Processing

Please wait...

Settings

Settings

Goto Application

1. WO2010088428 - CERTIFIED DEVICE-BASED ACCOUNTING

Publication Number WO/2010/088428
Publication Date 05.08.2010
International Application No. PCT/US2010/022453
International Filing Date 28.01.2010
IPC
H04W 12/12 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
12Fraud detection
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
CPC
H04L 12/14
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
12Data switching networks
02Details
14Metering,; charging ; or billing; arrangements ; specially adapted for data wireline or wireless communications
H04L 12/1403
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
12Data switching networks
02Details
14Metering,; charging ; or billing; arrangements ; specially adapted for data wireline or wireless communications
1403Architecture for metering, charging or billing
H04L 63/0823
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0823using certificates
H04L 63/126
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
12Applying verification of the received information
126the source of the received data
H04M 15/00
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
MTELEPHONIC COMMUNICATION
15Arrangements for metering, time-control or time indication ; ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
H04M 15/28
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
MTELEPHONIC COMMUNICATION
15Arrangements for metering, time-control or time indication ; ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
28with meter at substation ; or with calculation of charges at terminal
Applicants
  • QUALCOMM INCORPORATED [US]/[US] (AllExceptUS)
  • VANDERVEEN, Michaela [US]/[US] (UsOnly)
  • STEPHENS, Arthur [GB]/[US] (UsOnly)
  • PARK, Vincent, D. [US]/[US] (UsOnly)
Inventors
  • VANDERVEEN, Michaela
  • STEPHENS, Arthur
  • PARK, Vincent, D.
Agents
  • O'HARE, James, K.
Priority Data
12/362,20329.01.2009US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) CERTIFIED DEVICE-BASED ACCOUNTING
(FR) OPÉRATIONS COMPTABLES CERTIFIÉES À PARTIR D'UN APPAREIL MOBILE
Abstract
(EN)
Providing for secure tracking and reporting of wireless resources utilized by a mobile device is described herein. By way of example, resources utilized in conjunction with network- facilitated or peer-to-peer wireless data exchange can be tracked in secure, tamper-resistant components of the mobile device. Further, a report can be compiled from the tracked information and digitally signed with a secret data/material specific to the mobile device. The signed report can be submitted to a network server in conjunction with accounting, billing or like functions. By validating the signature of a mobile device, the network server can trust that information collected and submitted by user devices has not been tampered with or spoofed with an ID of another such device.
(FR)
L'invention concerne la mise à disposition d'opérations de suivi et de création de rapports sécurisées, via des ressources sans fil utilisées par un appareil mobile. À titre d'exemple, les ressources utilisées en liaison avec un échange de données réseau ou poste-à-poste sans fil peuvent être suivies dans des composants sécurisés et inviolables de l'appareil mobile. Il est en outre possible de compiler un rapport à partir des informations suivies, et de le signer numériquement au moyen de données ou éléments secrets spécifiques à l'appareil mobile. Le rapport signé peut être soumis à un serveur réseau en liaison avec des fonctions de comptabilité, de facturation ou similaires. La validation de la signature d'un appareil mobile constitue, pour le serveur réseau, la preuve que les informations recueillies et présentées par des appareils d'utilisateurs n'ont pas été altérées ni falsifiées avec un identifiant d'un autre appareil.
Latest bibliographic data on file with the International Bureau