Patents by Inventor Rolf Blom

Rolf Blom has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110010768
    Abstract: An IMS system includes an IMS initiator user entity. The system includes an IMS responder user entity that is called by the initiator user entity. The system includes a calling side S-CSCF in communication with the caller entity which receives an INVITE having a first protection offer and parameters for key establishment from the caller entity, removes the first protection offer from the INVITE and forwards the INVITE without the first protection offer. The system includes a receiving end S-CSCF in communication with the responder user entity and the calling side S-CSCF which receives the INVITE without the first protection offer and checks that the responder user entity supports the protection, inserts a second protection offer into the INVITE and forwards the INVITE to the responder user entity, wherein the responder user entity accepts the INVITE including the second protection offer and answers with an acknowledgment having a first protection accept.
    Type: Application
    Filed: December 1, 2008
    Publication date: January 13, 2011
    Applicant: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Luis Barriga, Rolf Blom, Yi Cheng, Fredrik Lindholm, Mats Naslund, Karl Norrman
  • Publication number: 20100316223
    Abstract: A security key, K_eNB, for protecting RRC/UP traffic between a User Equipment, UE, and a serving eNodeB is established by a method and an arrangement in a Mobility Management Entity, MME, and in said UE, of an Evolved Packet System, EPS. The MME and the UE derives the security key, K_eNB, from at least an NAS uplink sequence number, NAS_U_SEQ, sent from the UE to the MME, and from an Access Security Management Entity-key, K_ASME, shared between the MME and the UE.
    Type: Application
    Filed: May 20, 2008
    Publication date: December 16, 2010
    Applicant: TELEFONAKTIEBOLAGET L M ERICSSON
    Inventors: Rolf Blom, Gunnar Mildh, Karl Norrman
  • Publication number: 20100268937
    Abstract: A method and arrangement is disclosed for managing session keys for secure communication between a first and at least a second user device in a communications network. The method is characterized being independent of what type of credential each user device implements for security operations. A first user receives from a first key management server keying information and a voucher and generates a first session key. The voucher is forwarded to at least a responding user device that, with support from a second key management server communicating with the first key management server, resolves the voucher and determines a second session keys. First and second session keys are, thereafter, used for secure communication. In one embodiment the communication traverses an intermediary whereby first and second session keys protect communication with respective leg to intermediary.
    Type: Application
    Filed: November 30, 2007
    Publication date: October 21, 2010
    Applicant: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Rolf Blom, Yi Cheng, Fredrik Lindholm, John Mattsson, Mats Naslund, Karl Norrman
  • Publication number: 20100267363
    Abstract: In a method and a system for providing secure communication in a cellular radio system radio base station key is generated by determining a set of data bits known to both the UE and the radio base station, and creating the radio base station key in response to the determined set of data.
    Type: Application
    Filed: July 1, 2008
    Publication date: October 21, 2010
    Inventors: Rolf Blom, Magnus Lindstrom, Karl Norrman
  • Publication number: 20100195829
    Abstract: A communications apparatus includes a mobile device. The apparatus includes a receiver for receiving at the mobile device a plurality of signals carrying information including received signals which provides randomly varying data related to location of the mobile device. The apparatus includes a random number generator which generates a random number as a function of the data. The apparatus includes acryptographickey generator which generates a cryptographic key using the random number. A method to establish at a mobile device a random number for cryptographic operations includes the steps of receiving at the mobile device a plurality of signals carrying information including received signals which provides randomly varying data related to location of the mobile device. There is the step of estimating signal entropy for at least one of the received signals in dependence of location where the signals are received by the mobile device.
    Type: Application
    Filed: April 26, 2008
    Publication date: August 5, 2010
    Inventors: Rolf Blom, Mats Naslund
  • Patent number: 7724898
    Abstract: A cryptographic method is described. The method comprises storing binary data representing at least a portion of a field element of an odd-characteristic finite field GF(pk) in a register, p being an odd prime number, the field element comprising k coefficients in accordance with a polynomial-basis representation, the binary data comprising plural groups of data bits, wherein each group of data bits represents an associated one of the k coefficients and processing the binary data in accordance with a cryptographic algorithm such that the plural groups of data bits are processed in parallel. An apparatus comprising a memory and a processing unit coupled to the memory to carry out the method is also described.
