Method of checking amount of transmitted data
First Claim
1. An apparatus comprising a processor and a memory operatively connected to the processor, wherein the processor is configured to:
- store and update a first indication in the memory of a first amount of data transmitted over a connection with another apparatus, where the first amount of data transmitted over the connection represents an amount of data sent from the apparatus and an amount of data received at the apparatus,receive a counter check message from the other apparatus, where the counter check message is an integrity protected signalling message comprising a second indication of a second amount of data transmitted over the connection, where the second amount of data transmitted over the connection represents an amount of data sent from the other apparatus and an amount of data received at the other apparatus,in response to receiving the counter check message, compare the first indication with the second indication, andcause an integrity-protected signalling message indicating the comparison result to be sent to the other apparatus.
2 Assignments
0 Petitions
Accused Products
Abstract
During a connection between a network infrastructure and user equipment a first indication of the amount of data transmitted over the connection is maintained in the network infrastructure and a second indication of the amount data transmitted is maintained in the user equipment. A checking procedure is triggered in response to encountering a predetermined checking value. The checking procedure utilizes integrity protected signalling. During the checking procedure the first indication is compared with the second indication. This checking procedure enables easy discovery of an intruder who either sends and/or receives data on an authorized connection between a network infrastructure and a mobile station, the data transmission being charged from the mobile station.
12 Citations
28 Claims
-
1. An apparatus comprising a processor and a memory operatively connected to the processor, wherein the processor is configured to:
-
store and update a first indication in the memory of a first amount of data transmitted over a connection with another apparatus, where the first amount of data transmitted over the connection represents an amount of data sent from the apparatus and an amount of data received at the apparatus, receive a counter check message from the other apparatus, where the counter check message is an integrity protected signalling message comprising a second indication of a second amount of data transmitted over the connection, where the second amount of data transmitted over the connection represents an amount of data sent from the other apparatus and an amount of data received at the other apparatus, in response to receiving the counter check message, compare the first indication with the second indication, and cause an integrity-protected signalling message indicating the comparison result to be sent to the other apparatus. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus comprising a processor and a memory operatively connected to the processor, wherein the processor is configured to:
-
store and update a first indication in the memory of a first amount of data transmitted over a connection with another apparatus, where the first amount of data transmitted over the connection represents an amount of data sent from the apparatus and an amount of data received at the apparatus, trigger an intruder checking procedure in response to encountering a predefined checking value by sending the first indication to the other apparatus in a counter check message, where the counter check message is an integrity-protected signalling message, and receive a comparison result during the checking procedure, said comparison result being provided by an integrity protected signalling message received from the other apparatus, upon completion of the checking procedure, determining whether the connection is being used by an intruder based at least in part on the comparison result. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory, computer-readable medium comprising computer executable instructions thereon which, when executed by a processor of an apparatus, causes the processor:
-
to store and update a first indication in a memory of a first amount of data transmitted over a connection with another apparatus, where the first amount of data transmitted over the connection represents an amount of data sent from the apparatus and an amount of data received at the apparatus, to receive a counter check message from the other apparatus, where the counter check message is an integrity protected signalling message comprising a second indication of a second amount of data transmitted over the connection, where the second amount of data transmitted over the connection represents an amount of data sent from the other apparatus and an amount of data received at the other apparatus, in response to receiving the counter check message, to compare the first indication with the second indication; and to cause an integrity-protected signalling message indicating the comparison result to be sent over the connection. - View Dependent Claims (18)
-
-
19. A non-transitory, computer-readable medium comprising computer executable instructions thereon which, when executed by a processor of an apparatus, causes the processor:
-
to store and update a first indication of a first amount of data transmitted over a connection with another apparatus, where the first amount of data transmitted over the connection represents an amount of data sent from the apparatus and an amount of data received at the apparatus, to trigger an intruder checking procedure in response to encountering a predefined checking value by sending a first indication to the other apparatus in a counter check message, where the counter check message is an integrity-protected signalling message, to receive a comparison result during the checking procedure, said comparison result being provided by an integrity protected signalling message received from the other apparatus, to deduce, on the basis of the comparison result whether the connection is being used only by legal users. - View Dependent Claims (20)
-
-
21. An method comprising:
-
storing and updating a first indication in a memory of a first apparatus of a first amount of data transmitted over a connection with another apparatus, where the first amount of data transmitted over the connection represents an amount of data sent from the first apparatus and an amount of data received at the first apparatus, receiving a counter check message from the other apparatus at the first apparatus, where the counter check message is an integrity protected signalling message comprising a second indication of a second amount of data transmitted over the connection, where the second amount of data transmitted over the connection represents an amount of data sent from the other apparatus and an amount of data received at the other apparatus, in response to receiving the counter check message, comparing the first indication with the second indication, by a processor of the first apparatus, and causing an integrity-protected signalling message indicating the comparison result to be sent to the other apparatus. - View Dependent Claims (22, 23, 24)
-
-
25. An method comprising:
-
storing and updating a first indication in a memory of a first apparatus of a first amount of data transmitted over a connection with another apparatus, where the first amount of data transmitted over the connection represents an amount of data sent from the first apparatus and an amount of data received at the first apparatus, in response to encountering a predefined checking value, triggering an intruder checking procedure by sending the first indication to the other apparatus in a counter check message, where the counter check message is an integrity-protected signalling message, and receiving a comparison result during the checking procedure at the first apparatus, said comparison result being provided by an integrity protected signalling message received from the other apparatus, upon completion of the checking procedure, determining whether the connection is being used by an intruder based at least in part on the comparison result. - View Dependent Claims (26, 27, 28)
-
Specification