scispace - formally typeset
Patent

Secure communication methods and systems

Reads0
Chats0
TLDR
Secure end-to-end connections are established as separate multiple secure connections as mentioned in this paper, illustratively between a first system and an intermediate system and between a second system and a intermediate system.
Abstract
Methods and systems for secure communications are provided. Secure end-to-end connections are established as separate multiple secure connections, illustratively between a first system and an intermediate system and between a second system and an intermediate system. The multiple secure connections may be bound, by binding Internet Protocol Security Protocol (IPSec) Security Associations (SAs) for the multiple connections, for example, to establish the end-to-end connection. In the event of a change in operating conditions which would normally require the entire secure connection to be re-established, only one of the multiple secure connections which form the end-to-end connection is re-established. Separation of end-to-end connections in this manner may reduce processing resource requirements and latency normally associated with re-establishing secure connections.

read more

Citations
More filters
Patent

Service Plan Design, User Interfaces, Application Programming Interfaces, and Device Management

TL;DR: In this paper, the authors present methods, systems, and apparatuses to enable subscribers of mobile wireless communication devices to view, research, select and customize service plans; to create and manage device groups, share and set permission controls for service plans among devices in device groups; to manage communication services through graphical user interfaces; to sponsor and promote service plans.
Patent

Device-Assisted Services for Protecting Network Capacity

TL;DR: In this article, a device assisted service (DAS) for protecting network capacity is provided, which includes monitoring a network service usage activity of the communications device in network communication and classifying the network service activity for differential network access control for protecting the network capacity.
Patent

System and Method for Providing User Notifications

TL;DR: In this article, an end user device associated with a service plan having a limit on usage of a network service, the method comprising storing one or more notification actions corresponding to one-or more notification requests; performing a device action that reflects a past or intended use of the network service; receiving one of the one or multiple notification requests from a network element in response to the device action; performing one of several notification actions, the notification action causing the user device to retrieve at least a portion of a notification message associated with the status of the use.
Patent

Intermediate networking devices

TL;DR: In this paper, a wireless communication device comprising of one or more network modems enabling the wireless communication devices to communicate over a first wireless network, one or multiple processors configured to execute a set of instructions, when executed by the processors, causes processors to: establish a first connection between the wireless communications device and a first end-point device; establish a second connection between a second-end-device; and apply a first control to traffic transmitted by or to the first endpoint device.
Patent

Quality of service for device assisted services

TL;DR: In this article, a method for implementing a service policy on a device by obtaining, from a user interface (UI) or a network interface, a quality of service (QoS) activity map of an application identifier to a QoS policy is presented.
References
More filters
Patent

Accounting system in a network

TL;DR: A coupled data network with an accounting system is described in this article, where the accounting collection modules collect accounting data on message traffic transported between the end system and a communications server through the home interworking function and through the serving inter-working function.
Patent

VoIP terminal security module, SIP stack with security manager, system and security methods

TL;DR: A secure voice over internet protocol (VoIP) terminal includes a modular security manager for use in conjunction with a protocol stack thereof, wherein the security manager includes a plurality of interfaces to the stack as discussed by the authors.
Patent

Establishing consistent, end-to-end protection for a user datagram

TL;DR: In this article, a technique for protecting dataagrams throughout the entire network path by establishing cascaded tunnels is presented. But the problem is that the datagrams may be exposed in cleartext at the endpoints of each tunnel, thereby enabling security gateways to perform services that require content inspection (such as network address translation, access control and authorization).
Patent

Method and system for securely scanning network traffic

TL;DR: In this paper, a method and system for implementing secure network communications between a first device and a second device, at least one of the devices communicating with the other device via a firewall device, are provided.
Patent

Method and associated apparatus for pre-authentication, preestablished virtual private network in heterogeneous access networks

TL;DR: In this article, the authors propose a method of coordinating the handoff of a mobile carrier between a first access network and a second access network by establishing a contract between a user and a hyper operator.