EP1606899A4 - WLAN SESSION MANAGEMENT TECHNIQUES WITH SECURE RECHRIFICATION AND SESSION CLOSURE - Google Patents
WLAN SESSION MANAGEMENT TECHNIQUES WITH SECURE RECHRIFICATION AND SESSION CLOSUREInfo
- Publication number
- EP1606899A4 EP1606899A4 EP04719770A EP04719770A EP1606899A4 EP 1606899 A4 EP1606899 A4 EP 1606899A4 EP 04719770 A EP04719770 A EP 04719770A EP 04719770 A EP04719770 A EP 04719770A EP 1606899 A4 EP1606899 A4 EP 1606899A4
- Authority
- EP
- European Patent Office
- Prior art keywords
- session
- rechrification
- secure
- management techniques
- wlan
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US45454203P | 2003-03-14 | 2003-03-14 | |
| US454542P | 2003-03-14 | ||
| PCT/US2004/007403 WO2004084458A2 (en) | 2003-03-14 | 2004-03-11 | Wlan session management techniques with secure rekeying and logoff |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP1606899A2 EP1606899A2 (en) | 2005-12-21 |
| EP1606899A4 true EP1606899A4 (en) | 2011-11-02 |
Family
ID=33029889
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP04719770A Withdrawn EP1606899A4 (en) | 2003-03-14 | 2004-03-11 | WLAN SESSION MANAGEMENT TECHNIQUES WITH SECURE RECHRIFICATION AND SESSION CLOSURE |
Country Status (7)
| Country | Link |
|---|---|
| EP (1) | EP1606899A4 (en) |
| JP (2) | JP2006520571A (en) |
| KR (2) | KR20060053003A (en) |
| CN (2) | CN1874222A (en) |
| MX (1) | MXPA05009804A (en) |
| MY (1) | MY135833A (en) |
| WO (1) | WO2004084458A2 (en) |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1874222A (en) * | 2003-03-14 | 2006-12-06 | 汤姆森特许公司 | Method, terminal device and access point for providing security communication conversation |
| US7142851B2 (en) * | 2003-04-28 | 2006-11-28 | Thomson Licensing | Technique for secure wireless LAN access |
| CN102752309A (en) * | 2005-04-22 | 2012-10-24 | 汤姆森特许公司 | Method for performing safety anonymous accessing on wireless local area network by mobile equipment |
| JP4848421B2 (en) * | 2005-04-22 | 2011-12-28 | トムソン ライセンシング | Secure anonymous wireless LAN access mechanism |
| CN103441984B (en) * | 2006-04-24 | 2017-09-05 | 鲁库斯无线公司 | Dynamic authentication in safety wireless network |
| CN101454767B (en) * | 2006-04-24 | 2013-08-14 | 鲁库斯无线公司 | Dynamic Authentication in Secure Wireless Networks |
| WO2008001901A1 (en) | 2006-06-30 | 2008-01-03 | Nikon Corporation | Digital camera |
| JP2010529767A (en) * | 2007-06-11 | 2010-08-26 | エヌエックスピー ビー ヴィ | Authentication method and authentication execution electronic device |
| KR101016277B1 (en) * | 2007-12-20 | 2011-02-22 | 건국대학교 산학협력단 | Method and apparatus for registering SPI and setting SSI session with enhanced security |
| US8756668B2 (en) | 2012-02-09 | 2014-06-17 | Ruckus Wireless, Inc. | Dynamic PSK for hotspots |
| US10576256B2 (en) | 2016-12-13 | 2020-03-03 | Becton, Dickinson And Company | Antiseptic applicator |
| US11496902B2 (en) | 2017-09-29 | 2022-11-08 | Plume Design, Inc. | Access to Wi-Fi networks via two-step and two-party control |
| US11689925B2 (en) | 2017-09-29 | 2023-06-27 | Plume Design, Inc. | Controlled guest access to Wi-Fi networks |
| CN111404666B (en) | 2019-01-02 | 2024-07-05 | 中国移动通信有限公司研究院 | Key generation method, terminal equipment and network equipment |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0966813A2 (en) * | 1997-03-10 | 1999-12-29 | Guy L. Fielder | Bilateral authentication and encryption system |
| FI113119B (en) * | 1997-09-15 | 2004-02-27 | Nokia Corp | Procedure for performing secure transmissions in telecommunications networks |
| US6304658B1 (en) * | 1998-01-02 | 2001-10-16 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
| US6151677A (en) * | 1998-10-06 | 2000-11-21 | L-3 Communications Corporation | Programmable telecommunications security module for key encryption adaptable for tokenless use |
| US7028186B1 (en) * | 2000-02-11 | 2006-04-11 | Nokia, Inc. | Key management methods for wireless LANs |
| JP2002077129A (en) * | 2000-08-24 | 2002-03-15 | Nissin Electric Co Ltd | Method of communicating encryption |
