US Patent Application No: 2002/0161,905

Number of patents in Portfolio can not be more than 2000

IP security and mobile networking

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

The invention discloses a method transferring packets between a mobile host device (100) and a source node via a number of independent data networks while maintaining a secure connection. The independent networks may include, for example, the Internet (120), localized Access Zones (110, 140), a Corporate Intranets, a Home Network (130) etc. Problems may occur, for example, when the mobile node is using a co-located care-of address, in which case both IP-in-IP and IPsec tunneling transformations are performed, and the current IPsec and IP-in-IP implementations cannot perform the required tunneling operations on the mobile host. This is because the IP-in-IP and IPsec tunneling when the IP-in-IP tunnel is not the outermost transformation. In an embodiment of the invention, the security policy operated by the mobile host includes a primary security policy and a dynamic secondary security policy that selectively apply specified transformations to certain packets in the data transfer.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
NOKIA CORPORATIONESPOO831

International Classification(s)

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Haverinen, Henry Tampere, FI 52 1406
Honkanen, Jukka-Pekka Tampere, FI 11 328
Kuikka, Antti J Toijah, FI 1 72

Cited Art Landscape

Patent Info (Count) # Cites Year
 
TREND MICRO INCORPORATED (1)
* 6,330,562 System and method for managing security objects 187 1999
 
NATIONAL SECURITY AGENCY (1)
* 6,141,755 Firewall security apparatus for high-speed circuit switched networks 49 1998
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (2)
* 6,055,236 Method and system for locating network services with distributed network address translation 436 1999
* 7,028,335 Method and system for controlling attacks on distributed network address translation enabled networks 54 1999
 
TELEFONAKTIEBOLAGET L M ERICSSON (PUBL) (1)
* 6,061,346 Secure access method, and associated apparatus, for accessing a private IP network 230 1997
 
KABUSHIKI KAISHA TOSHIBA (2)
* 6,170,057 Mobile computer and method of packet encryption and authentication in mobile computing based on security policy of visited network 91 1997
* 6,163,843 Packet inspection device, mobile computer and packet transfer method in mobile computing with improved mobile computer authenticity check scheme 50 1997
 
FUJITSU LIMITED (1)
* 2002/0006,133 Communications service providing system, and mobile terminal device, address server device, and router device for use therewith 54 2001
 
MCAFEE, INC. (2)
* 5,950,195 Generalized security policy management system and method 281 1996
* 5,983,350 Secure firewall supporting different levels of authentication based on address or encryption status 289 1996
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
TROPOS NETWORKS, INC. (4)
* 7,649,866 Method of subnet roaming within a network 18 2004
* 2005/0074,015 Method of subnet roaming within a network 90 2004
* 8,064,404 Method of subnet roaming within a network 0 2009
* 2010/0085,920 Method of Subnet Roaming within a Network 6 2009
 
Other [Check patent profile for assignment information] (2)
* 2009/0138,619 METHOD AND APPARATUS FOR ASSIGNING NETWORK ADDRESSES BASED ON CONNECTION AUTHENTICATION 7 2009
* 2010/0269,155 Method and Apparatus for Registering Auto-Configured Network Addresses Based On Connection Authentication 9 2010
 
ROSALIND FRANKLIN UNIVERSITY OF MEDICINE AND SCIENCE (1)
* 2004/0107,345 System and methodology providing automation security protocols and intrusion detection in an industrial controller environment 43 2003
 
ROCKWELL AUTOMATION TECHNOLOGIES, INC. (5)
8,909,926 System and methodology providing automation security analysis, validation, and learning in an industrial controller environment 2 2003
* 2004/0153,171 System and methodology providing automation security architecture in an industrial controller environment 62 2003
* 2008/0077,976 CRYPTOGRAPHIC AUTHENTICATION PROTOCOL 8 2006
9,009,084 System and methodology providing automation security analysis and network intrusion protection in an industrial environment 1 2012
9,412,073 System and methodology providing automation security analysis and network intrusion protection in an industrial environment 0 2015
 
ROCKSTAR BIDCO, LP (1)
* 2010/0290,621 TUNNELING SUPPORT FOR MOBILE IP USING A KEY FOR FLOW IDENTIFICATION 12 2008
 
Sony Electronics Inc. (4)
* 2005/0135,628 System and method for authenticating components in wireless home entertainment system 6 2004
* 2005/0102,652 System and method for building software suite 10 2004
7,640,577 System and method for authenticating components in wireless home entertainment system 0 2006
* 2007/0192,488 System and method for authenticating components in wireless home entertainment system 4 2006
 
