CL2009001359A1 - Método para generar una clave criptográfica para la protección de la comunicación entre dos entidades, realizada por la primera entidad como parte de una operación distribuida de seguridad iniciada por la segunda entidad; dispositivo; equipo; sistema. - Google Patents

Método para generar una clave criptográfica para la protección de la comunicación entre dos entidades, realizada por la primera entidad como parte de una operación distribuida de seguridad iniciada por la segunda entidad; dispositivo; equipo; sistema.

Info

Publication number
CL2009001359A1
CL2009001359A1 CL2009001359A CL2009001359A CL2009001359A1 CL 2009001359 A1 CL2009001359 A1 CL 2009001359A1 CL 2009001359 A CL2009001359 A CL 2009001359A CL 2009001359 A CL2009001359 A CL 2009001359A CL 2009001359 A1 CL2009001359 A1 CL 2009001359A1
Authority
CL
Chile
Prior art keywords
entity
security operation
entities
cryptographic key
generating
Prior art date
Application number
CL2009001359A
Other languages
English (en)
Inventor
Mats Näslund
Karl Norrman
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=40527985&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CL2009001359(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Publication of CL2009001359A1 publication Critical patent/CL2009001359A1/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

UN MÉTODO Y DISPOSITIVO PARA GENERAR UNA CLAVE CRIPTOGRÁFICA PARA LA PROTECCIÓN DE LA COMUNICACIÓN ENTRE DOS ENTIDADES, REALIZADA POR LA PRIMERA ENTIDAD COMO PARTE DE UNA OPERACIÓN DISTRIBUIDA DE SEGURIDAD INICIADA POR LA SEGUNDA ENTIDAD. EL MÉTODO COMPRENDE PROPORCIONAR A LO MENOS DOS PARÁMETROS, EN DONDE EL PRIMER PARÁMETRO COMPRENDE O SE DERIVA DESDE UN CONJUNTO DE CLAVES CRIPTOGRÁFICAS QUE SON COMPUTADAS POR LA PRIMERA ENTIDAD, EJECUTANDO LA OPERACIÓN DE SEGURIDAD, Y EL SEGUNDO PARÁMETRO COMPRENDE O SE DERIVA DESDE UN SÍMBOLO QUE TIENE UN VALOR DIFERENTE CADA VEZ QUE LA OPERACIÓN DE SEGURIDAD ES INICIADA POR LA SEGUNDA ENTIDAD PARA LA PRIMERA ENTIDAD; Y APLICAR UNA FUNCIÓN DE DERIVACIÓN DE CLAVE, PARA GENERAR UNA CLAVE CRIPTOGRÁFICA BASADA EN LOS PARÁMETROS PROPORCIONADOS; DONDE EL SÍMBOLO COMPRENDE OR EXCLUSIVO DE UN NÚMERO DE SECUENCIA <SQN> Y UNA CLAVE DE ANONIMATO <AK>.
CL2009001359A 2008-06-06 2009-06-04 Método para generar una clave criptográfica para la protección de la comunicación entre dos entidades, realizada por la primera entidad como parte de una operación distribuida de seguridad iniciada por la segunda entidad; dispositivo; equipo; sistema. CL2009001359A1 (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US5938608P 2008-06-06 2008-06-06
PCT/EP2008/005960 WO2009146729A1 (en) 2008-06-06 2008-07-21 Cryptographic key generation

Publications (1)

Publication Number Publication Date
CL2009001359A1 true CL2009001359A1 (es) 2010-12-03

Family

ID=40527985

Family Applications (1)

Application Number Title Priority Date Filing Date
CL2009001359A CL2009001359A1 (es) 2008-06-06 2009-06-04 Método para generar una clave criptográfica para la protección de la comunicación entre dos entidades, realizada por la primera entidad como parte de una operación distribuida de seguridad iniciada por la segunda entidad; dispositivo; equipo; sistema.

