Patents by Inventor Rolf Blom
Rolf Blom has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140038566Abstract: A method of and arrangement for detecting a manipulated or defect base station of a communication network is disclosed, wherein a target base station, having selected one or more algorithms on the basis of a prioritized algorithm list (PAL) and a UE security capabilities (SCAP), reports UE SCAP related information to a core network node. The core network node having knowledge of the UE SCAP compares this information or parts of this information with the retrieved UE SCAP related information in order to be able to identify a manipulated or defect base station when a comparison fails to match.Type: ApplicationFiled: October 11, 2013Publication date: February 6, 2014Applicant: Telefonaktiebolaget LM Ericsson (publ)Inventors: Karl Norrman, Bernard Smeets, Rolf Blom
-
Patent number: 8645680Abstract: A method and apparatus for sending protected media data from a data source node to a client node via an intermediate node. The data source node establishes a first hop-by-hop key to be shared with the intermediate node and an end-to-end key to be shared with the client node. A single security protocol instance is configured and used to trans-protocol form data from a media stream into transformed data using the keys. The transformed data is then sent to the intermediate node. The intermediate node uses the first hop-by-hop key to apply a security processing to the transformed data, and establishes a second hop-by-hop key with the client node. A second transformation is performed on the transformed data using the second hop-by-hop key to produce further transformed media data, which is then sent to the client node.Type: GrantFiled: May 6, 2009Date of Patent: February 4, 2014Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Rolf Blom, Yi Cheng, John Mattsson, Mats Naslund, Karl Norrman
-
Patent number: 8621570Abstract: When setting up communication from a user equipment UE (1), such as for providing IP access for the UE in order to allow it to use some service, information or an indication or at least one network properly relating to a first network, e.g. the current access network (3, 3?), is sent to the UE from a node (13) in a sue and network such as the home network (5) of the subscriber ask UE. The information or indication can be sent in a first stage of an authentication procedure being part of the setting up of a connection from the UE. In particular, the network property can indicate whether the access network (3, 3?) is trusted or not.Type: GrantFiled: November 5, 2008Date of Patent: December 31, 2013Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Mats Naslund, Jari Arkko, Rolf Blom, Vesa Lehtovirta, Karl Norrman, Stefan Rommer, Bengt Sahlin
-
Patent number: 8620267Abstract: A method of and arrangement for detecting a manipulated or defect base station of a communication network is disclosed, wherein a target base station, having selected one or more algorithms on the basis of a prioritized algorithm list (PAL) and a UE security capabilities (SCAP), reports UE SCAP related information to a core network node. The core network node having knowledge of the UE SCAP compares this information or parts of this information with the retrieved UE SCAP related information in order to be able to identify a manipulated or defect base station when a comparison fails to match.Type: GrantFiled: August 25, 2008Date of Patent: December 31, 2013Assignee: Telefonaktiebolaget L M Ericssion (publ)Inventors: Karl Norrman, Bernard Smeets, Rolf Blom
-
Publication number: 20130291071Abstract: According to an aspect of the present invention there is provided a method of operating a communication device, the communication device being part of a group comprising two or more communication devices that share a subscription to a communication network. The method comprises receiving a group authentication challenge from the network, at least part of the group authentication challenge having been generated using group authentication information that is associated with the shared subscription. The device then generates a device specific response to the group authentication challenge using the group authentication information and device specific authentication information and sends the device specific response to the network. The device is for example a member of a machine-type communication device group.Type: ApplicationFiled: July 19, 2011Publication date: October 31, 2013Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Rolf Blom, Mats Näslund, Karl Norrman
-
Publication number: 20130268681Abstract: An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which receives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S-CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the INVITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept.Type: ApplicationFiled: March 13, 2013Publication date: October 10, 2013Inventors: Luis Barriga, Rolf Blom, Yi Cheng, Fredrik Lindholm, Mats Naslund, Karl Norrman
-
Patent number: 8555337Abstract: The present invention relates to fraud prevention and authentication of a device to a user. The method of authenticating a personal device according to the invention comprises a set up sequence, wherein at least a first preferred output format is selected by the user, and a device configuration verification sequence. In the device configuration verification sequence a checksum is calculated and converted to a user friendly output format based on the user selected preferred output format. In addition the checksum may be calculated based on variable, and user selectable, keying material. The personal device, after being authenticated according to the above, may be used to authenticate a second device.Type: GrantFiled: September 8, 2005Date of Patent: October 8, 2013Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Rolf Blom, Per-Olof Nerbrant, Mats Näslund
-
Patent number: 8549615Abstract: An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which receives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S-CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the INVITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept.Type: GrantFiled: December 1, 2008Date of Patent: October 1, 2013Assignee: Telefonaktiebolaget L M EricssonInventors: Luis Barriga, Rolf Blom, Yi Cheng, Fredrik Lindholm, Mats Naslund, Karl Norrman
