Abstract:
There are provided methods, systems and apparatus for identifying and/or changing the level of bearer security provided for a communications connection (315) between a terminal (310) and a serving network (320). An example method comprises the steps of communicating from the terminal (310) to a telecommunications network entity (324) in the serving network a security demand comprising at least one request for at least one particular security setting to be applied to a corresponding security parameter of the communications connection, wherein the security parameter defines an aspect of the security of the communications connection. If at least one of the requested particular security settings can be applied to the corresponding security parameter, the telecommunications network entity applies the requested security setting to the corresponding security parameter.
Abstract:
The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.
Abstract:
Various communication systems may benefit from appropriate security measures. For example, mobile networks may benefit from the flexible selection of security features. A method can include receiving an attach request. The method can also include sending a response to the request. The response can include information configured to allow selection of a control plane integrity algorithm independently of a user plane integrity algorithm.
Abstract:
An electronic device is provided. The electronic device includes at least one communication module and a processor configured to control the at least one communication module. The processor is configured to verify properties of at least one communication network accessed by the electronic device through the at least one communication module, to determine an authentication scheme to be applied to a communication connection between the electronic device and an external electronic device and to establish the communication connection such that the external electronic device accesses the at least one communication network through the electronic device based on the authentication scheme.
Abstract:
A method (100), performed by an Extensible Authentication Protocol (EAP) authenticator in a communication network, is disclosed. The method comprises obtaining an identification of at least one EAP method supported by an EAP authentication server providing an EAP authentication service to the EAP authenticator (110), wherein the identification is obtained from a network entity of the communication network or from inspection of traffic through the EAP authenticator. The method also comprises providing the identification of at least one EAP method to a device operable to request communication network access from the EAP authenticator (120). Also disclosed is a method (300), performed in an EAP authentication server in a communication network, the method comprising receiving a request for identification of EAP methods supported by the EAP authentication server (310), and sending a response to the request identifying at least one EAP method supported by the EAP authentication server (320). An EAP authenticator (500, 700, 900), EAP authentication server (600, 800, 1000) and computer program configured to carry out methods performed in an EAP authenticator and EAP authentication server are also disclosed.
Abstract:
A WiFi access management system and methods of operation are disclosed. In one embodiment, a method comprises receiving, at a server, a wireless access profile and a wireless access list from a securing client device; transmitting an invitation message to an accessing client device associated with the wireless access list; receiving, at the server, a request from the accessing client device to connect to a wireless network associated with the wireless access profile in response to the invitation message; determining, using a processing unit of the server, an operating system of the accessing client device; creating, using the processing unit, a customized configuration file associated with the wireless network based on the operating system of the accessing client device, the wireless access profile, and the wireless access list; and transmitting the customized configuration file using a second encryption protocol to the accessing client device through the server communication unit.
Abstract:
Disclosed herein are systems and methods for determining learned associations between authentication credentials and network contextual data, such as may be utilized in a network that supports network roving. A mobile device attempts to rove to a visited network using authentication credentials associated with another network, based at least in part on first contextual information associated with the other network and second contextual information associated with the visited network indicating that the visited network is part of a common association of networks that supports roving internetworking between the networks of the common association.
Abstract:
An example disclosed herein involves receiving (410), via a network, a request to initiate a data session between a client and a server; analyzing (420) characteristics of the network; and selecting (430) an encryption technology for the data session based on the characteristics of the network.
Abstract:
Systems and methods for compute resource configuration, verification, and remediation are provided herein. An example method includes verifying compliance of an operating system and compute assets provisioned configured within a middleware of a computing device using a pre-defined configuration profile, the compliance being determined by comparison of run-time hardware and software attributes of the compute assets to the pre-defined configuration profile comprising hardware and software requirements for the client.
Abstract:
A computer implemented method of monitoring a collector computer system includes receiving machine interpretable code that is configured for interpretation by the interpreter that includes: information identifying a first set of one or more monitoring targets within the collector computer system, a method for monitoring the first set of one or more monitoring targets, and predefined reporting criteria. The method also includes interpreting the machine interpretable code with an interpreter; monitoring at least a subset of the first set of one or more monitoring targets for candidate activity that satisfies the predefined reporting criteria by executing compiled instructions that correspond to the method for monitoring the first set of one or more monitoring targets; obtaining candidate event information that is associated with the candidate activity; and reporting the candidate event information to a computer system that is distinct from the collector computer system.