Patents by Inventor Thilo Ewald

Thilo Ewald has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9407668
    Abstract: A protection against an unsolicited communication for an IMS (PUCI) system includes a call session control function (CSCF), and a plurality of PUCE application servers. The PUCI application servers make an evaluation as to whether a communication received from the user equipment is an unsolicited communication; the CSCF makes a decision on routing toward the PUCI application servers based on the evaluation; then, the PUCI application servers execute the routing based on the decision.
    Type: Grant
    Filed: October 6, 2009
    Date of Patent: August 2, 2016
    Assignee: NEC CORPORATION
    Inventors: Anand Raghawa Prasad, Andreas Kunz, Toshiyuki Tamura, Stefan Schmid, Thilo Ewald
  • Patent number: 9338196
    Abstract: To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing portion. A SPIT determination portion evaluates the bind identification information in reference to the gray list and determines whether or not the session start request from the IP phone terminal is allowed.
    Type: Grant
    Filed: April 28, 2010
    Date of Patent: May 10, 2016
    Assignee: NEC CORPORATION
    Inventors: Anand Raghawa Prasad, Thilo Ewald, Toshiyuki Tamura, Stefan Schmid
  • Patent number: 9225751
    Abstract: A PUCI system is designed to process an incoming call originated by the user equipment toward the counterpart user equipment via an EMS node having a PUCI-light functionality, which includes an IBCF/I-CSCF, a S-CSCF, and a database storing the PUCI-light information. Through a query to the database indicating a suspicious session in relation to the incoming call, the IMS node immediately blocks the suspicious session or simply marks the suspicious session for the further processing at a subsequent node. The reason for rejection is included in a SIP BYE/ERROR message of an original session setup message, which is interpreted by a previous IMS node so as to obtain the relevant information from a SIP header. The relevant information is stored in either a global operator policy database or a local database, thus enabling a PUCI-negating IMS node to reject an unsolicited call related to the blocked session.
    Type: Grant
    Filed: October 6, 2009
    Date of Patent: December 29, 2015
    Assignee: NEC CORPORATION
    Inventors: Anand Raghawa Prasad, Andreas Kunz, Toshiyuki Tamura, Stefan Schmid, Thilo Ewald
  • Patent number: 9032515
    Abstract: A method for detecting attacks to multimedia systems, wherein a communication path (1) is established within the multimedia system by a multimedia communication flow between a communication source and a communication destination, is characterized in that at least two devices (3, 4, 8) are provided along the communication path (1), each the device (3, 4, 8) acting as inspection device (2) that is enabled to inspect the multimedia communication flow that transits the inspection device (2), and that the results of the single inspections are accumulated along the communication path (1). Furthermore, a multimedia system with attack detection functionality is described.
    Type: Grant
    Filed: August 21, 2007
    Date of Patent: May 12, 2015
    Assignee: NEC Europe Ltd.
    Inventors: Saverio Niccolini, Thilo Ewald, Stefan Schmid
  • Patent number: 8406396
    Abstract: A communication system shares terminal identification information (TII) used for identifying a terminal that sends a spam phone call, with another communication system belonging to another network provider, and includes: a storage section that stores the TII of a terminal that sends a spam phone call; a transmission section that transmits the TII stored in the storage section to the other communication system; a reception section that receives the TII used for identifying the terminal that sends the spam phone call; a registration section that registers the TII received by the reception section in the storage section; and a spam phone call determination section that determines whether there is a match between terminal information indicating information of an outgoing call terminal that sends a connection request, and the TII stored in the storage section, thereby determining whether the outgoing call terminal sends a spam phone call.
    Type: Grant
    Filed: April 22, 2010
    Date of Patent: March 26, 2013
    Assignee: NEC Corporation
    Inventors: Anand Raghawa Prasad, Thilo Ewald, Toshiyuki Tamura, Stefan Schmid
  • Publication number: 20120134484
    Abstract: A communication system shares terminal identification information (TII) used for identifying a terminal that sends a spam phone call, with another communication system belonging to another network provider, and includes: a storage section that stores the TII of a terminal that sends a spam phone call; a transmission section that transmits the TII stored in the storage section to the other communication system; a reception section that receives the TII used for identifying the terminal that sends the spam phone call; a registration section that registers the TII received by the reception section in the storage section; and a spam phone call determination section that determines whether there is a match between terminal information indicating information of an outgoing call terminal that sends a connection request, and the TII stored in the storage section, thereby determining whether the outgoing call terminal sends a spam phone call.
    Type: Application
    Filed: April 22, 2010
    Publication date: May 31, 2012
    Applicant: NEC CORPORATION
    Inventors: Anand Raghawa Prasad, Thilo Ewald, Toshiyuki Tamura, Stefan Schmid
  • Publication number: 20120110170
    Abstract: To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing portion. A SPIT determination portion evaluates the bind identification information in reference to the gray list and determines whether or not the session start request from the IP phone terminal is allowed.
    Type: Application
    Filed: April 28, 2010
    Publication date: May 3, 2012
    Applicant: NEC CORPORATION
    Inventors: Anand Raghawa Prasad, Thilo Ewald, Toshiyuki Tamura, Stefan Schmid
  • Publication number: 20110286394
    Abstract: A protection against an unsolicited communication for an IMS (PUCI) system includes a call session control function (CSCF), and a plurality of PUCE application servers. The PUCI application servers make an evaluation as to whether a communication received from the user equipment is an unsolicited communication; the CSCF makes a decision on routing toward the PUCI application servers based on the evaluation; then, the PUCI application servers execute the routing based on the decision.
    Type: Application
    Filed: October 6, 2009
    Publication date: November 24, 2011
    Inventors: Anand Raghawa Prasad, Andreas Kunz, Toshiyuki Tamura, Stefan Schmid, Thilo Ewald
  • Publication number: 20110289217
    Abstract: A PUCI system is designed to process an incoming call originated by the user equipment toward the counterpart user equipment via an EMS node having a PUCI-light functionality, which includes an IBCF/I-CSCF, a S-CSCF, and a database storing the PUCI-light information. Through a query to the database indicating a suspicious session in relation to the incoming call, the IMS node immediately blocks the suspicious session or simply marks the suspicious session for the further processing at a subsequent node. The reason for rejection is included in a SIP BYE/ERROR message of an original session setup message, which is interpreted by a previous IMS node so as to obtain the relevant information from a SIP header. The relevant information is stored in either a global operator policy database or a local database, thus enabling a PUCI-negating IMS node to reject an unsolicited call related to the blocked session.
    Type: Application
    Filed: October 6, 2009
    Publication date: November 24, 2011
    Inventors: Anand Raghawa Prasad, Andreas Kunz, Toshiyuki Tamura, Stefan Schmid, Thilo Ewald
  • Publication number: 20110265145
    Abstract: A PUCI system includes a user equipment (UE) and a PUCI application server holding user policies in connection to a home subscriber server (HSS) holding operator policies. A policy manager establishes the correlation between the user policies and the operator policies, thus determining whether to reject or forward an incoming call originated from a trusted/distrusted source network in accordance with prescribed rules/logics.
    Type: Application
    Filed: October 6, 2009
    Publication date: October 27, 2011
    Inventors: Anand Raghawa Prasad, Andreas Kunz, Toshiyuki Tamura, Stefan Schmid, Thilo Ewald
  • Publication number: 20110041181
    Abstract: A method for detecting attacks to multimedia systems, wherein a communication path (1) is established within the multimedia system by a multimedia communication flow between a communication source and a communication destination, is characterized in that at least two devices (3, 4, 8) are provided along the communication path (1), each the device (3, 4, 8) acting as inspection device (2) that is enabled to inspect the multimedia communication flow that transits the inspection device (2), and that the results of the single inspections are accumulated along the communication path (1). Furthermore, a multimedia system with attack detection functionality is described.
    Type: Application
    Filed: August 21, 2008
    Publication date: February 17, 2011
    Applicant: NEC EUROPE LTD.
    Inventors: Saverio Niccolini, Thilo Ewald, Stefan Schmid