×

Security protocols for mobile operator networks

  • US 9,270,700 B2
  • Filed: 06/18/2009
  • Issued: 02/23/2016
  • Est. Priority Date: 12/12/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented by a computer device at a media content provider, the method comprising:

  • establishing a mobile communication link with a mobile device via a communication service provider with which the mobile device is registered for mobile communications, and via at least one roaming node network with which the communication service provider has a roaming service agreement;

    receiving a security policy request from the mobile device to establish a security policy for end-to-end security of the mobile communication link between the media content provider and the mobile device for data communication security;

    communicating a security policy response to the mobile device to establish the security policy for the end-to-end security of the mobile communication link;

    communicating a challenge to the mobile device via the mobile communication link that is secure based on the security policy, the mobile communication link including the roaming node network and a mobile operator network that is managed by the communication service provider; and

    receiving the challenge back from the mobile device via the mobile operator network and the communication service provider, the challenge including data added by the communication service provider, the added data comprising a billing identifier that is associated with the mobile device, the billing identifier being securely received from the communication service provider via the mobile communication link.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×