    Type: Grant
    Filed: October 17, 2002
    Date of Patent: May 25, 2010
    Assignee: Telefonaktiebolaget L M Ericsson (Publ)
    Inventors: Mats Näslund, Rolf Blom
  • Publication number: 20100111272
    Abstract: A broker node is provided, acting as an intermediate administrator for all operators during service content distribution. A content provider has a single relation to the broker. This broker has in turn relations to a number of other operators. The content provider provides the communication content. A list of targeted users or subscribers is compiled by the broker. Preferably, the broker collects necessary subscriber attributes, such as position, device information and access properties, from the other operators. The communication content is preferably modified according to the collected attributes and the content can subsequently be delivered to the subscribers in a best possible way. The broker collects payment from the subscribers and reimburses the media content supplier. In a first aspect, the broker is a distributor and payment administrator for service content. In another aspect, the broker is a mediator of use of inter-operator relations to a third-party content provider.
    Type: Application
    Filed: January 11, 2010
    Publication date: May 6, 2010
    Applicant: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Steinar Dahlin, Rolf Blom, Jerker Widmark
  • Patent number: 7681050
    Abstract: A device (e.g., mobile device) and method are described herein that can protect data stored in a rewritable openly accessible memory from replay attacks by using an integrity key and an encryption key to en/decrypt the data, integrity protect the data via a MAC calculation, and verify the data.
    Type: Grant
    Filed: December 1, 2005
    Date of Patent: March 16, 2010
    Assignee: Telefonaktiebolaget L M Ericsson (Publ)
    Inventors: Rolf Blom, Christian Gehrmann
  • Patent number: 7660417
    Abstract: A basic idea according to the invention is to enhance or update the basic cryptographic security algorithms by an algorithm-specific modification of the security key information generated in the normal key agreement procedure of the mobile communication system. For communication with the mobile terminal, the network side normally selects an enhanced version of one of the basic cryptographic security algorithms supported by the mobile, and transmits information representative of the selected algorithm to the mobile terminal. The basic security key resulting from the key agreement procedure (AKA, 10) between the mobile terminal and the network is then modified (22) in dependence on the selected algorithm to generate an algorithm-specific security key. The basic security algorithm (24) is then applied with this algorithm-specific security key as key input to enhance security for protected communication in the mobile communications network.
    Type: Grant
    Filed: September 10, 2004
    Date of Patent: February 9, 2010
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Rolf Blom, Näslund Mats, Jari Arkko
  • Publication number: 20090307748
    Abstract: The present invention relates to fraud prevention and authentication of a device to a user. The method of authenticating a personal device according to the invention comprises a set up sequence, wherein at least a first preferred output format is selected by the user, and a device configuration verification sequence. In the device configuration verification sequence a checksum is calculated and converted to a user friendly output format based on the user selected preferred output format. In addition the checksum may be calculated based on variable, and user selectable, keying material. The personal device, after being authenticated according to the above, may be used to authenticate a second device.
    Type: Application
    Filed: September 8, 2005
    Publication date: December 10, 2009
    Inventors: Rolf Blom, Per-Olof Nerbrant, Mats Näslund
  • Publication number: 20090199001
    Abstract: A method and arrangement is disclosed for providing a user, not previously having an individual subscription with a network operator, with credentials for secure access to network services. The arrangement includes a gateway, associated with a subscription for network services, having means for generating and exporting to a user entity personalized user security data derived from security data related to the subscription. In particular, the derivation of credentials is based on a function that is shared between network and gateway and further conveniently makes use of bootstrapping on keying material from the subscription authentication. Pre-registered user identities are assigned trusted users who, thereafter, can download credentials and authenticate for service access. The invention may be implemented at a public place for providing temporary visitors network access whereby trust may exemplary be established by presenting a credit card.
