-10 | 2001-03-30 | Nokia Mobile Phones Ltd | A method of communicating the current protocol to other layers of the protocol stack |
US6314095B1 (en) | 1999-02-11 | 2001-11-06 | Motorola, Inc. | Method and apparatus for a high-speed multimedia content switch with compressed internet protocol header |
GB9903124D0 (en) | 1999-02-11 | 1999-04-07 | Nokia Telecommunications Oy | An authentication method |
FI106901B (en) | 1999-02-23 | 2001-04-30 | Nokia Mobile Phones Ltd | Method and apparatus for controlling transmission of data packets in a cellular system |
CA2299017A1 (en) | 1999-02-26 | 2000-08-26 | Akemichi Yamada | A method for high speed modulation and error control coding |
US6556587B1 (en) | 1999-02-26 | 2003-04-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Update of header compression state in packet communications |
US6377782B1 (en) | 1999-03-01 | 2002-04-23 | Mediacell, Inc. | Method and apparatus for communicating between a client device and a linear broadband network |
JP2000253459A (en) | 1999-03-02 | 2000-09-14 | Kodo Ido Tsushin Security Gijutsu Kenkyusho:Kk | Cipher radio communication equipment |
JP3968190B2 (en) | 1999-03-06 | 2007-08-29 | 松下電器産業株式会社 | Transceiver |
US6640251B1 (en) | 1999-03-12 | 2003-10-28 | Nortel Networks Limited | Multicast-enabled address resolution protocol (ME-ARP) |
US6788681B1 (en) | 1999-03-16 | 2004-09-07 | Nortel Networks Limited | Virtual private networks and methods for their operation |
DE69911264T2 (en) | 1999-03-19 | 2004-07-01 | Nokia Corp. | METHOD AND NETWORK ELEMENT FOR FORWARDING MULTIPLE MESSAGES |
US6614804B1 (en) | 1999-03-22 | 2003-09-02 | Webtv Networks, Inc. | Method and apparatus for remote update of clients by a server via broadcast satellite |
ES2620291T3 (en) * | 1999-03-24 | 2017-06-28 | Qualcomm, Incorporated | Multiple Reserve Access |
JP3816689B2 (en) | 1999-03-31 | 2006-08-30 | 株式会社東芝 | Information distribution apparatus, information reception apparatus, and communication method |
BR0009645A (en) | 1999-04-09 | 2002-01-15 | Opentv Inc | Bandwidth management in a hybrid unicast |
JP2000295541A (en) | 1999-04-09 | 2000-10-20 | Matsushita Electric Ind Co Ltd | Broadcast receiver, method for processing contract information of the broadcast receiver, and recording medium for contract information processing program for the broadcast receiver |
US6944763B1 (en) | 1999-04-13 | 2005-09-13 | Sony Corporation | Data transmission system |
US6473858B1 (en) | 1999-04-16 | 2002-10-29 | Digeo, Inc. | Method and apparatus for broadcasting data with access control |
US6765909B1 (en) | 1999-04-22 | 2004-07-20 | Nortel Networks Limited | Method and apparatus for providing support for multiple QoS levels within a third generation packet data session |
US7096355B1 (en) | 1999-04-26 | 2006-08-22 | Omniva Corporation | Dynamic encoding algorithms and inline message decryption |
US6345307B1 (en) * | 1999-04-30 | 2002-02-05 | General Instrument Corporation | Method and apparatus for compressing hypertext transfer protocol (HTTP) messages |
US6449491B1 (en) | 1999-05-10 | 2002-09-10 | Ericsson Inc. | Apparatus and methods for conducting group calls in wireless communications systems |
KR100429187B1 (en) | 1999-05-11 | 2004-04-28 | 엘지전자 주식회사 | ATM Packet Network and Method for Transmitting Packet |
JP3692830B2 (en) | 1999-05-14 | 2005-09-07 | 株式会社日立製作所 | Multicast communication system |
US6628946B1 (en) | 1999-05-20 | 2003-09-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for broadcasting system information in a cellular communications network |
AU4907600A (en) | 1999-06-02 | 2000-12-28 | Nortel Networks Limited | Method for engineering paths for multicast traffic |
US6959384B1 (en) | 1999-12-14 | 2005-10-25 | Intertrust Technologies Corporation | Systems and methods for authenticating and protecting the integrity of data streams and other data |
US6658463B1 (en) | 1999-06-10 | 2003-12-02 | Hughes Electronics Corporation | Satellite multicast performance enhancing multicast HTTP proxy system and method |
FI109321B (en) * | 1999-06-10 | 2002-06-28 | Nokia Corp | Method and Arrangement for Implementing Fast Cell Switching in a Packet Switched Cellular Radio System |
US6377810B1 (en) | 1999-06-11 | 2002-04-23 | Motorola, Inc. | Method of operation of mobile wireless communication system with location information |
US6434367B1 (en) | 1999-06-11 | 2002-08-13 | Lucent Technologies Inc. | Using decoupled power control sub-channel to control reverse-link channel power |
US6957346B1 (en) | 1999-06-15 | 2005-10-18 | Ssh Communications Security Ltd. | Method and arrangement for providing security through network address translations using tunneling and compensations |
US7296091B1 (en) | 1999-06-18 | 2007-11-13 | The Trustees Of Columbia University In The City Of New York | System and method for receiving over a network a broadcast from a broadcast source |
US6560206B1 (en) | 1999-06-21 | 2003-05-06 | Nortel Networks Limited | Cell based data transmission method |
US6577644B1 (en) | 1999-06-22 | 2003-06-10 | Lucent Technologies Inc. | Quality of service (QoS) enhancement to multilink point-to-point protocol (PPP) |
ATE403992T1 (en) | 1999-06-22 | 2008-08-15 | Hitachi Ltd | CRYPTOGRAPHIC APPARATUS AND METHOD |
JP3343908B2 (en) * | 1999-06-22 | 2002-11-11 | 日本電気株式会社 | Broadcast communication method and system, base station apparatus and mobile station |
US6633979B1 (en) | 1999-06-25 | 2003-10-14 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and arrangements for secure linking of entity authentication and ciphering key generation |
US6760752B1 (en) | 1999-06-28 | 2004-07-06 | Zix Corporation | Secure transmission system |
JP2001016253A (en) | 1999-06-29 | 2001-01-19 | Hitachi Ltd | Method for interrupting remaining tcp connection |
EP1071296A1 (en) | 1999-07-22 | 2001-01-24 | Alcatel | Method to multi-cast data packets to mobile stations, and related gateway, service and routing nodes |
US6779051B1 (en) | 1999-07-30 | 2004-08-17 | Nortel Networks Corporation | Determining an end point of a GRE tunnel |
US6067290A (en) | 1999-07-30 | 2000-05-23 | Gigabit Wireless, Inc. | Spatial multiplexing in a cellular network |
CN100512517C (en) | 1999-08-02 | 2009-07-08 | 高通股份有限公司 | Cell proadcast in hybrid GSM/CDMA network |
EP1075123A1 (en) | 1999-08-06 | 2001-02-07 | Lucent Technologies Inc. | Dynamic home agent system for wireless communication systems |
JP4009108B2 (en) | 1999-08-10 | 2007-11-14 | 富士通株式会社 | Memory card |
JP3704003B2 (en) | 1999-08-16 | 2005-10-05 | 株式会社東芝 | Radio base station apparatus, radio terminal apparatus, and information communication method |
JP2001053654A (en) | 1999-08-16 | 2001-02-23 | Matsushita Electric Ind Co Ltd | Signal separating device, signal separation method and recording medium |
US6449488B1 (en) | 1999-08-25 | 2002-09-10 | Lucent Technologies Inc. | Quality of service based CDMA broadcast scheduler |
US6289455B1 (en) | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
KR20020029783A (en) | 1999-09-08 | 2002-04-19 | 밀러 럿셀 비 | System and method for automatically determining when to answer incoming packet data calls in a wireless communication network |
US6363480B1 (en) * | 1999-09-14 | 2002-03-26 | Sun Microsystems, Inc. | Ephemeral decryptability |
KR100636110B1 (en) | 1999-10-29 | 2006-10-18 | 삼성전자주식회사 | Terminal supporting signaling for MPEG-4 tranceiving |
JP4423517B2 (en) | 1999-11-05 | 2010-03-03 | ソニー株式会社 | Data processing apparatus, data processing method, and recording medium |
US7069436B1 (en) | 1999-11-01 | 2006-06-27 | Sony Corporation | Information transmission system and method, transmitting apparatus, receiving apparatus, data processing device and data processing method, and recording medium |
JP3549788B2 (en) | 1999-11-05 | 2004-08-04 | 三菱電機株式会社 | Multi-stage encoding method, multi-stage decoding method, multi-stage encoding device, multi-stage decoding device, and information transmission system using these |
JP2001134193A (en) | 1999-11-09 | 2001-05-18 | Haneda Hume Pipe Co Ltd | Going-out display tag |
US6529740B1 (en) * | 1999-12-10 | 2003-03-04 | Motorola, Inc. | Group radio with subscriber-radio controlled channel selection |
