Patents by Inventor Guenther Horn

Guenther Horn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8798632
    Abstract: A method, apparatus and computer program product are provided to provide fresh security context during intersystem mobility. A method is provided which includes receiving an indication of handover of a remote device from a source system to a target system. The target system may implement a communications standard different from that of the source system. The method also includes determining a current sequence number value of a security context maintained in the source system. The method additionally includes deriving a fresh mapped security context for the target system based at least in part upon the determined sequence number value. The method further includes providing the derived fresh mapped security context to the target system.
    Type: Grant
    Filed: June 13, 2008
    Date of Patent: August 5, 2014
    Assignee: Nokia Corporation
    Inventors: Dan Lars Anders Forsberg, Marc Blommaert, Günther Horn
  • Patent number: 8745382
    Abstract: The method for the transmission of media data from a multicast service by a first apparatus to a plurality of second apparatuses is suitable for preventing reception of the media data by an unauthorized second apparatus using a security process. A first apparatus is provided which can be used to provide the media data protected by a security process. A third apparatus is provided which can be used to perform the security process with the first apparatus, performance of the security process between the first apparatus and the third apparatus and, on the basis of this, interchange of at least security data between the first apparatus and the third apparatus in order to provide the media data. A second apparatus is selected which can be used to perform at least one reception process for receiving the media data. A first data transmission link is selected which can be used to couple the first apparatus and the second apparatus at least for the purpose of transmitting the media data.
    Type: Grant
    Filed: January 15, 2007
    Date of Patent: June 3, 2014
    Assignee: Siemens Aktiengesellschaft
    Inventors: Matthias Franz, Günther Horn
  • Patent number: 8644249
    Abstract: A user terminal is switched between a cellular network and a worldwide interoperability for microwave access radio network within a telecommunication system. An authentication, authorization and accounting (AAA) server which is designed for use with both of these networks is disposed in the telecommunication system in such a way that user data of the user terminal stored in the AAA server can be accessed from both of these networks, thereby advantageously ensuring uninterrupted switching between the two networks free of loss.
    Type: Grant
    Filed: August 24, 2006
    Date of Patent: February 4, 2014
    Assignee: Siemens Aktiengesellschaft
    Inventors: Wolfgang Bücker, Wolfgang Gröting, Günther Horn, Joachim Kroβ, Maximilian Riegel
  • Patent number: 8607309
    Abstract: There are provided measures for trustworthiness decision making for access authentication, for example relating to the trustworthiness of non-3GPP access networks within a 3GPP-compliant packet data system, exemplary comprising receiving an indication about a provisional trustworthiness of an access network, which provides packet data access for a roaming user, with respect to a visited network of said user from a network element of said visited network, determining the applicability of local breakout or home routing for each subscribed access point name of said user, and deciding about a final trustworthiness of said access network based upon the received provisional trustworthiness indication and the determined routing applicability for each subscribed access point name of said user.
    Type: Grant
    Filed: January 5, 2009
    Date of Patent: December 10, 2013
    Assignee: Nokia Siemens Networks Oy
    Inventors: Robert Ropolyi, Guenther Horn
  • Patent number: 8565429
    Abstract: In the method and the arrangement for checking the authenticity of a first communication subscriber in a communications network, a first information item is formed in the first communication subscriber using a fault detection data item of the first communication subscriber and an information item relating to a random data item. In a second communication subscriber in the communications network, a second fault information item is formed using a fault detection data item of the second communication subscriber and the information relating to the random data item. The authenticity of the first communication subscriber is checked using the first fault information and the second fault information.
    Type: Grant
    Filed: June 18, 2003
    Date of Patent: October 22, 2013
    Assignee: Siemens Aktiengesellschaft
    Inventors: Jorge Cuellar, Guenther Horn
  • Publication number: 20130189955
    Abstract: A method is provided comprising receiving a group registration request from a master device, sending a request relating to the master device to a subscriber database, and receiving subscriber specific information relating to a member device from said subscriber database. The member device is controlled by the master device and the subscriber specific information relating to the member device is associated with the master device or with subscriber specific information relating to said master device in the subscriber database.
    Type: Application
    Filed: September 17, 2010
    Publication date: July 25, 2013
    Applicant: NOKIA SIEMENS NETWORKS OY
    Inventors: Guenther Horn, Robert Zaus
  • Patent number: 8488795
    Abstract: Cryptographic material is generated for a protocol for the encrypted transmission of media data between a subscriber device and a provider device. A first symmetric key of the subscriber device and the provider device is inserted in a symmetric key protection mechanism of a network protocol of a control layer to establish a communication session between the subscriber device and the provider device. A first time-variable parameter is transmitted from the provider device to the subscriber device. A second symmetric key for protecting the key management protocol is calculated by both the provider device and the subscriber device using a defined function depending at least on the first symmetric key and the first time-variable parameter.
