DE60328882D1 - SECURITY NEWS ABOUT A MOBILE COMMUNICATION NETWORK - Google Patents

SECURITY NEWS ABOUT A MOBILE COMMUNICATION NETWORK

Info

Publication number
DE60328882D1
DE60328882D1 DE60328882T DE60328882T DE60328882D1 DE 60328882 D1 DE60328882 D1 DE 60328882D1 DE 60328882 T DE60328882 T DE 60328882T DE 60328882 T DE60328882 T DE 60328882T DE 60328882 D1 DE60328882 D1 DE 60328882D1
Authority
DE
Germany
Prior art keywords
message
sender
text
encrypted
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE60328882T
Other languages
German (de)
Inventor
Michael Hawkes
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
2ergo Ltd
Original Assignee
Broca Communications Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Broca Communications Ltd filed Critical Broca Communications Ltd
Priority claimed from PCT/GB2003/000083 external-priority patent/WO2003063528A2/en
Application granted granted Critical
Publication of DE60328882D1 publication Critical patent/DE60328882D1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Abstract

A method of transmitting a message via a mobile telecommunications network from a sender's device to a user's terminal where the user is required to acknowledge message receipt in a predetermined way and authenticate himself by providing authentication data that is centrally authenticated, where an acknowledgement message is subsequently transmitted to the message sender and where at least a portion of the text message is encrypted by the sender's device before transmission and decrypted by the receiving terminal before display and where encryption data used for encryption and decryption of the message, is transmitted with the encrypted message. The message may be a text message, SMS, USSD, MMS and further security may be obtained by use of public/private key pairs wherein the public key is valid only for a certain number of text messages. The method may employ transaction reference counters in the devices to provide extra security and may also arrange for deletion of a received message after a set time.
DE60328882T 2002-01-16 2003-01-13 SECURITY NEWS ABOUT A MOBILE COMMUNICATION NETWORK Expired - Lifetime DE60328882D1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB0200942A GB2384392A (en) 2002-01-16 2002-01-16 Secure messaging via a mobile telecommunications network
GB0223063A GB2384396B (en) 2002-01-16 2002-10-04 Secure messaging via a mobile communications network
PCT/GB2003/000083 WO2003063528A2 (en) 2002-01-16 2003-01-13 Secure messaging via a mobile communications network

Publications (1)

Publication Number Publication Date
DE60328882D1 true DE60328882D1 (en) 2009-10-01

Family

ID=9929182

Family Applications (1)

Application Number Title Priority Date Filing Date
DE60328882T Expired - Lifetime DE60328882D1 (en) 2002-01-16 2003-01-13 SECURITY NEWS ABOUT A MOBILE COMMUNICATION NETWORK

Country Status (7)

Country Link
AT (1) ATE440466T1 (en)
DE (1) DE60328882D1 (en)
DK (1) DK1500289T3 (en)
ES (1) ES2334022T3 (en)
GB (3) GB2384392A (en)
PT (1) PT1500289E (en)
SI (1) SI1500289T1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7296156B2 (en) * 2002-06-20 2007-11-13 International Business Machines Corporation System and method for SMS authentication
NL1026695C2 (en) * 2004-07-21 2006-01-24 Telesystems Holding Gmbh Verification of a communication connection.
FR2881593A1 (en) * 2005-02-02 2006-08-04 France Telecom Mobile terminal users` registering method for universal mobile telecommunication system, involves sending message having information relative to user authentication towards application server providing information to external application
US8325925B2 (en) 2007-07-10 2012-12-04 Hewlett-Packard Development Company, L.P. Delivery of messages to a receiver mobile device
US20090215477A1 (en) * 2008-02-27 2009-08-27 Qualcomm, Incorporated Intelligent multiple device file sharing in a wireless communications system
SG157976A1 (en) * 2008-06-20 2010-01-29 Dallab S Pte Ltd Secure short message service
IT1398518B1 (en) 2009-09-25 2013-03-01 Colombo SAFE MILANO
CN103855471B (en) * 2014-02-27 2017-03-29 京信通信技术(广州)有限公司 Phase-shift system
WO2023144689A1 (en) * 2022-01-25 2023-08-03 Jio Platforms Limited System and method for secure messaging in a telecommunications network