Country Status (20)

Country Link
US (3) US8340288B2 (es)
EP (4) EP2528268B3 (es)
JP (5) JP4792135B2 (es)
KR (1) KR101274392B1 (es)
CN (2) CN102057617B (es)
AU (1) AU2008357317B2 (es)
BR (1) BRPI0822761B1 (es)
CA (1) CA2722186C (es)
CL (1) CL2009001359A1 (es)
DK (2) DK2291946T4 (es)
ES (3) ES2400020T5 (es)
IL (1) IL209799A (es)
MA (1) MA32613B1 (es)
MX (1) MX2010012033A (es)
MY (1) MY146687A (es)
NZ (1) NZ589294A (es)
PL (3) PL2291946T5 (es)
RU (1) RU2480925C2 (es)
WO (1) WO2009146729A1 (es)
ZA (1) ZA201008200B (es)

Families Citing this family (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080114772A1 (en) * 2006-11-14 2008-05-15 Fabrice Jogand-Coulomb Method for connecting to a network location associated with content
US20080114693A1 (en) * 2006-11-14 2008-05-15 Fabrice Jogand-Coulomb Method for allowing content protected by a first DRM system to be accessed by a second DRM system
US20080112562A1 (en) * 2006-11-14 2008-05-15 Fabrice Jogand-Coulomb Methods for linking content with license
US8327454B2 (en) * 2006-11-14 2012-12-04 Sandisk Technologies Inc. Method for allowing multiple users to access preview content
US8079071B2 (en) * 2006-11-14 2011-12-13 SanDisk Technologies, Inc. Methods for accessing content based on a session ticket
US8763110B2 (en) * 2006-11-14 2014-06-24 Sandisk Technologies Inc. Apparatuses for binding content to a separate memory device
WO2009021555A1 (en) * 2007-08-15 2009-02-19 Telefonaktiebolaget Lm Ericsson (Publ) Early ims security
US7522723B1 (en) * 2008-05-29 2009-04-21 Cheman Shaik Password self encryption method and system and encryption by keys generated from personal secret information
CN102625302B (zh) * 2008-06-23 2016-03-30 华为技术有限公司 密钥衍生方法、设备及系统
GB0822599D0 (en) * 2008-12-11 2009-01-21 Vodafone Plc Securing network rejection
US8296836B2 (en) * 2010-01-06 2012-10-23 Alcatel Lucent Secure multi-user identity module key exchange
US9215220B2 (en) 2010-06-21 2015-12-15 Nokia Solutions And Networks Oy Remote verification of attributes in a communication network
US20120142315A1 (en) * 2010-12-06 2012-06-07 Jong-Moon Chung Method for authentication and key establishment in a mobile communication system and method of operating a mobile station and a visitor location register
US8990554B2 (en) 2011-06-30 2015-03-24 Verizon Patent And Licensing Inc. Network optimization for secure connection establishment or secure messaging
US9270453B2 (en) 2011-06-30 2016-02-23 Verizon Patent And Licensing Inc. Local security key generation
US9154527B2 (en) 2011-06-30 2015-10-06 Verizon Patent And Licensing Inc. Security key creation
US8943318B2 (en) 2012-05-11 2015-01-27 Verizon Patent And Licensing Inc. Secure messaging by key generation information transfer
US8762723B2 (en) 2011-07-07 2014-06-24 Verayo, Inc. Cryptographic security using fuzzy credentials for device and server communications
US9215076B1 (en) * 2012-03-27 2015-12-15 Amazon Technologies, Inc. Key generation for hierarchical data access
US8892865B1 (en) 2012-03-27 2014-11-18 Amazon Technologies, Inc. Multiple authority key derivation
CN103906053B (zh) 2012-12-28 2019-09-10 北京三星通信技术研究有限公司 配置和传输加密密匙的方法
KR101672663B1 (ko) * 2013-01-11 2016-11-03 엘지전자 주식회사 무선 통신 시스템에서 보안 정보를 적용하기 위한 방법 및 장치
RU2747375C2 (ru) 2013-01-30 2021-05-04 Телефонактиеболагет Л М Эрикссон (Пабл) Генерирование защитного ключа для двойного соединения
JP2014192612A (ja) 2013-03-26 2014-10-06 Toshiba Corp 生成装置、暗号化装置、復号装置、生成方法、暗号化方法、復号方法およびプログラム
GB2518255A (en) * 2013-09-13 2015-03-18 Vodafone Ip Licensing Ltd Communicating with a machine to machine device