    Type: Grant
    Filed: September 24, 2007
    Date of Patent: July 16, 2013
    Assignee: Siemens Aktiengesellschaft
    Inventors: Wolfgang Bücker, Günther Horn, Srinath Thiruvengadam
  • Publication number: 20130091556
    Abstract: It is provided a method a method for establishing a first secure and authorized connection between a smart card and a first device in a network, wherein the first device comprises a second secure connection to a second device, wherein the method comprises storing a first security data; transferring the first security data between the first device and the second device; providing the first security data at the first device; establishing a binding between the smart card and the first device via the first secure and authorized connection utilizing the first security data; authorizing the binding between the smart card and the first device; and sending a second security data from the smart card to the first device via the first secure and authorized connection whereas the second security data may be usable for authentication of the first device to the network.
    Type: Application
    Filed: June 21, 2010
    Publication date: April 11, 2013
    Applicant: NOKIA SIEMENS NETWORKS OY
    Inventors: Guenther Horn, Wolf Dietrich Moeller
  • Patent number: 8291222
    Abstract: The use of suitable measures in a method for agreeing on a security key between at least one first and one second communication station to secure a communication link is improved so that the security level for the communication is increased and the improved method can be combined with already available methods. A first parameter is determined from an authentication and key derivation protocol. In addition, an additional parameter is sent securely from the second to the first communications station. A security key is then determined from the first parameter and the additional parameter.
    Type: Grant
    Filed: April 10, 2006
    Date of Patent: October 16, 2012
    Assignee: Siemens Aktiengesellschaft
    Inventors: Marc Blommaert, Günther Horn
  • Publication number: 20120084451
    Abstract: It is disclosed a method (and related apparatus) including selecting, at a first endpoint entity, at least one range of protection to be granted, the range of protection relating to one of a plurality of network elements in at least one access network and at least one core network and to a second endpoint entity, and transmitting, to a network element entity, a signaling message including first establishment information indicating the at least one range of protection to be granted; and a method (and related apparatus) including receiving, at the network element entity, the signaling message from the first endpoint entity, obtaining, from a second endpoint entity and based on the first establishment information, second establishment information indicating protection granted by the second endpoint entity, and signaling, from the network element entity to the first endpoint entity, third establishment information indicating the protection granted to the first endpoint entity.
    Type: Application
    Filed: June 10, 2009
    Publication date: April 5, 2012
    Inventors: Peter Schneider, Guenther Horn
  • Publication number: 20120039452
    Abstract: There is proposed a mechanism for controlling a communication connection establishment to a subscriber using service including blacklisting, whitelisting, authentication request and/or Turing test for unsolicited communications prevention. Furthermore, there is proposed a management system used to configure a corresponding communication connection establishment control on the basis of an interface for the subscriber for defining a personalized communication connection establishment control profile.
    Type: Application
    Filed: March 16, 2009
    Publication date: February 16, 2012
    Inventors: Guenther Horn, Joachim Charzinski, Wolfgang Buecker, Bernd Jaegar
  • Publication number: 20110314289
    Abstract: It is provided an apparatus, comprising property checking means configured to check whether a claimant property information received from a claimant device corresponds to a predefined claimant attribute; obtaining means configured to obtain a result, which is positive only if the claimant property information corresponds to the predefined claimant attribute as checked by the property checking means; key generation means configured to generate a first claimant intermediate key from a predefined claimant permanent key stored in the apparatus; supplying means configured to supply, to the claimant device, the first claimant intermediate key using a secured protocol, wherein at least one of the key generation means and the supplying means is configured to generate and to supply, respectively, the first claimant intermediate key only if the result is positive.
    Type: Application
    Filed: April 29, 2011
    Publication date: December 22, 2011
    Applicant: NOKIA SIEMENS NETWORKS OY
    Inventors: Guenther HORN, Wolf-Dietrich MOELLER
  • Publication number: 20110225632
    Abstract: There are provided measures for trustworthiness decision making for access authentication, for example relating to the trustworthiness of non-3GPP access networks within a 3GPP-compliant packet data system, exemplary comprising receiving an indication about a provisional trustworthiness of an access network, which provides packet data access for a roaming user, with respect to a visited network of said user from a network element of said visited network, determining the applicability of local breakout or home routing for each subscribed access point name of said user, and deciding about a final trustworthiness of said access network based upon the received provisional trustworthiness indication and the determined routing applicability for each subscribed access point name of said user.