    Type: Application
    Filed: June 9, 2006
    Publication date: August 6, 2009
    Inventors: Luis Barriga, Rolf Blom, Mats Naslund
  • Publication number: 20090068998
    Abstract: A solution making it possible for one telecommunication network operator (10?) to act as intermediate distributor or administrator of a content provider (60) for a multitude of operators (20) is presented. The content provider (60) has a single relation to the central operator (10?), in turn having relations to other operators (20). It is thus possible for the content provider (60) to reach all users (30) of all operators (10?, 20) through a single relation to that operator (10?). The content provider (60) provides service content, e.g. media content. A list of targeted users (30) or subscribers is compiled. The central operator (10?) collects necessary subscriber attributes (80), such as position, device information and access properties, from the other operators (20). The content is modified according to the collected attributes (80), and the content is distributed to the subscribers (30) in the best possible way.
    Type: Application
    Filed: April 1, 2005
    Publication date: March 12, 2009
    Inventors: Jerker Widmark, Rolf Blom, Steinar Dahlin, Clary Hallberg Dahlin
  • Publication number: 20080273704
    Abstract: A method of delivering an application key or keys to an application server for use in securing data exchanged between the application server and a user equipment, the user equipment accessing a communications network via an access domain. The method comprises running an Authentication and Key Agreement procedure between the user equipment and a home domain in order to make keying material available to the user equipment and to an access enforcement point. At least a part of said keying material is used to secure a communication tunnel between the user equipment and the access enforcement point, and one or more application keys are derived within the home domain using at least part of said keying material. Said application key(s) is(are) provided to said application server, and the same application key(s) derived at the user equipment, wherein said access enforcement point is unable to derive or have access to said application key(s).
    Type: Application
    Filed: July 11, 2006
    Publication date: November 6, 2008
    Inventors: Karl Norrman, Rolf Blom, Fredrik Lindholm
  • Patent number: 7382881
    Abstract: A method of facilitating the lawful interception of an IP session between two or more terminals 12,13, wherein session uses encryption to secure traffic. The method includes storing a key allocated to at least one of terminals 12,13 or to at least one of the subscribers using one of the terminals 12,13, at the terminal 12,13 and at a node 5,8 within a network 1,6 through which session is conducted, or a node coupled to that network. Prior to the creation of session, a seed value is exchanged between the terminal 12,13 at which the key is stored and node 5,8. The key and the seed value are used at both the terminal 12,13 and the node 5,8 to generate a pre-master key. The pre-master key becomes known to each of the terminals 12,13 involved in the IP session and to the network node 5,8. The pre-master key is used, directly or indirectly, to encrypt and decrypt traffic associated with IP session.
    Type: Grant
    Filed: December 6, 2002
    Date of Patent: June 3, 2008
    Assignee: Telefonaktiebolaget L M Ericsson (Publ)
    Inventors: Ilkka Uusitalo, Pasi Ahonen, Rolf Blom, Boman Krister, Mats Näslund
  • Publication number: 20080095362
    Abstract: An authentication server and a system and method for managing cryptographic keys across different combinations of user terminals, access networks, and core networks. A Transformation Coder Entity (TCE) creates a master key (Mk), which is used to derive keys during the authentication procedure. During handover between the different access types, the Mk or a transformed Mk is passed between two nodes that hold the key in the respective access networks when a User Equipment (UE) terminal changes access. The transformation of the Mk is performed via a one-way function, and has the effect that if the Mk is somehow compromised, it is not possible to automatically obtain access to previously used master keys. The transformation is performed based on the type of authenticator node and type of UE/identity module with which the transformed key is to be utilized. The Mk is never used directly, but is only used to derive the keys that are directly used to protect the access link.
    Type: Application
    Filed: September 19, 2007
    Publication date: April 24, 2008
    Inventors: Rolf Blom, Karl Norrman, Mats Naslund
  • Patent number: 7298840
    Abstract: A method of authenticating a message (111) received via a transmission channel (108) using a Message Authentication Code (MAC). The message comprises a message body (114) and a tag (116) and the method comprises the steps of generating a second tag (115) according to a MAC function (112) on the basis of the received message body and a secret key (113), calculating a distance (117) between the received tag and generated second tag, and comparing (118) the calculated distance with a predetermined threshold value.