JP3721906B2 (en) | 1999-12-15 | 2005-11-30 | 株式会社日立製作所 | Mobile communication system and multicast method in mobile communication system |
US6832314B1 (en) | 1999-12-15 | 2004-12-14 | Ericsson, Inc. | Methods and apparatus for selective encryption and decryption of point to multi-point messages |
JP3362780B2 (en) | 1999-12-15 | 2003-01-07 | 日本電信電話株式会社 | Authentication method in communication system, center device, recording medium storing authentication program |
JP2001177523A (en) | 1999-12-16 | 2001-06-29 | Mitsubishi Electric Corp | Multicast communication method |
US6798791B1 (en) | 1999-12-16 | 2004-09-28 | Agere Systems Inc | Cluster frame synchronization scheme for a satellite digital audio radio system |
US6654384B1 (en) | 1999-12-30 | 2003-11-25 | Aperto Networks, Inc. | Integrated self-optimizing multi-parameter and multi-variable point to multipoint communication system |
US6608841B1 (en) | 1999-12-30 | 2003-08-19 | Nokia Networks Oy | System and method for achieving robust IP/UDP/RTP header compression in the presence of unreliable networks |
US7340600B1 (en) | 2000-01-14 | 2008-03-04 | Hewlett-Packard Development Company, L.P. | Authorization infrastructure based on public key cryptography |
KR100943877B1 (en) | 2000-01-28 | 2010-02-24 | 퀄컴 인코포레이티드 | Method and apparatus for channel optimization during point-to-point protocol ppp session requests |
US20020023165A1 (en) * | 2000-01-28 | 2002-02-21 | Lahr Nils B. | Method and apparatus for encoder-based distribution of live video and other streaming content |
US8046795B2 (en) | 2000-02-03 | 2011-10-25 | Sony Corporation | Method and system for directing the generation of a video media event in a generation system based on a media event protocol file such that the video media event remains visible at a predetermined location in a second web page while a user navigates from a first web page to the second web page which does not refer to the video media event |
WO2001058044A2 (en) | 2000-02-07 | 2001-08-09 | Tantivy Communications, Inc. | Minimal maintenance link to support synchronization |
US6956833B1 (en) | 2000-02-08 | 2005-10-18 | Sony Corporation | Method, system and devices for wireless data storage on a server and data retrieval |
US6915272B1 (en) | 2000-02-23 | 2005-07-05 | Nokia Corporation | System and method of secure payment and delivery of goods and services |
US6490259B1 (en) | 2000-02-24 | 2002-12-03 | Telcordia Technologies, Inc. | Active link layer and intra-domain mobility for IP networks |
US6751218B1 (en) | 2000-02-26 | 2004-06-15 | Avaya Technology Corp. | Method and system for ATM-coupled multicast service over IP networks |
US7016351B1 (en) * | 2000-02-29 | 2006-03-21 | Cisco Technology, Inc. | Small group multicast in a computer network |
US20010036834A1 (en) | 2000-03-03 | 2001-11-01 | Subir Das | Supporting fast intra-domain handoffs and paging in wireless cellular networks |
EP1134977A1 (en) | 2000-03-06 | 2001-09-19 | Irdeto Access B.V. | Method and system for providing copies of scrambled content with unique watermarks, and system for descrambling scrambled content |
US6523069B1 (en) * | 2000-03-13 | 2003-02-18 | Yahoo! Inc. | Transmission of multicast media between networks |
US6970452B2 (en) | 2000-03-13 | 2005-11-29 | Curitell Communications Inc. | Common subscriber managing apparatus and method based on functional modeling of a common subscriber server for use in an ALL-IP network and method therefor |
US6539242B1 (en) * | 2000-03-31 | 2003-03-25 | Qualcomm Incorporated | Efficient detection of general paging messages in poor signal to noise environments |
SG109450A1 (en) | 2000-04-06 | 2005-03-30 | Ntt Docomo Inc | Multicast signal transmission power control method and base station using the same |
US7200230B2 (en) * | 2000-04-06 | 2007-04-03 | Macrovision Corporation | System and method for controlling and enforcing access rights to encrypted media |
ES2315219T3 (en) | 2000-04-07 | 2009-04-01 | Irdeto Access B.V. | DATA ENCRYPTION AND DEFRYING SYSTEM. |
CN1243455C (en) | 2000-04-14 | 2006-02-22 | 株式会社Ntt都科摩 | Multicast service providing system, multicast service providing method, information distributor, radio terminal, and radio base station |
US7076468B2 (en) * | 2000-04-28 | 2006-07-11 | Hillegass James C | Method and system for licensing digital works |
US20010055298A1 (en) | 2000-05-10 | 2001-12-27 | John Baker | Apparatus and system to provide wireless data services through a wireless access integrated node |
JP3662473B2 (en) | 2000-05-12 | 2005-06-22 | 株式会社エヌ・ティ・ティ・ドコモ | Multicast service providing method and information distribution apparatus |
JP4436960B2 (en) | 2000-05-16 | 2010-03-24 | 日本電気株式会社 | Packet communication system and mobile communication system |
JP2001333032A (en) | 2000-05-23 | 2001-11-30 | Matsushita Electric Ind Co Ltd | Restricted reception system |
US6898285B1 (en) | 2000-06-02 | 2005-05-24 | General Instrument Corporation | System to deliver encrypted access control information to support interoperability between digital information processing/control equipment |
ES2225566T3 (en) | 2000-06-07 | 2005-03-16 | General Instrument Corporation | TIME PAYMENT SYSTEM FOR SUPPLY OF CONTENT TO SUPPORT REPRODUCTION SYSTEMS. |
JP3552648B2 (en) * | 2000-06-20 | 2004-08-11 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Data transmission / reception system for ad hoc wireless communication and data transmission / reception method for ad hoc wireless communication |
JP2002001113A (en) * | 2000-06-27 | 2002-01-08 | Nippon Sanso Corp | Adsorbent, adsorption cylinder and apparatus for pressure swing adsorption separation |
US6598203B1 (en) | 2000-06-28 | 2003-07-22 | Northrop Grumman Corporation | Parallel punctured convolutional encoder |
GB2364211A (en) * | 2000-06-30 | 2002-01-16 | Nokia Oy Ab | A terminal comprising two receivers for receiving an encrypted first signal from a first network and a decryption second signal from a second network |
JP3742282B2 (en) * | 2000-06-30 | 2006-02-01 | 株式会社東芝 | Broadcast receiving method, broadcast receiving apparatus, information distribution method, and information distribution apparatus |
WO2002003179A2 (en) * | 2000-06-30 | 2002-01-10 | Williams Eddie H | Online digital content library |
JP2002027417A (en) | 2000-07-10 | 2002-01-25 | Matsushita Electric Ind Co Ltd | Method and device for accumulating program |
JP2002026835A (en) | 2000-07-10 | 2002-01-25 | Matsushita Electric Ind Co Ltd | Limited reception method and system |
US7203314B1 (en) * | 2000-07-21 | 2007-04-10 | The Directv Group, Inc. | Super encrypted storage and retrieval of media programs with modified conditional access functionality |
US6862684B1 (en) * | 2000-07-28 | 2005-03-01 | Sun Microsystems, Inc. | Method and apparatus for securely providing billable multicast data |
CN1338841A (en) * | 2000-08-11 | 2002-03-06 | 海南格方网络安全有限公司 | Intelligent key for security authentication of computer |
JP4254031B2 (en) | 2000-08-21 | 2009-04-15 | ソニー株式会社 | Recording apparatus, portable terminal, management server, information processing method, and recording medium |
ATE307452T1 (en) | 2000-08-25 | 2005-11-15 | Research In Motion Ltd | SYSTEM AND METHOD FOR IMPLEMENTING THE ENHANCED TRANSPORT LAYER SECURITY PROTOCOL |
JP3578710B2 (en) | 2000-09-11 | 2004-10-20 | シャープ株式会社 | Multi-channel broadcast receiving method and multi-channel broadcast receiving apparatus |
KR100461884B1 (en) * | 2000-09-15 | 2004-12-14 | 엘지전자 주식회사 | Method for Transferring Message in Message Transfer Part with High Speed |
US6879573B1 (en) * | 2000-09-15 | 2005-04-12 | Lucent Technologies Inc. | Channel sharing by diverse multiframes in a wireless communications network |
JP2002217894A (en) | 2000-09-28 | 2002-08-02 | Hitachi Ltd | Method for data distribution service |
US6564211B1 (en) | 2000-10-04 | 2003-05-13 | Lsi Logic Corporation | Fast flexible search engine for longest prefix match |
KR100358120B1 (en) | 2000-10-20 | 2002-10-25 | 한국전자통신연구원 | In-Band Adjascent-Channel Type Digital Audio Broadcasting Transmission System |
US6804520B1 (en) | 2000-11-01 | 2004-10-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Temporary service interruption for high speed data transfer |
