Method of checking amount of transmitted data
First Claim
Patent Images
1. A method, comprising:
- maintaining in a network infrastructure a first indication of an amount of data transmitted over a connection in a communication system;
maintaining in an apparatus a second indication of the amount of data transmitted over the connection;
triggering, in response to encountering a predetermined checking value, a checking procedure to find out whether or not the connection is used by an intruder, the checking procedure utilizing integrity protected signalling messages and the first and second indications;
transmitting at least one of the first and second indications in an integrity protected signalling message during the checking procedure between the apparatus and the network infrastructure;
verifying the integrity of the integrity protected signalling message; and
comparing, in response to the integrity being verified, the first indication with the second indication during the checking procedure.
2 Assignments
0 Petitions
Accused Products
Abstract
During a connection between a network infrastructure and user equipment a first indication of the amount of data transmitted over the connection is maintained in the network infrastructure and a second indication of the amount data transmitted is maintained in the user equipment. A checking procedure is triggered in response to encountering a predetermined checking value. The checking procedure utilizes integrity protected signalling. During the checking procedure the first indication is compared with the second indication.
24 Citations
20 Claims
-
1. A method, comprising:
-
maintaining in a network infrastructure a first indication of an amount of data transmitted over a connection in a communication system; maintaining in an apparatus a second indication of the amount of data transmitted over the connection; triggering, in response to encountering a predetermined checking value, a checking procedure to find out whether or not the connection is used by an intruder, the checking procedure utilizing integrity protected signalling messages and the first and second indications; transmitting at least one of the first and second indications in an integrity protected signalling message during the checking procedure between the apparatus and the network infrastructure; verifying the integrity of the integrity protected signalling message; and comparing, in response to the integrity being verified, the first indication with the second indication during the checking procedure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A communication system comprising:
-
a network infrastructure; at least one apparatus; and a connection established between the apparatus and the network infrastructure;
whereinthe network infrastructure is configured to maintain a first indication of the amount of data transmitted over the connection; the apparatus is configured to maintain a second indication of the amount of data transmitted over the connection; and the network infrastructure is configured to trigger, in response to encountering a predetermined checking value, a checking procedure to find out whether or not the connection is used by an intruder, the checking procedure utilizing integrity protected signalling messages and the first and second indications, to transmit during the checking procedure at least one of the indications in an integrity protected signalling message between the apparatus and the network infrastructure;
to verify the integrity of integrity protected signalling message; and
in response to the integrity being verified to compare the first indication with the second indication during the checking procedure. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification