EP1714510A1 - Emission de cle publique par un terminal mobile - Google Patents
Emission de cle publique par un terminal mobileInfo
- Publication number
- EP1714510A1 EP1714510A1 EP05717618A EP05717618A EP1714510A1 EP 1714510 A1 EP1714510 A1 EP 1714510A1 EP 05717618 A EP05717618 A EP 05717618A EP 05717618 A EP05717618 A EP 05717618A EP 1714510 A1 EP1714510 A1 EP 1714510A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- public key
- key
- mobile
- terminal
- network entity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the invention relates to a public key infrastructure in a mobile telephone network.
- the invention also relates to mobile computer terminals, in particular having a SIM or WIM card.
- Such terminals can therefore be mobile telephones or WAP telephones. They have in common the characteristic of having a SIM or WIM card, therefore of already being identified on a network related to the operator to which the mobile telephone service has been subscribed.
- the invention relates in particular to a public key infrastructure in a mobile network.
- a universal and recurring question in the field of networks is how to ensure trust between interlocutors who do not know each other and from a distance.
- the solution exists, it consists in implementing a public key infrastructure (PKI or PKI, Public Key Infrastructure).
- PKI public key infrastructure
- This infrastructure has the advantage of offering stakeholders using this infrastructure to rely on a high security layer allowing strong authentication, signature and encryption.
- it has the drawback of its organization which remains complex, long, difficult to set up and therefore expensive for an operator.
- the interactions between the different entities identified by the certificates and the certification authority are an important part of the management of certificates, that is to say approvals including, essentially, a public key. These interactions include operations such as registration for certification, certificate renewal, certificate revocation, key backup and recovery.
- a CA Certification Authority
- the means used by the various Certification authorities to verify an identity before issuing a certificate can vary widely.
- RA Registration Authority
- An RA acts as an interface between the CA by receiving requests from users, authenticating them, and forwarding them to the CA. After receiving the response from the CA, the RA notifies the user of the result.
- RAs can be useful at the PKI level across different departments, in different geographic areas or any other unit whose policy and authentication requests vary. We can note here the drawbacks of this infrastructure: it is long and costly to set up, it has little flexibility in the generation of certificates (linked to the certification policy), it has a significant cost for the user who wishes have a certificate, it requires significant management on the side of the certification operator.
- a public key infrastructure offers high security, but has the disadvantage of prior registration with a registration authority.
- the invention aims to make the public key certification process easier.
- This object is achieved according to the invention thanks to a certification method using a public key certification authority and using at least one mobile terminal capable of receiving messages which are encrypted by this public key, characterized in that 'it comprises the step consisting in generating the public key within the mobile terminal itself, the stage consisting, for a telecommunications network entity, in acquiring this key from the terminal by a network communication, and the step consisting, for the network entity, in authenticating the terminal by a process of authenticating the interlocutor used in a usual telephone communication, the method further comprising the step of supplying the certification authority with this public key in association with the result of this identification process.
- a mobile telecommunications system comprising at least one mobile terminal and a network entity, characterized in that it comprises means for generating a public key within the mobile terminal itself and means within the telecommunications network entity to acquire this public key from the terminal by a network communication, as well as means for authenticating the terminal by an authentication process used in a usual telephone communication, the system comprising in in addition to a certification authority and means for supplying the certification authority with the public key generated by the mobile terminal in association with the result of this authentication process.
- a mobile telecommunication terminal is further proposed, characterized in that it includes means for producing at least one key intended for decrypting messages received by this terminal, as well as means for transmitting this key by network communication. via a telephony network entity, destined for a certification authority so that this becomes a public key.
- a telephony network entity destined for a certification authority so that this becomes a public key.
- the issuance of a certificate must be carried out according to a well-defined procedure and if this certificate is to have any value, face to face after, for example, examination of identity documents.
- Different trusted authorities develop different certificate issuing policies. In some cases, only the email address is sufficient. In other cases, the UNIX or Windows login and a password will be sufficient.
- the issuing process may require notarial documents beforehand, or even a complete verification of the identity "face to face”.
- the process for issuing certificates can take a completely transparent form for user (at the expense of security) or request meaningful user input and complex procedures. In general, these certification procedures must be very flexible, so organizations can adapt them to their needs.
- the public key it contains Before a certificate is issued, the public key it contains must be generated in correspondence with a private key which is confidential. Sometimes it may be useful to issue a certificate to a person for signing operations and another certificate for encryption use. Private keys, whether for signature or encryption, are kept on a physical medium (smart card, nail, USB, ...), physical medium which is held by the person he represents, for provide high security. With a view to recovery, the private encryption key is sequestered on a protected central server where it can be found in the event that the user loses his key, for example. An encryption key specifically dedicated to telephone communications is generally produced either locally (workstation or even inside a smart card) or centrally, for example in a smart card personalization workshop.
- the generation of keys locally provides maximum non-repudiation service, but involves more user participation in the delivery process. Flexibility in key management is essential for most organizations without neglecting the security side.
- a certificate is subject to a validity period. Any attempt to use a certificate before or after its validity period will fail. Therefore the mechanisms for the administration and renewal of certificates are essential for security policy.
- An administrator may want to be notified when a certificate expires, so an appropriate renewal process can be put in place and avoid any inconvenience with the use of expiring certificates.
- the certificate renewal process may involve the reuse of the same public key / private key pair or the issuance of another. A certificate can be suspended even if it is valid, for example during a flight.
- Certificate revocation consists of publishing a Certificate Revocation List (CRL) in a directory at regular intervals.
- CTL Certificate Revocation List
- the verification of this list is therefore an integral part of the authentication process.
- the infrastructure of a mobile network has been designed to guarantee high security.
- the GSM system therefore uses authentication and encryption methods. To guarantee this high level of security, the network strongly authenticates the mobile.
- the GSM system uses four types of addressing linked to the subscriber: - the IMSI is known only within the GSM network; - the TMSI corresponds to a temporary identity used to identify the mobile during mobile / network interactions; - the MSISDN corresponds to the subscriber's telephone number, it is the only identifier known from the outside. - the MSRN, which is a number assigned when the call is established.
- SIM Subscriber Identifier Module
- IMSI International Mobile Station Identity
- the abbreviation TMSI Temporal Mobile Suscriber Identity
- MSISDN Mobile Station International ISDN Number
- IMEI International Mobile Equipment Identity
- MSRN Mobile Station Roaming Number
- the GSM system uses an authentication process aimed at protecting both the subscriber but also the operator.
- a subscriber 10 wishing to authenticate on the network the network via a communication entity 20, then transmits a random number called RAND to the mobile.
- the SIM card calculates the signature of RAND using the A3 algorithm and the private key Ki stored in the SIM card.
- the result obtained is noted SRES, then sent to the network.
- the network (here entity 20), to ensure the identity of this subscriber, will do the same, that is to say that it calculates a RAND signature using A3 and the key Ki specific to each subscriber and stored on a database. If the result calculated locally is identical to that received, the subscriber is authenticated, otherwise the mobile is rejected.
- Kc an encryption key
- This key is constructed using random data transmitted by the network and a private key Ki specific to subscriber 10 and stored in the SIM card. With these two parameters a key Kc is generated with the help of the A8 algorithm. For its part, the network (entity 20) performs the same operation. The key Ki corresponding to the subscriber previously identified is in an AUC (Authentication Center) base, and the network obtains with this key Ki the same encryption key Kc on its side.
- the idea is to define a lean PKI model with the following objectives here, which are those of reducing the cost of management for the operator, ie avoiding a heavy and centralized architecture and relying on security telephony architecture and in particular the identification / authentication on which the system is based.
- this solution can be used for secure exchanges such as for example in a work environment in order to preserve the confidentiality of exchanges or else in the context of peer-to-peer communications.
- the authentication procedure has high security elements.
- the idea is to generate a key pair in the phone.
- the subscriber 10 sends his public key to a certification operator (here the entity 20 itself).
- the role of certification operator is therefore at least partially fulfilled by the mobile operator itself.
- Authentication on the GSM network is therefore strong authentication (possession of a security element and a secret). This sending to the certification server 30 is carried out in a secure tunnel.
- the operator 20 can certify this received key, because it is certain of the identity corresponding to the public key presented: non usurpation of identity possible on the GSM network. Then the operator 20 returns the certificate to its owner (case where the entity 20 is confused with the certification authority) and / or deposits it on the public certification server, here referenced 30.
- the advantages of this solution are enormous, in particular the simplified certification procedure, the absence here of a recovery process, and decentralized management transferred to the client.