US6819930B1 (en) | 2000-11-03 | 2004-11-16 | Lucent Technologies Inc. | Apparatus and method for use in allocating a channel resource in wireless multiple access communications systems |
JP4691244B2 (en) | 2000-11-10 | 2011-06-01 | 株式会社東芝 | Limited reception device and security module of limited reception system, limited reception system, limited reception device authentication method, and encryption communication method |
US7046672B2 (en) | 2000-11-16 | 2006-05-16 | Microsoft Corporation | Robust, inferentially synchronized transmission of compressed transport-layer-protocol headers |
US7079511B2 (en) | 2000-12-06 | 2006-07-18 | Qualcomm, Incorporated | Method and apparatus for handoff of a wireless packet data services connection |
FR2818062B1 (en) | 2000-12-07 | 2003-04-11 | Thomson Multimedia Sa | METHOD FOR SECURE TRANSMISSION OF DIGITAL DATA FROM A SOURCE TO A RECEIVER |
JP2002175505A (en) | 2000-12-08 | 2002-06-21 | Citizen Watch Co Ltd | Portable information device, personal identification system, and identification data erasing method |
US6857075B2 (en) | 2000-12-11 | 2005-02-15 | Lucent Technologies Inc. | Key conversion system and method |
US7039180B1 (en) | 2000-12-20 | 2006-05-02 | Cisco Technology, Inc. | Method and apparatus for enabling multiple protocol communication over a network |
US6760602B2 (en) | 2000-12-22 | 2004-07-06 | Motorola, Inc. | Mobile communication system with improved base station control |
US20020091931A1 (en) | 2001-01-05 | 2002-07-11 | Quick Roy Franklin | Local authentication in a communication system |
US7278164B2 (en) | 2001-01-05 | 2007-10-02 | Revit Technology Corporation | Software usage/procurement management |
US7133353B2 (en) | 2001-01-08 | 2006-11-07 | Telefonaktiebolaget Lm Ericsson (Publ) | CDMA system using quasi-orthogonal codes |
US6920119B2 (en) | 2001-01-09 | 2005-07-19 | Motorola, Inc. | Method for scheduling and allocating data transmissions in a broad-band communications system |
US7290063B2 (en) | 2001-01-10 | 2007-10-30 | Nokia Corporation | Relocating context information in header compression |
JP2002216040A (en) | 2001-01-18 | 2002-08-02 | Nippon Telegraph & Telephone East Corp | Contents distribution system and method |
US7036023B2 (en) | 2001-01-19 | 2006-04-25 | Microsoft Corporation | Systems and methods for detecting tampering of a computer system by calculating a boot signature |
JP3910915B2 (en) | 2001-01-31 | 2007-04-25 | 株式会社エヌ・ティ・ティ・ドコモ | System for distributing a program to a storage module of a mobile terminal |
JP2002232962A (en) | 2001-02-07 | 2002-08-16 | Kddi Corp | Mobile communication authentication interworking system |
US6725459B2 (en) | 2001-02-09 | 2004-04-20 | Scientific-Atlanta, Inc. | Descrambling device for use in a conditional access system |
US7266687B2 (en) | 2001-02-16 | 2007-09-04 | Motorola, Inc. | Method and apparatus for storing and distributing encryption keys |
US6879690B2 (en) * | 2001-02-21 | 2005-04-12 | Nokia Corporation | Method and system for delegation of security procedures to a visited domain |
US7301968B2 (en) | 2001-03-02 | 2007-11-27 | Pmc-Sierra Israel Ltd. | Communication protocol for passive optical network topologies |
US6763025B2 (en) | 2001-03-12 | 2004-07-13 | Advent Networks, Inc. | Time division multiplexing over broadband modulation method and apparatus |
US8121296B2 (en) | 2001-03-28 | 2012-02-21 | Qualcomm Incorporated | Method and apparatus for security in a data processing system |
US7349425B2 (en) | 2001-03-28 | 2008-03-25 | Qualcomm Incorporated | Method and apparatus for overhead messaging in a wireless communication system |
UA75125C2 (en) | 2001-03-28 | 2006-03-15 | Квалкомм Інкорпорейтид | Method for controlling signal power in point-to-multipoint data communication (variants) and a device for the realization of the method (variants) |
JP3920583B2 (en) | 2001-03-29 | 2007-05-30 | 株式会社日立製作所 | COMMUNICATION SECURITY MAINTAINING METHOD, APPARATUS THEREOF, AND PROCESSING PROGRAM THEREOF |
TW502190B (en) | 2001-04-11 | 2002-09-11 | Taiwan Cellular Corp | Commodity ordering method of wireless mobile communication network and information processing system thereof |
