Content and security proxy in a mobile communications system
First Claim
1. A method for making available security functions for the transmission of data from and to a subscriber terminal unit of a mobile communications network, comprising:
- carrying out a real-time analysis of the data flow from and to the subscriber terminal unit in a device of a network node of the mobile communications network, the data having contents specified previously by one of a subscriber and a network operator being recognized and processed further; and
carrying out first an authentication method by which the subscriber is authenticated via the device of the network node,wherein at least one of an arising data transfer volume and an arising data transfer cost is limited to a predefined measure, and wherein the authentication method is adjustable at least one of dynamically and interactively.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and device is provided for making available security functions during the transmission of data from and to a subscriber terminal of a mobile communications network. A real-time analysis of the data flow from and to the subscriber terminal is carried out in a device of a network node of the mobile communications network during which data with contents defined beforehand by the subscriber or by a network operator/provider are identified and processed. This results in protecting the terminal and subscriber'"'"'s devices connected thereto from external attacks.
7 Citations
12 Claims
-
1. A method for making available security functions for the transmission of data from and to a subscriber terminal unit of a mobile communications network, comprising:
-
carrying out a real-time analysis of the data flow from and to the subscriber terminal unit in a device of a network node of the mobile communications network, the data having contents specified previously by one of a subscriber and a network operator being recognized and processed further; and carrying out first an authentication method by which the subscriber is authenticated via the device of the network node, wherein at least one of an arising data transfer volume and an arising data transfer cost is limited to a predefined measure, and wherein the authentication method is adjustable at least one of dynamically and interactively. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A device for making available security functions for the transmission of data from and to a subscriber terminal unit of a mobile communications network, including a security and filtering device comprising:
-
a filter component for the real-time analysis of the data flow from and to the subscriber terminal unit; an authentication component for authenticating the subscriber vis-a-vis the security and filtering device, the authentication component being adjustable at least one of dynamically and interactively; an administrative component as the interface to the subscriber; and a database for storing subscriber-specific and network operator-specific data and security and filtering functions. - View Dependent Claims (11, 12)
-
Specification