-
Patent number: 8539564Abstract: A method of establishing keys for at least partially securing media plane data exchanged between first and second end users via respective first and second media plane network nodes. The method comprises sending session set-up signalling from said first end point towards said second end point, said session set-up signalling including a session key generated by said first end point. The set-up signalling is intercepted at a first signalling plane network node and a determination made as to whether or not a signalling plane key has already been established for securing the signalling plane between said first end point and said first signalling plane network node. If a signalling plane key has already been established, then a media plane key is derived from that signalling plane key, and the media plane key sent to said first media plane network node for securing the media plane between said first end user and said first media plane network node.Type: GrantFiled: March 4, 2009Date of Patent: September 17, 2013Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Mats Näslund, Rolf Blom, Yi Cheng, Fredrik Lindholm, Karl Norrman
-
Publication number: 20130104241Abstract: Devices for providing flexible control of rendering of protected media comprising first and second content objects are provided. An instruction database combines with traditional use of digital rights objects for determining, at rights parsing and instruction handler, conditions for rendering of first content object. Conditions may force the user to render second content objects or to input requested data and may adapt to environmental conditions exemplary relating to user profile, location, or time of day. A set of second content objects may be pre-determined and specified in provided instructions. User selection, from a list of second content objects, of a specified number of second content objects, provides for generation of a key enabling successful rendering of first content object.Type: ApplicationFiled: November 2, 2009Publication date: April 25, 2013Inventors: Rolf Blom, Per-Olof Nerbrant, Goran Selander, Clary Hallberg Dahlin
-
Patent number: 8429737Abstract: An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which receives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S-CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the INVITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept.Type: GrantFiled: December 1, 2008Date of Patent: April 23, 2013Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Luis Barriga, Rolf Blom, Yi Cheng, Fredrik Lindholm, Mats Naslund, Karl Norrman
-
Publication number: 20120322413Abstract: A method and apparatus to establish trust between two nodes in a communications network. A first node receives from a network node authentication data unique to the first node, which can be used to derive a compact representation of verification data for the first node. The first node also receives a certified compact representation of verification data of all nodes in the network. The first node derives trust information from the authentication data for the node, and sends to a second node a message that includes the trust information and part of the authentication data. The second node has its own copy of the certified compact representation of verification data of all nodes in the network, and verifies the authenticity of the message from the first node using the compact representation of verification data of all nodes in the network and the received trust information and authentication data.Type: ApplicationFiled: February 12, 2010Publication date: December 20, 2012Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Wassim Haddad, Rolf Blom, Mats Naslund
-
Patent number: 8275403Abstract: When a mobile terminal (10), having a basic identity module (12) operative according to a first security standard, initiates a service access, the home network (30) determines whether the mobile terminal has an executable program (14) configured to interact with the basic identity module for emulating an identity module according to the second security standard. If it is concluded that the mobile terminal has such an executable program, a security algorithm is executed at the home network (30) to provide security data according to the second security standard. At least part of these security data are then transferred, transparently to a visited network (20), to the mobile terminal (10). On the mobile terminal side, the executable program (14) is executed for emulating an identity module according to the second security standard using at least part of the transferred security data as input.Type: GrantFiled: July 16, 2010Date of Patent: September 25, 2012Assignee: Telefonaktiebolaget LM Ericsson (Publ)Inventors: Rolf Blom, Mats Näslund
-
Patent number: 8272063Abstract: A method for achieving a secure recording and storing of a recorded activity is based on an extended Digital Rights Management (DRM) system. A recording and storing procedure is initiated, in response to recognizing one or more triggers at a device hosted by a user equipment. On the basis of the one or more triggers a Rights Issuer is located, and a Recording and Storing Instruction (RSI) is retrieved from the RI, using an existing DRM standard. Based on the RSI, a trusted storage for storing the recorded activity is located, and one or more recording procedures, involving one or more recording equipments, are activated and managed by the device. Before the recorded content is forwarded to the trusted storage, a protected content is generated from the recorded content, according to content of the RSI.Type: GrantFiled: July 10, 2007Date of Patent: September 18, 2012Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Göran Selander, Rolf Blom
-
