Security Protocols for Mobile Operator Networks
First Claim
1. A method implemented by a computer device at a media content provider, the method comprising:
- establishing a mobile communication link with a mobile phone via a communication service provider with which the mobile phone is registered for mobile communications, and via at least one roaming node network with which the communication service provider has a roaming service agreement;
receiving a security policy request from the mobile phone to establish a security policy for end-to-end security of the mobile communication link between the media content provider and the mobile phone for data communication security; and
communicating a security policy response to the mobile phone to establish the security policy for the end-to-end security of the mobile communication link that is adaptable to security restrictions of the roaming node network.
2 Assignments
0 Petitions
Accused Products
Abstract
Security protocols for mobile operator networks are described. In embodiments, mobile communication link is established between a mobile phone and a media content provider via a communication service provider with which the mobile phone is registered for mobile communications, and via at least one roaming node network with which the communication service provider has a roaming service agreement. The media content provider receives a security policy request from the mobile phone to establish a security policy for end-to-end security of the mobile communication link between the media content provider and the mobile phone for data communication security. The media content provider then communicates a security policy response to the mobile phone to establish the security policy for the end-to-end security of the mobile communication link that is adaptable to security restrictions of the roaming node network.
29 Citations
20 Claims
-
1. A method implemented by a computer device at a media content provider, the method comprising:
-
establishing a mobile communication link with a mobile phone via a communication service provider with which the mobile phone is registered for mobile communications, and via at least one roaming node network with which the communication service provider has a roaming service agreement; receiving a security policy request from the mobile phone to establish a security policy for end-to-end security of the mobile communication link between the media content provider and the mobile phone for data communication security; and communicating a security policy response to the mobile phone to establish the security policy for the end-to-end security of the mobile communication link that is adaptable to security restrictions of the roaming node network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method implemented by a mobile phone, the method comprising:
-
establishing a mobile communication link with a media content provider via a communication service provider with which the mobile phone is registered for mobile communications, and via at least one roaming node network with which the communication service provider has a roaming service agreement; communicating a security policy request to the media content provider to establish a security policy for end-to-end security of the mobile communication link between the media content provider and the mobile phone for data communication security; and receiving a security policy response from the media content provider to establish the security policy for the end-to-end security of the mobile communication link that is adaptable to security restrictions of the roaming node network. - View Dependent Claims (13, 14)
-
-
15. A mobile communication system, comprising:
-
a media content provider configured to establish a mobile communication link with a mobile phone via a communication service provider with which the mobile phone is registered for mobile communications, and via at least one roaming node network with which the communication service provider has a roaming agreement; a security protocol service implemented by a computer device at the media content provider, the security protocol service configured to; receive a security policy request from the mobile phone to establish a security policy for end-to-end security of the mobile communication link between the media content provider and the mobile phone for data communication security; determine an encryption policy for the roaming node network based on a region code that corresponds to the roaming node network; and initiate communication of a security policy response to the mobile phone, the security policy response including the encryption policy that is utilized to establish the security policy for the end-to-end security of the mobile communication link that is adaptable to security restrictions of the roaming node network. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification