EP1678933A1 - Verfahren zum gesicherten abfragen von daten eines kommunikationsteilnehmers - Google Patents
Verfahren zum gesicherten abfragen von daten eines kommunikationsteilnehmersInfo
- Publication number
- EP1678933A1 EP1678933A1 EP04817374A EP04817374A EP1678933A1 EP 1678933 A1 EP1678933 A1 EP 1678933A1 EP 04817374 A EP04817374 A EP 04817374A EP 04817374 A EP04817374 A EP 04817374A EP 1678933 A1 EP1678933 A1 EP 1678933A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- communication
- communication terminal
- data
- keg2
- participant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/2753—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content
- H04M1/2757—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content by data transmission, e.g. downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/20—Aspects of automatic or semi-automatic exchanges related to features of supplementary services
- H04M2203/2044—Group features, e.g. closed user group
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6009—Personal information, e.g. profiles or personal directories being only provided to authorised persons
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
- H04M3/382—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42085—Called party identification service
- H04M3/42093—Notifying the calling party of information on the called or connected party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42365—Presence services providing information on the willingness to communicate or the ability to communicate in terms of media capability or network connectivity
Definitions
- the invention relates to a method for querying data relating to a second communication participant by a first communication participant.
- Such data can be personal data of the second communication subscriber (sensitive to data protection law), such as data about his current location (e.g. city, district, street), data about his current activity (e.g. . at work, in a conference, leisure time) or for data about his or her current participation in electronic communication processes (eg logged in to a chat about "fishing", current participation in an internet strategy game) occasionally also referred to as "presence data", which are collected and distributed by a "presence service” (presence service). Since this data contains personal information about the second communication subscriber, it is desirable to restrict access to this data.
- the invention is based on the object of specifying a method by which access to the data relating to the second communication subscriber can be checked.
- This object is achieved according to the invention by a method for querying data relating to a second communication subscriber by a first communication subscriber, with the method from a first communication terminal of the first communication subscriber to a data query message to a second communication terminal of the second communication subscriber is transmitted, the data query message containing a group identifier of a group of communication participants which is assigned to the first communication participant, by the second communication terminal of the second communication participant the transmitted group identifier is compared with group identifiers stored in a group memory of the second communication participant, and, if the comparison result is positive, that Data for transmission to the first communication terminal are provided.
- the group assigned to the first communication participant can be, for example, a sports club, a school class, a seminar group or a department of a company to which the first communication participant belongs.
- the data in response to the data request message from the first communication terminal device is only made available for transmission to this first communication terminal device if such a group identifier, which is already stored in the group memory of the second communication terminal device, is also transmitted with the data request message. This limits access to the data to those communication terminals (or to communication participants using these communication terminals) who have knowledge of the group and who have the corresponding group identifier. Communication terminals that do not have the corresponding group identifier and, consequently, this cannot access with the data request message, access to the data is denied; the data are not made available for transmission to such communication terminals.
- the method according to the invention can advantageously also be designed such that, if the comparison result is positive, an authorization control message is output at the second communication terminal and the data are only made available for transmission to the first communication terminal when a positive authorization confirmation message is received by the second communication terminal.
- the access control and thus the security against an undesired data query is once again considerably improved, since the queried data are only made available for transmission if, in addition to the positive comparison result, there is a positive authorization confirmation message at the second communication terminal.
- the method according to the invention can run in such a way that an identifier of the first communication subscriber is additionally transmitted to the second communication terminal with the data request message, the transmitted identifier is additionally compared by the second communication terminal with identifiers stored in a memory of the second communication subscriber, and the data is only then Transmission to the first communication terminal are provided if there is also a positive comparison result in this second comparison.
- the memory of the second communication participant can be, for example, a “telephone book memory” of a mobile telephone of the second communication participant even stronger control of the data access is carried out since, in addition to the correspondence of the group identifier with the stored group identifiers, a correspondence between the transmitted identifier and an identifier stored in the memory of the second communication subscriber is also checked.
