AU2017328040B2 - Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (EAP) procedure - Google Patents

Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (EAP) procedure Download PDF

Info

Publication number
AU2017328040B2
AU2017328040B2 AU2017328040A AU2017328040A AU2017328040B2 AU 2017328040 B2 AU2017328040 B2 AU 2017328040B2 AU 2017328040 A AU2017328040 A AU 2017328040A AU 2017328040 A AU2017328040 A AU 2017328040A AU 2017328040 B2 AU2017328040 B2 AU 2017328040B2
Authority
AU
Australia
Prior art keywords
network
authentication
authenticator
procedure
cellular network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
AU2017328040A
Other languages
English (en)
Other versions
AU2017328040A1 (en
Inventor
Adrian Edward Escott
Soo Bum Lee
Anand Palanigounder
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of AU2017328040A1 publication Critical patent/AU2017328040A1/en
Application granted granted Critical
Publication of AU2017328040B2 publication Critical patent/AU2017328040B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
AU2017328040A 2016-09-19 2017-08-17 Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (EAP) procedure Active AU2017328040B2 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201662396791P 2016-09-19 2016-09-19
US62/396,791 2016-09-19
US15/489,670 2017-04-17
US15/489,670 US10433163B2 (en) 2016-09-19 2017-04-17 Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (EAP) procedure
PCT/US2017/047355 WO2018052640A1 (en) 2016-09-19 2017-08-17 Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (eap) procedure

Publications (2)

Publication Number Publication Date
AU2017328040A1 AU2017328040A1 (en) 2019-02-21
AU2017328040B2 true AU2017328040B2 (en) 2021-01-28

Family

ID=59762061

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2017328040A Active AU2017328040B2 (en) 2016-09-19 2017-08-17 Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (EAP) procedure

Country Status (10)

Country Link
US (3) US10433163B2 (enExample)
EP (1) EP3516894B1 (enExample)
JP (1) JP7008690B2 (enExample)
CN (2) CN109691157B (enExample)
AU (1) AU2017328040B2 (enExample)
BR (1) BR112019004865A2 (enExample)
CA (1) CA3033131A1 (enExample)
ES (1) ES2894476T3 (enExample)
TW (1) TWI745415B (enExample)
WO (1) WO2018052640A1 (enExample)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10433163B2 (en) 2016-09-19 2019-10-01 Qualcomm Incorporated Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (EAP) procedure
RU2727160C1 (ru) * 2016-10-31 2020-07-21 Телефонактиеболагет Лм Эрикссон (Пабл) Аутентификация для систем следующего поколения
CN108810890B (zh) * 2017-05-05 2019-06-11 华为技术有限公司 锚密钥生成方法、设备以及系统
CN116847342A (zh) 2017-09-27 2023-10-03 日本电气株式会社 通信终端和通信终端的方法
FR3077175A1 (fr) * 2018-01-19 2019-07-26 Orange Technique de determination d'une cle destinee a securiser une communication entre un equipement utilisateur et un serveur applicatif
US12127047B2 (en) * 2018-04-12 2024-10-22 Qualcomm Incorporated Access stratum (AS) security for a centralized radio access network (C-RAN)
US11184177B2 (en) * 2018-09-19 2021-11-23 Synaptics Incorporated Method and system for securing in-vehicle ethernet links
US10944796B2 (en) 2018-09-27 2021-03-09 Palo Alto Networks, Inc. Network slice-based security in mobile networks
JP6974622B2 (ja) * 2019-03-28 2021-12-01 パロ アルト ネットワークス, インコーポレイテッドPalo Alto Networks, Inc. モバイルネットワークにおけるマルチアクセス分散型エッジセキュリティ
WO2021031051A1 (en) 2019-08-18 2021-02-25 Apple Inc. Mobile device authentication without electronic subscriber identity module (esim) credentials
US11032743B1 (en) * 2019-11-30 2021-06-08 Charter Communications Operating, Llc Methods and apparatus for supporting devices of different types using a residential gateway
WO2021165934A1 (en) * 2020-02-20 2021-08-26 Lenovo (Singapore) Pte. Ltd. Re-authentication key generation
JP7455217B2 (ja) 2020-02-21 2024-03-25 テレフオンアクチーボラゲット エルエム エリクソン(パブル) 認証および鍵管理における認証サーバー機能の選択
CN116325840B (zh) * 2020-09-30 2025-08-08 华为技术有限公司 一种密钥推衍方法及其装置、系统
WO2023229316A1 (en) * 2022-05-23 2023-11-30 Samsung Electronics Co., Ltd. Method and system for designing security protocol for 6g network architecture

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009087006A1 (en) * 2008-01-09 2009-07-16 Nokia Siemens Networks Oy Mechanism for authentication and authorization for network and service access
US20160127897A1 (en) * 2014-10-29 2016-05-05 Qualcomm Incorporated User-plane security for next generation cellular networks
US20160127903A1 (en) * 2014-11-05 2016-05-05 Qualcomm Incorporated Methods and systems for authentication interoperability

