EP1574007A1 - Automatische anschlussbezogene terminal- oder nutzerauthentifizierung in kommunikationsnetzen - Google Patents
Automatische anschlussbezogene terminal- oder nutzerauthentifizierung in kommunikationsnetzenInfo
- Publication number
- EP1574007A1 EP1574007A1 EP03782462A EP03782462A EP1574007A1 EP 1574007 A1 EP1574007 A1 EP 1574007A1 EP 03782462 A EP03782462 A EP 03782462A EP 03782462 A EP03782462 A EP 03782462A EP 1574007 A1 EP1574007 A1 EP 1574007A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- network
- unique
- connection
- authentication unit
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000004891 communication Methods 0.000 title description 2
- 238000000034 method Methods 0.000 claims abstract description 41
- 238000001514 detection method Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 230000003068 static effect Effects 0.000 claims description 2
- 238000012384 transportation and delivery Methods 0.000 description 6
- 230000007717 exclusion Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 201000009032 substance abuse Diseases 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4535—Network directories; Name-to-address mapping using an address exchange platform which sets up a session between two nodes, e.g. rendezvous servers, session initiation protocols [SIP] registrars or H.323 gatekeepers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/41—Billing record details, i.e. parameters, identifiers, structure of call data record [CDR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/43—Billing software details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/46—Real-time negotiation between users and providers or operators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/82—Criteria or parameters used for performing billing operations
- H04M15/8207—Time based data metric aspects, e.g. VoIP or circuit switched packet data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0164—Billing record, e.g. Call Data Record [CDR], Toll Ticket[TT], Automatic Message Accounting [AMA], Call Line Identifier [CLI], details, i.e. parameters, identifiers, structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/56—On line or real-time flexible agreements between service providers and telecoms operators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/78—Metric aspects
- H04M2215/7813—Time based data, e.g. VoIP or circuit switched packet data
Definitions
- the present invention relates to automatic terminal or user identification in networks, in particular in the network of the Internet, and in particular to a method for automatically detecting an access right to protected areas in networks, in particular in the network of the Internet, the term protected area not being any freely available transactions.
- access rights for the transactions must be ensured to the exclusion of unauthorized persons, and on the other hand, the data must be securely transmitted.
- the present invention addresses the first of these problems, namely, checking whether a terminal that carries out transactions to the exclusion of unauthorized persons also has access rights for it.
- a common method of identifying a terminal or user for the delivery of a certain service is to request a user name and password.
- Such a procedure in which a user name and password is requested provides a relatively high degree of safety with regard to the identification 'of the user.
- users nowadays often write down user names and passwords because they have to manage too many passwords or pins, e.g. for access to their own computer, account card, credit card etc.
- writing it down is known to pose a security risk.
- For the corresponding provider of the service This also means that a correspondingly powerful customer data management system is provided, which usually requires manual maintenance.
- the recipient of the service registers with him in any way.
- the customer with the open call-by-cal! or anonymously for the network operator (provider) in the case of an open internet by call.
- the network operator is only the call number, i.e. a unique connection identifier of an otherwise anonymous customer, the destination number and the duration of the call.
- these data are usually transmitted to the customer's telephone company, for example DeutscheInstitut AG, for collection.
- the customer can remain completely anonymous for the provider of a certain service, since apart from the unique connection identifier no further information about the customer is required.
- the object of the present invention is therefore to enable automatic identification of access rights to protected areas in networks, in particular on the Internet.
- this object is achieved in a method for automatically detecting an access right to protected areas in a first network using a unique connection identifier of a second network, in particular in the network network of the Internet, with the following method steps: dynamic or static assignment of a unique identifier of the first network for one Terminal, at or before its connection structure with the first network, storing a combination of at least the unique connection identifier of the second network and the unique identifier of the first network in an authentication unit, querying the authentication unit to determine the unique connection identifier of the second network based on the unique identifier of the first network when the terminal is open want to access the protected area, check whether there is an access right for the protected area for the unique connection identifier of the second network.
- the present method thus enables secure automatic detection of access rights to protected areas in networks based on the identifiers from two different networks. It is not necessary to register in advance using a user name and password and to provide personal information. However, even when accessing areas which additionally require registration, such as databases subject to a charge, the method according to the invention enables access only from certain network elements, in particular certain telephone connections (both mobile and landline networks), which is possible Abuses even in the event of loss or deliberate disclosure of username and password.
- the combination stored in the current authentication unit contains additional data, such as the dial-in number in the network, a user name (login) and / or a password.
- This data can enable an even better identification of the terminal, whereby in particular the user name and password can be generated automatically when dialing into the network.
- the authentication unit is only managed temporarily, so that it is essentially a dynamic unit.
- the combination is on
- the unique identifier of the second network is a call number.
- the protected area preferably includes the provision of an online individual connection proof, so that the user of call-by-call or internet-by-call services can access his connection proof without having to register beforehand.
- the individual connection verification is carried out automatically for the unique connection identification of the terminal.
- further input at the user's terminal is necessary before releasing a single connection proof, in order to ensure that not every terminal that has access to a specific network element or a specific telephone connection can also call up the connection proofs of this connection.
- the further input includes the entry of a bill and / or customer number of the telephone company, and or a PIN.
- the protected area comprises at least one of the following services: provision of data (fee-based databases), electronic commerce (e-commerce) and payment.
- e-commerce electronic commerce
- payment amounts of money can be billed, for example, via a customer's telephone bill, e.g. the one-off billing of a small amount for reading a certain newspaper article on the Internet.
- the costs incurred by the payment service are preferably automatically billed using the unique connection identifier.
- connection number or SIM card address in the protected area based on the unique connection identifier of the second network, such as the connection number or SIM card address, other terminal data is automatically called up and / or further procedural steps initiated.
- the additional data can result, for example, from a pre-registration under the unique connection identifier.
- Such additional data is particularly useful in the e-commerce area, where delivery and billing addresses may have to be entered.
- process steps z. B. an automatic processing of an order.
- the method according to the invention can also be used in combination with the known authentication with user name and password in order to achieve even higher data security.
- the object on which the invention is based is also achieved in a method for providing data for automatic detection of access rights to protected areas in networks, in particular in the network network of the Internet, with the following method steps: providing at least one unique identifier from at least two different networks during there is a connection to both networks, storing a combination of the different identifiers in a dynamic authentication unit, outputting and / or authenticating one of the unique identifiers, in the event of a corresponding request for the other unique identifiers, deleting the data from the dynamic authentication unit as soon as a connection with at least one of the two networks has ended.
- the method according to the invention provides a dynamic Identification unit of terminals currently in the network, which enables a terminal to be identified on the basis of its unique identifier from both networks.
- the authentication unit is managed in real time so that the stored data is only kept as long as the terminal is in the network. After the connection is terminated, the data will be deleted immediately to prevent misuse.
- At least one of the identifiers is preferably an IP number and / or a unique connection identifier of a terminal.
- additional data for the combination mentioned above are stored in the current authentication unit. These can include, for example, the dial-in number, a user name (login) and a password. These additional data provide an even higher level of identification security.
- a call number block or a destination number block can be identified via the authentication unit or the output identifier.
- Fig. 1 is a schematic system overview for an open intemet-by-call
- IP Internet protocol
- the data relevant for billing the call is recorded by the provider and forwarded to DTAG for collection.
- DTAG provides the provider with information about which data records were billed on which invoice number (invoice number, customer number and invoice date) without the provider knowing the customer's personal details.
- DTAG does not list the customer's individual Internet-by-call calls on their invoices, which, however, the customer can, as described below, query online.
- the system described below with reference to FIG. 1 enables automatic connection-related authentication of a customer in order to enable access to an online individual connection proof from an Internet by call provider.
- Block 1 in FIG. 1 represents the telecommunication network outside the provider's network.
- the call is dialed and the call is transferred to the POI of the Internet-by-call provider.
- the system of the network provider is represented by a dashed box 2 in FIG. 1.
- Block 4 in FIG. 1 represents a switch in which the data relevant to the billing of the customer is generated.
- customer data which are referred to as call data records (CDR)
- CDR call data records
- These data are forwarded in the provider's network to a calculation system in block 6, which calculates the costs for the respective call.
- the calculated costs are transmitted to the DTAG in block 8, stating the unique connection identifier.
- DTAG subsequently bills these costs to the customer of the respective connection of the unique connection identifier and delivers data relating to the billing back to the calculation system in block 6.
- This data contains, for example, the invoice number, the customer number and the invoice date.
- the customer's personal data are not included.
- the calculated costs are transmitted from block 6 together with the CDR data to an internal database server in block 10. This transmission can take place immediately or only after receipt of the invoice data by DTAG. If the data is transmitted immediately, the invoice data returned later by DTAG will be checked after receipt. March
- the switch in block 4 forwards part of the CDR data, namely the unique connection identifier and the dial-in number, to a modem bank in block 12, where the call is terminated.
- the data is transmitted from the modem bank in block 12 to a server in block 14.
- a current IP address for the call is distributed there.
- the current IP address, as well as the associated unique connection identifier and the dial-in number are then forwarded to an authentication unit in block 16.
- the switch in block 4 tells the modem bank in block 12 that the call is ended.
- the corresponding space at the modem bank is released and the modem bank informs the server in block 14, stating the corresponding IP address, that the call has ended.
- the server in block 14 transmits this information immediately to the authentication unit, in which the data from the IP address, unique connection identifier and dial-in number are deleted immediately.
- the authentication unit thus contains a dynamic database in which only current authentication data is stored, i.e. Data relating to a current connection between a customer's line (unique line identifier) and a dial-in point of the network (dial-in number) and the dynamically assigned IP address. This particular combination of data is only saved as long as there is an actual connection to a customer connection.
- a customer now wants to view his billing data online, he will call up the corresponding website in the provider's network, which has access to the database server in block 10, via a web interface in block 20.
- the database server 10 is indeed informed of the customer's currently assigned IP number, but not of its unique connection identifier.
- the database server in block 10 therefore makes a request to the authentication unit in block 16 to determine whether the The customer's IP address used in the request represents a current IP address and also which connection, ie which unique connection identifier, the IP address has been assigned to. If it is a current IP address, the data combination from the authentication unit is delivered to the database server in block 10, and the database server can now filter out the individual connection evidence associated with the unique connection identifier and release it for inspection. If necessary, additional information, such as a PIN and / or an invoice and / or customer number from DTAG, can also be requested in order to make the information regarding the individual connection proof available only to the person or terminal who actually has access has the invoice from DTAG.
- the essential feature for a secure, connection-related identification of a terminal is the provision of the dynamic authentication unit, which only contains data for currently existing connections and thus offers a high level of security against misuse.
- connection-related authentication of access rights can of course also be extended to other areas.
- any network-internal or network-external service could access the authentication unit in order to determine whether and to which telephone connection (unique connection identifier) a specific IP address is currently assigned.
- the unique connection identifier now permits connection-related authentication by the respective service.
- only certain registered services may access the authentication unit, which also have to identify themselves separately in order to prevent misuse of the authentication unit.
- Such services are, for example, payment services, which settle amounts via a corresponding collection system using DTAG's telephone bill. Such billing takes place, for example, in the reading certain newspaper articles on the Internet. Proof of the establishment of the connection, the order, the delivery and thus for the enforcement of payment claims or delivery obligations is therefore possible with the above authentication procedure even for "anonymous" end customers.
- connection-related authentication Another option for using connection-related authentication is identification by e-commerce providers.
- e-commerce providers When placing orders or inquiries to e-commerce providers, they can automatically perform connection-related authentication and thus clearly assign orders. This is particularly advantageous when purchasing virtual products (e.g. digital books, sound and film recordings), since the delivery address is not a control here. Further authentication via user name and password can then be omitted or used in order to offer even greater security.
- the e-commerce provider can call up further relevant customer data, provided the customer is registered with the unique connection ID.
- connection-related authentication provides protection against misuse.
- connection-related authentication can be particularly useful is the registration with certain services via the unique connection identifier.
- the customer can have his connection activated for certain services, and then receives an automatically generated code that he will add to the dial-in number in the future using the by-dialing method.
- the corresponding unique connection identifier can be assigned a specific set of services. ordered, which are approved for this unique connection identifier (eg only online-tariffed services, no XXX service).
- connection-related identification can replace an electronic signature in many cases and also enables the transfer of payment models known from the telephone networks to the data networks.
