CONNECTING METHOD FOR SECURE CONNECTING OF A MOBILE DEVICE SYSTEM TO A NETWORK
First Claim
Patent Images
1. Connecting method for secure connecting of a Mobile Device System (10) to a Network (100), comprising the following steps:
- Sending a communication request (20) from the Mobile Device System (10) to a Network Operator (30) requesting a communication to the Network (100),Receiving the communication request (20) at the Network Operator (30) and extracting at least one specification information (22) out of the communication request (20) specifying the Mobile Device System (10),Forwarding the communication request (20) via a private Access Point Network (APN) to a Cleaning Hub (50) based on the specification information (22),Comparing the communication request (20) at the Cleaning Hub (50) to at least one communication policy (40),Allowing or denying the communication of the Mobile Device System (10) to the Network (100) requested with the communication request (20) based on the result of the comparison to the at least one communication policy (40).
1 Assignment
0 Petitions
Accused Products
Abstract
The invention is related to a Connecting method for secure connecting of a Mobile Device System (10) to a Network (100), comprising the following steps:
- Sending a communication request (20) from the Mobile Device System (10) to a Network Operator (30) requesting a communication to the Network (100),
- Receiving the communication request (20) at the Network Operator (30) and extracting at least one specification information (22) out of the communication request (20) specifying the Mobile Device System (10),
- Forwarding the communication request (20) via a private Access Point Network (APN) to a Cleaning Hub (50) based on the specification information (22),
- Comparing the communication request (20) at the Cleaning Hub (50) to at least one communication policy (40),
- Allowing or denying the communication of the Mobile Device System (10) to the Network (100) requested with the communication request (20) based on the result of the comparison to the at least one communication policy (40).
6 Citations
20 Claims
-
1. Connecting method for secure connecting of a Mobile Device System (10) to a Network (100), comprising the following steps:
-
Sending a communication request (20) from the Mobile Device System (10) to a Network Operator (30) requesting a communication to the Network (100), Receiving the communication request (20) at the Network Operator (30) and extracting at least one specification information (22) out of the communication request (20) specifying the Mobile Device System (10), Forwarding the communication request (20) via a private Access Point Network (APN) to a Cleaning Hub (50) based on the specification information (22), Comparing the communication request (20) at the Cleaning Hub (50) to at least one communication policy (40), Allowing or denying the communication of the Mobile Device System (10) to the Network (100) requested with the communication request (20) based on the result of the comparison to the at least one communication policy (40). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 15, 16, 17, 18, 19, 20)
-
-
13. Computer program product being stored on a non transitory computer readable medium, comprising the following:
-
non transitory computer readable program means, initiating the computer to send a communication request (20) from a Mobile Device System (10) to a Network Operator (30) requesting a communication to a Network (100), non transitory computer readable program means, initiating the computer to receive the communication request (20) at the Network Operator (30) and extract at least one specification information (22) out of the communication request (20) specifying the Mobile Device System (10), non transitory computer readable program means, initiating the computer to forward the communication request (20) via a private Access Point Network (APN) to a Cleaning Hub (50) based on the specification information (22), non transitory computer readable program means, initiating the computer to compare the communication request (20) at the Cleaning Hub (50) to at least one communication policy (40), non transitory computer readable program means, initiating the computer to allow or deny the communication of the Mobile Device System (10) to the Network (100) requested with the communication request (20) based on the result of the comparison to the at least one communication policy (40). - View Dependent Claims (14)
-
Specification