Lehtovirta, Espoo
Daniel Lehtovirta, Espoo FI
Patent application number | Description | Published |
---|---|---|
20080215962 | PC-METADATA ON BACKSIDE OF PHOTOGRAPH - A method including selectively displaying a content side or a backside, respectively, of a digital media content, wherein the backside includes an area for notes; and storing notes of the area as meta data to the digital media content is disclosed. A corresponding apparatus, user interface, and computer program is also disclosed. | 09-04-2008 |
20090049413 | Apparatus and Method for Tagging Items - A method including presenting an image on a display of a device, automatically providing a tag association menu on the display, the tag association menu being provided with the image, selecting a tag from the tag association menu, the selected tag to be associated with the image and automatically closing the tag association menu. | 02-19-2009 |
20100228836 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR FACILITATING SYNCHRONIZATION OF SETTING CONFIGURATIONS - A method, apparatus, and computer program product are provided for facilitating synchronization of setting configurations. An apparatus may include a processor and a memory storing instructions that when executed by the processor cause the apparatus to configure a setting on the apparatus. The instructions when executed by the processor may further cause the apparatus to generate a settings data package comprising the setting configuration. The instructions when executed by the processor may additionally cause the apparatus to send the settings data package to a settings management service for synchronization of the setting configuration to at least one of a service or a user device. The settings management service may be configured to synchronize the setting configuration by distributing the settings data package to the at least one of the service or the user device. Corresponding methods and computer program products are also provided. | 09-09-2010 |
20110057885 | METHOD AND APPARATUS FOR SELECTING A MENU ITEM - An apparatus, having a processor, and a memory including computer program code, the memory and the computer program code configured to, working with the processor, cause the apparatus to perform at least the following: receive indication of a first touch input, determine that the first touch input comprises a rotationally pivoting touch input, provide for display of a plurality of menu items based at least in part on the first touch input, receive indication of a second touch input associated with at least one of the menu items, and perform selection of at least one of the menu items based at least in part on the second touch input is disclosed. A corresponding method, computer readable medium and computer program product are also disclosed. | 03-10-2011 |
Vesa Lehtovirta, Espoo FI
Patent application number | Description | Published |
---|---|---|
20110009094 | Method and Apparatus for Reliable Broadcast/Multicast Service - A method is provided for use by a user terminal ( | 01-13-2011 |
20110035787 | Access Through Non-3GPP Access Networks - When setting up communication from a user equipment UE ( | 02-10-2011 |
20110264913 | METHOD AND APPARATUS FOR INTERWORKING WITH SINGLE SIGN-ON AUTHENTICATION ARCHITECTURE - A method is provided for use in interworking a single sign-on authentication architecture and a further authentication architecture in a split terminal scenario. The split terminal scenario is one in which authentication under the single sign-on authentication architecture is required of a browsing agent ( | 10-27-2011 |
20120027211 | Security Key Management In IMS-Based Multimedia Broadcast And Multicast Services (MBMS) - A system, method, and nodes for managing shared security keys between a User Equipment, UE, an authentication node such as an SCF/NAF, and a service node such as a BM-SC or AS. The SCF/NAF allocates to each BM-SC, a different SCF/NAF identifier such as a fully qualified domain name, FQDN, from the FQDN space the SCF/NAF administers. The SCF/NAF then locally associates these allocated FQDNs with the connected BM-SCs and with different services. The network sends the correct FQDN to the UE in a service description for a desired service, and the UE is able to derive a security key using the FQDN. When the UE requests the desired service, the SCF/NAF is able to associate the service identifier with the correct FQDN and an associated BM-SC. The SCF/NAF uses the FQDN to obtain the security key from a bootstrapping server and sends it to the associated BM-SC. As a result, the UE and the associated BM-SC share a specific security key. | 02-02-2012 |
20130294603 | CENTRALIZED KEY MANAGEMENT IN EMBMS - A split architecture eMBMS with distributed BMSCs providing the same eMBMS service allows for a centralized key service where each BMSC is able to derive a set of MTKs from the MSK using the MTK-IDs as the differentiating input. This avoids the need to send MTKs to the BMSCs. | 11-07-2013 |
20140071880 | Method and Apparatus for Reliable Broadcast/Multicast Service - A method is provided for use by a user terminal operating an IP-based multimedia broadcast/multicast service. The method comprises storing information relating to user service registrations performed using an IP connection such as a Packet Data Protocol, PDP, context established to enable connectivity between the user terminal and a service node for the broadcast/multicast service. The information is of a type to enable re-registration of at least some of any of the user services affected by a loss of the IP connection. In one embodiment, the multimedia broadcast/multicast service is a 3GPP Multimedia Broadcast/Multicast Service, MBMS, the user terminal is a User Equipment, UE, and the service node is a Broadcast/Multicast Service Center, BM-SC. In another embodiment, the multimedia broadcast/multicast service is an Open Mobile Alliance Broadcast, OMA BCAST, service, the user terminal is a Terminal, and the service node is an OMA BCAST Subscription Management, BSM, node. | 03-13-2014 |
20140304777 | SECURING DATA COMMUNICATIONS IN A COMMUNICATIONS NETWORK - A method of securing communications between first node attached to first network and second node attached to second network. At the second node, first and second information is received on whether the respective first and second networks have a secure network layer path to the respective first and second nodes or are known to use a secure network layer path to attached nodes. Third information is received on whether the first network has a secure internal network layer path and, where the first and second networks are different, whether the first network has a secure network layer path to the second network or is known to use a secure network layer path to the second network. The information determines whether the entire path between the first node and the second node is secured at the network layer level, and whether to establish application layer security for communications. | 10-09-2014 |
Vesa Petteri Lehtovirta, Espoo FI
Patent application number | Description | Published |
---|---|---|
20090013381 | User Authentication and Authorisation in a Communications System - A method of authenticating a client to two or more servers coupled together via a communications network, wherein the client and a first server possess a shared secret. The method comprises authenticating the client to a first server using said shared secret, signalling associated with this authentication process being sent between the client and said first server via a second server, generating a session key at the client and at the first server, and providing the session key to said second server, and using the session key to authenticate the client to the second server. | 01-08-2009 |
20090205028 | Method and System for Mobile Device Credentialing - Methods and systems taught herein allow communication device manufacturers to preconfigure communication devices to use preliminary access credentials to gain temporary network access for downloading subscription credentials, and particularly allow the network operator issuing the subscription credentials to verify that individual devices requesting credentials are trusted. In one or more embodiments, a credentialing server is owned or controlled by the network operator, and is used by the network operator to verify that subscription credentials are issued only to trusted communication devices, even though such devices may be referred to the credentialing server by an external registration server and may be provisioned by an external provisioning server. Particularly, the credentialing server interrogates requesting devices for their device certificates and submits these device certificates to an external authorization server, e.g., an independent OCSP server, for verification. A common Public Key Infrastructure (PKI) may be used for operator and device certificates. | 08-13-2009 |
20090217038 | Methods and Apparatus for Locating a Device Registration Server in a Wireless Network - Methods and apparatus for locating and accessing a data server in a wireless network are disclosed. The disclosed techniques may be used to allow a wireless device provided with temporary credentials to access a wireless network and obtain a network address for a data server for downloading subscription credentials. An exemplary wireless device comprises a processing unit configured to send an access authentication request to a wireless network, and to receive an authentication challenge value from the wireless network in response. The processing unit is further configured to generate a cryptographic response from the authentication challenge value and to send the cryptographic response to the wireless network, and to also derive a data server address from the authentication challenge value. Thus, the authentication challenge value serves two purposes—as a challenge key for use in a network access authentication procedure, and as a carrier for data server address information. | 08-27-2009 |
20090217364 | Method and Apparatus for Managing Subscription Credentials in a Wireless Communication Device - According to the teachings presented herein, a wireless communication device reverts from subscription credentials to temporary access credentials, in response to detecting an access failure. The device uses its temporary access credentials to gain temporary network access, either through a preferred network (e.g., home network) or through any one of one or more non-preferred networks (e.g., visited networks). After gaining temporary access, the device determines whether it needs new subscription credentials and, if so, uses the temporary access to obtain them. Correspondingly, in one or more embodiments, a registration server is configured to support such operations, such as by providing determination of credential validity and/or by redirecting the device to a new home operator for obtaining new subscription credentials. | 08-27-2009 |
20120254997 | METHODS AND APPARATUSES FOR AVOIDING DAMAGE IN NETWORK ATTACKS - Methods and apparatuses in a client terminal ( | 10-04-2012 |
20140096193 | ACCESS THROUGH NON-3GPP ACCESS NETWORKS - When setting up communication from a user equipment UE ( | 04-03-2014 |
20150058980 | Methods and Apparatuses for Avoiding Damage in Network Attacks - Methods and apparatuses in a client terminal and a web server for enabling safe communication between said terminal and server. When the terminal obtains a web page from the server in a session, the terminal creates a context-specific key, Ks_NAF′, based on one or more context parameters, P1, . . . Pn, pertaining to said session and/or web page. The terminal then indicates the context-specific key in a login request to the server, and the server determines a context-specific key, Ks_NAF′, in the same manner to verify the client if the context-specific key determined in the web server matches the context-specific key received from the client terminal. The context-specific key is thus bound to and valid for the present context or session only and cannot be used in other contexts or sessions. | 02-26-2015 |