Patents by Inventor Gunther Horn

Gunther Horn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110092213
    Abstract: A method, apparatus and computer program product are provided to provide fresh security context during intersystem mobility. A method is provided which includes receiving an indication of handover of a remote device from a source system to a target system. The target system may implement a communications standard different from that of the source system. The method also includes determining a current sequence number value of a security context maintained in the source system. The method additionally includes deriving a fresh mapped security context for the target system based at least in part upon the determined sequence number value. The method further includes providing the derived fresh mapped security context to the target system.
    Type: Application
    Filed: June 13, 2008
    Publication date: April 21, 2011
    Applicant: NOKIA CORPORATION
    Inventors: Dan Lars Anders Forsberg, Marc Blommaert, Günther Horn
  • Publication number: 20110010538
    Abstract: An access specific key is provided for securing of a data transfer between a mobile terminal and a node of an access net. For authentication of the mobile terminal, a authentication server generates a session key, from which a basic key is derived and transferred to an interworking-proxy-server. The interworking-proxy-server derives the access specific key from the transferred basis key and provides the key to the node of the access net.
    Type: Application
    Filed: August 9, 2007
    Publication date: January 13, 2011
    Applicant: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Rainer Falk, Günther Horn, Dirk Kröselberg
  • Patent number: 7676041
    Abstract: A first cryptographic key (318) and a second cryptographic key (322) are created by a mobile radio terminal (103) and by a computer of the home communications network (108, 109) by using authentication key materials (312). The first cryptographic key (318) is transmitted to the computer of the visited communications network (113), and the second cryptographic key (322) is transmitted to an application server computer (106, 107).
    Type: Grant
    Filed: February 18, 2004
    Date of Patent: March 9, 2010
    Assignee: Siemens Aktiengesellschaft
    Inventors: Günther Horn, Dirk Kröselberg
  • Publication number: 20100034384
    Abstract: Cryptographic material is generated for a protocol for the encrypted transmission of media data between a subscriber device and a provider device. A first symmetric key of the subscriber device and the provider device is inserted in a symmetric key protection mechanism of a network protocol of a control layer to establish a communication session between the subscriber device and the provider device. A first time-variable parameter is transmitted from the provider device to the subscriber device. A second symmetric key for protecting the key management protocol is calculated by both the provider device and the subscriber device using a defined function depending at least on the first symmetric key and the first time-variable parameter.
    Type: Application
    Filed: September 24, 2007
    Publication date: February 11, 2010
    Applicant: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Wolfgang Bücker, Günther Horn, Srinath Thiruvengadam
  • Publication number: 20090191857
    Abstract: The present invention relates to remotely provisioning subscriber identification parameters in a device on a wireless network. A secure connection is established with the device, and a token containing the new subscriber identification parameters is forwarded over the secure connection. The device may verify the received token. In one embodiment, the subscriber identification parameters are updated to change network operators. The secure connection can be with the old network operator or the new network operator. The device on the wireless network may be a machine-to-machine device. The provisioned subscriber identification may be part of a universal subscriber identification module.
    Type: Application
    Filed: January 30, 2008
    Publication date: July 30, 2009
    Inventors: Gunther Horn, Mikko J. Kanerva, Luc De Bie, Silke Holtmanns
  • Publication number: 20090132806
    Abstract: The use of suitable measures in a method for agreeing on a security key between at least one first and one second communication station to secure a communication link is improved so that the security level for the communication is increased and the improved method can be combined with already available methods. A first parameter is determined from an authentication and key derivation protocol. In addition, an additional parameter is sent securely from the second to the first communications station. A security key is then determined from the first parameter and the additional parameter.
    Type: Application
    Filed: April 10, 2006
    Publication date: May 21, 2009
    Inventors: Marc Blommaert, Gunther Horn
  • Publication number: 20090052396
    Abstract: A user terminal is switched between a cellular network and a worldwide interoperability for microwave access radio network within a telecommunication system. An authentication, authorization and accounting (AAA) server which is designed for use with both of these networks is disposed in the telecommunication system in such a way that user data of the user terminal stored in the AAA server can be accessed from both of these networks, thereby advantageously ensuring uninterrupted switching between the two networks free of loss.
