Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

679 results about "International mobile subscriber identity" patented technology

The international mobile subscriber identity or IMSI /ˈɪmziː/ is a number that uniquely identifies every user of a cellular network. It is stored as a 64-bit field and is sent by the mobile device to the network. It is also used for acquiring other details of the mobile in the home location register (HLR) or as locally copied in the visitor location register. To prevent eavesdroppers from identifying and tracking the subscriber on the radio interface, the IMSI is sent as rarely as possible and a randomly-generated TMSI is sent instead.

Radius-based mobile internet protocol (IP) address-to-mobile identification number mapping for wireless communication

A method of finding a mobile wireless communications device when an Internet Protocol (IP) packet from a remote user is sent to the device over an IP network. The mobile device does not have to register with the IP network in order to receive the IP. The method comprises the steps of receiving the IP packet at a home agent associated with a wireless communications network. The IP packet includes an IP address assigned to the device. If there is no current mobility binding record for the mobile device, instead of dropping the packet the home agent sends an access-request packet, containing the IP address, to an authentication server. The authentication server, e.g., a RADIUS server, maintains a table mapping the IP address for the device to an identification number uniquely associated with the device, such as the device's International Mobile Subscriber Identity number. The authentication server sends an access-accept packet to the home agent in the event that the device is authorized to receive the IP packet, in which case the access-accept packet includes the identification information. The home agent uses the identification number to locate, page and automatically connect the wireless device to the IP network via an InterWorking Unit (IWU) configured as a IP network access server.
Owner:UTSTARCOM INC

Multiple IMSI multiple/single MSISDN (MIMM/MISM) on multiple SIMs for a single operator

A method and apparatus for a Multiple IMSI Multiple / Single MSISDN (MIMM / MISM) on Multiple SIMs service for a single mobile communications network operator. In one embodiment, a system includes a Signaling Gateway that includes a MIMM / MISM application. Embodiments include a designating a set of subscriber identity modules (SIMs) for a subscriber, wherein the set of SIMs is registered to the subscriber; and wherein the set of SIMs comprises multiple SIMs, each of which is useable in one or more mobile communication devices, and each of which comprises a different international mobile subscriber identity (IMSI). Embodiments further include configuring the set of SIMs and the network such that the subscriber presents a uniform appearance to entities communicating with the subscriber regardless of which SIM is used for the communication, wherein the subscriber can simultaneously carry on a voice call on one SIM and carry on a data session on another SIM.
Owner:ROAMWARE

Short-range wireless system and method for multimedia tags

A short-range wireless system and method is disclosed to store and transfer a new type of multimedia data construct called a tag. A user can write text, create a voice clip and append it to the text, take a digital picture and append it to the text, to create a multimedia file as the content of a tag. The creation or modifying of the multimedia file can be done in the user's mobile wireless device or off line and then stored in the mobile device. The multimedia file is then incorporated into the tag or it can be referenced by a pointer in the tag. The multimedia file is artistic expression of the user and the tag uniquely associates the user's identity with the multimedia file by prohibiting alteration of the content after the user completes its creation. A content-originator flag (CFG) value in the tag is set to “false” during the period when the user is creating or modifying the tag's content. When the user completes editing the content of the tag, the content-originator flag (CFG) value is set to true, thereby freezing the content. The tag includes the user's ID, such as his / her international mobile subscriber identity (IMSI) or mobile station ISDN number (MSISDN). Subsequent viewers of the content can make a copy of the content and can then modify it, but they cannot authentically attribute the modified copy to the original user. The system can be implemented as a wireless personal area network (PAN) such as provided in the Bluetooth Standard or a wireless local area network (LAN) such as provided in the IEEE 802.11 Wireless LAN Standard and the HIPERLAN Standard.
Owner:NOKIA TECH OY

Security protection method and security protection system for mobile terminal application

The invention discloses a security protection method and a security protection system for a mobile terminal application, and belongs to the field of terminal application security protection. The method comprises the steps that a mobile terminal equipment identity, a mobile subscriber identity and subscriber login information are sent to a server for registration during a registration course, and bound to form a subscriber identity; login information, the mobile terminal equipment identity and the mobile subscriber identity in the current subscriber identity are compared with the original subscriber identity in the server sequentially during a login course to determine information required to be updated; and updating is performed by authentication of the original mobile subscriber identity finally. According to the method and the system, a mobile terminal equipment information binding method is adopted, so that the security problems due to the fact that terminal equipment is updated, an SIM (Subscriber Identity Module) card number is replaced or the subscriber login information is stolen under the condition of single registration of a subscriber are solved, and the security and conveniences of the terminal application are improved.
Owner:方正国际软件(北京)有限公司

Automatic protecting method for computer system based on Bluetooth device authentication

The invention provides an automatic protecting method for a computer system based on Bluetooth device authentication. In the method, a control program is written in a disk MBR (Master Boot Record), and double authentication of hardware equipment and user identity is realized by combining a Bluetooth wireless transmitting protocol before an operating system is started and using a Bluetooth address, a PIN (Personal Identification Number) code and a mobile terminal IMSI (International Mobile Subscriber Identity) number. In an operation process of the operating system, automatic real-time monitoring is set, the system can be automatically locked and can not be operated once the Bluetooth device of a user deviates from the coverage area of a Bluetooth adapter; and the system can be automatically unlocked and recovered for operation once the Bluetooth device of the user returns to the coverage area.
Owner:SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products