Content and security proxy in a mobile communications system
1 Assignment
0 Petitions
Accused Products
Abstract
A method and device is provided for making available security functions during the transmission of data from and to a subscriber terminal of a mobile communications network. A real-time analysis of the data flow from and to the subscriber terminal is carried out in a device of a network node of the mobile communications network during which data with contents defined beforehand by the subscriber or by a network operator/provider are identified and processed. This results in protecting the terminal and subscriber'"'"'s devices connected thereto from external attacks.
-
Citations
20 Claims
-
1-10. -10. (canceled)
-
11. A method for making available security functions for the transmission of data from and to a subscriber terminal unit of a mobile communications network, comprising:
-
carrying out a real-time analysis of the data flow from and to the subscriber terminal unit in a device of a network node of the mobile communications network, the data having contents specified previously by one of a subscriber and a network operator being recognized and processed further; and
carrying out first an authentication method by which the subscriber is authenticated via the device of the network node. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A device for making available security functions for the transmission of data from and to a subscriber terminal unit of a mobile communications network, including a security and filtering device comprising:
-
a filter component for the real-time analysis of the data flow from and to the subscriber terminal unit;
an authentication component for authenticating the subscriber vis-a-vis the security and filtering device;
an administrative component as the interface to the subscriber; and
a database for storing subscriber-specific and network operator-specific data and security and filtering functions. - View Dependent Claims (19, 20)
-
Specification