- the data are only made available for transmission in the event that the identifier of the first communication participant is already stored in the memory of the second communication participant, ie access to the data is only permitted in this case.
- the method according to the invention can advantageously also be designed in such a way that an authorization query message is output in the second communication terminal if there is a negative comparison result in the second comparison, and the data are only made available for transmission to the first communication terminal when the second communication terminal provides one positive authorization response message is received.
- the first communication terminal is advantageously enabled to have access to the data even if the identifier of the first communication participant is not stored in the memory of the second communication participant.
- an authorization request message is issued by the second communication terminal; the queried data are only made available for transmission to the first communication terminal if a positive authorization response message is received by the second communication terminal. With such a positive authorization response message, an express authorization for the provision of data can be granted.
- the method can run according to the invention in such a way that the data communication message is signed by the first communication terminal with a private key of the first communication participant, the authenticity of the data query message is checked by the second communication terminal by means of a public key of the first communication participant, and the data for transmission is only authenticity be provided to the first communication terminal.
- a particularly secure method is achieved according to the invention, since signing with the private key of the first communication participant and checking the authenticity of the data query message by means of the public key of the first communication participant ensures that the data query message is actually from the first communication terminal of the first communication participant was generated. This advantageously prevents a third communication terminal from being able to pretend to be the first communication terminal without authorization.
- the public key of the first communication subscriber can be queried by the second communication terminal from a key server assigned to the group. This makes it a central one
- the public key of group members can be saved on the special key server of this group. Since only the public keys belonging to communication participants belonging to the group are stored on the key server assigned to the group, communication terminals of communication participants outside the group are denied access to the data in a simple and effective manner, since these Data are not provided for such communication terminals.
- the method can also run in such a way that the second communication terminal queries the public key of the first communication subscriber from a key server operated by an operator of a communication network, by means of which the data query message is transmitted from the first communication terminal to the second communication terminal.
- the public keys can advantageously be queried from a centrally maintained key server of the communication network operator, which results in a variant of the method which is particularly easy to implement for the communication participants.
- the method according to the invention can advantageously run in such a way that the public key of the first communication subscriber is queried by the second communication terminal from a proxy server operated by an operator of a communication network via which the communication between the first communication terminal and the second communication terminal takes place, public keys of a large number of communication participants are temporarily stored in the proxy server.
- the key can advantageously be queried from the proxy server in which (for example in the case of past procedural sequences) the public keys of communication participants involved in these past procedural sequences are temporarily stored.
- a proxy server forms an automatically updating key server of the
- FIG. 1 shows an exemplary embodiment of a process sequence of the method according to the invention
- FIG. 2 shows a further exemplary embodiment of a method sequence of the method according to the invention.
- a communication network KN which in the exemplary embodiment is a mobile radio network (for example a GSM or UMTS mobile radio network).
- the method according to the invention is not limited to the accumulation in mobile radio networks; the communication network KN can also be a fixed telephone network (for example an ISDN network) or a computer network (for example the Internet).
- the communication network KN is managed by a network operator A first communication terminal KEG1 of a first communication participant W and a second communication terminal KEG2 of a second communication participant P are connected to the communication network.
- first communication participant W data relating to the second communication participant P are to be queried by its communication terminal KEGl is sometimes referred to as a "watcher” and such a second communication subscriber P is referred to as a "presenter” or "presentity".
- first communication terminal KEG1 and The second communication terminal KEG2 in the exemplary embodiment is a cell phone.
- such communication terminals can also be, for example, a landline telephone, an Internet computer or a portable computer with a mobile radio interface.
- Communication connections are established in the usual way between the mobile telephone KEG1 and the communication network KN and the mobile telephone KEG2 and the communication network KN via a so-called air interface and via base stations (not shown); this allows messages to be transmitted, for example, from the first communication terminal KEG1 to the second communication terminal KEG2.
- a data request message DAN is transmitted from the first communication terminal KEG1 of the first communication participant W to the second communication terminal KEG2 of the second communication participant P via the switching center VS of the communication network KN.
- This data query message DAN contains, in addition to an indication of the specific data to be queried (for example the current location and the current activity of the second communication subscriber W), an identifier of the first communication subscriber W (in this case the mobile phone number MSISDN of the first communication terminal KEGl) and a group identifier GK ( in this case the group identifier "Sport Club X" of a sports club in which the first communication participant W is a member). Furthermore, the data request message DAN (optionally) contains the name and a picture of the first communication participant and any text chosen by the latter (customer This data query message DAN is sent via the switching center VS to the second communication tion terminal KEG2 transmitted. The second communication terminal KEG2 is assigned to the communication subscriber P whose data is queried using the data query message DAN. The second communication terminal KEG2 reads the group identifier GK from the data request message DAN
- the method can also run in such a way that, based on the positive comparison result, the data are not yet made available for transmission, but rather that an authorization control message is output by the second communication terminal.
- This authorization control message has the result that the following display is displayed on a display unit of the second communication terminal: "Do you really want to transfer your data to the subscriber ⁇ name> with the number ⁇ MSISDN> and the picture ⁇ Bild>?" Output of the name and the picture is not mandatory.) If the second communication subscriber P answers this question explicitly with "yes" and presses a corresponding key on the mobile telephone KEG2, the second communication terminal receives a positive authorization confirmation message. Only after this positive authorization confirmation message are the queried data made available for transmission to the first communication terminal KEG1. This procedure with the output of an authorization control message and the receipt of an authorization confirmation night can also be used as a "reactive authorization"
- Transmission of the queried data are referred to, since the second communication terminal KEG2 (ie the second communication subscriber P), after receiving a specific data query message DAN, gives approval (confirmation) for the transmission of the data.
- the data can be provided in various ways.
- the data requested by the communication terminal KEG1 can be kept in stock in the second communication terminal KEG2, for example, it will be based on the presentation of the positive comparison result or. upon the presence of the authorization confirmation message, read out from a memory of the second communication terminal and written into a data transmission message (for example, in a USSD stream, not shown in the figure).
- the data are then transmitted with the data transmission message via the communication network z KN to the first communication terminal KEG1.
- a data provision signal DB is sent from the second communication terminal KEG2 to the computer R of the communication network KN.
- the queried data are stored on this computer R.
- the data provision signal DB contains the information that the requested data are to be transmitted to the communication terminal KEG1 via the communication network KN.
- the computer R then transmits this data (for example by means of a USSD message) to the first communication terminal KEG1.
- Such computers R as such are known and are known as “presence computers” or “Presence server”. These computers can form part of the communication network KN or can also be arranged outside the communication network and connected to the communication network.
- the comparator unit V of the second communication terminal KEG2 additionally carries out a second comparison: the identifier MSISDN of the first communication subscriber is read from the data query message DAN and compared with the identifier stored in a memory SP of the second communication subscriber.
- This memory of the second communication subscriber can be, for example, the telephone book memory known per se at telephone rates, in which, for. B. names and telephone numbers MSISDN are stored by those communication participants to which the user of the telephone occasionally establishes communication connections. Only when the comparator unit V determines that the transmitted identifier also coincides with an identifier already stored in the memory SP, are the data made available for transmission to the first communication terminal KEG1.
- an authorization query message is output by the second communication terminal, which has the consequence that on the display unit of the second
- the following display is output: "Do you really want to transfer your data to the subscriber ⁇ name> with the phone number ⁇ MSISDN> and the picture ⁇ B ⁇ ld>? It is not absolutely necessary to display the name and the picture. If the second communication subscriber P answers this question explicitly with "yes" and actuates a corresponding key on the mobile telephone KEG2, the second communication terminal receives a positive authorization response message.
- the requested data are made available for transmission to the first communication terminal KEG1 in one of the ways described above.
- This method with the output of an authorization query message and the receipt of an authorization response message, realizes a "reactive authorization" for the transmission of the queried data, analogously to the procedure described above with the authorization control message and the authorization confirmation message, since here too the second communication terminal device KEG2 (ie on the part of the second communication subscriber P) after receipt of a specific data query message DAN the authorization to transmit the data is granted.