- connection-related identification generally enables the provision of content to the exclusion of third parties without further authentication and the blocking of content for a unique connection identifier. On the basis of the connection-related information, it can also be checked whether a certain performance makes sense for this connection. It makes no sense to transfer a video stream to a GSM cell phone, while this can make sense for a UMTS device or a landline connection with a terminal.
- the present invention is not limited to the specific embodiment and the examples mentioned above. Rather, it generally provides for automatic authentication of a terminal in networks, in particular in the network of the Internet, in which at least two identifiers from at least two different networks are used. Authentication can be used for various purposes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10259755 | 2002-12-19 | ||
DE10259755A DE10259755A1 (de) | 2002-12-19 | 2002-12-19 | Automatische Terminal- oder Nutzeridentifizierung in Netzwerken |
PCT/EP2003/014632 WO2004057824A1 (de) | 2002-12-19 | 2003-12-19 | Automatische anschlussbezogene terminal- oder nutzerauthentifizierung in kommunikationsnetzen |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1574007A1 true EP1574007A1 (de) | 2005-09-14 |
Family
ID=32477836
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP03782462A Ceased EP1574007A1 (de) | 2002-12-19 | 2003-12-19 | Automatische anschlussbezogene terminal- oder nutzerauthentifizierung in kommunikationsnetzen |
Country Status (7)
Country | Link |
---|---|
US (1) | US8127339B2 (de) |
EP (1) | EP1574007A1 (de) |
JP (1) | JP2006511995A (de) |
AU (1) | AU2003290102A1 (de) |
CA (1) | CA2511261A1 (de) |
DE (1) | DE10259755A1 (de) |
WO (1) | WO2004057824A1 (de) |
Families Citing this family (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2003207495A1 (en) | 2002-01-08 | 2003-07-24 | Seven Networks, Inc. | Connection architecture for a mobile network |
US7917468B2 (en) | 2005-08-01 | 2011-03-29 | Seven Networks, Inc. | Linking of personal information management data |
US7853563B2 (en) | 2005-08-01 | 2010-12-14 | Seven Networks, Inc. | Universal data aggregation |
US8468126B2 (en) | 2005-08-01 | 2013-06-18 | Seven Networks, Inc. | Publishing data in an information community |
DE102004039407A1 (de) | 2004-08-13 | 2006-02-23 | Siemens Ag | Kommunikationssystem, Verfahren zum Anmelden in einem Kommunikationssystem und Netzwerkverbindungs-Rechner |
US8010082B2 (en) | 2004-10-20 | 2011-08-30 | Seven Networks, Inc. | Flexible billing architecture |
US7441271B2 (en) | 2004-10-20 | 2008-10-21 | Seven Networks | Method and apparatus for intercepting events in a communication system |
US7706781B2 (en) | 2004-11-22 | 2010-04-27 | Seven Networks International Oy | Data security in a mobile e-mail service |
FI117152B (fi) * | 2004-12-03 | 2006-06-30 | Seven Networks Internat Oy | Sähköpostiasetusten käyttöönotto matkaviestimelle |
US7877703B1 (en) | 2005-03-14 | 2011-01-25 | Seven Networks, Inc. | Intelligent rendering of information in a limited display environment |
US7796742B1 (en) * | 2005-04-21 | 2010-09-14 | Seven Networks, Inc. | Systems and methods for simplified provisioning |
US8438633B1 (en) | 2005-04-21 | 2013-05-07 | Seven Networks, Inc. | Flexible real-time inbox access |
WO2006136660A1 (en) | 2005-06-21 | 2006-12-28 | Seven Networks International Oy | Maintaining an ip connection in a mobile network |
US8069166B2 (en) | 2005-08-01 | 2011-11-29 | Seven Networks, Inc. | Managing user-to-user contact with inferred presence information |
US7769395B2 (en) | 2006-06-20 | 2010-08-03 | Seven Networks, Inc. | Location-based operations and messaging |
US8151322B2 (en) * | 2006-05-16 | 2012-04-03 | A10 Networks, Inc. | Systems and methods for user access authentication based on network access point |
US7716378B2 (en) | 2006-10-17 | 2010-05-11 | A10 Networks, Inc. | System and method to associate a private user identity with a public user identity |
US8312507B2 (en) | 2006-10-17 | 2012-11-13 | A10 Networks, Inc. | System and method to apply network traffic policy to an application session |
US8805425B2 (en) | 2007-06-01 | 2014-08-12 | Seven Networks, Inc. | Integrated messaging |
US8693494B2 (en) | 2007-06-01 | 2014-04-08 | Seven Networks, Inc. | Polling |
US8839386B2 (en) * | 2007-12-03 | 2014-09-16 | At&T Intellectual Property I, L.P. | Method and apparatus for providing authentication |
US8364181B2 (en) | 2007-12-10 | 2013-01-29 | Seven Networks, Inc. | Electronic-mail filtering for mobile devices |
US9002828B2 (en) | 2007-12-13 | 2015-04-07 | Seven Networks, Inc. | Predictive content delivery |
US8793305B2 (en) | 2007-12-13 | 2014-07-29 | Seven Networks, Inc. | Content delivery to a mobile device from a content service |
US8107921B2 (en) | 2008-01-11 | 2012-01-31 | Seven Networks, Inc. | Mobile virtual network operator |
US8862657B2 (en) | 2008-01-25 | 2014-10-14 | Seven Networks, Inc. | Policy based content service |
US20090193338A1 (en) | 2008-01-28 | 2009-07-30 | Trevor Fiatal | Reducing network and battery consumption during content delivery and playback |
US8787947B2 (en) | 2008-06-18 | 2014-07-22 | Seven Networks, Inc. | Application discovery on mobile devices |
US8078158B2 (en) | 2008-06-26 | 2011-12-13 | Seven Networks, Inc. | Provisioning applications for a mobile device |
US8909759B2 (en) | 2008-10-10 | 2014-12-09 | Seven Networks, Inc. | Bandwidth measurement |
TW201209697A (en) | 2010-03-30 | 2012-03-01 | Michael Luna | 3D mobile user interface with configurable workspace management |
US8838783B2 (en) | 2010-07-26 | 2014-09-16 | Seven Networks, Inc. | Distributed caching for resource and mobile network traffic management |
EP2599003B1 (de) | 2010-07-26 | 2018-07-11 | Seven Networks, LLC | Koordinierung eines mobilnetzwerkverkehrs zwischen mehreren anwendungen |
CA2806557C (en) | 2010-07-26 | 2014-10-07 | Michael Luna | Mobile application traffic optimization |
CA2806548C (en) | 2010-07-26 | 2015-03-31 | Seven Networks, Inc. | Distributed implementation of dynamic wireless traffic policy |
US8843153B2 (en) | 2010-11-01 | 2014-09-23 | Seven Networks, Inc. | Mobile traffic categorization and policy for network use optimization while preserving user experience |
US9060032B2 (en) | 2010-11-01 | 2015-06-16 | Seven Networks, Inc. | Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic |
US8166164B1 (en) | 2010-11-01 | 2012-04-24 | Seven Networks, Inc. | Application and network-based long poll request detection and cacheability assessment therefor |
US9330196B2 (en) | 2010-11-01 | 2016-05-03 | Seven Networks, Llc | Wireless traffic management system cache optimization using http headers |
WO2012060995A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
WO2012061437A1 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Cache defeat detection and caching of content addressed by identifiers intended to defeat cache |
US8484314B2 (en) | 2010-11-01 | 2013-07-09 | Seven Networks, Inc. | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
EP2635973A4 (de) | 2010-11-01 | 2014-01-15 | Seven Networks Inc | An das verhalten einer mobilen anwendung und an netzwerkbedingungen angepasste zwischenspeicherung |
US8326985B2 (en) | 2010-11-01 | 2012-12-04 | Seven Networks, Inc. | Distributed management of keep-alive message signaling for mobile network resource conservation and optimization |
