Patents by Inventor Daniel Bergström

Daniel Bergström has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11956634
    Abstract: The application discloses methods and corresponding systems and network devices and/or nodes for enabling user equipment belonging to a home network to access data communication services in a visited network of a wireless communication system. By way of example, there is provided a method that comprises the step of obtaining at least one cryptographic token originating from a network node of the home network of the user equipment and cryptographically signed by a private key associated with the home network, wherein the at least one cryptographic token represents means for accessing data communication services via user data transport functions of the visited network.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: April 9, 2024
    Assignee: Telefonaktiebolaget LM Ericsson (Publ)
    Inventors: Tommy Arngren, Bernard Smeets, Tomas Thyni, Daniel Bergström
  • Publication number: 20230353345
    Abstract: There are provided methods and corresponding systems for supporting protected collection of measurement data, representative of usage of network capabilities within a communication network, related to at least two logical and/or physical entities or nodes, also referred to as managed entities, managed by a management system associated with the communication network. By way of example, there is provided a method comprising the step of combining measurement data related to a set of at least two of the managed entities according to a controllable and/or detectable pattern. The controllable pattern is defining at least the order of managed entities in which the combining of measurement data is to be performed. The method also comprises enabling the combined measurement data to be collected for validation of existence of the controllable pattern in the combined measurement data.
    Type: Application
    Filed: December 5, 2019
    Publication date: November 2, 2023
    Inventors: Patricia TOGÅRD, Tommy ARNGREN, Daniel BERGSTRÖM, Bernard SMEETS
  • Patent number: 11797712
    Abstract: It is provided a method for enabling a user device to verify data integrity. The method is performed in a network node and includes: obtaining measurement data indicating resource usage by the user device; obtaining a session identifier; generating a measurement indicator using a one-way function, based on the measurement data; generating an asymmetric cryptographic signature of the session identifier and the measurement indicator, the asymmetric cryptographic signature being based on a private key of a cryptographic key pair of the network node; and storing, in a distributed ledger database, a set of data comprising the asymmetric cryptographic signature, the session identifier and the measurement indicator.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: October 24, 2023
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Tomas Thyni, Bernard Smeets, Tommy Arngren, Daniel Bergström
  • Publication number: 20230328804
    Abstract: A method for providing information exchange between a primary communication device and a secondary communication device, where the method, when executed in the primary communication device, comprises: determining that functionality of the primary communication device is malfunctioning; recognizing at least one indication, each being received from a secondary communication device, indicating that the respective secondary communication device is capable of providing substitute functionality for the malfunctioning functionality; setting up a connection between the primary and the secondary communication device, and executing a command, received from the substitute functionality of the secondary communication device.
    Type: Application
    Filed: May 29, 2020
    Publication date: October 12, 2023
    Inventors: Tommy Arngren, Daniel Bergström, Andreas Kristensson, Peter Ökvist
  • Publication number: 20230239655
    Abstract: A geofencing system (310) that does not rely on a GNSS or other like system. The geofencing system comprises a group of two or more fence-pole devices, FPDs, that define a geofenced area (399). Each FPD in the group is capable of making its own determination as to whether or not a certain communication device (377, 378) appears to be within the geofenced area. In one embodiment, if all of the FPDs have determined that the communication device appears to be within the geofenced area, then it is decided that the communication device is within the geofenced area. In another embodiment, if the group of FPDs consists of N FPDs and at least N?1 of the FPDs have determined that the communication device appears to be within the geofenced area, then it is decided that the communication device is within the geofenced area.
    Type: Application
    Filed: June 8, 2020
    Publication date: July 27, 2023
    Applicant: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Peter ÖKVIST, Andreas KRISTENSSON, David LINDERO, Anders LANDSTRÖM, Daniel BERGSTRÖM, Stefan WÄNSTEDT, Tommy ARNGREN
  • Publication number: 20230025271
    Abstract: A method in a communication device, and a communication device, for executing a software updating process at the communication device is suggested, where the method is executed by acquiring data captured by at least one sensor which is accessible to the communication device, by comparing the acquired data to predefined conditions for initiating a software updating process, and by initiating the software updating process at the communication device in response to determining that the acquired data meet with predefined conditions for updating software at the communication device.
    Type: Application
    Filed: December 19, 2019
    Publication date: January 26, 2023
    Inventors: Tommy Arngren, Håkan Englund, Daniel Bergström
  • Publication number: 20220352927
    Abstract: A Near-Field Communication (NFC)-enabled constrained device (100) is provided. The constrained device (100) comprises a processing circuit (111) operative to implement a functionality of the constrained device (100), an NFC-interface circuit (115) configured to harvest power transmitted by an NFC-enabled control device (200) and to enable exchange of data with the control device (200), when the devices are in proximity, and a restart circuit (121) configured to accumulate electrical charge using the harvested power received from the NFC-interface circuit (115), and to trigger restart of the processing circuit (111) when the accumulated electrical charge exceeds a threshold level. Further provided is an NFC-enabled control device (200) for restarting the NFC-enabled constrained device (100).