- FIG. 2 shows another example of a process sequence of the method according to the invention.
- FIG. 2 shows a communication network KN, a first communication terminal KEG1 of a first communication participant W and a second communication terminal KEG2 of a second communication participant P.
- the first communication participant W and the second communication participant P are members of one
- a data query message DAN ⁇ is sent from the first communication terminal KEG1 to the second communication terminal KEG 2, the data query message DAN ⁇ containing a group identifier GK (Company X) and an identifier in the form of a mobile phone number MSISDN (0816).
- the first communication terminal KEG1 generates a signature for the data request message DAN ⁇ by means of a private key of the first telecommunication subscriber W and adds this signature to the data request message DAN; the signature is therefore checked with the data directs DAN to transfer the second communication terminal KEG2.
- the comparator unit V Upon receipt of the data query message DAN ⁇ at the second communication terminal KEG2, the comparator unit V compares, as in the method according to FIG. 1, the group identifier GK transmitted with the data query message DAN ⁇ with the group identifiers already stored in the group memory GS of the second communication terminal KEG2 and determines that the group identifier "Company X" is already stored in the group memory GS. The information is also stored in the group memory GS that the authenticity of data query messages must be checked for the group "Company X" by means of the signature that is also transmitted. The second communication terminal KEG2 then reads the signature from the data request message DAN ⁇ and checks the authenticity of the signed message DAN ⁇ using a public key of the first communication participant W.
- This check can be carried out, for example, in the comparator unit V of the second communication terminal KEG2, which is formed by a microprocessor of the communication terminal KEG2. As soon as the authenticity of the data query message has been checked by means of the public key, the method continues as described above in connection with FIG. 1, so that the data are finally made available for transmission to the first communication terminal in one of the ways described above.
- the public key required for this authenticity check can be queried by the second communication terminal KEG2 from a key server PKI assigned to the group (here, for example, operated by company X).
- the public key can also be queried from a key server which is operated by the network operator / network operator of the communication network KN.
- the key server PKI would, for example, be arranged directly at the computer OP of the network operator.
- the computer OP of the network operator works as a proxy server, which transmits the public key to the second communication terminal KEG2 when the second communication terminal KEG2 is queried.
- a large number of public keys of communication participants are temporarily stored in the proxy server OP. These are public keys which have been transmitted via the communication network KN in already completed process sequences of the method according to the invention. If the public key of the first communication participant W is not stored in the proxy server OP, the proxy server OP in turn queries this public key from the key server PKI of the company "Company X" and forwards the public key to the second communication terminal KEG2. This is symbolized with dashed arrows in the lower part of Figure 2. Access to the key server PKI from Company X can be secured, for example
- HTTPS hypertext transfer protocol secure
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10351721A DE10351721A1 (de) | 2003-10-31 | 2003-10-31 | Verfahren zum Abfragen von Daten |
PCT/DE2004/002409 WO2005043876A1 (de) | 2003-10-31 | 2004-10-26 | Verfahren zum gesicherten abfragen von daten eines kommunikationsteilnehmers |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1678933A1 true EP1678933A1 (de) | 2006-07-12 |
Family
ID=34485205