FR3018371B1 (fr) * 2014-03-10 2016-05-06 Commissariat Energie Atomique Procede et systeme de chiffrement/dechiffrement de donnees a cle distante et verification prealable de jeton
CN106465109A (zh) * 2014-05-20 2017-02-22 诺基亚技术有限公司 蜂窝网络认证
EP3146742B1 (en) 2014-05-20 2019-07-31 Nokia Technologies Oy Exception handling in cellular authentication
FR3022053B1 (fr) * 2014-06-06 2018-02-02 Oberthur Technologies Procede d'authentification d'une premiere entite electronique par une seconde entite electronique et entite electronique mettant en œuvre un tel procede
RU2017132104A (ru) * 2015-02-16 2019-03-18 Нек Корпорейшн Система связи, устройство узла, терминал связи, способ управления ключами и энергонезависимый читаемый компьютером носитель, на котором хранится программа
KR101675088B1 (ko) * 2015-04-30 2016-11-10 성균관대학교산학협력단 Mtc에서의 네트워크와의 상호 인증 방법 및 시스템
US10931644B2 (en) 2015-06-23 2021-02-23 Telefonaktiebolaget Lm Ericsson (Publ) Methods, network nodes, mobile entity, computer programs and computer program products for protecting privacy of a mobile entity
WO2017182057A1 (en) * 2016-04-19 2017-10-26 Nokia Solutions And Networks Oy Network authorization assistance
US11076269B2 (en) * 2016-07-07 2021-07-27 Nokia Solutions And Networks Oy Machine type communication using mobile originated short messaging service without mobile station international subscriber directory number
CN110192212B (zh) * 2016-07-14 2024-06-04 数字资产(瑞士)股份有限公司 数字资产平台
EP3471365A4 (en) * 2016-07-15 2019-06-19 Huawei Technologies Co., Ltd. METHOD AND APPARATUS FOR ACQUIRING KEY
EP3285512A1 (en) * 2016-08-17 2018-02-21 Gemalto Sa Authentication server of a cellular telecommunication network and corresponding uicc
CN106789057B (zh) * 2016-11-28 2020-05-22 航天恒星科技有限公司 卫星通信协议下的密钥协商方法及系统
KR102549946B1 (ko) * 2017-01-09 2023-06-30 삼성전자주식회사 이동통신 환경에서 단말의 초기 접속 요청 메시지를 라우팅하는 방법 및 관련 파라미터
JP6441390B2 (ja) * 2017-01-26 2018-12-19 株式会社東芝 生成装置、暗号化装置、復号装置、生成方法、暗号化方法、復号方法およびプログラム
JP6745403B2 (ja) * 2017-04-11 2020-08-26 華為技術有限公司Huawei Technologies Co.,Ltd. ネットワーク認証方法、デバイス、およびシステム
KR20230147749A (ko) * 2017-06-23 2023-10-23 모토로라 모빌리티 엘엘씨 이용되는 보안 키들에 영향을 주는 연결 재구성의 일부로서 베어러 특정 변경들을 구현하기 위한 방법 및 장치
GB2578408B (en) * 2017-08-29 2022-04-20 Bosch Gmbh Robert Methods and systems for linear key agreement with forward secrecy using an insecure shared communication medium
KR101835076B1 (ko) * 2017-11-15 2018-04-19 곽권섭 보안강화 eps-aka 프로토콜을 이용한 이동통신 가입자 인증 방법
DE102018133605B4 (de) * 2018-12-27 2023-03-02 Bachmann Gmbh Verfahren und Vorrichtung zur Prüfung der Integrität von Modulen einer Windkraftanlage
US12081972B2 (en) * 2019-01-18 2024-09-03 Qualcomm Incorporated Protection of sequence numbers in authentication and key agreement protocol
EP3720039B1 (de) * 2019-04-05 2024-09-04 Siemens Aktiengesellschaft Verfahren für das konfigurieren eines sicherheitsmoduls mit mindestens einem abgeleiteten schlüssel
CN111628985A (zh) * 2020-05-22 2020-09-04 深圳市有方科技股份有限公司 安全访问控制方法、装置、计算机设备和存储介质
US12120225B2 (en) * 2020-09-25 2024-10-15 Renesas Electronics Corporation Secure key generation and management in open and secure processor environments
US11924350B2 (en) 2021-07-29 2024-03-05 Digital Asset (Switzerland) GmbH Cryptographically enforced partial blinding for distributed system
US11647392B1 (en) 2021-12-16 2023-05-09 Bank Of America Corporation Systems and methods for context-aware mobile application session protection
CN115021913B (zh) * 2022-06-14 2024-05-31 中国信息通信研究院 工业互联网标识解析体系密钥生成方法、系统与存储介质

