Patents by Inventor Mats Naslund
Mats Naslund has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8929543Abstract: A method comprises maintaining, in a first node serving a mobile terminal over a connection protected by at least one first key, said first key and information about the key management capabilities of the mobile terminal. Upon relocation of the mobile terminal to a second node the method includes: if, and only if, said key management capabilities indicate an enhanced key management capability supported by the mobile terminal, modifying, by said first node, the first key, thereby creating a second key, sending, from the first node to the second node, the second key, and transmitting to the second node the information about the key management capabilities of the mobile terminal.Type: GrantFiled: March 16, 2011Date of Patent: January 6, 2015Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Karl Norrman, Tomas Hedberg, Mats Naslund
-
Publication number: 20140351595Abstract: A method and apparatus for key management in a communication network. A Key Management Server (KMS) receives from a first device a request for a token associated with a user identity, the user identity being associated with a second device. The KMS then sends the requested token and a user key associated with the user to the first device. The KMS subsequently receives the token from the second device. A second device key is generated using the user key and a modifying parameter associated with the second device. The modifying parameter is available to the first device for generating the second device key. The second device key is then sent from the KMS to the second device. The second device key can be used by the second device to authenticate itself to the first device, or for the first device to secure communications to the second device.Type: ApplicationFiled: August 8, 2014Publication date: November 27, 2014Inventors: Rolf Blom, Fredrik Lindholm, Mats Näslund, Karl Norrman
-
Patent number: 8887246Abstract: A method for preserving privacy during authorization in pervasive environments is described. The method includes an authorization phase in which the user is provided with a reusable credential associated with verifiable constraints, and an operation phase where the service provider verifies the reusable credential before authorizing the user. Third parties cannot link plural uses of the credential to each other, and the service provider cannot link plural uses of said credential to each other.Type: GrantFiled: June 22, 2010Date of Patent: November 11, 2014Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Mats Naslund, Tereza Cristina Carvalho, Cristina Dominicini, Makan Pourzandi, Rony Sakuragui, Marcos Antonio Simplicio Junior
-
Patent number: 8885831Abstract: A method of operating a node for performing handover between access networks wherein a user has authenticated for network access in a first access network. The method comprises receiving from a home network a first session key and a temporary identifier allocated to the user for the duration of a communication session. The identifier is mapped to the first session key, and the mapped identifier and key are stored at the node. A second session key is derived from the first session key and the second session key is sent to an access network, and the identifier sent to a user terminal. When the user subsequently moves to a second access network, the node receives the identifier from the user terminal. The node then retrieves the first session key mapped to the received identifier, derives a third session key and sends the third session key to the second access network.Type: GrantFiled: June 7, 2013Date of Patent: November 11, 2014Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Mats Naslund, Jari Arkko
-
Patent number: 8863236Abstract: There is disclosed a method, and a communication system, and a communication node for implementing the claimed method, for attempting to enhance legitimacy assessment and thwart a man-in-the middle or similar false-location attack by evaluating the topology of a communication-session requesting node relative to the proposed communication path through a network between the requesting node and the requested node. Upon receiving the request, a PRD (Prefix Reachability Detection) protocol is initiated, either after or during a secure key exchange, if any, which if performed preferably includes an ART (address reachability text). The PRD is executed by sending a message to the communication node challenging the location-authenticity of the requesting device. The communication node, which may be for example an access router through which the requesting node accesses the network, determines if the requesting node is positioned behind the communication node topologically, and reports the result to the requested node.Type: GrantFiled: February 26, 2008Date of Patent: October 14, 2014Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Wassim Haddad, Mats Näslund
-
Publication number: 20140304768Abstract: A tamper-resistant security device, such as a subscriber identity module or equivalent, has an AKA (Authentication and Key Agreement) module for performing an AKA process with a security key stored in the device, as well as means for external communication. The tamper-resistant security device includes an application that cooperates with the AKA module and an internal interface for communications between the AKA module and the application. The application cooperating with the AKA module is preferably a security and/or privacy enhancing application. For increased security, the security device may also detect whether it is operated in its normal secure environment or a foreign less secure environment and set access rights to resident files or commands that could expose the AKA process or corresponding parameters accordingly.Type: ApplicationFiled: June 19, 2014Publication date: October 9, 2014Inventors: Mats NÄSLUND, Karl Norrman, Tomas Goldbeck-Löwe
-