    Type: Application
    Filed: August 24, 2006
    Publication date: February 26, 2009
    Inventors: Wolfgang Bucker, Wolfgang Groting, Gunther Horn, Joachim Kross, Maximilian Riegel
  • Publication number: 20070147618
    Abstract: To safeguard data transmission, a first terminal communicates in a first network with the aid of at least one session key and a second terminal communicates in a second network with the aid of at least one session key. The first terminal is connected to the second terminal through a local interface. In the first terminal, at least one first session key is determined and at least one second session key is derived from the first session keys. At least one second session key is transmitted to the second terminal through the local interface by a safety protocol. The second terminal is authenticated to the second network by at least one second session key or by the key derived from the second session key(s) through an authentication protocol.
    Type: Application
    Filed: November 10, 2004
    Publication date: June 28, 2007
    Inventor: Günther Horn
  • Publication number: 20060171541
    Abstract: A first cryptographic key (318) and a second cryptographic key (322) are created by a mobile radio terminal (103) and by a computer of the home communications network (108, 109) by using authentication key materials (312). The first cryptographic key (318) is transmitted to the computer of the visited communications network (113), and the second cryptographic key (322) is transmitted to an application server computer (106, 107).
    Type: Application
    Filed: February 18, 2004
    Publication date: August 3, 2006
    Inventors: Gunther Horn, Dirk Kroselberg
  • Publication number: 20040102181
    Abstract: The invention concerns countering a rogue shell threat in a cellular mobile communication system by an apparatus or a method for authentication in a mobile communication system comprising a mobile communication network (VLR/SGSN/HLR/RNC . . .
    Type: Application
    Filed: May 27, 2003
    Publication date: May 27, 2004
    Inventor: Gunther Horn
  • Patent number: 6526509
    Abstract: The method provides that a session code (K) can be agreed between a first computer unit (U) and a second computer unit (N), without it being possible for any unauthorized third party to gain access to useful information relating to the codes or the identity of the first computer unit (U). This is achieved by embedding the principle of the El-Gamal code interchange in the method, with additional formation of a digital signature via a hash value of the session code (K) which is formed by the first computer unit (U).
    Type: Grant
    Filed: November 10, 1997
    Date of Patent: February 25, 2003
    Assignee: Siemens Aktiengesellschaft
    Inventors: Günther Horn, Klaus Müller, Volker Kessler
  • Patent number: 6064741
    Abstract: The method is for the exchange of cryptographic keys, in which the length of the transmitted messages is significantly reduced and the security properties of the method are considerably increased in comparison with known methods.In a network computer unit and in a user computer unit, a first interim key and a second interim key are formed as a function of generated random numbers.A session key is calculated by a bit-by-bit exclusive-OR operation on the first interim key and the second interim key. The keys are never transmitted in plain text. By use of a function, which for example may be a symmetric cryptographic function, a hash function or a one-way function, the network computer unit and the user computer unit authenticate each other.
    Type: Grant
    Filed: October 10, 1997
    Date of Patent: May 16, 2000
    Assignee: Siemens Aktiengesellschaft
    Inventors: Gunther Horn, Klaus Muller, Volker Kessler
  • Patent number: 4649361
    Abstract: The invention specifies a coil form which assures the possibility of production by automated means, a strain-relieved connection between external connecting lines, which can pass in an insulated fashion through an opening of a surrounding motor stator housing, and the coil winding ends of an exciter winding wound on the coil form. For this purpose connector sleeves are inserted and fixed in place to radially continuous, stepped diameter, fitting openings in a locking plastic bracket which is hinged-mounted by a plastic hinge on one end flange and which, after the connection has been made, can be swiveled over the exciter coil winding and locked on the other end flange. Around one set of sleeve ends of the connector sleeves which project out of the internal operating side of the plastic bracket, the coil winding ends of the exciter coil are wound.
    Type: Grant
    Filed: September 27, 1985
    Date of Patent: March 10, 1987
    Assignee: Siemens Aktiengesellschaft
    Inventors: Gunther Horn, Wolfgang Pieper, Heribert Roeser