| CN1874222A (en) * | 2003-03-14 | 2006-12-06 | 汤姆森特许公司 | Method, terminal device and access point for providing security communication conversation |
-
2004
- 2004-03-11 CN CNA2006100925525A patent/CN1874222A/en active Pending
- 2004-03-11 KR KR1020067005624A patent/KR20060053003A/en not_active Ceased
- 2004-03-11 MX MXPA05009804A patent/MXPA05009804A/en active IP Right Grant
- 2004-03-11 CN CNA2004800063151A patent/CN1759550A/en active Pending
- 2004-03-11 KR KR1020057017159A patent/KR20050116821A/en not_active Ceased
- 2004-03-11 WO PCT/US2004/007403 patent/WO2004084458A2/en not_active Ceased
- 2004-03-11 EP EP04719770A patent/EP1606899A4/en not_active Withdrawn
- 2004-03-11 JP JP2006507069A patent/JP2006520571A/en active Pending
- 2004-03-13 MY MYPI20040889A patent/MY135833A/en unknown
-
2006
- 2006-03-20 JP JP2006077107A patent/JP2006180561A/en active Pending
Non-Patent Citations (2)
| Title |
|---|
| "An initial Security Analysis of the IEEE 802.1X Standard", 1 January 2002 (2002-01-01), XP055007968, Retrieved from the Internet <URL:http://www.cs.umd.edu/~waa/1x.pdf> [retrieved on 20110923] * |
| SALOWEY CISCO P ERONEN NOKIA J: "EAP Key Derivation for Multiple Applications; draft-salowey-eap-key-deriv-00.txt", IETF STANDARD-WORKING-DRAFT, INTERNET ENGINEERING TASK FORCE, IETF, CH, 1 February 2003 (2003-02-01), XP015005137, ISSN: 0000-0004 * |
Also Published As
| Publication number | Publication date |
|---|---|
| MY135833A (en) | 2008-07-31 |
| JP2006520571A (en) | 2006-09-07 |
| WO2004084458A2 (en) | 2004-09-30 |
| KR20050116821A (en) | 2005-12-13 |
| WO2004084458A3 (en) | 2004-11-18 |
| JP2006180561A (en) | 2006-07-06 |
| EP1606899A2 (en) | 2005-12-21 |
| KR20060053003A (en) | 2006-05-19 |
| CN1759550A (en) | 2006-04-12 |
| CN1874222A (en) | 2006-12-06 |
| MXPA05009804A (en) | 2006-05-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE60304325D1 (en) | CLOSED CAPSULE WITH OPENING AGENT | |
| ITPD20020141A1 (en) | FLEXIBLE CONTAINER WITH FACILITATED AND FOLDABLE OPENING | |
| DE602004014563D1 (en) | Closure with ventilation | |
| IL195610A0 (en) | Neural networks with learning and expression capability | |
| EP1696805A4 (en) | Tissue closure and tissue closing device | |
| PL376173A1 (en) | Refrigerator and refrigerator door | |
| EP1606899A4 (en) | WLAN SESSION MANAGEMENT TECHNIQUES WITH SECURE RECHRIFICATION AND SESSION CLOSURE | |
| DE602005022921D1 (en) | CLOSURE WITH SEVERAL COVERS | |
| DE102005001607B8 (en) | Door locking device, door and door locking unit | |
| DE60311031D1 (en) | opening hinge | |
| DE60239520D1 (en) | Encryption device and method with side channel attack resistance | |
| DE60304229D1 (en) | Brush-flattened and with Pinselabflacher equipped drawing device | |
| NL1027109A1 (en) | Connection and use with treatment. | |
| ATE399131T1 (en) | CONTAINER AND CLOSURE ARRANGEMENT | |
| FI20020982A0 (en) | Authentication procedure and arrangement | |
| ES1055586Y (en) | POWER DEVICE WITH HANDBAG AND HANDBAG. | |
| FR2849253B1 (en) | SECURITY CLOSURE | |
| DE602004005309D1 (en) | DOOR AND DOOR PROVIDED | |
| DE602005012771D1 (en) | Image forming apparatus provided with an opening and closing unit. | |
| NO20053898D0 (en) | Use and proceeding at footballshoes | |
| DE602005008838D1 (en) | Door safety device and turntable with the same | |
| ES1052481Y (en) | SECURITY CLOSURE WITH MAGNETIC OPENING | |
| SK3601U (en) | Security fitting with chain | |
| ES1054748Y (en) | PLUG WITH OPENING AND ROTATING CLOSURE DEVICE | |
| ES1061999Y (en) | OPENING AND CLOSING DEVICE FOR DOORS. |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20050928 |
|
| AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
| DAX | Request for extension of the european patent (deleted) | ||
| RBV | Designated contracting states (corrected) |
Designated state(s): DE FR GB IT |
|
| RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: THOMSON LICENSING |
|
| A4 | Supplementary search report drawn up and despatched |
Effective date: 20111005 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20120105 |