Publication number: 20140289870Abstract: A method and apparatus for obtaining a password hint is disclosed. In some embodiments, the method includes: receiving a spatial pattern from a user; obtaining a password comprising a plurality of characters; obtaining a password hint comprising an arrangement of characters, wherein the arrangement of characters includes the plurality of characters of the password and additional characters, and the plurality of characters of the password are located within the arrangement of characters according to the received spatial pattern. The method may also include storing the password hint or providing the password hint to the user.Type: ApplicationFiled: November 8, 2011Publication date: September 25, 2014Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Göran Selander, Mats Näslund
-
Patent number: 8837737Abstract: A method and apparatus for key management in a communication network. A Key Management Terminal KMS Terminal Server (KMS) receives from a first device a request for a token associated with a user identity, the user identity being associated with a second device. The KMS then sends the requested token and a user key associated with the user to the first device. The KMS subsequently receives the token from the second device. A second device key is generated using the user key and a modifying parameter associated with the second device. The modifying parameter is available to the first device for generating the second device key. The second device key is then sent from the KMS to the second device. The second device key can be used by the second device to authenticate itself to the first device, or for the first device to secure communications to the second device.Type: GrantFiled: March 13, 2009Date of Patent: September 16, 2014Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Rolf Blom, Fredrik Lindholm, Mats Naslund, Karl Norrman
-
Patent number: 8837729Abstract: A method of improving privacy by hiding, in an ordered sequence of messages M[x(1), D(1)], M[x(2), D(2)], etc, communicated between a first and at least one second party sharing a key k, metadata x(i) descriptive of message processing, wherein D(i) denotes payload data. The method comprises the first and the second party agreeing on a pseudo random mapping depending on a shared key k, Fk, mapping at least x(i) to y(i), and the first party modifying the messages by replacing x(i) by y(i) in each message M(x(i), D(i)). The first party then transmits the modified messages maintaining their original order, and on reception of a message M(y(m), D), the second party uses a mapping Gk to retrieve position m of received value and the original value x(m).Type: GrantFiled: February 10, 2006Date of Patent: September 16, 2014Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Pekka Nikander, Jari Arrko, Mats Näslund
-
Patent number: 8832821Abstract: An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which receives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S-CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the INVITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept.Type: GrantFiled: March 13, 2013Date of Patent: September 9, 2014Assignee: Telefonaktiebolaget LM Ericsson (PUBL)Inventors: Luis Barriga, Rolf Blom, Yi Cheng, Fredrik Lindholm, Mats Naslund, Karl Norrman
-
Patent number: 8819765Abstract: A method and arrangement for distributing a security policy to a communication terminal having an association with a home communication network, but being present in a visited communication network. The home communication network generates its own preferred security policy Ph and the visited communication network generates its own preferred security policy Pv. A communication network entity in the visited communication network combines the security policies and selects security algorithms and/or functions to apply from the combined security policy. By generating security policy vectors of both networks and combining them before the security algorithms are selected, both networks are able to influence the selection without requiring the use of signaling messages.Type: GrantFiled: January 22, 2008Date of Patent: August 26, 2014Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Mats Naslund, Michael Liljenstam, Karl Norrman, Bengt Sahlin
-
Patent number: 8811987Abstract: Methods, apparatus, and computer program products for creating an association between a first user equipment and at least one access point assisted by a registration server in a telecommunication network are disclosed. The registration server responds to a first contact request carried out using a first association number for the access point, provided by the first user equipment, receives a first association request for the association with the access point, provided by the first user equipment, authorizes the first association request based on a first authorization information provided by the first user equipment; registers the association between the first user equipment and the access point responsive to authorization of the first association request. The first user equipment is associated with the access point and the association is administered by the registration server.Type: GrantFiled: December 19, 2008Date of Patent: August 19, 2014Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Göran Selander, Jari Vikberg, Karl Norrman, Rolf Blom, Mats Näslund
-
Patent number: 8797940Abstract: Systems and methods for the configuration of network nodes without a secured connection in a telecommunications system are described herein. These network nodes can be wireless network nodes which are part of the network infrastructure, such as, wireless relays, wireless repeaters and self-back-hauled eNodeBs.Type: GrantFiled: May 20, 2009Date of Patent: August 5, 2014Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: András Rácz, Göran Selander, Mats Näslund, Luis Barriga, Magnus Lindström, Gunnar Mildh, Niklas Johansson
-
