Patents by Inventor Silke Holtmanns

Silke Holtmanns has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8626708
    Abstract: A method and arrangements for managing user data stored in a database of a communications system where the database is managed by a main controller is disclosed. In the method a user is first authenticated, where after an application entity can manage user data in the database that associates with the user and an application by communicating data between the application entity and a second entity connected to the communications system.
    Type: Grant
    Filed: October 13, 2005
    Date of Patent: January 7, 2014
    Assignee: Nokia Corporation
    Inventors: Pekka Laitinen, Silke Holtmanns
  • Publication number: 20130337743
    Abstract: A first apparatus having a first identity associated therewith the first apparatus, the first apparatus comprising: at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the first apparatus to perform at least the following: enable transmission of a proxy initiation command to a second apparatus, wherein the proxy initiation command is configured to enable the second apparatus to initiate a first-identity-second-apparatus connection, the first-identity-second-apparatus connection enabling the second apparatus to transmit data denoted as being from the first identity and/or receive data denoted as being to the first identity via the data network.
    Type: Application
    Filed: December 14, 2010
    Publication date: December 19, 2013
    Applicant: NOKIA CORPORATION
    Inventors: Silke Holtmanns, Zhongliang Hu
  • Patent number: 8607053
    Abstract: In accordance with the exemplary embodiments of the invention there is at least a method, an executable computer program, and an apparatus to determine at a network application function a list of desired user equipment security features to be used, the security features of the list ordered by preference of the network application function, send the list to a database of user security settings via a bootstrapping server function, and receive by the network application function, via the bootstrapping server function, a security features response including a security key, derived from information stored in the database, corresponding to a desired security feature contained in the list, thereby informing the network application function of the availability of at least one of the desired security features in the user equipment.
    Type: Grant
    Filed: November 24, 2010
    Date of Patent: December 10, 2013
    Assignee: Nokia Corporation
    Inventor: Silke Holtmanns
  • Patent number: 8582762
    Abstract: This invention relates to security procedures in a communication system, specifically to production of key material. The invention provides a method for producing key material in a highly secure way for use in communication with a local network of a company. The method uses authentication information obtained from the communication system and information exchanged locally between a mobile station and the authentication systems of the company to produce a communication key for use in authentication procedures or e.g. for signing and/or encrypting data.
    Type: Grant
    Filed: September 16, 2005
    Date of Patent: November 12, 2013
    Assignee: Nokia Corporation
    Inventors: Silke Holtmanns, Pekka Laitinen, Philip Ginzboorg, Kari Miettinen, Jaakko Rajaniemi
  • Patent number: 8560015
    Abstract: A method includes downloading at the request of a user an application for storage in a secure module of a terminal; requesting the user to assign a descriptive name for the downloaded application; storing the descriptive name together with an application identity of the downloaded application; in response to a request to activate a stored application, presenting the user with a list having elements of one or more stored applications, where each list element comprises at least the user assigned descriptive name; and activating an application associated with a selection of a list element by the user. Various embodiments of apparatus for implementing the method are also disclosed.
    Type: Grant
    Filed: July 9, 2012
    Date of Patent: October 15, 2013
    Assignee: Nokia Corporation
    Inventors: Silke Holtmanns, Pekka Johannes Laitinen, Rune Lindholm
  • Publication number: 20130227656
    Abstract: A method and apparatus are provided for access credential provisioning. A method may include receiving, at a first mobile apparatus, information about a second mobile apparatus. The first mobile apparatus may be provisioned with network access credential information to be transferred from the first mobile apparatus to the second mobile apparatus. The method may further include causing the information about the second mobile apparatus to be provided to a provisioning apparatus for the network. The method may additionally include receiving authorization form the provisioning apparatus to transfer the network access credential information from the first mobile apparatus to the second mobile apparatus. The method may also include, in response to receipt of the authorization, causing the network access credential information to be provided to the second mobile apparatus. A corresponding apparatus is also provided.
    Type: Application
    Filed: October 21, 2010
    Publication date: August 29, 2013
    Applicant: Nokia Corporation
    Inventors: Silke Holtmanns, André Dolenc
  • Patent number: 8522025
    Abstract: One aspect of the invention discloses a method of authenticating an application. The method comprising performing, with a server application, bootstrapping procedures between the server application and a bootstrapping server function; deriving a shared key based on at least a key received from the bootstrapping server function server during the bootstrapping procedures and a network application function identifier; providing an application with a bootstrapping transaction identifier, the bootstrapping transaction identifier being received from the bootstrapping server function server during the bootstrapping procedures; receiving a response from the application; and authenticating the application by validating the response with the shared key.