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7131006B1 (en) * 1999-11-15 2006-10-31 Verizon Laboratories Inc. Cryptographic techniques for a communications network
GB0004178D0 (en) 2000-02-22 2000-04-12 Nokia Networks Oy Integrity check in a communication system
US20030053629A1 (en) * 2001-09-14 2003-03-20 Koninklijke Philips Electronics N.V. USB authentication interface
DE10307403B4 (de) * 2003-02-20 2008-01-24 Siemens Ag Verfahren zum Bilden und Verteilen kryptographischer Schlüssel in einem Mobilfunksystem und Mobilfunksystem
ATE552709T1 (de) * 2003-09-26 2012-04-15 Ericsson Telefon Ab L M Verbesserter sicherheitsentwurf für die kryptographie in mobilkommunikationssystemen
GB2407236B (en) * 2003-10-17 2006-04-05 Toshiba Res Europ Ltd Methods and apparatus for secure data communication links
EP1626598A1 (en) * 2004-06-21 2006-02-15 Axalto SA Method for securing an authentication and key agreement protocol
US7461268B2 (en) * 2004-07-15 2008-12-02 International Business Machines Corporation E-fuses for storing security version data
US20060046690A1 (en) 2004-09-02 2006-03-02 Rose Gregory G Pseudo-secret key generation in a communications system
US7558957B2 (en) * 2005-04-18 2009-07-07 Alcatel-Lucent Usa Inc. Providing fresh session keys
US20060236116A1 (en) * 2005-04-18 2006-10-19 Lucent Technologies, Inc. Provisioning root keys
WO2007062689A1 (en) * 2005-12-01 2007-06-07 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for distributing keying information
WO2007085779A1 (en) * 2006-01-24 2007-08-02 British Telecommunications Public Limited Company Method and system for recursive authentication in a mobile network
US20070271458A1 (en) * 2006-05-22 2007-11-22 Peter Bosch Authenticating a tamper-resistant module in a base station router
JP5060081B2 (ja) 2006-08-09 2012-10-31 富士通株式会社 フレームを暗号化して中継する中継装置
PT2087634T (pt) 2006-11-01 2016-10-26 ERICSSON TELEFON AB L M (publ) Sistemas de telecomunicações e cifragem de mensagens de controlo em sistemas deste tipo
JP5396300B2 (ja) * 2010-02-08 2014-01-22 オルガノ株式会社 電気式脱イオン水製造装置

