$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[미국특허] Method for secure handover 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04M-001/66
출원번호 US-0251396 (1999-02-17)
발명자 / 주소
  • Arne Norefors SE
  • Yi Cheng SE
  • Lorens Almehag SE
  • Karl Dan Gustav Jerrestam SE
출원인 / 주소
  • Telefonaktiebolaget LM Ericsson (publ) SE
대리인 / 주소
    Burns, Doane, Swecker & Mathis, L.L.P.
인용정보 피인용 횟수 : 79  인용 특허 : 5

초록

In a mobile, wireless telecommunications network, communications relating to a mobile terminal can be protected during a handover of the mobile terminal from a first access point to a second access point. This may be accomplished by transmitting a security token from the first access point to the mo

대표청구항

1. In a mobile, wireless telecommunications network, a method for achieving secure handover of a mobile terminal from a first access point to a second access point, wherein the first access point and the second access point are physically connected through a fixed network, said method comprising the

이 특허에 인용된 특허 (5) 인용/피인용 타임라인 분석

  1. Haartsen Jacobus C. (Staffanstorp SEX), Authentication and handover methods and systems for radio personal communications.
  2. Dent Paul (Stehag SEX), Authentication system for digital cellular communications.
  3. Frid Lars,SEX ; Pehrsson Arne,SEX ; Backstrom Martin,SEX ; Andersson Dick,SEX ; Axelsson Ulf,SEX ; Olsson Ulf,SEX, Communicating packet data with a mobile station roaming within an incompatible mobile network.
  4. Rose Gregory G.,AUX ; Quick Roy F., Method and apparatus for providing authentication security in a wireless communication system.
  5. Osborn William R., System for preventing electronic memory tampering.

