Patents by Inventor Tomas Goldbeck-Lowe
Tomas Goldbeck-Lowe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10091680Abstract: Methods and apparatus are provided for collecting and detecting service area (SA) swapping noise in a wireless network including a plurality of SAs serving a plurality of devices. By receiving SA updates from the stationary devices of the plurality of devices changes in SA identifiers of the SA updates associated with each stationary device are detected. For each stationary device, if two or more SAs are detected to have changed for the stationary device, then these SAs are identified as contributing to SA swapping noise. With this in mind, SA transitions between the identified SAs for a non-stationary device of the plurality of devices are not interpreted as movement of the non-stationary device. However, SA transitions for the non-stationary device from these SAs to other SAs not contributing to SA swapping noise are interpreted as a change of location or movement of the non-stationary device.Type: GrantFiled: September 21, 2012Date of Patent: October 2, 2018Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Julien Forgeat, Richard Carlsson, Tomas Goldbeck-Löwe
-
Patent number: 9445391Abstract: Methods are provided for filtering, collecting, and analyzing location data for a plurality of devices in a wireless network. Location data for one or more devices is received, for each device the location data includes a unique identifier. Whether the devices belong to the group of devices is determined based on the unique identifier. The location data of devices determined to belong to the group of devices are stored and used in the mobility analysis and the results distributed accordingly. A relevancy analysis may be performed on the stored location data of devices determined to belong to the group of devices in which device information is generated that is associated with devices not belonging to the group of devices. The device information is fed back to determine whether the devices belong to the group of devices based on the unique identifier.Type: GrantFiled: September 21, 2012Date of Patent: September 13, 2016Assignee: TELEFONAKTIEBOLAGET L M. ERICSSONInventors: Richard Carlsson, Tomas Goldbeck-Löwe, Sky Zhao
-
Publication number: 20160191510Abstract: A tamper-resistant security device, such as a subscriber identity module or equivalent, has an AKA (Authentication and Key Agreement) module for performing an AKA process with a security key stored in the device, as well as means for external communication. The tamper-resistant security device includes an application that cooperates with the AKA module and an internal interface for communications between the AKA module and the application. The application cooperating with the AKA module is preferably a security and/or privacy enhancing application. For increased security, the security device may also detect whether it is operated in its normal secure environment or a foreign less secure environment and set access rights to resident files or commands that could expose the AKA process or corresponding parameters accordingly.Type: ApplicationFiled: March 4, 2016Publication date: June 30, 2016Inventors: Mats Näslund, Tomas Goldbeck-Löwe, Karl Norrman
-
Patent number: 9282095Abstract: A tamper-resistant security device, such as a subscriber identity module or equivalent, has an AKA (Authentication and Key Agreement) module for performing an AKA process with a security key stored in the device, as well as means for external communication. The tamper-resistant security device includes an application that cooperates with the AKA module and an internal interface for communications between the AKA module and the application. The application cooperating with the AKA module is preferably a security and/or privacy enhancing application. For increased security, the security device may also detect whether it is operated in its normal secure environment or a foreign less secure environment and set access rights to resident files or commands that could expose the AKA process or corresponding parameters accordingly.Type: GrantFiled: June 19, 2014Date of Patent: March 8, 2016Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Mats Näslund, Karl Norrman, Tomas Goldbeck-Löwe
-
Publication number: 20150237596Abstract: Methods are provided for filtering, collecting, and analysing location data for a plurality of devices in a wireless network. Location data for one or more devices is received, for each device the location data includes a unique identifier. Whether the devices belong to the group of devices is determined based on the unique identifier. The location data of devices determined to belong to the group of devices are stored and used in the mobility analysis and the results distributed accordingly. A relevancy analysis may be performed on the stored location data of devices determined to belong to the group of devices in which device information is generated that is associated with devices not belonging to the group of devices. The device information is fed back to determine whether the devices belong to the group of devices based on the unique identifier.Type: ApplicationFiled: September 21, 2012Publication date: August 20, 2015Applicant: Telefonaktiebolaget L M Ericsson (publ)Inventors: Richard Carlsson, Tomas Goldbeck-Löwe, Sky Zhao
-
Publication number: 20150230115Abstract: Methods and apparatus are provided for collecting and detecting service area (SA) swapping noise in a wireless network including a plurality of SAs serving a plurality of devices. By receiving SA updates from the stationary devices of the plurality of devices changes in SA identifiers of the SA updates associated with each stationary device are detected. For each stationary device, if two or more SAs are detected to have changed for the stationary device, then these SAs are identified as contributing to SA swapping noise. With this in mind, SA transitions between the identified SAs for a non-stationary device of the plurality of devices are not interpreted as movement of the non-stationary device. However, SA transitions for the non-stationary device from these SAs to other SAs not contributing to SA swapping noise are interpreted as a change of location or movement of the non-stationary device.Type: ApplicationFiled: September 21, 2012Publication date: August 13, 2015Inventors: Julien Forgeat, Richard Carlsson, Tomas Goldbeck-Löwe
-