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8630414B2 (en) * 2002-06-20 2014-01-14 Qualcomm Incorporated Inter-working function for a communication system
US7593717B2 (en) 2003-09-12 2009-09-22 Alcatel-Lucent Usa Inc. Authenticating access to a wireless local area network based on security value(s) associated with a cellular system
US20050272466A1 (en) * 2004-05-03 2005-12-08 Nokia Corporation Selection of wireless local area network (WLAN) with a split WLAN user equipment
ATE415041T1 (de) * 2004-06-24 2008-12-15 Telecom Italia Spa Verfahren und system zur regelung des zugriffs auf kommunikationsnetze, diesbezügliches netz und computerprogramm dafür
US7738871B2 (en) * 2004-11-05 2010-06-15 Interdigital Technology Corporation Wireless communication method and system for implementing media independent handover between technologically diversified access networks
WO2007000179A1 (en) * 2005-06-29 2007-01-04 Telecom Italia S.P.A. Short authentication procedure in wireless data communications networks
US20070150723A1 (en) * 2005-12-23 2007-06-28 Estable Luis P Methods and apparatus for increasing security and control of voice communication sessions using digital certificates
US20080313455A1 (en) * 2007-06-12 2008-12-18 Nokia Siemens Networks Oy Key support for password-based authentication mechanisms
US7826427B2 (en) * 2007-08-22 2010-11-02 Intel Corporation Method for secure transfer of data to a wireless device for enabling multi-network roaming
US8949950B2 (en) 2007-12-20 2015-02-03 Telefonaktiebolaget L M Ericsson (Publ) Selection of successive authentication methods
US8131296B2 (en) * 2008-08-21 2012-03-06 Industrial Technology Research Institute Method and system for handover authentication
EP2428019A4 (en) * 2009-05-03 2015-01-28 Toshiba Kk MEDIA-INDEPENDENT TRANSFER PROTOCOL SECURITY
CN101562814A (zh) * 2009-05-15 2009-10-21 中兴通讯股份有限公司 一种第三代网络的接入方法及系统
US8429728B2 (en) * 2009-08-24 2013-04-23 Alcatel Lucent Pre-registration security support in multi-technology interworking
CN102045173A (zh) * 2009-10-12 2011-05-04 华为终端有限公司 用户设备的认证方法、装置和系统
US9093000B2 (en) * 2013-12-03 2015-07-28 Design Display Group, Inc. Product centric merchandiser
US9918225B2 (en) * 2014-11-03 2018-03-13 Qualcomm Incorporated Apparatuses and methods for wireless communication
US10433163B2 (en) 2016-09-19 2019-10-01 Qualcomm Incorporated Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (EAP) procedure

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009087006A1 (en) * 2008-01-09 2009-07-16 Nokia Siemens Networks Oy Mechanism for authentication and authorization for network and service access
US20160127897A1 (en) * 2014-10-29 2016-05-05 Qualcomm Incorporated User-plane security for next generation cellular networks
US20160127903A1 (en) * 2014-11-05 2016-05-05 Qualcomm Incorporated Methods and systems for authentication interoperability

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ABOBA, B. et al. "Extensible Authentication Protocol (EAP)", RFC 3748, June 2004, Retrieved on 31 July 2020 from the Internet <URL: http://www.ietf.org/rfc/rfc3748. txt> *

Also Published As

Publication number Publication date
CN109691157B (zh) 2022-05-03
EP3516894B1 (en) 2021-09-15
AU2017328040A1 (en) 2019-02-21
CN114727283A (zh) 2022-07-08
JP2019533344A (ja) 2019-11-14
CA3033131A1 (en) 2018-03-22
EP3516894A1 (en) 2019-07-31
WO2018052640A1 (en) 2018-03-22
US20200029212A1 (en) 2020-01-23
ES2894476T3 (es) 2022-02-14
US10433163B2 (en) 2019-10-01
US20180084414A1 (en) 2018-03-22
BR112019004865A2 (pt) 2019-06-11
TW201815178A (zh) 2018-04-16
CN109691157A (zh) 2019-04-26
JP7008690B2 (ja) 2022-01-25
TWI745415B (zh) 2021-11-11
CN114727283B (zh) 2025-03-25
US20230031581A1 (en) 2023-02-02
US12022279B2 (en) 2024-06-25
US11463871B2 (en) 2022-10-04

Similar Documents

Publication Publication Date Title
US12022279B2 (en) Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (EAP) procedure
US10674360B2 (en) Enhanced non-access stratum security
CN109845333B (zh) 用于经由接入网到核心网的连通性的方法和装置
JP6495357B2 (ja) ネットワーク展開において認証情報をプロビジョニングするための方法および装置
US11032704B2 (en) Techniques for subscription-based authentication in wireless communications
US10028307B2 (en) Configurable access stratum security
EP3453149B1 (en) Secure signaling before performing an authentication and key agreement
US20160309523A1 (en) Reducing delay in attachment procedure with a network
CN115152259A (zh) 用户装备的第三方控制
WO2016155543A1 (en) Techniques for redirecting a mobile device to a high-speed dedicated network

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)