Publication number: 20140215217Abstract: A method comprising the use of a bootstrapping protocol to define a security relationship between a first server and a second server, the first and second servers co-operating to provide a service to a user terminal. A bootstrapping protocol is used to generate a shared key for securing communication between the first server and the second server. The shared key is based on a context of the bootstrapping protocol, and the context is associated with a Subscriber Identity Module (SIM) associated with the user terminal and provides a base for the shared key. A method of the invention may, for example, be employed within a computing/service network such as a “cloud”, and in particular for communications between two servers in the cloud that are co-operating to provide a service to a user.Type: ApplicationFiled: September 8, 2011Publication date: July 31, 2014Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Kristoffer Gronowski, Shingo Murakami, Mats Näslund
-
Patent number: 8788705Abstract: Methods and arrangements for supporting a forwarding process in routers when routing data packets through a packet-switched network, by employing hierarchical parameters in which the hops of a predetermined transmission path between a sender and a receiver are encoded. A name server generates and distributes router-associated keys to routers in the network which keys are used for computing the hierarchical parameters.Type: GrantFiled: January 4, 2010Date of Patent: July 22, 2014Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Karl Norrman, Jukka Ylitalo, Mats Näslund, Pekka Nikander
-
Publication number: 20140196127Abstract: An access authentication system for authenticating a subscriber of a service, the access authentication system comprising an operator access authentication system and one or more private access authentication systems, each private access authentication system being communicatively connectable with the operator access authentication system, the operator access authentication system being adapted to provide one or more authentication functions for facilitating authentication of subscribers of the service based on respective subscriber authentication data items associated with credentials of the subscriber; wherein each private access authentication system is adapted to communicate one or more subscriber authentication data items to said operator access authentication system; and wherein each private access authentication system is further adapted to communicate one or more verification data items indicative of the private access authentication system operating in at least one predetermined state.Type: ApplicationFiled: June 13, 2012Publication date: July 10, 2014Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Bernard Smeets, Mats Näslund
-
Patent number: 8776183Abstract: A Personal Area Network Security Domain (PSD) is formed between devices (142, 150, 152, 154 and 156). The PSD allows the sharing of data and/or resources between the devices within the PSD. The devices within the PSD are located remotely from one another. For example, communication between device (150 and 156) will be performed via mobile or cellular telephone network (120), the Internet (140) and mobile or cellular telephone network (126). Each network (120, 126) is provided with a PSD Hub, which enables an IPsec secure connection between the devices (150 and 156) to be established.Type: GrantFiled: November 5, 2004Date of Patent: July 8, 2014Assignee: Vodafone Group PLCInventors: Pubudu Chandrasiri, Bulent Ozgur Gurleyen, Mats Naslund, Annika Jonsson, Christian Gehrmann
-
Patent number: 8738910Abstract: Methods and arrangements for enabling the use of a first device (300) for controlling transfer of media content from a content provider (306) to a second device (302). The first device has a pre-established security association with the communications network. When the network detects a request made by the first device for delivery of media content to the second device, key information is established which enables determination of one or more media keys for encryption of the media content. The network sends key information to the content provider and to the first device. The content provider then delivers media content encrypted by the media key(s) to the second device. Further, the first device forward the media key(s) over a local communication link to the second device for decryption of media content encrypted by the media key(s) when delivered by the content provider.Type: GrantFiled: December 7, 2009Date of Patent: May 27, 2014Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Göran Selander, Yi Cheng, Mattias Eld, Frank Hartung, Michael Liljenstam, Mats Näslund
-
Publication number: 20140096193Abstract: When setting up communication from a user equipment UE (1), such as for providing IP access for the UE in order to allow it to use some service, information or an indication of at least one network property relating to a first network, e.g. the current access network (3, 3?), is sent to the UE from a node (13) in a second network such as the home network (5) of the subscriber of the UE. The information or indication can be sent in a first stage of an authentication procedure being part of the setting up of a connection from the UE. In particular, the network property can indicate whether the access network (3, 3?) is trusted or not.Type: ApplicationFiled: November 26, 2013Publication date: April 3, 2014Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Mats Näslund, Jari Arkko, Rolf Blom, Vesa Petteri Lehtovirta, Karl Norrman, Stefan Rommer, Bengt Sahlin
-
Patent number: 8665874Abstract: Method and apparatus for supporting the forwarding of received data packets in a router (402,702) of a packet-switched network. A forwarding table (706a) is configured in the router based on aggregating router keys and associated aggregation related instructions received from a key manager (400,700). Each aggregating router key represents a set of destinations. When a data packet (P) is received comprising an ingress tag derived from a sender key or router key, the ingress tag is matched with entries in the forwarding table. An outgoing port is selected for the packet according to a found matching table entry that further comprises an associated aggregation related instruction. An egress tag is then created according to the aggregation related instruction, and the packet with the created egress tag attached is sent from the selected outgoing port to a next hop router.Type: GrantFiled: November 7, 2008Date of Patent: March 4, 2014Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Andras Czaszar, Lars G. Magnusson, Mats Naslund, Lars Westberg