NOKIA TECHNOLOGIES OY (1)
* 2005/0198,306 System, method and computer program product for accessing at least one virtual private network 53 2004
 
HITACHI, LTD. (2)
* 8,437,345 Terminal and communication system 1 2004
* 2007/0081,512 Terminal and communication system 20 2004
 
BIRDSTEP TECHNOLOGY ASA (2)
* 2004/0078,600 Seamless IP mobility across security boundaries 20 2003
* 2008/0040,793 Seamless IP mobility across security boundaries 7 2007
 
RAPPORE TECHNOLOGIES (1)
7,308,703 Protection of data accessible by a mobile device 102 2003
 
MOTOROLA SOLUTIONS, INC. (3)
8,677,114 Application steering and application blocking over a secure tunnel 1 2007
* 2008/0165,964 APPLICATION STEERING AND APPLICATION BLOCKING OVER A SECURE TUNNEL 4 2007
* 2012/0254,615 USING A DYNAMICALLY-GENERATED SYMMETRIC KEY TO ESTABLISH INTERNET PROTOCOL SECURITY FOR COMMUNICATIONS BETWEEN A MOBILE SUBSCRIBER AND A SUPPORTING WIRELESS COMMUNICATIONS NETWORK 0 2011
 
APPLE INC. (4)
7,353,533 Administration of protection of data accessible by a mobile device 305 2003
* 2004/0123,153 Administration of protection of data accessible by a mobile device 120 2003
9,237,514 System and method for filtering access points presented to a user and locking onto an access point 0 2005
* 2006/0094,400 System and method for filtering access points presented to a user and locking onto an access point 90 2005
 
SENFORCE TECHNOLOGIES (2)
7,526,800 Administration of protection of data accessible by a mobile device 83 2004
* 2005/0055,578 Administration of protection of data accessible by a mobile device 240 2004
 
MICROSOFT TECHNOLOGY LICENSING, LLC (6)
7,991,854 Dynamic session maintenance for mobile computing devices 49 2004
7,457,626 Virtual private network structure reuse for mobile computing devices 18 2004
* 2005/0210,150 Dynamic session maintenance for mobile computing devices 77 2004
* 2005/0208,947 Virtual private network structure reuse for mobile computing devices 48 2004
8,909,743 Dynamic session maintenance for mobile computing devices 0 2011
* 2011/0238,801 DYNAMIC SESSION MAINTENANCE FOR MOBILE COMPUTING DEVICES 0 2011
 
BROADCOM CORPORATION (3)
* 8,418,241 Method and system for traffic engineering in secured networks 1 2007
* 2008/0115,203 METHOD AND SYSTEM FOR TRAFFIC ENGINEERING IN SECURED NETWORKS 3 2007
9,185,097 Method and system for traffic engineering in secured networks 0 2013
 
NETOCTAVE, INC. (1)
* 2003/0195,973 Methods, systems, and computer program products for processing a packet with layered headers using a data structure that positionally relates the layered headers 5 2002
 
NOKIA SIEMENS NETWORKS OY (1)
* 2004/0268,124 Systems and methods for creating and maintaining a centralized key store 21 2003
 
NOVELL, INC. (5)
9,197,668 Access control to files based on source information 0 2006
* 2006/0120,526 Access control to files based on source information 105 2006
8,566,571 Pre-boot securing of operating system (OS) for endpoint evaluation 1 2008
* 2010/0153,696 Pre-boot securing of operating system (OS) for endpoint evaluation 22 2008
* 8,838,804 Securing a network connection by way of an endpoint computing device 0 2009
 
CISCO TECHNOLOGY, INC. (7)
7,502,929 Method and apparatus for assigning network addresses based on connection authentication 13 2001
* 7,143,435 Method and apparatus for registering auto-configured network addresses based on connection authentication 31 2002
8,122,136 Methods and apparatus for providing security to a computerized device 5 2002
* 7,577,837 Method and apparatus for encrypted unicast group communication 3 2003
* 7,752,653 Method and apparatus for registering auto-configured network addresses based on connection authentication 2 2006
7,886,149 Method and apparatus for assigning network addresses based on connection authentication 1 2009
8,291,489 Method and apparatus for registering auto-configured network addresses based on connection authentication 3 2010
 
Check Point Software Technologies, Inc. (1)
* 2004/0266,420 System and method for secure mobile connectivity 15 2003
 