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5146217A (en) * 1989-05-25 1992-09-08 Motorola, Inc. Selective call receiver having confidential message read protection
US5091942A (en) * 1990-07-23 1992-02-25 Ericsson Ge Mobile Communications Holding, Inc. Authentication system for digital cellular communications
WO1992017006A1 (en) * 1991-03-18 1992-10-01 Motorola, Inc. Selective call receiver with secured message presentation
AU697210B2 (en) * 1993-11-01 1998-10-01 Telefonaktiebolaget Lm Ericsson (Publ) A message transmission system and method for a radiocommunication system
SE9304222L (en) * 1993-12-21 1995-06-22 Telia Ab Method and device for calls from mobile stations
US5479408A (en) * 1994-02-22 1995-12-26 Will; Craig A. Wireless personal paging, communications, and locating system
ES2196156T3 (en) * 1995-05-19 2003-12-16 Siemens Ag PROCEDURE FOR THE EXCHANGE OF CLIPTOGRAPHIC KEYS, ASSISTED BY COMPUTER, BETWEEN A FIRST COMPUTER UNIT AND A SECOND COMPUTER UNIT.
US5692032A (en) * 1995-11-27 1997-11-25 Nokia Mobile Phones Ltd. Mobile terminal having one key user message acknowledgment function
EP0960402B1 (en) * 1996-06-19 2007-09-26 Behruz Vazvan Real time system and method for remote purchase payment and remote bill payment transactions and transferring of electronic cash and other required data
FI107097B (en) * 1997-09-24 2001-05-31 Nokia Networks Oy Targeted broadcast on the radio network
JP3139483B2 (en) * 1998-12-15 2001-02-26 日本電気株式会社 Personal communication system and communication method therefor
FI108813B (en) * 1999-03-08 2002-03-28 Sonera Smarttrust Oy Method and system in the communication system
AU3822299A (en) * 1999-04-20 2000-11-02 Nokia Networks Oy Information collection method and system
US7707420B1 (en) * 1999-06-23 2010-04-27 Research In Motion Limited Public key encryption with digital signature scheme
EP1065899A1 (en) * 1999-06-30 2001-01-03 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for exchanging messages in a two-way communication system
JP3312335B2 (en) * 1999-07-30 2002-08-05 株式会社コムスクエア User authentication method, user authentication system and recording medium
EP1107623A3 (en) * 1999-12-06 2002-01-02 Nokia Mobile Phones Ltd. Mobile station providing user-defined private zone for restricting access to user application data
EP1119132A3 (en) * 2000-01-19 2003-01-02 Research In Motion Limited Broadcasting encrypted messages using session keys
AU2656500A (en) * 2000-02-29 2001-09-12 Swisscom Mobile Ag Transaction confirmation method, authentication server and wap server
AU2001245292A1 (en) * 2000-04-14 2001-10-30 Sun Microsystems, Inc. Network access security
FR2808403B1 (en) * 2000-04-26 2002-11-15 Loic Eonnet TELECOMMUNICATION FACILITY AND METHOD FOR EXCHANGING INFORMATION BETWEEN TELEPHONES AND SERVICE PROVIDERS
JP3423921B2 (en) * 2000-05-31 2003-07-07 ネットビレッジ株式会社 Mobile device authentication method
SE516567C2 (en) * 2000-06-07 2002-01-29 Anoto Ab Procedure and apparatus for secure wireless transmission of information
FR2817108A1 (en) * 2000-11-17 2002-05-24 Mercury Technologies Sarl Method for making payments over mobile telephone system, comprises calculation of signatures during voice or data transmission using a mother key and diversified keys derived from the mother key
JP2003006168A (en) * 2001-06-25 2003-01-10 Ntt Docomo Inc Method for authenticating mobile terminal and mobile terminal
CA2412148C (en) * 2001-11-22 2008-04-22 Ntt Docomo, Inc. Authentication system, mobile terminal, and authentication method

Also Published As

Publication number Publication date
GB0200942D0 (en) 2002-03-06
ES2334022T3 (en) 2010-03-04
PT1500289E (en) 2009-12-17
GB0223063D0 (en) 2002-11-13
GB2424804A (en) 2006-10-04
SI1500289T1 (en) 2010-01-29
DK1500289T3 (en) 2009-12-21
ATE440466T1 (en) 2009-09-15
GB0611866D0 (en) 2006-07-26
GB2384392A (en) 2003-07-23
GB2384396B (en) 2007-01-03
GB2384396A (en) 2003-07-23

Similar Documents

Publication Publication Date Title
US7076657B2 (en) Use of short message service (SMS) for secure transactions
ES2263264T3 (en) PROCEDURE AND SYSTEM FOR THE PROCESSING OF MESSAGES IN A TELECOMMUNICATIONS SYSTEM.
CN105704690B (en) The method and system of the hidden close communication of short message based on hand-set digit fingerprint authentication
TWI581599B (en) Key generation system, data signature and encryption system and method
CN101416541A (en) Method and system for phone-number discovery and phone-number authentication for m0bile communications devices
JP2010259074A (en) Secure session set up based on wireless application protocol
KR102255366B1 (en) Apparatus and method for Mobile Trusted Module based security of Short Message Service
BRPI0418366B1 (en) SYSTEM AND METHOD FOR GENERATING REPRODUCABLE SESSION KEYS
RU2006101864A (en) METHOD FOR PROVIDING A SIGNATURE KEY FOR DIGITAL SIGNING, VERIFICATION OR ENCRYPTION OF DATA, AND ALSO MOBILE TERMINAL
CN1977559B (en) Method and system for protecting information exchanged during communication between users
CN101635924A (en) CDMA port-to-port encryption communication system and key distribution method thereof
Hossain et al. A proposal for enhancing the security system of short message service in GSM
CN102811426A (en) Method and system for cryptographically sending and receiving messages of mobile device
DE60328882D1 (en) SECURITY NEWS ABOUT A MOBILE COMMUNICATION NETWORK
KR20190040443A (en) Apparatus and method for creating secure session of smart meter
KR20100012567A (en) Transmission and reception system for character message and method thereof
CN101262340A (en) MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS
CN108270917B (en) Encrypted smart phone
US9648495B2 (en) Method and device for transmitting a verification request to an identification module
CN201623859U (en) System for encrypting short messages through mobile phone terminal
EP4109811A1 (en) Secure device equipped with quantum-random-number-based quantum encryption chip and secure communication service provision method using same
KR101293260B1 (en) Mobile communication terminal and method
JP2005051368A (en) Communication apparatus, base station apparatus and communication system
CN112291196A (en) End-to-end encryption method and system suitable for instant messaging
CN102026171A (en) Method for safely controlling remote wireless equipment

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8327 Change in the person/name/address of the patent owner

Owner name: 2ERGO LTD., MANCHESTER, GB