Patent number: 8261078Abstract: A method and arrangement is disclosed for providing a user, not previously having an individual subscription with a network operator, with credentials for secure access to network services. The arrangement includes a gateway, associated with a subscription for network services, having means for generating and exporting to a user entity personalized user security data derived from security data related to the subscription. In particular, the derivation of credentials is based on a function that is shared between network and gateway and further conveniently makes use of bootstrapping on keying material from the subscription authentication. Pre-registered user identities are assigned trusted users who, thereafter, can download credentials and authenticate for service access. The invention may be implemented at a public place for providing temporary visitors network access whereby trust may exemplary be established by presenting a credit card.Type: GrantFiled: June 9, 2006Date of Patent: September 4, 2012Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Luis Barriga, Rolf Blom, Mats Näslund
-
Publication number: 20120198527Abstract: A method of establishing keys for at least partially securing media plane data exchanged between first and second end users via respective first and second media plane network nodes. The method comprises sending session set-up signalling from said first end point towards said second end point, said session set-up signalling including a session key generated by said first end point. The set-up signalling is intercepted at a first signalling plane network node and a determination made as to whether or not a signalling plane key has already been established for securing the signalling plane between said first end point and said first signalling plane network node. If a signalling plane key has already been established, then a media plane key is derived from that signalling plane key, and the media plane key sent to said first media plane network node for securing the media plane between said first end user and said first media plane network node.Type: ApplicationFiled: March 4, 2009Publication date: August 2, 2012Inventors: Mats Näslund, Rolf Blom, Yi Cheng, Fredrik Lindholm, Karl Norrman
-
Publication number: 20120191970Abstract: A method of sending protected data from a sender unit to a receiver unit via an intermediate unit. The intermediate unit stores information associated with a certificate belonging to the receiver unit, and information associated with a certificate belonging to the intermediate unit, which has previously been signed by the receiver unit. The intermediate unit receives a request from the sender unit to send protected data to the receiver unit, and so it sends a response to the sender unit. The response includes the information associated with the certificate belonging to the receiver unit, which allows the sender unit to verify that the intermediate unit is authorised to receive data on behalf of the receiver unit. The intermediate unit then receives data from the sender unit that is protected using the information associated with the certificate belonging to the receiver unit for subsequent forwarding to the receiver unit.Type: ApplicationFiled: October 1, 2009Publication date: July 26, 2012Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Rolf Blom, Fredrik Lindholm, John Mattsson
-
Publication number: 20120166802Abstract: A method for establishing a security association between a client and a service node for the purpose of pushing information from the service node to the client, where the client and a key server share a base secret. The method comprises sending a request for generation and provision of a service key from the service node to a key server, the request identifying the client and the service node, generating a service key at the key server using the identities of the client and the service node, the base secret, and additional information, and sending the service key to the service node together with said additional information, forwarding said additional information from the service node to the client, and at the client, generating said service key using the received additional information and the base key. A similar approach may be used to provide p2p key management.Type: ApplicationFiled: January 11, 2012Publication date: June 28, 2012Applicant: Telefonaktiebolaget LM EricssonInventors: Rolf BLOM, Karl Norrman
-
Patent number: 8196194Abstract: In a procedure for delivering streaming media, a Client first requests the media from an Order Server. The Order Server authenticates the Client and sends a ticket to the Client. Then, the Client sends the ticket to a Streaming Server. The Streaming Server checks the ticket for validity and if found valid encrypts the streaming data using a standardized real-time protocol such as the SRTP and transmits the encrypted data to the Client. The Client receives the data and decrypts them. Copyrighted material adapted to streaming can be securely delivered to the Client. The robust protocol used is very well suited for in particular wireless clients and similar devices having a low capacity such as cellular telephones and PDAs.Type: GrantFiled: September 30, 2010Date of Patent: June 5, 2012Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Fredrik Lindholm, Rolf Blom, Karl Norrman, Göran Selander, Mats Näslund
-
Publication number: 20120096560Abstract: In a method of enabling Digital Rights Management (DRM) of content in a communications network supporting a DRM system a first user equipment (RMUE), is registering with a first rights issuer of the DRM system from which a delegation assertion, authorizing the RMUE to become a private rights issuer, is retrieved. RMUE retrieves a first, signed rights object from the first rights issuer, that contains a first set of rights for the RMUE to DRM protect private content and to issue at least one second rights object, associated with the private content. DRM protection is then applied on private content, obtained by the RMUE, according to at least the first set of rights. RMUE issues a second rights object, defining a second set of rights for rendering the private content, according to the first set of rights.Type: ApplicationFiled: June 19, 2008Publication date: April 19, 2012Applicant: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Göran Selander, Rolf Blom, Steinar Dahlin, Clary Hallberg Dahlin