    Type: Application
    Filed: September 30, 2019
    Publication date: November 3, 2022
    Inventors: Jonas Pettersson, Daniel Bergström, Tommy Arngren, Till Burkert
  • Publication number: 20220191697
    Abstract: The application discloses methods and corresponding systems and network devices and/or nodes for enabling user equipment belonging to a home network to access data communication services in a visited network of a wireless communication system. By way of example, there is provided a method that comprises the step of obtaining at least one cryptographic token originating from a network node of the home network of the user equipment and cryptographically signed by a private key associated with the home network, wherein the at least one cryptographic token represents means for accessing data communication services via user data transport functions of the visited network.
    Type: Application
    Filed: April 25, 2019
    Publication date: June 16, 2022
    Inventors: Tommy Arngren, Bernard Smeets, Tomas Thyni, Daniel Bergström
  • Publication number: 20210390213
    Abstract: It is provided a method for enabling a user device to verify data integrity. The method is performed in a network node and includes: obtaining measurement data indicating resource usage by the user device; obtaining a session identifier; generating a measurement indicator using a one-way function, based on the measurement data; generating an asymmetric cryptographic signature of the session identifier and the measurement indicator, the asymmetric cryptographic signature being based on a private key of a cryptographic key pair of the network node; and storing, in a distributed ledger database, a set of data comprising the asymmetric cryptographic signature, the session identifier and the measurement indicator.
    Type: Application
    Filed: October 29, 2018
    Publication date: December 16, 2021
    Inventors: Tomas THYNI, Bernard SMEETS, Tommy ARNGREN, Daniel BERGSTRÖM
  • Publication number: 20210359749
    Abstract: A method is executable by a first communication device, where the method comprise listening to satellite transmissions, which is transmitting conditions for allowing the first communication device to exchange data with a second communication device, recognizing conditions for allowing exchange of data between the first and the second communication devices, determining requirements for data exchange under the mentioned conditions, and determining according to the conditions, a time interval within which the second communication device is expected to be located within device-to-device, D2D, communication range of the first communication device, after which data is exchanged between the first and the second communication device, within the determined time interval.
    Type: Application
    Filed: October 22, 2018
    Publication date: November 18, 2021
    Inventors: Tommy Arngren, Daniel Bergström
  • Patent number: 11044340
    Abstract: It is presented a method performed in a deployment server being configured to deploy a software container. The method comprises the steps of: receiving a trigger to deploy a software container; obtaining an image intended for the software container comprising a set of at least one module; injecting a security module in the image; obtaining a container specification of the image; configuring the security module to forward incoming communication to the set of at least one module in accordance with the obtained container specification; modifying the container specification such that the at least one service is accessed externally only via the security module and that all outgoing communication, from the set of at least one module, is directed via the security module; publishing the modified container specification in a service discovery repository; and deploying the software container on at least one execution server.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: June 22, 2021
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Johan Kristiansson, Daniel Bergström, Jonas Lundberg, Nicklas Sandgren
  • Patent number: 10785334
    Abstract: It is presented a method performed by a first software container comprising an implanted agent, which is configured to run in said first software container. The method comprise the steps, performed by the implanted agent, of: resolving an Internet Protocol, IP, address and a port of the first software container; and registering a microservice identity, the IP address and the port of the first software container in a first distributed hash table for enabling a second implanted agent running in a second software container to configure a reverse proxy running in the second software container.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: September 22, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Johan Kristiansson, Daniel Bergström, Jonas Lundberg, Nicklas Sandgren
  • Patent number: 10761881
    Abstract: It is provided a method for managing a lifecycle of a software container announced in a distributed peer-to-peer repository, wherein the method is performed in a server. The method comprises the steps of: initialising execution of the software container in the server; setting the software container in a standby state; receiving a start message from a remote device, the start message comprising at least one start parameter for the software container; and starting a main process of the software container and applying the at least one start parameter for the main process, to progress the software container to a running state.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: September 1, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Johan Kristiansson, Daniel Bergström, Jonas Lundberg, Nicklas Sandgren
  • Patent number: 10528379
    Abstract: It is provided a method for allocating a software container executing on a server of a set of servers. The method is performed in a container allocator and comprising the steps of: receiving a request to invoke a software container for a client; calculating a lookup key associated with the software container; performing a lookup in a distributed peer-to-peer repository using the lookup key, giving a result set of active software containers; selecting one software container from the set of software containers; and connecting to the selected software container to allocate the selected software container to the client.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: January 7, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Johan Kristiansson, Daniel Bergström, Jonas Lundberg, Nicklas Sandgren
  • Publication number: 20190394302
    Abstract: It is presented a method performed in a deployment server being configured to deploy a software container. The method comprises the steps of: receiving a trigger to deploy a software container; obtaining an image intended for the software container comprising a set of at least one module; injecting a security module in the image; obtaining a container specification of the image; configuring the security module to forward incoming communication to the set of at least one module in accordance with the obtained container specification; modifying the container specification such that the at least one service is accessed externally only via the security module and that all outgoing communication, from the set of at least one module, is directed via the security module; publishing the modified container specification in a service discovery repository; and deploying the software container on at least one execution server.
    Type: Application
    Filed: January 31, 2017
    Publication date: December 26, 2019
    Inventors: Johan Kristiansson, Daniel Bergström, Jonas Lundberg, Nicklas Sandgren
  • Publication number: 20190146833
    Abstract: It is provided a method for managing a lifecycle of a software container announced in a distributed peer-to-peer repository, wherein the method is performed in a server. The method comprises the steps of: initialising execution of the software container in the server; setting the software container in a standby state; receiving a start message from a remote device, the start message comprising at least one start parameter for the software container; and starting a main process of the software container and applying the at least one start parameter for the main process, to progress the software container to a running state.
    Type: Application
    Filed: June 28, 2016
    Publication date: May 16, 2019
    Inventors: Johan Kristiansson, Daniel Bergström, Jonas Lundberg, Niklas Sandgren
  • Publication number: 20180157516
    Abstract: It is provided a method for allocating a software container executing on a server of a set of servers. The method is performed in a container allocator and comprising the steps of: receiving a request to invoke a software container for a client; calculating a lookup key associated with the software container; performing a lookup in a distributed peer-to-peer repository using the lookup key, giving a result set of active software containers; selecting one software container from the set of software containers; and connecting to the selected software container to allocate the selected software container to the client.
    Type: Application
    Filed: June 26, 2015
    Publication date: June 7, 2018
    Inventors: Johan KRISTIANSSON, Daniel BERGSTRÖM, Jonas LUNDBERG, Nicklas SANDGREN
  • Publication number: 20180152534
    Abstract: It is presented a method performed by a first software container comprising an implanted agent, which is configured to run in said first software container. The method comprise the steps, performed by the implanted agent, of: resolving an Internet Protocol, IP, address and a port of the first software container; and registering a microservice identity, the IP address and the port of the first software container in a first distributed hash table for enabling a second implanted agent running in a second software container to configure a reverse proxy running in the second software container.
    Type: Application
    Filed: March 15, 2016
    Publication date: May 31, 2018
    Applicant: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Johan KRISTIANSSON, Daniel BERGSTRÖM, Jonas LUNDBERG, Nicklas SANDGREN
  • Patent number: 8094139
    Abstract: An electronic pen capable of recording position data representative of its movement runs a time handling method. In this method, a counter is operated to sequentially generate a monotonous sequence of counter values. Further, a time calculator is operated to generate a current time value. Also, a control device is operated to derive a current counter value from the counter and the current time value from the time calculator, and to associate at least a subset of the position data with the current counter value and the current time value. If each subset defines a pen stroke, counter values may represent the order in which pen strokes were created. The pen may allow an external device to arbitrarily adjust the time calculator, e.g. to reflect a local time, since the resulting time values need not be used to determine the mutual order of the pen strokes.
    Type: Grant
    Filed: February 22, 2006
    Date of Patent: January 10, 2012
    Assignee: Anoto AB
    Inventors: Daniel Bergström, Ola Sandstrom
  • Publication number: 20080129711
    Abstract: An electronic pen capable of recording position data representative of its movement runs a time handling method. In this method, a counter is operated to sequentially generate a monotonous sequence of counter values. Further, a time calculator is operated to generate a current time value. Also, a control device is operated to derive a current counter value from the counter and the current time value from the time calculator, and to associate at least a subset of the position data with the current counter value and the current time value. If each subset defines a pen stroke, counter values may represent the order in which pen strokes were created. The pen may allow an external device to arbitrarily adjust the time calculator, e.g. to reflect a local time, since the resulting time values need not be used to determine the mutual order of the pen strokes.
    Type: Application
    Filed: February 22, 2006
    Publication date: June 5, 2008
    Applicant: Anoto AB
    Inventors: Daniel BERGSTRÖM, Ola SANDSTRÖM