    Type: Grant
    Filed: April 9, 2002
    Date of Patent: November 20, 2007
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Christian Gehrmann, Rolf Blom
  • Publication number: 20070230707
    Abstract: A method and an arrangement for providing keys for protecting communication between a terminal (300) and service points in a communication network. A basic key (Ik) is first established with a service control node (304) when the terminal has entered the network. An initial modified key (Ik1) is then created in both the service control node and the terminal, by applying a predetermined first function (f) to at least the basic key and an initial value of a key version parameter (v). The initial modified key is sent to a first service point (302), such that it can be used to protect communication between the terminal and the first service point. When the terminal switches to a second service point (306), the first service point and the terminal both create a second modified key (Ik2) by applying a predetermined second function (g) to the initial modified key, and the first service point sends the second modified key to the second service point.
    Type: Application
    Filed: March 22, 2007
    Publication date: October 4, 2007
    Applicant: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Rolf Blom, Karl Norrman, Mats Naslund
  • Publication number: 20070192602
    Abstract: A system and method for preventing unauthorized duplication of an identity module, IM, and authenticating valid IMs. Different information is stored in the IM and an authentication center, AuC, and if the information in the AuC is leaked, it is insufficient to clone the IM. The IM generates a first key, K1, and a second key, K2, while assuring that K1 cannot be derived from K2, and optionally that K2 cannot be derived from K1. The IM exports K2 and an identifier to the AuC while keeping K1 secret within the IM. During authentication, the IM provides to a third party such as a VLR, information containing the identifier. The VLR forwards the information to the AuC, which retrieves K2 based on the identifier and generates a first value, R, and a second value, X, based on at least K2. The AuC then returns R and X to the VLR, which forwards R to the IM. The IM then generates a response, RES, based on at least K1 and R, and sends the RES to the VLR. The VLR then verifies the RES based on X.
    Type: Application
    Filed: December 16, 2005
    Publication date: August 16, 2007
    Applicant: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Rolf Blom, Mats Naslund
  • Publication number: 20070160201
    Abstract: The invention provides an establishment of a secret session key shared Between two network elements (NEa, NEb) belonging to different network domains (NDa, NDb). A first network element (NEa) of a first network domain (NDa) requests security parameters from an associated key management center (KMC) (AAAa). Upon reception of the request, the KMC (AAAa) generates a freshness token (FRESH) and calculates the session key (K) based on this token (FRESH) and a master key (KAB) shared with a second network domain (NDb). The security parameters are (securely) provided to the network element (NEa), which extracts the session key (K) and forwards the freshness token (FRESH) to the KMC (AAAb) of the second domain (NDb) through a second network element (NEb). Based on the token (FRESH) and the shared master key (KAB), the KMC (AAAb) generates a copy of the session key (K), which is (securely) provided to the second network element (NEb).
    Type: Application
    Filed: February 11, 2004
    Publication date: July 12, 2007
    Applicant: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)
    Inventors: Rolf Blom, Mats Naslund, Elisabetta Carrara, Fredrik Lindholm, Karl Norrman
  • Patent number: 7243292
    Abstract: Binary data representing a code word of an error-correcting code is used for calculating a syndrome, wherein a given portion of the binary data comprises k groups of data bits and represents a field element of the finite field GF(pk), p being an odd prime number, the field element comprising k coefficients in accordance with a polynomial basis representation, each group of data bits of the given portion representing a corresponding one of the k coefficients. The given portion, is stored in a first general purpose register and is processed such that the k groups of data bits of the given portion are processed in parallel; determining whether the syndrome is equal to zero; and detecting and correcting errors in the binary data if the syndrome is not equal to zero.
    Type: Grant
    Filed: October 17, 2002
    Date of Patent: July 10, 2007
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Mats Näslund, Rolf Blom