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04817374A Withdrawn EP1678933A1 (de) | 2003-10-31 | 2004-10-26 | Verfahren zum gesicherten abfragen von daten eines kommunikationsteilnehmers |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1678933A1 (de) |
JP (1) | JP2007510338A (de) |
CN (1) | CN1875608A (de) |
DE (1) | DE10351721A1 (de) |
WO (1) | WO2005043876A1 (de) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8175578B2 (en) * | 2007-05-07 | 2012-05-08 | Battelle Energy Alliance, Llc | Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002057807A (ja) * | 2000-08-08 | 2002-02-22 | Nec Corp | 携帯電話の電話帳管理システム |
DE10118794A1 (de) * | 2001-04-05 | 2002-10-17 | Deutsche Telekom Ag | Verfahren und Vorrichtung zum digitalen Signieren einer Transaktion |
US20020152265A1 (en) * | 2001-04-06 | 2002-10-17 | Hillel Felman | Method and apparatus for selectively releasing personal contact information stored in an electronic or telephonic database |
-
2003
- 2003-10-31 DE DE10351721A patent/DE10351721A1/de not_active Withdrawn
-
2004
- 2004-10-26 JP JP2006537054A patent/JP2007510338A/ja active Pending
- 2004-10-26 CN CNA200480032514XA patent/CN1875608A/zh active Pending
- 2004-10-26 WO PCT/DE2004/002409 patent/WO2005043876A1/de active Search and Examination
- 2004-10-26 EP EP04817374A patent/EP1678933A1/de not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
See references of WO2005043876A1 * |
Also Published As
Publication number | Publication date |
---|---|
CN1875608A (zh) | 2006-12-06 |
WO2005043876A1 (de) | 2005-05-12 |
JP2007510338A (ja) | 2007-04-19 |
DE10351721A1 (de) | 2005-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69904570T3 (de) | Verfahren, anordnung und einrichtung zur authentifizierung durch ein kommunikationsnetz | |
DE69931344T2 (de) | Nachrichtenverarbeitungsverfahren und system in einem telekommunikationssystem | |
EP1169873B1 (de) | Verfahren um mitglieder einer gemeinsamen interessengruppe zu finden | |
DE60025377T2 (de) | Verfahren und system für den schutz einer nutzeridentität | |
DE4317143C2 (de) | Verfahren und Einrichtung zum Betrieb eines Mobilfunknetzes | |
DE19958707A1 (de) | Verfahren zur Übertragung einer Textnachricht | |
WO2004019640A1 (de) | Verfahren zum identifizieren eines kommunikationsendgeräts | |
DE60036916T2 (de) | Kommunikationsnetzwerk | |
EP1207670A2 (de) | Dienst zur automatischen Übermittlung von Paketdaten | |
EP1181835B1 (de) | Kommunikationsverfahren und geeignete vorrichtung für kommunikationsforums | |
DE10061554A1 (de) | Vorrichtung und Verfahren zum Zuordnen von Fahrzeugidentifikationen über ein Funknetz | |
EP1929758B1 (de) | VERFAHREN ZUR AKTIVIERUNG ZUMINDEST EINER WEITERER ABHÖRHÖRMAßNAHME IN ZUMINDEST EINEM KOMMUNIKATIONSNETZ | |
EP1503538A1 (de) | Verfahren zum Ermitteln eines Abrechnungstarifs für eine Datenübertragung | |
EP1014733B1 (de) | Verfahren zum Abhören eines Teilnehmers eines Intelligenten Netzes | |
EP1148744B1 (de) | Netzwerkserver | |
EP1678933A1 (de) | Verfahren zum gesicherten abfragen von daten eines kommunikationsteilnehmers | |
WO2003107641A1 (de) | Verfahren zum identifizieren eines telekommunikationsteilnehmers | |
DE10237131A1 (de) | Verfahren sowie Vorrichtung zur datenquellenspezifischen Kennzeichnung von Push-Nutzdaten | |
EP1014734B1 (de) | Verfahren zum Abhören eines Teilnehmers eines Intelligenten Netzes | |
EP1034685B1 (de) | Verfahren zur authorisierung eines endgeräteanschlusses eines telekommunikationsnetzes | |
DE10241097B4 (de) | Verfahren zum Gewinnen von Präsenzdaten | |
DE10241092A1 (de) | Verfahren zum Bereitstellen von Präsenszanzeigedaten | |
DE10154546B4 (de) | Verfahren zum Zugänglichmachen von Diensten in Telekommunikationsnetzen, zum Beispiel im Internet | |
WO2005117396A1 (de) | Verfahren und vorrichtung zum austausch von teilnehmerinformationen in einem kommunikationssystem | |
DE10226315A1 (de) | Verfahren zur Verwaltung von Leistungsparametern der Kommunikation in einem mobilen Kommunikationsnetz |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20060403 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20070126 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS S.P.A. |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20100701 |