Also Published As

Publication number Publication date
MX2010012033A (es) 2010-11-30
ZA201008200B (en) 2011-03-30
EP2291946B2 (en) 2020-06-03
DK2291946T4 (da) 2020-08-31
CN102057617A (zh) 2011-05-11
CN103746794B (zh) 2017-06-23
US8953793B2 (en) 2015-02-10
US8340288B2 (en) 2012-12-25
MY146687A (en) 2012-09-14
ES2400020T5 (es) 2021-03-09
US20150023499A1 (en) 2015-01-22
MA32613B1 (fr) 2011-09-01
PL2658163T3 (pl) 2017-08-31
RU2480925C2 (ru) 2013-04-27
JP6492115B2 (ja) 2019-03-27
US20130156182A1 (en) 2013-06-20
EP3242436A1 (en) 2017-11-08
NZ589294A (en) 2012-07-27
CA2722186C (en) 2015-09-15
JP6121512B2 (ja) 2017-04-26
IL209799A0 (en) 2011-02-28
CN102057617B (zh) 2013-12-25
EP2658163B1 (en) 2016-12-14
JP2014078985A (ja) 2014-05-01
KR101274392B1 (ko) 2013-06-17
DK2291946T3 (da) 2013-03-18
BRPI0822761B1 (pt) 2020-09-29
EP2658163B3 (en) 2021-12-29
EP2658163A1 (en) 2013-10-30
PL2528268T6 (pl) 2022-04-25
EP2528268B3 (en) 2021-12-29
PL2658163T6 (pl) 2022-02-14
EP2291946A1 (en) 2011-03-09
EP2291946B1 (en) 2012-12-26
JP2011522494A (ja) 2011-07-28
KR20110017426A (ko) 2011-02-21
IL209799A (en) 2015-03-31
EP2528268B1 (en) 2017-05-24
WO2009146729A1 (en) 2009-12-10
JP2017175624A (ja) 2017-09-28
ES2617067T7 (es) 2022-04-28
US9326142B2 (en) 2016-04-26
PL2291946T3 (pl) 2013-05-31
EP2528268A1 (en) 2012-11-28
ES2400020T3 (es) 2013-04-05
US20110091036A1 (en) 2011-04-21
DK2528268T3 (en) 2017-09-11
CA2722186A1 (en) 2009-12-10
ES2617067T3 (es) 2017-06-15
JP4792135B2 (ja) 2011-10-12
ES2637313T7 (es) 2022-04-27
PL2528268T3 (pl) 2017-10-31
ES2637313T3 (es) 2017-10-11
JP2016096557A (ja) 2016-05-26
AU2008357317B2 (en) 2012-04-12
CN103746794A (zh) 2014-04-23
AU2008357317A1 (en) 2009-12-10
DK2528268T6 (da) 2022-03-21
BRPI0822761A2 (pt) 2015-06-30
RU2010149890A (ru) 2012-06-10
JP2011254512A (ja) 2011-12-15
PL2291946T5 (pl) 2021-02-08

Similar Documents

Publication Publication Date Title
CL2009001359A1 (es) Método para generar una clave criptográfica para la protección de la comunicación entre dos entidades, realizada por la primera entidad como parte de una operación distribuida de seguridad iniciada por la segunda entidad; dispositivo; equipo; sistema.
PE20170656A1 (es) Autenticacion de la red de servicio
EA201591160A1 (ru) Способ и устройство для маркирования промышленных изделий с помощью физического свойства
BR112016006445A2 (pt) método para proteger mensagens de transação transitando entre um aplicativo móvel em um dispositivo móvel e um gateway (ponte de ligação), e sistema processador de transações
GB2572088A8 (en) Controlling access to a locked space using cryptographic keys stored on a blockchain
AU2017269734A1 (en) Cryptologic rewritable blockchain
WO2015008158A3 (en) Securing method for lawful interception
WO2015157735A3 (en) Content encryption and decryption
WO2014116956A3 (en) System and method for differential encryption
TW200746773A (en) Security considerations for the LTE of UMTS
AR073672A1 (es) Aparato de base de nodo-b y protocolos de seguridad
CO2019007875A2 (es) Direccionamiento de un entorno de ejecución confiable utilizando clave de firma
WO2015134929A3 (en) Security and data privacy for lighting sensor networks
AR081175A1 (es) Aparato y metodo para senalizar el contexto de seguridad aumentado para encriptacion de sesion y claves de integridad
WO2015134760A3 (en) Secure hardware for cross-device trusted applications
ES2531634T3 (es) Procedimiento de comunicación en una red, dispositivo de comunicación y sistema asociado
MY190913A (en) Device and method for secure connection
SG10201803986RA (en) Method and system for secure transmission of remote notification service messages to mobile devices without secure elements
TW200610349A (en) Key derivation functions to enhance security
BR112013001728A2 (pt) métodos para criptografar um valor introduzido em um dispositivo de usuário, para verificar um valor comunicado a um sistema de autenticação via uma rede de comunicações, e para comunicar um valor introduzido em um dispositivo de usuário a um sistema de autenticação via uma rede de comunicações, dispositivo de usuário, sistema, software, e, meio legível por computador.
MX2019003604A (es) Mensaje cifrado con instruccion de autenticacion.
BRPI0513794A (pt) técnicas para reforçar criptografia de enchimento de vez única
BR112017008214A2 (pt) métodos e sistemas para interoperacionalidade de autenticação
AR080033A1 (es) Administracion de claves en una red inalambrica usando claves primarias y secundarias
NZ613485A (en) Method for authenticating first communication equipment by means of second communication equipment