Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_3fc6890df1074a35356f43e035472eee |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-02 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-12 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1475 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W76-10 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-02 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-065 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-106 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-10 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-108 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W88-12 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-122 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-121 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-123 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-037 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-00 |
classificationIPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W36-14 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W12-02 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W12-10 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04W12-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32 |
filingDate |
2001-10-09^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate |
2009-10-06^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_3f6680f810f9a0bcd5a3c523b9bbff2e http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_7db7ef2c10c6f05571a67b70b5c0a8f8 |
publicationDate |
2009-10-06^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
CA-2424496-C |
titleOfInvention |
A system for ensuring encrypted communication after handover |
abstract |
A fraudulent intruder can eavesdrop on a call by removing information about an encryption algorithm when a multimode mobile station sends an unprotected initial signaling message containing this information over the radio interface to the mobile telecommunications system. The attempt can be prevented in a universal mobile telecommunications system (UMTS) comprising at least two radio access networks providing mobile stations with access to a multimode mobile station, and at least one core network. During connection setup with a first radio access network, the multimode mobile station sends an unprotected initial signaling message that includes information about those encryption algorithms that the multimode mobile station supports when it communicates in a second radio access network. The first radio access network saves some or all the information of it. Then it composes and sends an integrity-protected message that includes information about the encryption algorithms supported by the multimode mobile station in the second radio access network. |
priorityDate |
2000-11-28^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |