SE9903370L - Method and apparatus for establishing a secure connection between access points and terminal in a packet switching communication network - Google Patents

Method and apparatus for establishing a secure connection between access points and terminal in a packet switching communication network

Info

Publication number
SE9903370L
SE9903370L SE9903370A SE9903370A SE9903370L SE 9903370 L SE9903370 L SE 9903370L SE 9903370 A SE9903370 A SE 9903370A SE 9903370 A SE9903370 A SE 9903370A SE 9903370 L SE9903370 L SE 9903370L
Authority
SE
Sweden
Prior art keywords
mobile terminal
access points
establishing
access
terminal
Prior art date
Application number
SE9903370A
Other languages
Swedish (sv)
Other versions
SE9903370D0 (en
SE519471C2 (en
Inventor
Andras Gergely Valko
Istvan Maricza
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Priority to SE9903370A priority Critical patent/SE519471C2/en
Publication of SE9903370D0 publication Critical patent/SE9903370D0/en
Priority to PCT/SE2000/001795 priority patent/WO2001022685A1/en
Priority to AU76942/00A priority patent/AU7694200A/en
Publication of SE9903370L publication Critical patent/SE9903370L/en
Publication of SE519471C2 publication Critical patent/SE519471C2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

In a method for establishing a secure communication in a packet based network comprising an access network (13) having access points (10) for two or more mobile terminals (11) belonging to the access network, a first access point is contacted by one mobile terminal in the intention of initiating a session from the mobile terminal. A secret key is generated using a function f stored in the access points acting on the information from the mobile terminal at the first access point by a converter known by two or more access points. The secret key is sent from the first access point to the mobile terminal using encryption, which is decrypted at the mobile terminal. The secret key is then used as a shared security key in communication between the mobile terminal and any access point knowing the converter.
SE9903370A 1999-09-20 1999-09-20 Method for establishing a secure connection between access points and a mobile terminal in a packet switched network SE519471C2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
SE9903370A SE519471C2 (en) 1999-09-20 1999-09-20 Method for establishing a secure connection between access points and a mobile terminal in a packet switched network
PCT/SE2000/001795 WO2001022685A1 (en) 1999-09-20 2000-09-15 Method and arrangement for communications security
AU76942/00A AU7694200A (en) 1999-09-20 2000-09-15 Method and arrangement for communications security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SE9903370A SE519471C2 (en) 1999-09-20 1999-09-20 Method for establishing a secure connection between access points and a mobile terminal in a packet switched network

Publications (3)

Publication Number Publication Date
SE9903370D0 SE9903370D0 (en) 1999-09-20
SE9903370L true SE9903370L (en) 2001-03-21
SE519471C2 SE519471C2 (en) 2003-03-04

Family

ID=20417062

Family Applications (1)

Application Number Title Priority Date Filing Date
SE9903370A SE519471C2 (en) 1999-09-20 1999-09-20 Method for establishing a secure connection between access points and a mobile terminal in a packet switched network

Country Status (3)

Country Link
AU (1) AU7694200A (en)
SE (1) SE519471C2 (en)
WO (1) WO2001022685A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2374497B (en) * 2001-04-03 2003-03-12 Ericsson Telefon Ab L M Facilitating legal interception of IP connections
JP3870081B2 (en) 2001-12-19 2007-01-17 キヤノン株式会社 COMMUNICATION SYSTEM AND SERVER DEVICE, CONTROL METHOD, COMPUTER PROGRAM FOR IMPLEMENTING THE SAME, AND STORAGE MEDIUM CONTAINING THE COMPUTER PROGRAM
AU2002342779A1 (en) * 2002-09-30 2004-05-04 Siemens Aktiengesellschaft Verifying check-in authentication by using an access authentication token
KR100628566B1 (en) * 2005-04-25 2006-09-26 삼성전자주식회사 Method for security information configuration wlan
DE102009019864A1 (en) * 2009-05-06 2010-11-18 Heinrich-Heine-Universität Düsseldorf Method of sharing wireless access points to a communication network

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5598459A (en) * 1995-06-29 1997-01-28 Ericsson Inc. Authentication and handover methods and systems for radio personal communications
SE506619C2 (en) * 1995-09-27 1998-01-19 Ericsson Telefon Ab L M Method for encrypting information
US5850444A (en) * 1996-09-09 1998-12-15 Telefonaktienbolaget L/M Ericsson (Publ) Method and apparatus for encrypting radio traffic in a telecommunications network

Also Published As

Publication number Publication date
SE9903370D0 (en) 1999-09-20
SE519471C2 (en) 2003-03-04
WO2001022685A1 (en) 2001-03-29
AU7694200A (en) 2001-04-24

Similar Documents

Publication Publication Date Title
US5410602A (en) Method for key management of point-to-point communications
ATE385147T1 (en) ARRANGING DATA ENCRYPTION IN A WIRELESS TELECOMMUNICATIONS SYSTEM
FI981564A0 (en) Authentication in a telecommunications network
KR950703236A (en) Efficient Real-Time Authentication and Encryption in a Communication System (Mtehod and Apparatus for Efficient Real-Time Authentication and Encryption in a Communication System)
TW428409B (en) Method for updating secret shared data in a wireless communication system
MXPA05008896A (en) Method for creating and distributing cryptographic keys in a mobile radio system, and corresponding mobile radio system.
HK1047003A1 (en) Key management for telephone calls to protect signaling and call packets between cta's
SE0003440D0 (en) Communication system
ATE332599T1 (en) METHOD AND DEVICE FOR INITIALIZING SECURE CONNECTIONS BETWEEN AND ONLY BETWEEN ASSOCIATED CORDLESS DEVICES
WO2003049357B1 (en) Lawful interception of end-to-end encrypted data traffic
AU2003279439A1 (en) Identification of a terminal with a server
WO2005006627A3 (en) Terminal identity masking in a wireless network
BR9714320A (en) Method and equipment for providing authentication security in a wireless communication system
BR0214690A (en) Equipment and method for use of an encryption key in a hybrid communications network
ATE298155T1 (en) AUTHENTICATION BETWEEN COMMUNICATION PARTNERS IN A TELECOMMUNICATIONS NETWORK
SE9903370L (en) Method and apparatus for establishing a secure connection between access points and terminal in a packet switching communication network
BR0115573A (en) Limit encryption scheme for message authentication systems
WO2001069838A3 (en) Method, and associated apparatus, for generating security keys in a communication system
DK1315394T3 (en) Short-distance wireless connections in a telecommunications network
SE9801871D0 (en) method for secure telephony with mobility in a telephone and data communication system comprising an IP network
KR100705913B1 (en) Method of Encryption Short Message in Paging Channel
AU3266001A (en) Method, apparatus and system for providing encryption keys in a satellite communications network
MY148190A (en) Network authentication
ATE306793T1 (en) SYSTEM, METHOD AND CONNECTION CENTER FOR ESTABLISHING COMMUNICATIONS CONNECTIONS
MY128545A (en) Security system