Smart card security feature profile in home subscriber server

作者: Silke Holtmanns

DOI:

关键词: Bootstrapping Server FunctionLogical securitySecurity associationCovert channelDatabaseExecutableNetwork Access ControlComputer scienceData securityKey (cryptography)

摘要: In accordance with the exemplary embodiments of invention there is at least a method, an executable computer program, and apparatus to determine network application function list desired user equipment security features be used, ordered by preference function, send database settings via bootstrapping server receive response including key, derived from information stored in database, corresponding feature contained list, thereby informing availability one equipment.

参考文章(21)
Imtiyaz Shaikh, Xuming Chen, IP pool name lists ,(2010)
Nuria Esteban-Vares, Zamora David Castellanos, Methods and apparatus for use in a generic bootstrapping architecture ,(2009)
Gregory Gordon Rose, James Semple, John Wallace Nasielski, Secure bootstrapping for wireless communications ,(2006)
Ravi Pandey, Hannu Tuominen, Fabio Fadini, Attachment solution for multi-access environments ,(2007)
Pruthvi Panyam Nataraj, Eduardo Lazaro Reyes, Bipin Tomar, Arun Prasath Anbalagan, Method and system for software installation ,(2007)
Gabor Bajko, Tat Keung Chan, Authentication in communications networks ,(2006)
Jyrki Aarnos, Hisham Khartabil, Ilkka Westman, Jose Costa-Requena, Method and apparatus for resolving protocol-agnostic schemes in an internet protocol multimedia subsystem ,(2003)
Erik Huestis, Michael Huestis, Robert DeAnna, Dan McFeely, Bill Gockeler, Bryan Freeland, System for development, management and operation of distributed clients and servers ,(2002)