US7203837B2 (en) | 2001-04-12 | 2007-04-10 | Microsoft Corporation | Methods and systems for unilateral authentication of messages |
JP3819729B2 (en) | 2001-04-20 | 2006-09-13 | 株式会社エヌ・ティ・ティ・ドコモ | Data-safety communication apparatus and method |
TW508958B (en) | 2001-05-03 | 2002-11-01 | Far Eastone Telecomm Co Ltd | Instantaneous polling utilizing a message service mobile phone Network |
US7995603B2 (en) | 2001-05-22 | 2011-08-09 | Nds Limited | Secure digital content delivery system and method over a broadcast network |
FI111776B (en) * | 2001-05-28 | 2003-09-15 | Nokia Corp | Forwarding control messages on packet data network control channels |
EP1410258A4 (en) * | 2001-06-22 | 2007-07-11 | Inc Nervana | System and method for knowledge retrieval, management, delivery and presentation |
US7900042B2 (en) * | 2001-06-26 | 2011-03-01 | Ncipher Corporation Limited | Encrypted packet inspection |
US6983410B2 (en) * | 2001-07-02 | 2006-01-03 | Qualcomm, Incorporated | System and method for a frame re-transmission in a broadcast communication system |
US6781999B2 (en) | 2001-07-23 | 2004-08-24 | Airvana, Inc. | Broadcasting and multicasting in wireless communication |
US7114175B2 (en) * | 2001-08-03 | 2006-09-26 | Nokia Corporation | System and method for managing network service access and enrollment |
DE10138718A1 (en) * | 2001-08-07 | 2003-02-20 | Siemens Ag | Method for transmitting encryption information to participants in a multicast group |
US6677888B2 (en) * | 2001-08-09 | 2004-01-13 | Honeywell International, Inc. | Secure aircraft communications addressing and reporting system (ACARS) |
US20040120527A1 (en) | 2001-08-20 | 2004-06-24 | Hawkes Philip Michael | Method and apparatus for security in a data processing system |
US7185362B2 (en) * | 2001-08-20 | 2007-02-27 | Qualcomm, Incorporated | Method and apparatus for security in a data processing system |
US7787389B2 (en) | 2001-08-20 | 2010-08-31 | Qualcomm Incorporated | Method and system for utilization of an outer decoder in a broadcast services communication system |
US6731936B2 (en) | 2001-08-20 | 2004-05-04 | Qualcomm Incorporated | Method and system for a handoff in a broadcast communication system |
US20030054807A1 (en) | 2001-09-17 | 2003-03-20 | Liangchi Hsu | Apparatus, and associated method, for facilitating multicast and broadcast services in a radio communication system |
US6701482B2 (en) | 2001-09-20 | 2004-03-02 | Qualcomm Incorporated | Method and apparatus for coding bits of data in parallel |
JP2003099327A (en) | 2001-09-21 | 2003-04-04 | Yoichi Akase | Data-reproducing method and terminating device |
US7237108B2 (en) | 2001-09-26 | 2007-06-26 | General Instrument Corporation | Encryption of streaming control protocols and their headers |
KR100819493B1 (en) | 2001-09-28 | 2008-04-07 | 엘지전자 주식회사 | Apparatus for receiving and transmitting mpeg data by wireless lan |
JP3841337B2 (en) | 2001-10-03 | 2006-11-01 | 日本放送協会 | Content transmission device, content reception device, content transmission program, and content reception program |
US7184789B2 (en) | 2001-10-03 | 2007-02-27 | Qualcomm, Incorporated | Method and apparatus for data packet transport in a wireless communication system using an internet protocol |
US7352868B2 (en) | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
US7649829B2 (en) * | 2001-10-12 | 2010-01-19 | Qualcomm Incorporated | Method and system for reduction of decoding complexity in a communication system |
JP2003124927A (en) | 2001-10-15 | 2003-04-25 | Sony Corp | Mutual authentication system, mutual authentication method, mutual authentication equipment and storage medium |
FR2831360B1 (en) * | 2001-10-19 | 2004-02-06 | Viaccess Sa | INTERACTIVE PROTOCOL FOR THE REMOTE MANAGEMENT OF ACCESS CONTROL OF BROKEN INFORMATION |
US6987764B2 (en) * | 2001-11-05 | 2006-01-17 | Qualcomm, Incorporated | Method and apparatus for selecting a packet data serving node for multi-cast/broadcast services |
US7181620B1 (en) * | 2001-11-09 | 2007-02-20 | Cisco Technology, Inc. | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach |
JP4292736B2 (en) | 2001-11-15 | 2009-07-08 | ソニー株式会社 | Transmission system and transmission method |
US6885874B2 (en) * | 2001-11-27 | 2005-04-26 | Motorola, Inc. | Group location and route sharing system for communication units in a trunked communication system |
US6882850B2 (en) * | 2001-12-03 | 2005-04-19 | Sprint Spectrum L.P. | Method and system for zone-based capacity control |
EP1452000A2 (en) * | 2001-12-07 | 2004-09-01 | Telefonaktiebolaget LM Ericsson (publ) | Lawful interception of end-to-end encrypted data traffic |
MXPA04005487A (en) * | 2001-12-07 | 2004-12-06 | Qualcomm Inc | Apparatus and method of using a ciphering key in a hybrid communications network. |
FR2833446B1 (en) | 2001-12-12 | 2004-04-09 | Viaccess Sa | PROTOCOL FOR CONTROLLING THE MODE OF ACCESSING DATA TRANSMITTED IN POINT TO POINT OR POINT MULTI-POINT MODE |
NZ533176A (en) | 2001-12-25 | 2005-10-28 | Ntt Docomo Inc | Device and method for restricting content access and storage |
US7076657B2 (en) | 2001-12-28 | 2006-07-11 | Siemens Communications, Inc. | Use of short message service (SMS) for secure transactions |
US8126127B2 (en) | 2002-01-16 | 2012-02-28 | Qualcomm Incorporated | Method and apparatus for provision of broadcast service information |
US6970689B2 (en) | 2002-02-15 | 2005-11-29 | Broadcom Corporation | Programmable mixer for reducing local oscillator feedthrough and radio applications thereof |
JP3609788B2 (en) | 2002-02-27 | 2005-01-12 | 株式会社東芝 | Broadcast signal recording device |
JP3857610B2 (en) | 2002-03-05 | 2006-12-13 | 株式会社エヌ・ティ・ティ・ドコモ | Succession assurance device, communication device, program, and recording medium |
JP4104356B2 (en) * | 2002-03-18 | 2008-06-18 | 東芝ソリューション株式会社 | Broadcast system, receiver, and program |
CA2477571C (en) | 2002-03-27 | 2016-04-26 | British Telecommunications Public Limited Company | Key management protocol |
JP2003297015A (en) | 2002-03-29 | 2003-10-17 | Toshiba Corp | Contents storage terminal, and distribution server for distributing contents to the contents storage terminal |
JP3818504B2 (en) | 2002-04-15 | 2006-09-06 | ソニー株式会社 | Information processing apparatus and method, and program |
JP4192498B2 (en) | 2002-05-17 | 2008-12-10 | 日本電気株式会社 | Content transfer method, program thereof, system thereof and server |
JP4220303B2 (en) | 2002-05-22 | 2009-02-04 | パナソニック株式会社 | Speculative recording device and system thereof |
US7529463B2 (en) | 2002-05-22 | 2009-05-05 | Panasonic Corporation | Speculative recording device |
US7197072B1 (en) * | 2002-05-30 | 2007-03-27 | Intervideo, Inc. | Systems and methods for resetting rate control state variables upon the detection of a scene change within a group of pictures |
JP4276411B2 (en) * | 2002-06-28 | 2009-06-10 | インクリメント・ピー株式会社 | Communication device authentication system, communication device authentication method, communication device authentication apparatus, communication device authentication program, and information recording medium |
US7646737B2 (en) * | 2002-08-02 | 2010-01-12 | Qualcomm Incorporated | Multimode wireless device system provision validation and acquisition method and apparatus |
KR20040021039A (en) | 2002-09-02 | 2004-03-10 | 엘지전자 주식회사 | Method for correcting an error recorded on high density optical disc |
EP1547304B1 (en) | 2002-09-13 | 2007-11-14 | Telefonaktiebolaget LM Ericsson (publ) | Secure broadcast/multicast service |
JP2004186768A (en) | 2002-11-29 | 2004-07-02 | Toshiba Corp | Broadcast receiver system, broadcast receiving method and av network system |
US7319757B2 (en) * | 2003-01-02 | 2008-01-15 | Intel Corporation | Wireless communication device and method for over-the-air application service |
US7599655B2 (en) | 2003-01-02 | 2009-10-06 | Qualcomm Incorporated | Method and apparatus for broadcast services in a communication system |
US7424115B2 (en) | 2003-01-30 | 2008-09-09 | Nokia Corporation | Generating asymmetric keys in a telecommunications system |
US20040202329A1 (en) | 2003-04-11 | 2004-10-14 | Samsung Electronics Co., Ltd. | Method and system for providing broadcast service using encryption in a mobile communication system |