    Type: Application
    Filed: May 1, 2009
    Publication date: September 15, 2011
    Applicant: NOKIA SIEMENS NETWORKS OY
    Inventors: Robert Ropolyi, Guenther Horn
  • Publication number: 20110191576
    Abstract: Cryptographic network separation functionality is provided on a user device. An option to store information about a type of database where a user is homed is provided in an indicator on a storage medium. An interface is provided between the user device and the storage medium for accessing the indicator. In case the information about the type of database cannot be obtained from the storage medium, it is determined not to enforce the cryptographic network separation functionality on the user device.
    Type: Application
    Filed: September 24, 2008
    Publication date: August 4, 2011
    Applicant: NOKIA CORPORATION
    Inventors: Dan Forsberg, Günther Horn, Marc Blommaert
  • Publication number: 20110145575
    Abstract: The present invention is related to a method, apparatus, and computer program product, in which a password-based digest access authentication procedure is used for performing authentication between a client and a server, wherein the authentication procedure is secured by at least one of modifying a digest-response parameter with a user password and generating a bootstrapped key based on the user password and at least one fresh parameter not used in a previous protocol run between the client and the server.
    Type: Application
    Filed: February 25, 2008
    Publication date: June 16, 2011
    Inventors: Marc Blommaert, Guenther Horn
  • Publication number: 20110092213
    Abstract: A method, apparatus and computer program product are provided to provide fresh security context during intersystem mobility. A method is provided which includes receiving an indication of handover of a remote device from a source system to a target system. The target system may implement a communications standard different from that of the source system. The method also includes determining a current sequence number value of a security context maintained in the source system. The method additionally includes deriving a fresh mapped security context for the target system based at least in part upon the determined sequence number value. The method further includes providing the derived fresh mapped security context to the target system.
    Type: Application
    Filed: June 13, 2008
    Publication date: April 21, 2011
    Applicant: NOKIA CORPORATION
    Inventors: Dan Lars Anders Forsberg, Marc Blommaert, Günther Horn
  • Publication number: 20110010538
    Abstract: An access specific key is provided for securing of a data transfer between a mobile terminal and a node of an access net. For authentication of the mobile terminal, a authentication server generates a session key, from which a basic key is derived and transferred to an interworking-proxy-server. The interworking-proxy-server derives the access specific key from the transferred basis key and provides the key to the node of the access net.
    Type: Application
    Filed: August 9, 2007
    Publication date: January 13, 2011
    Applicant: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Rainer Falk, Günther Horn, Dirk Kröselberg
  • Publication number: 20110004762
    Abstract: A home subscriber server (400) receives a request for authentication information from an authentication server (300) and transforms cryptographic keys for a user equipment (100) into access specific cryptographic keys based on an identity of an authenticator (200) controlling access from the user equipment (100) to an EPS network, and generates the authentication information including the access specific cryptographic keys and a separation indicator which is set. The user equipment (100) checks whether the separation indicator included in the authentication information is set, and if the separation indicator is set, transforms cryptographic keys into access specific cryptographic keys based on the identity of the authenticator (200), and computes a key specific to an authentication method from the access specific cryptographic keys.
    Type: Application
    Filed: April 2, 2008
    Publication date: January 6, 2011
    Applicant: NOKIA SIEMENS NETWORKS OY
    Inventor: Guenther Horn
  • Publication number: 20110004757
    Abstract: Embodiments provide an apparatus, method, product and storage medium for secure communication, wherein a message is sent over a secure signalling path to a recipient, the message including a value indicating a key for encrypting or decrypting information for secure communication, or a key derivation value for deriving a key. The message further includes an indication indicating the type of usage of the value. The receiver of the message may return a message which also includes a key or key derivation value and an indication indicating the type of key or type of usage of the value.
    Type: Application
    Filed: April 7, 2008
    Publication date: January 6, 2011
    Inventors: Guenther Horn, Peter Schneider
  • Publication number: 20100111308
    Abstract: In a method for key handling in mobile communication systems, first and second numbers are exchanged between entities of the mobile communication system. The first and second numbers are respectively used only once with respect to the respective system parameters of the communication system and therefore allowing greater security in the communication system.
    Type: Application
    Filed: March 18, 2008
    Publication date: May 6, 2010
    Applicant: NOKIA SIEMENS NETWORKS GMBH & CO. KG
    Inventors: Dan Forsberg, Guenther Horn, Ulrike Meyer