Patent number: 8873498Abstract: One aspect pertains to a method of enabling an Evolved Packet Core (EPC) network to implement predetermined Quality of Service (QoS) resource policies applied to subscriber/service groups operating via the network. The method comprises receiving a request for QoS resources to be provided to a bearer for traffic of a user of a subscriber/service group from which the request originated. A Resource Class (RC) parameter is assigned to the request. The RC parameter identifies a resource partition and the originating subscriber/service group, A Gx-Request that includes the RC parameter is forwarded to the EPC network to invoke application of the requested QoS resources so as to establish a bearer in accordance with the predetermined policies identifiable from the RC. Other aspects pertain to EPC network nodes configured accordingly.Type: GrantFiled: July 2, 2010Date of Patent: October 28, 2014Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Zoltán Richárd Turányi, Hans Eriksson, Tomas Goldbeck-Löwe
-
Publication number: 20140304768Abstract: A tamper-resistant security device, such as a subscriber identity module or equivalent, has an AKA (Authentication and Key Agreement) module for performing an AKA process with a security key stored in the device, as well as means for external communication. The tamper-resistant security device includes an application that cooperates with the AKA module and an internal interface for communications between the AKA module and the application. The application cooperating with the AKA module is preferably a security and/or privacy enhancing application. For increased security, the security device may also detect whether it is operated in its normal secure environment or a foreign less secure environment and set access rights to resident files or commands that could expose the AKA process or corresponding parameters accordingly.Type: ApplicationFiled: June 19, 2014Publication date: October 9, 2014Inventors: Mats NÄSLUND, Karl Norrman, Tomas Goldbeck-Löwe
-
Publication number: 20130176975Abstract: One aspect pertains to a method of enabling an Evolved Packet Core (EPC) network to implement predetermined Quality of Service (QoS) resource policies applied to subscriber/service groups operating via the network. The method comprises receiving a request for QoS resources to be provided to a bearer for traffic of a user of a subscriber/service group from which the request originated. A Resource Class (RC) parameter is assigned to the request. The RC parameter identifies a resource partition and the originating subscriber/service group, A Gx-Request that includes the RC parameter is forwarded to the EPC network to invoke application of the requested QoS resources so as to establish a bearer in accordance with the predetermined policies identifiable from the RC. Other aspects pertain to EPC network nodes configured accordingly.Type: ApplicationFiled: July 2, 2010Publication date: July 11, 2013Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Zoltán Richárd Turányi, Hans Eriksson, Tomas Goldbeck-Löwe
-
Patent number: 8467300Abstract: The basic concept of the present invention is to utilize the terminal as an auxiliary information collector in networks where the regular network-based information collection is not possible and/or for providing information that complements the information that the network-based Access Awareness Entity collects by itself. The terminal collects information related to the access network directly, through retrieval of explicitly available information, and indirectly, through measurements and statistics. The collected information is delivered to the network-based Access Awareness Entity.Type: GrantFiled: October 18, 2007Date of Patent: June 18, 2013Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Johan Rune, Tomas Goldbeck-Lowe, Tony Larsson, Mattias Pettersson
-
Publication number: 20100316018Abstract: A method of performing network-based handover control in respect of a mobile node 1 having multi-access capabilities, wherein IP packets are routed to and from the mobile node using a Mobile IP protocol. The method comprises informing a Home Agent 4 within a home network of two or more care-of-addresses available to a mobile node 1, at the Home Agent 4, selecting one of said care-of-addresses, and informing the mobile node of the selection, at the mobile node, performing a handover to the selected care-of-address, and at the Home Agent binding the selected care-of-address to a home address of the mobile node.Type: ApplicationFiled: December 14, 2006Publication date: December 16, 2010Inventors: Zoltan Richard Turanyi, Tomas Goldbeck-Lowe, Gunnar Nilsson Cassel
-
Publication number: 20100214955Abstract: The basic concept of the present invention is to utilize the terminal as an auxiliary information collector in networks where the regular network-based information collection is not possible and/or for providing information that complements the information that the network-based Access Awareness Entity collects by itself. The terminal collects information related to the access network directly, through retrieval of explicitly available information, and indirectly, through measurements and statistics. The collected information is delivered to the network-based Access Awareness Entity.Type: ApplicationFiled: October 18, 2007Publication date: August 26, 2010Inventors: Johan Rune, Tomas Goldbeck-Lowe, Tony Larsson, Mattias Pettersson
-
Publication number: 20090313379Abstract: A method, infrastructure node (11, 12, 202), and mobile node (1) arranged to hide topology information from the user and mobile node by translating topology information to non-topology related address information and using session management messages of a first communication protocol as bearer for Internet Protocol mobility messages relating to a second communication protocol.Type: ApplicationFiled: July 3, 2006Publication date: December 17, 2009Applicant: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)Inventors: Gunnar Rydnell, Tomas Goldbeck-Löwe, Stefan Rommer
-
Publication number: 20060288407Abstract: The invention generally relates to a tamper-resistant security device, such as a subscriber identity module or equivalent, which has an AKA (Authentication and Key Agreement) module for performing an AKA process with a security key stored in the device, as well as means for external communication. The idea according to the invention is to provide the tamper-resistant security device with an application adapted for cooperating with the AKA module and means for interfacing the AKA module and the application. The application cooperating with the AKA module is preferably a security and/or privacy enhancing application. The application is advantageously a software application implemented in an application environment of the security device.Type: ApplicationFiled: September 17, 2003Publication date: December 21, 2006Inventors: Mats Naslund, Karl Norman, Tomas Goldbeck-Lowe