KINETO WIRELESS, LLC (34)
7,996,009 Method for authenticating access to an unlicensed wireless communications system using a licensed wireless communications system authentication process 0 2002
* 2011/0149,838 METHOD AND SYSTEM FOR SIGNALING TRAFFIC AND MEDIA TYPES WITHIN A COMMUNICATIONS NETWORK SWITCHING SYSTEM 7 2005
7,957,348 Method and system for signaling traffic and media types within a communications network switching system 9 2005
7,606,190 Apparatus and messages for interworking between unlicensed access network and GPRS network for data services 36 2005
7,843,900 Mechanisms to extend UMA or GAN to inter-work with UMTS core network 8 2005
7,606,568 Messaging for registration in an unlicensed wireless communication system 17 2005
* 2006/0009,202 Messaging for release of radio resources in an unlicensed wireless communication system 58 2005
7,634,270 GPRS data protocol architecture for an unlicensed wireless communication system 5 2005
7,634,271 GSM signaling protocol architecture for an unlicensed wireless communication system 3 2005
* 7,283,822 Service access control interface for an unlicensed wireless communication system 47 2006
* 7,272,397 Service access control interface for an unlicensed wireless communication system 41 2006
* 2006/0223,497 Service access control interface for an unlicensed wireless communication system 8 2006
7,885,644 Method and system of providing landline equivalent location information over an integrated communication system 42 2007
* 2007/0238,448 METHOD AND SYSTEM OF PROVIDING LANDLINE EQUIVALENT LOCATION INFORMATION OVER AN INTEGRATED COMMUNICATION SYSTEM 110 2007
8,165,086 Method of providing improved integrated communication system data service 1 2007
7,912,004 Generic access to the Iu interface 10 2007
7,852,817 Generic access to the Iu interface 12 2007
7,454,207 Service access control interface for an unlicensed wireless communication system 20 2007
8,204,502 Method and apparatus for user equipment registration 15 2007
8,073,428 Method and apparatus for securing communication between an access point and a network controller 43 2007
8,036,664 Method and apparatus for determining rove-out 33 2007
7,995,994 Method and apparatus for preventing theft of service in a communication system 77 2007
8,150,397 Method and apparatus for establishing transport channels for a femtocell 21 2007
8,005,076 Method and apparatus for activating transport channels in a packet switched communication system 12 2007
8,019,331 Femtocell integration into the macro network 16 2008
8,090,371 Network controller messaging for release in an unlicensed wireless communication system 4 2008
7,773,993 Network controller messaging for channel activation in an unlicensed wireless communication system 10 2008
7,668,558 Network controller messaging for paging in an unlicensed wireless communication system 4 2008
7,684,803 Network controller messaging for ciphering in an unlicensed wireless communication system 8 2008
7,818,007 Mobile station messaging for ciphering in an unlicensed wireless communication system 5 2008
7,769,385 Mobile station messaging for registration in an unlicensed wireless communication system 10 2008
8,041,335 Method and apparatus for routing of emergency services for unauthorized user equipment in a home Node B system 53 2009
8,130,703 Apparatus and messages for interworking between unlicensed access network and GPRS network for data services 1 2009
8,045,493 Mechanisms to extend UMA or GAN to inter-work with UMTS core network 0 2010
 
FUJITSU LIMITED (1)
8,752,131 Facilitating protection of a maintenance entity group 0 2008
 
TELCORDIA TECHNOLOGIES, INC. (2)
* 8,565,186 Methods of mitigation of trombone routing in an IMS/MMD network 0 2007
* 2008/0070,573 Methods of mitigation of trombone routing in an IMS/MMD network 12 2007
 
INTEL CORPORATION (1)
* 7,039,404 Continuous mobility across wireless networks by integrating mobile IP and GPRS mobility agents 30 2002
 
HARRIS CORPORATION (12)
8,935,780 Mission management for dynamic computer networks 0 2012
8,898,795 Bridge for communicating with a dynamic computer network 0 2012
8,819,818 Dynamic computer network with variable identity parameters 0 2012
9,154,458 Systems and methods for implementing moving target technology in legacy hardware 0 2012
9,130,907 Switch for communicating data in a dynamic computer network 0 2012
9,075,992 Systems and methods for identifying, deterring and/or delaying attacks to a network using shadow networking techniques 0 2012
8,966,626 Router for communicating data in a dynamic computer network 0 2012
8,959,573 Noise, encryption, and decoys for communications in a dynamic computer network 5 2012
8,935,786 Systems and methods for dynamically changing network states 0 2012
8,898,782 Systems and methods for spontaneously configuring a computer network 0 2012
9,338,183 Session hopping 0 2013
9,264,496 Session hopping 0 2014
 
GEORGIA TECH RESEARCH CORPORATION (1)
* 2005/0185,621 Systems and methods for parallel communication 14 2005
 
NOKIA CORPORATION (1)
* 2006/0111,113 Virtual private network with mobile nodes 42 2002
* Cited By Examiner