이 특허를 인용한 특허 (79) 인용/피인용 타임라인 분석

  1. Parekh, Nileshkumar J.; Krasnyanskiy, Maksim (Max), Apparatus and method of performing a handoff in a communication network.
  2. Faccin, Stefano, Apparatus, and associated methods, for facilitating secure, make-before-break hand-off in a radio communication system.
  3. Lee,Kyung Hee; Sung,Maeng Hee, Authentication method for fast handover in a wireless local area network.
  4. Vinck, Bart, Authentication method for inter-system handover between at least two radio communications systems.
  5. Yao, Wenfeng; Wang, Zaixian, Channel switching method, apparatus, and system.
  6. Adachi, Tomoko; Toshimitsu, Kiyoshi, Communication system, wireless communication apparatus, and communication method.
  7. Adachi, Tomoko; Toshimitsu, Kiyoshi, Communication system, wireless communication apparatus, and communication method.
  8. Adachi, Tomoko; Toshimitsu, Kiyoshi, Communication system, wireless communication apparatus, and communication method.
  9. Adachi, Tomoko; Toshimitsu, Kiyoshi, Communication system, wireless communication apparatus, and communication method.
  10. Adachi, Tomoko; Toshimitsu, Kiyoshi, Communication system, wireless communication apparatus, and communication method.
  11. Adachi, Tomoko; Toshimitsu, Kiyoshi, Communication system, wireless communication apparatus, and communication method.
  12. Adachi, Tomoko; Toshimitsu, Kiyoshi, Communication system, wireless communication apparatus, and communication method.
  13. Adachi,Tomoko; Toshimitsu,Kiyoshi, Communication system, wireless communication apparatus, and communication method.
  14. Laroia, Rajiv; Anigstein, Pablo; Parizhsky, Vladimir; Srinivasan, Murari; Tsirtsis, George, Communications methods and apparatus using physical attachment point identifiers.
  15. Laroia, Rajiv; Anigstein, Pablo; Parizhsky, Vladimir; Srinivasan, Murari; Tsirtsis, George, Communications methods and apparatus using physical attachment point identifiers which support dual communications links.
  16. Prakash, Rajat; Horn, Gavin Bernard; Jain, Nikhil; Rezaiifar, Ramin, Connection setup using flexible protocol configuration.
  17. Bajic, Zeljko, Distributed MAC architecture for a wireless repeater.
  18. Bajic, Zeljko, Distributed MAC architecture for wireless repeater.
  19. Machiraju, Sridhar; Bolot, Jean; Chen, Hao, Distributed wireless device association with basestations.
  20. Machiraju, Sridhar; Bolot, Jean; Chen, Hao, Distributed wireless device association with basestations.
  21. Haddad, Wassim; Touati, Samy, Enabling seamless offloading between wireless local-area networks in fixed mobile convergence systems.
  22. O'Neill, Alan; Corson, Matthew Scott; Tsirtsis, Georgios; Park, Vincent D.; Dynarski, Richard J.; Mazik, David R; Sigal, Leonid G., Enhanced techniques for using core based nodes for state transfer.
  23. Davies,Stephen William; Vanderveen,Michaela C, Facilitated security for handoff in wireless communications.
  24. Damnjanovic, Aleksandar, Forward handover under radio link failure.
  25. Haddad, Wassim; Naslund, Mats, Key distribution to a set of routers.
  26. Bims, Harry, Location tracking in a wireless communication system using power levels of packets received by repeaters.
  27. Zilliacus, Martin; Koli, Ari, Mapping wireless proximity identificator to subscriber identity for hotspot based wireless services for mobile terminals.
  28. Zilliacus, Martin; Koli, Ari, Mapping wireless proximity identificator to subscriber identity for hotspot based wireless services for mobile terminals.
  29. Narashimha, Murali; Hill, Thomas C., Method and apparatus for enabling operators with operators with unused bandwidth to acquire users.
  30. Laroia, Rajiv; Anigstein, Pablo; Mazik, David R.; Parizhsky, Vladimir; Park, Vincent; Srinivasan, Murari; Tsirtsis, George, Method and apparatus for end node assisted neighbor discovery.
  31. Laroia, Rajiv; Anigstein, Pablo; Mazik, David R.; Parizhsky, Vladimir; Park, Vincent; Srinivasan, Murari; Tsirtsis, George, Method and apparatus for end node assisted neighbor discovery.
  32. Kang, Hyun-Jeong; Baek, Young-Kyo; Taori, Rakesh; Jung, Jung-Soo, Method and apparatus for managing security keys for communication authentication with mobile station in wireless communication system.
  33. Xu, Xiaoying; Chen, Jing, Method and apparatus for negotiating security during handover between different radio access technologies.
  34. Grob, Matthew Stuart; Padovani, Roberto; Bender, Paul E.; Karmi, Gadi; Kimball, Robert H.; Hoagland, Greg M., Method and apparatus for robust handoff in wireless communication systems.
  35. Kang, Hyun-Jeong; Park, Jung-Shin; Kim, Dae-Gyun; Jung, Jung-Soo, Method and device for managing security key for communication authentication of subscriber station used in cooperative communication of multiple base station in radio communication system.
  36. Hofmann,J?rgen; Schniedenharn,J?rg; Wehmeier,Lars, Method and radio communication system for transmitting useful information as a service for several user stations.
  37. Heinonen,Tomi; Nyberg,Kaisa, Method and system for access point roaming.
  38. Günther, Christian, Method and system for continuously transmitting encrypted data of broadcast service to mobile terminal.
  39. Hunkeler, Teresa, Method and system wherein handover information is broadcast in wireless local area networks.
  40. Hunkeler,Teresa, Method and system wherein handover information is broadcast in wireless local area networks.
  41. Xu, Xiaoying; Chen, Jing, Method and user equipment for negotiating security during handover between different radio access technologies.
  42. Lee, In-Sun; Jang, Kyung-Hun; Shin, Min-Ho; Arbaugh, William Albert; Mishra, Arunesh, Method for performing handoff in wireless network.
  43. Lee, In-Sun; Jang, Kyuno-Hun; Shin, Min-Ho; Arbaugh, William Albert; Mishra, Arunesh, Method for performing handoff in wireless network.
  44. Sandberg, Leif, Method for registering and enabling PKI functionalities.
  45. Govindan, Saravanan; Cheng, Hong; Tan, Pek Yew, Method for verifications and fast QoS establishment.
  46. Krishnamurthi, Givindarajan; Chalmers, Robert, Method of reducing denial-of-service attacks and a system as well as an access router therefor.
  47. Watanabe, Fujio; Nguyen, Phong; Sanda, Takako, Method, and associated apparatus, for effectuating handover of communications in a bluetooth, or other, radio communication system.
  48. Gupta, Ajay; Malladi, Durga Prasad, Methods and apparatus for facilitating robust forward handover in long term evolution (LTE) communication systems.
  49. Gupta, Ajay; Malladi, Durga Prasad, Methods and apparatus for facilitating robust forward handover in long term evolution (LTE) communication systems.
  50. Guo,Yile, Mobile user location privacy solution based on the use of multiple identities.
  51. Bims, Harry, Mobility support via routing.
  52. Park, Vincent D.; Corson, M. Scott; Tsirtsis, George, Packet routing in a wireless communications environment.
  53. Bims, Harry, Plug-n-playable wireless communication system.
  54. Park, Vincent D.; Mazik, David R., Provision of QoS treatment based upon multiple requests.
  55. Park, Vincent D.; Mazik, David R., Provision of a move indication to a resource requester.
  56. Bims, Harry, Reconfiguration of a communication system.
  57. Bims, Harry, Reconfiguration of a communication system.
  58. Bims, Harry, Reconfiguration of a communication system.
  59. Prakash, Rajat; Khandekar, Aamod; Gorokhov, Alexei; Borran (Jaber), Mohammad J., Recovery from handoff error due to false detection of handoff completion signal at access terminal.
  60. Grewal, Karanvir; Sood, Kapil; Schluessler, Travis; Khosravi, Hormuzd M., Roaming secure authenticated network access method and apparatus.
  61. Shim,Eunsoo; Redlich,Jens Peter; Gitlin,Richard D., Secure candidate access router discovery method and system.
  62. Chaplin, Clint, Secure switching system for networks and method for securing switching.
  63. Lior, Avi; Li, Yong, Securing dynamic authorization messages.
  64. Bims, Harry, Single frequency wireless communication system.
  65. Corson, M. Scott; Tsirtsis, George; Park, Vincent D., State synchronization of access routers.
  66. Corson, Mathew Scott; Tsirtsis, Georgios; Park, Vincent Douglas, State synchronization of access routers.
  67. Chana, Tejender; DiRienzo, Giuseppe Joe, System and method for limiting a wireless communication device to a specified geographic zone.
  68. Chana, Tejender; DiRienzo, Giuseppe Joe, System and method for limiting a wireless communication device to a specified geographic zone.
  69. Karaoguz, Jeyhan; Seshadri, Nambirajan, System and method for providing a mesh network using a plurality of wireless access points (WAPs).
  70. Karaoguz, Jeyhan; Seshadri, Nambirajan, System and method for providing a mesh network using a plurality of wireless access points (WAPs).
  71. Koodli,Rajeev; Perkins,Charles E.; Devarapalli,Vijay, System and method for resource authorizations during handovers.
  72. Walker,Jesse R., Technique to establish wireless session keys suitable for roaming.
  73. Nakhjiri, Madjid F.; Wan, Changsheng, Token-based dynamic key distribution method for roaming environments.
  74. Ala-Laurila, Juha; Hansen, Harri; Salvela, Juha, Transfer of security association during a mobile terminal handover.
  75. Bims, Harry; Leung, Eugene, Tunneling protocols for wireless communications.
  76. Chang, Sunny; Nguyen, Tu, User equipment in mobile communication system and control method thereof.
  77. Bajic,Zeljko, Virtual switch.
  78. Suzuki,Hideyuki, Wireless information transmitting system, radio communication method, radio station, and radio terminal device.
  79. Wu, Gang; Watanabe, Fujio; Hagen, Alexander, Wireless network handoff key.

활용도 분석정보

상세보기
다운로드
내보내기

활용도 Top5 특허

해당 특허가 속한 카테고리에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로