EP2636268B1 (de) | 2010-11-22 | 2019-02-27 | Seven Networks, LLC | Optimierung von ressourcenabfrageintervallen zur zufriedenstellenden beantwortung von anfragen auf mobilen vorrichtungen |
EP2596658B1 (de) | 2010-11-22 | 2018-05-09 | Seven Networks, LLC | Ausrichtung einer datenübertragung an der optimierung von verbindungen für übertragungen über ein drahtloses netzwerk |
EP2661697B1 (de) | 2011-01-07 | 2018-11-21 | Seven Networks, LLC | System und verfahren zur reduzierung eines mobilnetzwerkverkehrs für domänennamensystem (dns)-anfragen |
WO2012145544A2 (en) | 2011-04-19 | 2012-10-26 | Seven Networks, Inc. | Device resource sharing for network resource conservation |
WO2012149221A2 (en) | 2011-04-27 | 2012-11-01 | Seven Networks, Inc. | System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief |
US8621075B2 (en) | 2011-04-27 | 2013-12-31 | Seven Metworks, Inc. | Detecting and preserving state for satisfying application requests in a distributed proxy and cache system |
EP2737741A4 (de) | 2011-07-27 | 2015-01-21 | Seven Networks Inc | Überwachung der aktivitäten von mobilanwendungen für böswilligem verkehr auf einer mobiler vorrichtung |
WO2013086225A1 (en) | 2011-12-06 | 2013-06-13 | Seven Networks, Inc. | A mobile device and method to utilize the failover mechanisms for fault tolerance provided for mobile traffic management and network/device resource conservation |
US8918503B2 (en) | 2011-12-06 | 2014-12-23 | Seven Networks, Inc. | Optimization of mobile traffic directed to private networks and operator configurability thereof |
US9208123B2 (en) | 2011-12-07 | 2015-12-08 | Seven Networks, Llc | Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor |
US9277443B2 (en) | 2011-12-07 | 2016-03-01 | Seven Networks, Llc | Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol |
US8861354B2 (en) | 2011-12-14 | 2014-10-14 | Seven Networks, Inc. | Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization |
US20130159511A1 (en) | 2011-12-14 | 2013-06-20 | Seven Networks, Inc. | System and method for generating a report to a network operator by distributing aggregation of data |
WO2013090834A1 (en) | 2011-12-14 | 2013-06-20 | Seven Networks, Inc. | Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic |
EP2801236A4 (de) | 2012-01-05 | 2015-10-21 | Seven Networks Inc | Detektion und verwaltung von benutzerinteraktionen mit vordergrundanwendungen auf einer mobilvorrichtung in verteilten cache-speichern |
WO2013116856A1 (en) | 2012-02-02 | 2013-08-08 | Seven Networks, Inc. | Dynamic categorization of applications for network access in a mobile network |
WO2013116852A1 (en) | 2012-02-03 | 2013-08-08 | Seven Networks, Inc. | User as an end point for profiling and optimizing the delivery of content and data in a wireless network |
US8812695B2 (en) | 2012-04-09 | 2014-08-19 | Seven Networks, Inc. | Method and system for management of a virtual network connection without heartbeat messages |
US20130268656A1 (en) | 2012-04-10 | 2013-10-10 | Seven Networks, Inc. | Intelligent customer service/call center services enhanced using real-time and historical mobile application and traffic-related statistics collected by a distributed caching system in a mobile network |
WO2014011216A1 (en) | 2012-07-13 | 2014-01-16 | Seven Networks, Inc. | Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications |
US9161258B2 (en) | 2012-10-24 | 2015-10-13 | Seven Networks, Llc | Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion |
US20140177497A1 (en) | 2012-12-20 | 2014-06-26 | Seven Networks, Inc. | Management of mobile device radio state promotion and demotion |
US9241314B2 (en) | 2013-01-23 | 2016-01-19 | Seven Networks, Llc | Mobile device with application or context aware fast dormancy |
US8874761B2 (en) | 2013-01-25 | 2014-10-28 | Seven Networks, Inc. | Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols |
US9326185B2 (en) | 2013-03-11 | 2016-04-26 | Seven Networks, Llc | Mobile network congestion recognition for optimization of mobile traffic |
US9122853B2 (en) | 2013-06-24 | 2015-09-01 | A10 Networks, Inc. | Location determination for user authentication |
US9065765B2 (en) | 2013-07-22 | 2015-06-23 | Seven Networks, Inc. | Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network |
US11165770B1 (en) | 2013-12-06 | 2021-11-02 | A10 Networks, Inc. | Biometric verification of a human internet user |
CN105099692B (zh) | 2014-05-22 | 2020-01-14 | 创新先进技术有限公司 | 安全校验方法、装置、服务器及终端 |
US9680702B1 (en) * | 2014-06-02 | 2017-06-13 | Hrl Laboratories, Llc | Network of networks diffusion control |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0966815A4 (de) * | 1997-02-02 | 2001-12-12 | Fonefriend Systems Inc | Internetvermittlungsbox, system und verfahren für internettelefonie |
SE520137C2 (sv) * | 1997-03-11 | 2003-06-03 | Ericsson Telefon Ab L M | Metod och anordning för att från en Internetansluten dator sända sitt telefonnummer till en uppringd telefon med hjälp av en tjänst i en nod |
CA2201994A1 (en) * | 1997-04-07 | 1998-10-07 | Singh Sikand Parminder | Telecommunication systems control |
JP3796893B2 (ja) * | 1997-04-18 | 2006-07-12 | カシオ計算機株式会社 | アドレス割り当てシステム及び装置 |
JP3613929B2 (ja) * | 1997-05-07 | 2005-01-26 | 富士ゼロックス株式会社 | アクセス資格認証装置および方法 |
US6151628A (en) * | 1997-07-03 | 2000-11-21 | 3Com Corporation | Network access methods, including direct wireless to internet access |
DE19817494C2 (de) * | 1998-04-20 | 2003-01-30 | Siemens Ag | Netzkopplungseinheit für ein Kommunikationssystem |
WO2000067446A1 (en) * | 1999-05-03 | 2000-11-09 | Nokia Corporation | SIM BASED AUTHENTICATION MECHANISM FOR DHCRv4/v6 MESSAGES |
US20020022962A1 (en) * | 1999-05-28 | 2002-02-21 | Marybelle, Inc. | Payment methods for on-line funeral home memorials |
US6456701B1 (en) * | 2000-06-16 | 2002-09-24 | Bell Canada | Network-centric control of access to transceivers |
JP2002041476A (ja) * | 2000-07-26 | 2002-02-08 | Ntt Comware Corp | ユーザ認証システム及びユーザ認証方法 |
JP2002064649A (ja) * | 2000-08-16 | 2002-02-28 | Soft Ryutsu Kk | 発信元電話番号通知方法およびシステム、発信元端末id通知方法およびシステム、webサイトへのアクセス頻度監視方法 |
JP2002207929A (ja) * | 2001-01-12 | 2002-07-26 | Nippon Telegr & Teleph Corp <Ntt> | 顧客認証方法、その装置、プロバイダ装置及びその処理方法、販売サービス提供装置及びその処理方法 |
US20020129282A1 (en) * | 2001-03-09 | 2002-09-12 | Hopkins Samuel A. | Internet services |
TWI260874B (en) * | 2001-03-26 | 2006-08-21 | Ntt Docomo Inc | Method and apparatus for providing communication service |
DE10128729A1 (de) * | 2001-06-13 | 2002-07-25 | Siemens Ag | Verfahren und Anordnung zum Anmelden eines Nutzers bei einer über eine Authentifizierungseinheit mit dem Nutzer verbundenen Dienstleistungseinheit |
-
2002
- 2002-12-19 DE DE10259755A patent/DE10259755A1/de not_active Withdrawn
-
2003
- 2003-12-19 WO PCT/EP2003/014632 patent/WO2004057824A1/de active Application Filing
- 2003-12-19 EP EP03782462A patent/EP1574007A1/de not_active Ceased
- 2003-12-19 CA CA002511261A patent/CA2511261A1/en not_active Abandoned
- 2003-12-19 AU AU2003290102A patent/AU2003290102A1/en not_active Abandoned
- 2003-12-19 US US10/539,506 patent/US8127339B2/en not_active Expired - Fee Related
- 2003-12-19 JP JP2004561384A patent/JP2006511995A/ja active Pending
Non-Patent Citations (1)
Title |
---|
See references of WO2004057824A1 * |
Also Published As
Publication number | Publication date |
---|---|
AU2003290102A1 (en) | 2004-07-14 |
US20060165226A1 (en) | 2006-07-27 |
JP2006511995A (ja) | 2006-04-06 |
WO2004057824A1 (de) | 2004-07-08 |
DE10259755A1 (de) | 2004-07-08 |
US8127339B2 (en) | 2012-02-28 |