    Type: Grant
    Filed: October 18, 2006
    Date of Patent: August 27, 2013
    Assignee: Nokia Corporation
    Inventors: Shreekanth Lakshmeshwar, Philip Ginzboorg, Pekka Laitinen, Silke Holtmanns
  • Publication number: 20130205134
    Abstract: Methods and apparatuses are provided for access credential provisioning. A method may include causing a trusted device identity for a mobile apparatus to be provided to an intermediary apparatus. The intermediary apparatus may serve as an intermediary between the mobile apparatus and a provisioning apparatus for a network. The method may further include receiving, from the intermediary apparatus, network access credential information for the network. The network access credential information may be provisioned to the mobile apparatus by the provisioning apparatus based at least in part on the trusted device identity. Corresponding apparatuses are also provided.
    Type: Application
    Filed: September 29, 2010
    Publication date: August 8, 2013
    Applicant: Nokia Corporation
    Inventors: Silke Holtmanns, André Dolenc
  • Publication number: 20130080779
    Abstract: A method and apparatus including units configured to send a request from a first network entity to a user equipment for an identifier and receive a message indicating that a public key is required from the user equipment by the first network entity. The method and apparatus also includes units configured to send, by the first network entity, the public key to the user equipment and receive an encrypted identifier by the first network entity, wherein upon authenticating the public key, the user equipment encrypts at least part of the identifier using the public key, thereby enabling further processing between the network entity and the user equipment.
    Type: Application
    Filed: November 20, 2012
    Publication date: March 28, 2013
    Inventors: Silke Holtmanns, Dan Forsberg
  • Publication number: 20130023309
    Abstract: A method includes downloading at the request of a user an application for storage in a secure module of a terminal; requesting the user to assign a descriptive name for the downloaded application; storing the descriptive name together with an application identity of the downloaded application; in response to a request to activate a stored application, presenting the user with a list having elements of one or more stored applications, where each list element comprises at least the user assigned descriptive name; and activating an application associated with a selection of a list element by the user. Various embodiments of apparatus for implementing the method are also disclosed.
    Type: Application
    Filed: July 9, 2012
    Publication date: January 24, 2013
    Inventors: Silke Holtmanns, Pekka Johannes Laitinen, Rune Lindholm
  • Patent number: 8347090
    Abstract: A method and apparatus including units configured to send a request from a first network entity to a user equipment for an identifier and receive a message indicating that a public key is required from the user equipment by the first network entity. The method and apparatus also includes units configured to send, by the first network entity, the public key to the user equipment and receive an encrypted identifier by the first network entity, wherein upon authenticating the public key, the user equipment encrypts at least part of the identifier using the public key, thereby enabling further processing between the network entity and the user equipment.
    Type: Grant
    Filed: September 21, 2007
    Date of Patent: January 1, 2013
    Assignee: Nokia Corporation
    Inventors: Silke Holtmanns, Dan Forsberg
  • Patent number: 8336105
    Abstract: A method and devices for a control of usage of content is disclosed. In one embodiment, a user device performs the steps of obtaining the content, defining usage rights, generating integrity protection information for defined usage rights, encrypting the content with a content encryption key, encrypting the content encryption key with a key encryption key associated with a recipient device and/or an operator of the recipient device, communicating the encrypted content, the defined usage rights, the encrypted content encryption key, and the integrity protection information to the recipient device.
    Type: Grant
    Filed: October 31, 2003
    Date of Patent: December 18, 2012
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Frank Hartung, Silke Holtmanns
  • Publication number: 20120289197
    Abstract: An apparatus with a memory and computer program code configured, with a processor, to start an application; to read a file from a first subscriber module and to determine if there is an active subscriber module lock of the first subscriber module; in response to determining that there is an active subscriber module lock of the first subscriber module executing the application; otherwise if it is determined that there is not an active subscriber module lock of the first subscriber module, to determine if there is an active subscriber module lock of a second subscriber module and continuing until an active subscriber module lock of another subscriber module is determined, and then executing the application using that subscriber module having the active subscriber module lock, otherwise terminating the method without executing the application if no active subscriber module lock of any other subscriber module is determined to be present.
    Type: Application
    Filed: May 8, 2012
    Publication date: November 15, 2012
    Inventors: Silke Holtmanns, Rune Lindholm
  • Publication number: 20120239936
    Abstract: Methods and apparatus, including computer program products, are provided for credential transfer. In one aspect there is provided a method. The method may include receiving, at a first device, an authorization token; determining, at the first device, a delegation token, one or more credentials, and metadata; and providing, by the first device to a second device, the delegation token, the one or more credentials, and the metadata. Related apparatus, systems, methods, and articles are also described.
