AU2001279743A1 - System and method for secure mobile communication - Google Patents

System and method for secure mobile communication

Info

Publication number
AU2001279743A1
AU2001279743A1 AU2001279743A AU7974301A AU2001279743A1 AU 2001279743 A1 AU2001279743 A1 AU 2001279743A1 AU 2001279743 A AU2001279743 A AU 2001279743A AU 7974301 A AU7974301 A AU 7974301A AU 2001279743 A1 AU2001279743 A1 AU 2001279743A1
Authority
AU
Australia
Prior art keywords
security
communication
network elements
communicate
mobile communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001279743A
Inventor
Stephen Eric Billington
Erwin Perry Comer
Rong Shi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motorola Solutions Inc
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc filed Critical Motorola Inc
Publication of AU2001279743A1 publication Critical patent/AU2001279743A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/18Negotiating wireless communication parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices

Abstract

This invention relates to a communication system (100) and providing secure communication therefor. The communication system (100) comprises two networks (101, 129) which may be run by different operators each having a security controller (201,203) and a network element (123,125). The two security controllers (201,203) are operable to negotiate a security key and a security mechanism through a first communication link and communicate this to the network elements (123,125). The security mechanisms include security algorithms and protocols. The network elements (123,125) then communicate with each other through a second communication link using the security key and security mechanism communicated. The communication between the network elements (123,125) is via an Internet Protocol connection and the security mechanism and security key form a Security Association as defined in IPsec as standardised by the Internet Engineering Task Force (IETF). The invention is applicable to UMTS communication systems.
AU2001279743A 2000-07-17 2001-07-12 System and method for secure mobile communication Abandoned AU2001279743A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US61885000A 2000-07-17 2000-07-17
US09/618,850 2000-07-18
PCT/EP2001/008092 WO2002007404A2 (en) 2000-07-17 2001-07-12 System and method for secure mobile communication

Publications (1)

Publication Number Publication Date
AU2001279743A1 true AU2001279743A1 (en) 2002-01-30

Family

ID=24479378

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001279743A Abandoned AU2001279743A1 (en) 2000-07-17 2001-07-12 System and method for secure mobile communication

Country Status (7)

Country Link
EP (1) EP1303968B1 (en)
CN (1) CN1200544C (en)
AT (1) ATE344571T1 (en)
AU (1) AU2001279743A1 (en)
DE (1) DE60124258T2 (en)
GB (1) GB2365720B (en)
WO (1) WO2002007404A2 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181012B2 (en) * 2000-09-11 2007-02-20 Telefonaktiebolaget Lm Ericsson (Publ) Secured map messages for telecommunications networks
GB2370732B (en) * 2001-10-17 2003-12-10 Ericsson Telefon Ab L M Security in communications networks
CN100433639C (en) * 2005-01-27 2008-11-12 华为技术有限公司 Method and system for realizing network safety control
CN100479376C (en) * 2005-06-27 2009-04-15 华为技术有限公司 Method of distinguishing playback management message
US8532653B2 (en) * 2006-08-11 2013-09-10 Intellectual Ventures Holding 81 Llc Managing control signalling over different radio access technologies (RATS) using different types of spectrum
US9077772B2 (en) * 2012-04-20 2015-07-07 Cisco Technology, Inc. Scalable replay counters for network security
CN103686717B (en) * 2013-12-23 2016-09-07 江苏物联网研究发展中心 A kind of key management method of Internet of Things sensor-based system
CN104092697B (en) * 2014-07-18 2017-09-15 新华三技术有限公司 A kind of time-based anti-replay method and device

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4888801A (en) * 1988-05-02 1989-12-19 Motorola, Inc. Hierarchical key management system
US5222140A (en) * 1991-11-08 1993-06-22 Bell Communications Research, Inc. Cryptographic method for key agreement and user authentication
EP0658021B1 (en) * 1993-12-08 2001-03-28 International Business Machines Corporation A method and system for key distribution and authentication in a data communication network
IL113259A (en) * 1995-04-05 2001-03-19 Diversinet Corp Apparatus and method for safe communication handshake and data transfer
US6252869B1 (en) * 1995-12-29 2001-06-26 At&T Corp. Data network security system and method
US5862220A (en) * 1996-06-03 1999-01-19 Webtv Networks, Inc. Method and apparatus for using network address information to improve the performance of network transactions
US5778173A (en) * 1996-06-12 1998-07-07 At&T Corp. Mechanism for enabling secure electronic transactions on the open internet

Also Published As

Publication number Publication date
ATE344571T1 (en) 2006-11-15
DE60124258T2 (en) 2007-09-13
EP1303968A2 (en) 2003-04-23
CN1200544C (en) 2005-05-04
DE60124258D1 (en) 2006-12-14
GB2365720B (en) 2004-04-14
CN1442014A (en) 2003-09-10
GB0020645D0 (en) 2000-10-11
WO2002007404A2 (en) 2002-01-24
GB2365720A (en) 2002-02-20
WO2002007404A3 (en) 2002-09-06
EP1303968B1 (en) 2006-11-02

Similar Documents

Publication Publication Date Title
EP1414215A3 (en) System and methodology providing automation security protocols and intrusion detection in an industrial controller environment
MXPA04001160A (en) Method and process management system for the operation of a technical plant.
CA2341213A1 (en) System and method for enabling secure access to services in a computer network
WO2002044858A3 (en) System and method for securing a non-secure communication channel
AU2001261379A1 (en) Intelligent feedback loop process control system
WO2006050074A3 (en) System and method for providing a multi-credential authentication protocol
WO2005065007A3 (en) Method and system for authentication using infrastructureless certificates
WO2002095543A3 (en) Apparatus and method for providing secure network communication
WO2002045370A3 (en) Secure session management and authentication for web sites
CA2377292A1 (en) System and method for providing secure communications between wireless units using a common key
WO2003075121A3 (en) Firewall
WO2005001660A3 (en) Secure network privacy system using proxy server
WO2000002758A3 (en) Optimized communication system for radio-assisted traffic services
WO2007127547A3 (en) Method and system for propagating mutual authentication data in wireless communication networks
WO2005057880A3 (en) Interface between ethernet and storage area network
AU2001279743A1 (en) System and method for secure mobile communication
CA2487499A1 (en) Method, means, and computer program product for controlling and/or restricting use of telecommunications connection
WO2002078199A3 (en) A method and system for remotely authenticating identification devices
EP1322079A3 (en) System and method for providing gaps between data elements at ingress to a network element
WO2005046157A3 (en) Method for safeguarding data transmission between a first terminal and a first network and between a second terminal and a second network
WO2007047092A3 (en) Method and system for network-aware applications
WO2005060273A3 (en) Security for wireless transmission
EP1257107A3 (en) Two-way communicating method and system and information processing apparatus
WO2002082780A3 (en) Method for controlling machines or devices on fixed line connections by means of at least one telecommunication network
AU3759600A (en) Internet, intranet and other network communication security systems utilizing entrance and exit keys