CA2511261A1 (en) | 2004-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1574007A1 (de) | Automatische anschlussbezogene terminal- oder nutzerauthentifizierung in kommunikationsnetzen | |
DE69723333T2 (de) | Vorausbezahlungsverfahren für Telefonkommunikationsnutzung | |
WO2000039987A1 (de) | Verfahren und system, um benutzern eines telekommunikationsnetzes objekte zur verfügung zu stellen | |
WO2001062016A2 (de) | Verfahren zum feststellen der authentizität eines dienste-nutzers und vorrichtung zum durchführen des verfahrens | |
EP1249148B1 (de) | Verfahren zur teilnehmerinitierten automatischen subskribierung | |
WO2005031667A1 (de) | Verfahren zur abwicklung einer elektronischen transaktion | |
DE10213072A1 (de) | Verfahren zum Betrieb eines einem Mobilfunknetz zugeordneten Abrechnungssystems zur Abrechnung einer kostenpflichtigen Benutzung von Daten und Datenübertragungsnetz | |
EP1604490B1 (de) | Verfahren und anordnung zum externen steuern und verwalten wenigstens eines einem lokalen funknetz zugeordneten wlan-teilnehmers | |
EP1034670B1 (de) | Verfahren zur verwaltung von informationen auf identifikationskarten | |
WO1999027721A1 (de) | Verfahren und vorrichtungen zur verwaltung von informationen auf identifikationskarten | |
EP0855069B1 (de) | Verfahren zur bargeldlosen Bezahlung von aus einem verteilten Datennetz abrufbaren Diensten | |
DE19809043A1 (de) | Verfahren und Vorrichtung zum universellen und gesicherten Zugang zu Telefonnetzen | |
DE10218729B4 (de) | Verfahren zum Authentifizieren und/oder Autorisieren von Personen | |
EP1419638A2 (de) | Computersystem und verfahren zur datenzugriffskontrolle | |
DE10154546B4 (de) | Verfahren zum Zugänglichmachen von Diensten in Telekommunikationsnetzen, zum Beispiel im Internet | |
EP1370107B1 (de) | Verfahren und Anordnung zum Zugreifen auf Rufnummernportabilitätsdaten | |
EP1093096A2 (de) | Verfahren und Anordnung zur sicheren Abwicklung von E-Commerce Bezahlvorgängen über Kreditkarten | |
EP1317860B1 (de) | Verfahren zur erfassung von bedarfsträger-spezifischen übertragungskosten bei der durchführung von überwachungsmassnahmen in paketorientierten telekommunikationsnetzen | |
DE10065067B4 (de) | Verfahren zum Verifizieren nutzerspezifischer Informationen in einem Daten- und/oder Kommunikationssystem sowie Daten- und/oder Kommunikationssystem | |
DE10121726A1 (de) | Verfahren und Anordnung zum Bezahlen von über ein Datennetz abrufbaren Datenangeboten | |
EP2068530A1 (de) | Verfahren und Kommunikationssystem zum Steuern des Zugangs zu Medieninhalten in Abhängigkeit des Alters eines Nutzers | |
EP0978963A2 (de) | Verfahren und Vorrichtung zur automatischen Abrechnung von Benutzungsgebühren | |
EP1292087A1 (de) | Verfahren zur anonymisierten Kommunikation und zur Adressierung eines anonymisierten Kommunikationsendgerätes | |
EP1650689A1 (de) | Verfahren und System zur selektiven Abfrage von Teilnehmerinformationen | |
DE10061906A1 (de) | Verfahren und Vorrichtung zur Übertragung von elektronischen Werteinheiten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20050620 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
DAX | Request for extension of the european patent (deleted) | ||
APBK | Appeal reference recorded |
Free format text: ORIGINAL CODE: EPIDOSNREFNE |
|
APBN | Date of receipt of notice of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA2E |
|
APBR | Date of receipt of statement of grounds of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA3E |
|
APAF | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNE |
|
APAF | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNE |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
APBT | Appeal procedure closed |
Free format text: ORIGINAL CODE: EPIDOSNNOA9E |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20150811 |