US7181196B2 (en) | 2003-05-15 | 2007-02-20 | Lucent Technologies Inc. | Performing authentication in a communications system |
US7275157B2 (en) | 2003-05-27 | 2007-09-25 | Cisco Technology, Inc. | Facilitating 802.11 roaming by pre-establishing session keys |
US7574196B2 (en) | 2003-06-30 | 2009-08-11 | Nokia Corporation | Method and a system for charging a streaming connection in a mobile packet radio system |
US8098818B2 (en) | 2003-07-07 | 2012-01-17 | Qualcomm Incorporated | Secure registration for a multicast-broadcast-multimedia system (MBMS) |
KR100843072B1 (en) | 2005-02-03 | 2008-07-03 | 삼성전자주식회사 | Wireless network system and communication method using wireless network system |
KR100628566B1 (en) | 2005-04-25 | 2006-09-26 | 삼성전자주식회사 | Method for security information configuration wlan |
-
2003
- 2003-07-07 US US10/617,215 patent/US8098818B2/en not_active Expired - Fee Related
-
2004
- 2004-07-01 BR BRPI0412375-1A patent/BRPI0412375A/en not_active IP Right Cessation
- 2004-07-01 MX MXPA06000149A patent/MXPA06000149A/en unknown
- 2004-07-01 CN CN2004800195875A patent/CN1820480B/en not_active Expired - Fee Related
- 2004-07-01 CN CN200910222054A patent/CN101707804A/en active Pending
- 2004-07-01 WO PCT/US2004/021530 patent/WO2005009001A1/en active Application Filing
- 2004-07-01 AU AU2004301386A patent/AU2004301386A1/en not_active Abandoned
- 2004-07-01 JP JP2006518829A patent/JP2007527652A/en not_active Ceased
- 2004-07-01 DE DE602004016510T patent/DE602004016510D1/en active Active
- 2004-07-01 RU RU2006103360/09A patent/RU2363110C2/en not_active IP Right Cessation
- 2004-07-01 UA UAA200601141A patent/UA90454C2/en unknown
- 2004-07-01 KR KR1020067000322A patent/KR20060031848A/en not_active Application Discontinuation
- 2004-07-01 EP EP04756664A patent/EP1642441B1/en not_active Not-in-force
- 2004-07-01 AT AT04756664T patent/ATE408299T1/en not_active IP Right Cessation
- 2004-07-01 CA CA002531215A patent/CA2531215A1/en not_active Abandoned
- 2004-07-07 TW TW093120386A patent/TW200509634A/en unknown
-
2006
- 2006-01-01 IL IL172932A patent/IL172932A0/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2005009001A8 (en) | 2005-03-10 |
JP2007527652A (en) | 2007-09-27 |
US20050008159A1 (en) | 2005-01-13 |
DE602004016510D1 (en) | 2008-10-23 |
US8098818B2 (en) | 2012-01-17 |
WO2005009001A1 (en) | 2005-01-27 |
UA90454C2 (en) | 2010-05-11 |
IL172932A0 (en) | 2006-06-11 |
EP1642441A1 (en) | 2006-04-05 |
TW200509634A (en) | 2005-03-01 |
CN1820480B (en) | 2010-09-08 |
AU2004301386A1 (en) | 2005-01-27 |
ATE408299T1 (en) | 2008-09-15 |
MXPA06000149A (en) | 2006-03-21 |
RU2363110C2 (en) | 2009-07-27 |
CN1820480A (en) | 2006-08-16 |
CN101707804A (en) | 2010-05-12 |
BRPI0412375A (en) | 2006-09-19 |
EP1642441B1 (en) | 2008-09-10 |
KR20060031848A (en) | 2006-04-13 |
RU2006103360A (en) | 2006-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8098818B2 (en) | Secure registration for a multicast-broadcast-multimedia system (MBMS) | |
KR101217681B1 (en) | - method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system | |
US9520996B2 (en) | Ciphering data for transmission in a network | |
JP5296124B2 (en) | Method and apparatus for time-based billing for broadcast-multicast service (BCMCS) in a wireless communication system | |
EP2127154B1 (en) | Verification of system information in wireless communication system | |
AU2004258561C1 (en) | Apparatus and method for a secure broadcast system | |
US20060291660A1 (en) | SIM UICC based broadcast protection | |
AU2010212432A1 (en) | Secure registration for a multicast-broadcast-multimedia system (MBMS) | |
WO2006136280A1 (en) | Sim/uicc based broadcast protection | |
TW200524334A (en) | Method and apparatus for time-based charging for broadcast-multicast services (BCMCs) in a wireless communication system | |
WO2006121420A2 (en) | Method and apparatus for providing user information to a content provider |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
FZDE | Discontinued | ||
FZDE | Discontinued |
Effective date: 20120703 |