    Type: Application
    Filed: December 18, 2009
    Publication date: September 20, 2012
    Applicant: NOKIA CORPORATION
    Inventors: Silke Holtmanns, Nadarajah Asokan, Kari Timo Juhani Kostiainen
  • Publication number: 20120204231
    Abstract: A method, apparatus and computer program product are provided to facilitate authentication of a request, such as by a mobile terminal, while also supplying information about the user to a service, website, application or the like A method, apparatus and computer program product may provide for interworking a bootstrapping architecture, such as Generic Bootstrapping Architecture, and a shared identity service, such as OpenID architecture In this regard, a method, apparatus and computer program product may provide for a secure session with a service provider through Generic Bootstrapping Architecture while being able to supply the service provider with the user information and/or accessing a user account using OpenID architecture.
    Type: Application
    Filed: October 19, 2010
    Publication date: August 9, 2012
    Applicant: NOKIA CORPORATION
    Inventors: Silke Holtmanns, Hannes Tschofenig
  • Publication number: 20120196569
    Abstract: The exemplary embodiments of the invention include inputting, at a device, a voucher having a plurality of data fields, where the voucher provides provisional subscriber identification for the device, sending at least some of the voucher data fields to a network operator, based on the sent information, receiving a software based subscriber identity module, and using the software based subscriber identity module to authenticate the device. Further, the exemplary embodiments include receiving a voucher having a plurality of data fields from a device, where the voucher provides provisional subscriber identification for the device, in response to the voucher code, sending to the device a request for additional information, in response to the request, receiving an additional data field of the voucher and a security identifier of the device, and based on validating the additional information using the security identifier, sending a software based subscriber identity module to the device.
    Type: Application
    Filed: January 27, 2012
    Publication date: August 2, 2012
    Inventors: Silke Holtmanns, Marc Richarme, Thomas Kumpf
  • Publication number: 20120110637
    Abstract: Systems, methods, and apparatuses are provided for facilitating authorization of a roaming mobile terminal. A method may include receiving a request for security key related policy information for a user equipment device. The request may be sent by a service providing node on a visited network. The method may further include causing a service authorization information request including a user security settings package to be sent to a policy decisioning server. The method may also include receiving, in response to the service authorization information request, a service authorization information answer including a modified user security settings package including the authorization policy information for the user equipment device. The method may additionally include causing the requested security key related policy information to be sent to the service providing node. Corresponding systems and apparatuses are also provided.
    Type: Application
    Filed: April 29, 2010
    Publication date: May 3, 2012
    Applicant: NOKIA CORPORATION
    Inventors: Silke Holtmanns, Pekka Laitinen
  • Publication number: 20120102315
    Abstract: A method including receiving, at a first entity, from a second entity, the content and an identification of the second entity, over a peer-to-peer communication link. The received content is rendered and verification information containing the identification of the second entity and an identification of the received content is generated. The verification information is encrypted using an encryption key.
    Type: Application
    Filed: October 25, 2010
    Publication date: April 26, 2012
    Applicant: Nokia Corporation
    Inventors: Silke Holtmanns, Jan Ignatius
  • Publication number: 20120057697
    Abstract: A method including receiving encrypted multimedia information of a multimedia broadcast multicast service streaming session, wherein the multimedia information is encrypted using an encryption key. An indication allowing to switch the receiving of the encrypted multimedia information to a peer-to-peer streaming session is received and receiving of the encrypted multimedia information from the multimedia broadcast multicast service streaming session to the peer-to-peer streaming session is switched. Encrypted multimedia information of the peer-to-peer streaming session is received.
    Type: Application
    Filed: September 7, 2010
    Publication date: March 8, 2012
    Applicant: NOKIA CORPORATION
    Inventors: Silke Holtmanns, Pekka Johannes Laitinen
  • Publication number: 20120052861
    Abstract: In accordance with an example embodiment of the present invention, an apparatus comprises at least one processor and at least one memory including computer program code. The at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following initiate a first mobile communication using a called number associated with a non-local subscriber identity information, the non-local subscriber identity information associated with a second apparatus, and automatically initiate a second mobile communication using a local subscriber identity contact information associated with the called number in such a manner as to avoid using a roaming area.
    Type: Application
    Filed: August 25, 2010
    Publication date: March 1, 2012
    Applicant: NOKIA CORPORATION
    Inventor: Silke Holtmanns