Security Method for the Verification of an Information Retrieval Request
First Claim
1. A security method for the verification of an Information Retrieval Request (10) which requests a transmission of data (20) from a Location Register Server (LR) to a Sending Entity (30) in a Mobile Communication Network (100), comprising the following steps:
- receiving an Information Retrieval Request (10) from the Sending Entity (20),extracting at least one Specification Code (12) for specifying the Sending Entity (20) and/or a Mobile Subscriber (MS) out of the Information Retrieval Request (10),comparing the extracted at least one Specification Code (12) to a Verification List (14),based on the result of the comparison with the Verification List (14), allowing or prohibiting the transmission of data (20) requested in the Information Retrieval Request (10).
1 Assignment
0 Petitions
Accused Products
Abstract
The invention is related to security method for the verification of an Information Retrieval Request (10) which requests a transmission of data (20) from a Location Register Server (LR) to a Sending Entity (30) in a Mobile Communication Network (100), comprising the following steps: receive an Information Retrieval Request (10) from the Sending Entity (20); extract at least one Specification Code (12) for specifying the Sending Entity (20) and/or a Mobile Subscriber (MS) out of the Information Retrieval Request (10); compare the extracted at least one Specification Code (12) to a Verification List (14); based on the result of the comparison with the Verification List (14), allow or prohibit the transmission of data (20) requested in the Information Retrieval Request (10).
-
Citations
20 Claims
-
1. A security method for the verification of an Information Retrieval Request (10) which requests a transmission of data (20) from a Location Register Server (LR) to a Sending Entity (30) in a Mobile Communication Network (100), comprising the following steps:
-
receiving an Information Retrieval Request (10) from the Sending Entity (20), extracting at least one Specification Code (12) for specifying the Sending Entity (20) and/or a Mobile Subscriber (MS) out of the Information Retrieval Request (10), comparing the extracted at least one Specification Code (12) to a Verification List (14), based on the result of the comparison with the Verification List (14), allowing or prohibiting the transmission of data (20) requested in the Information Retrieval Request (10). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product being stored on a computer readable medium, comprising the following:
-
computer readable program means, initiating the computer to receive an Information Retrieval Request (10) from a Sending Entity (30), computer readable program means, initiating the computer to extract at least one Specification Code (12) for the Sending Entity (30) and/or a Mobile Subscriber (MS) out of the Information Retrieval Request (10), computer readable program means, initiating the computer to compare the extracted at least one Specification Code (12) to a Verification List (14), computer readable program means, initiating the computer, based on the result of the comparison with the Verification List (14), to allow or prohibit the transmission of data (20) requested in the Information Retrieval Request (10). - View Dependent Claims (12)
-
-
13. A security device (200) for the verification of an Information Retrieval Request (10) which requests a transmission of data (20) from a Location Register Server (LR) to a Sending Entity (30), comprising:
-
a Receiving Module (210) for receiving an Information Retrieval Request (10) from a Sending Entity (20), an Extraction Module (220) for extracting at least one Specification Code (12) for the Sending Entity (20) and/or a Mobile Subscriber (MS) out of the Information Retrieval Request (10), a Comparison Module (230) for comparing the extracted at least one Specification Code (12) to a Verification List (14) and a Verification Module (240) for prohibiting or allowing the transmission of the data (20) requested in the Information Retrieval Request (10) based on the result of the comparison. - View Dependent Claims (14, 15, 16)
-
-
17. A mobile communication network (100) for communication between mobile stations (300) comprising a Home Location Register Server (HLR) and multiple Location Register Servers (LR) characterized in that the Location Register Servers (LR) and/or Signal Transfer Points (STP) to the Location Register Servers (LR) comprise a Security Device (200) comprising:
-
a Receiving Module (210) for receiving an Information Retrieval Request (10) from a Sending Entity (20), an Extraction Module (220) for extracting at least one Specification Code (12) for the Sending Entity (20) and/or a Mobile Subscriber (MS) out of the Information Retrieval Request (10), a Comparison Module (230) for comparing the extracted at least one Specification Code (12) to a Verification List (14) and a Verification Module (240) for prohibiting or allowing the transmission of the data (20) requested in the Information Retrieval Request (10) based on the result of the comparison. - View Dependent Claims (18, 19, 20)
-
Specification