Patents by Inventor Gerasimos Dimitriadis

Gerasimos Dimitriadis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11546308
    Abstract: A technique for hiding topological information in a message that leaves a trusted network-domain is presented. The message pertains to a subscriber session and comprises a Fully Qualified Domain Name (FQDN) of a message originator. The originator is located in a first network domain, and the message is directed towards a destination in a second network domain. A method aspect comprises the steps of receiving the message, determining the FQDN comprised in the message and determining an identifier associated with the message. The identifier comprises at least one of a subscriber identifier, a session identifier and a destination identifier. Further, the method comprises applying a cryptographic operation on the FQDN and the identifier, or on information derived therefrom, to generate a cryptographic value. The message is then processed by substituting at least a portion of the FQDN with the cryptographic value prior to forwarding the message towards the second network domain.
    Type: Grant
    Filed: November 3, 2019
    Date of Patent: January 3, 2023
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Kurt Essigmann, Gerasimos Dimitriadis, Volker Kleinfeld
  • Publication number: 20200067893
    Abstract: A technique for hiding topological information in a message that leaves a trusted network-domain is presented. The message pertains to a subscriber session and comprises a Fully Qualified Domain Name (FQDN) of a message originator. The originator is located in a first network domain, and the message is directed towards a destination in a second network domain. A method aspect comprises the steps of receiving the message, determining the FQDN comprised in the message and determining an identifier associated with the message. The identifier comprises at least one of a subscriber identifier, a session identifier and a destination identifier. Further, the method comprises applying a cryptographic operation on the FQDN and the identifier, or on information derived therefrom, to generate a cryptographic value. The message is then processed by substituting at least a portion of the FQDN with the cryptographic value prior to forwarding the message towards the second network domain.
    Type: Application
    Filed: November 3, 2019
    Publication date: February 27, 2020
    Inventors: Kurt Essigmann, Gerasimos Dimitriadis, Volker Kleinfeld
  • Patent number: 10491573
    Abstract: A technique for hiding topological information in a message that leaves a trusted network-domain is presented. The message pertains to a subscriber session and comprises a Fully Qualified Domain Name (FQDN) of a message originator. The originator is located in a first network domain, and the message is directed towards a destination in a second network domain. A method aspect comprises the steps of receiving the message, determining the FQDN comprised in the message and determining an identifier associated with the message. The identifier comprises at least one of a subscriber identifier, a session identifier and a destination identifier. Further, the method comprises applying a cryptographic operation on the FQDN and the identifier, or on information derived therefrom, to generate a cryptographic value. The message is then processed by substituting at least a portion of the FQDN with the cryptographic value prior to forwarding the message towards the second network domain.
    Type: Grant
    Filed: December 8, 2014
    Date of Patent: November 26, 2019
    Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Kurt Essigmann, Gerasimos Dimitriadis, Volker Kleinfeld
  • Publication number: 20180131599
    Abstract: A node (111-114) in a multi-path network (100) sends a first message to a first egress node (111-114, 121), the first message being directed to at least one target node (121). After said sending, the node (111-114) receives an answer message. Based on the answer message, a value indicative of the identity of an originator node (111-114, 121) of the answer message is added to a routing record of a second message. The second message is directed to the at least one target node (121). The second routing message is sent to a second egress node (111-114, 121).
    Type: Application
    Filed: May 15, 2015
    Publication date: May 10, 2018
    Inventors: Gerasimos DIMITRIADIS, Kurt ESSIGMANN, Kostas VLACHOPOULOS
  • Patent number: 9806992
    Abstract: The invention relates to a method, by a diameter routing unit (110), to route diameter commands of a data packet session using a diameter protocol in a mobile communications network, the diameter routing unit comprising a storage unit (111) storing information which policy and charging control unit is handling which data packet session and storing information about a presence of at least one additional diameter routing unit (100) which routes diameter commands of the diameter protocol to the same pool of policy and charging control units (31, 32) as the diameter routing unit.
    Type: Grant
    Filed: March 22, 2013
    Date of Patent: October 31, 2017
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Sven Steinacker, Gerasimos Dimitriadis, Volker Kleinfeld
  • Publication number: 20160352696
    Abstract: A technique for hiding topological information in a message that leaves a trusted network-domain is presented. The message pertains to a subscriber session and comprises a Fully Qualified Domain Name (FQDN) of a message originator. The originator is located in a first network domain, and the message is directed towards a destination in a second network domain. A method aspect comprises the steps of receiving the message, determining the FQDN comprised in the message and determining an identifier associated with the message. The identifier comprises at least one of a subscriber identifier, a session identifier and a destination identifier. Further, the method comprises applying a cryptographic operation on the FQDN and the identifier, or on information derived therefrom, to generate a cryptographic value. The message is then processed by substituting at least a portion of the FQDN with the cryptographic value prior to forwarding the message towards the second network domain.
    Type: Application
    Filed: December 8, 2014
    Publication date: December 1, 2016
    Inventors: Kurt Essigmann, Gerasimos Dimitriadis, Volker Kleinfeld
  • Publication number: 20160156729
    Abstract: The invention generally relates to a method, by a proxy agent, for establishing a communication session between a first and a second communicating entity over the proxy agent in a communication network. This session comprises a plurality of messages which are exchanged between the first communicating entity and the proxy agent and the proxy agent and the second communicating entity. The proxy agent inserts session information to a first message received by the first or the second communicating entity. The proxy agent then sends the first message to the first or the second communicating entity. The proxy agent then receives a second message by the first or the second communicating entity. This second message contains the session information which is then analysed by the proxy agent. Based on this session information the proxy agent sends a third message to the first or the second communicating entity.
    Type: Application
    Filed: July 24, 2013
    Publication date: June 2, 2016
    Inventors: Kurt ESSIGMANN, Sven STEINACKER, Volker KLEINFELD, Gerasimos DIMITRIADIS
  • Publication number: 20150358229
    Abstract: The invention relates to a method, by a diameter routing unit (110), to route diameter commands of a data packet session using a diameter protocol in a mobile communications network, the diameter routing unit comprising a storage unit (111) storing information which policy and charging control unit is handling which data packet session and storing information about a presence of at least one additional diameter routing unit (100) which routes diameter commands of the diameter protocol to the same pool of policy and charging control units (31, 32) as the diameter routing unit.
    Type: Application
    Filed: March 22, 2013
    Publication date: December 10, 2015
    Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
    Inventors: Sven Steinacker, Gerasimos Dimitriadis, Volker Kleinfeld