- the idea is therefore to generate the bi-key here within mobile 10 with here the principles according to which the DN (distinguished name, or unique identifier) for each certificate holder is their telephone number and each certificate holder generates their bi-key and obtains a certificate by sending its public key for certification in the traditional way.
- the server automatically determines the origin of the call using the DN.
- the authentication of the sender is carried out by the telephone network (entity 20).
- the certification entity 30 which generates the certificate in correspondence with the key received is certain of the identity certified in the certificate, thanks to the identification action carried out by the telephony entity 20, and its identification means. usual mobile terminal.
- the server 30 can therefore finally generate the certificate corresponding to the public key received and then send the certificate to its owner.
- the described method is implemented by a computer program.
- This computer program is intended to be stored in / or transmitted by a data medium, and includes software instructions for executing the method by a computer device, in this case, the described measuring device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0401347A FR2866168A1 (fr) | 2004-02-11 | 2004-02-11 | Emission de cle publique par terminal mobile |
PCT/FR2005/000328 WO2005079090A1 (fr) | 2004-02-11 | 2005-02-11 | Emission de cle publique par terminal mobile |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1714510A1 true EP1714510A1 (fr) | 2006-10-25 |
Family
ID=34778678
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05717618A Withdrawn EP1714510A1 (fr) | 2004-02-11 | 2005-02-11 | Emission de cle publique par un terminal mobile |
Country Status (6)
Country | Link |
---|---|
US (1) | US20070186097A1 (zh) |
EP (1) | EP1714510A1 (zh) |
JP (1) | JP2007525125A (zh) |
CN (1) | CN1918931A (zh) |
FR (1) | FR2866168A1 (zh) |
WO (1) | WO2005079090A1 (zh) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070074027A1 (en) * | 2005-09-26 | 2007-03-29 | Tien-Chun Tung | Methods of verifying, signing, encrypting, and decrypting data and file |
US20110113240A1 (en) * | 2009-11-10 | 2011-05-12 | Christina Fu | Certificate renewal using enrollment profile framework |
US9130758B2 (en) * | 2009-11-10 | 2015-09-08 | Red Hat, Inc. | Renewal of expired certificates |
FR2957438B1 (fr) | 2010-03-09 | 2012-03-30 | Proton World Int Nv | Detection d'un deroutement d'un canal de communication d'un dispositif de telecommunication couple a un circuit nfc |
FR2957439B1 (fr) | 2010-03-09 | 2012-03-30 | Proton World Int Nv | Protection d'un canal de communication entre un module de securite et un circuit nfc |
FR2957440B1 (fr) * | 2010-03-09 | 2012-08-17 | Proton World Int Nv | Protection d'un module de securite dans un dispositif de telecommunication couple a un circuit nfc |
FR2969341B1 (fr) | 2010-12-20 | 2013-01-18 | Proton World Int Nv | Gestion de canaux de communication dans un dispositif de telecommunication couple a un circuit nfc |
CN102098672A (zh) * | 2011-03-16 | 2011-06-15 | 北京邮电大学 | 密钥信息的传递方法与系统、发送端及接收端 |
US9231931B2 (en) * | 2012-05-23 | 2016-01-05 | Kt Corporation | Method and apparatus of constructing secure infra-structure for using embedded universal integrated circuit card |
CN107689947B (zh) | 2016-08-05 | 2021-03-30 | 华为国际有限公司 | 一种数据处理的方法和装置 |
CN112995144A (zh) * | 2021-02-05 | 2021-06-18 | 杭州华橙软件技术有限公司 | 文件处理方法、系统、可读存储介质及电子设备 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020049818A1 (en) * | 1998-05-29 | 2002-04-25 | Gilhuly Barry J. | System and method for pushing encrypted information between a host system and a mobile data communication device |
US6772331B1 (en) * | 1999-05-21 | 2004-08-03 | International Business Machines Corporation | Method and apparatus for exclusively pairing wireless devices |
ATE358298T1 (de) * | 2001-07-12 | 2007-04-15 | Research In Motion Ltd | System und verfahren zum schieben von daten von einer informationsquelle zu einem mobilen endgerät beinhalten die transcodierung der daten |
EP1410600B1 (en) * | 2001-07-16 | 2008-08-27 | Research In Motion Limited | A system and method for supporting multiple certificate authorities on a mobile communication device |
WO2003050774A1 (en) * | 2001-12-10 | 2003-06-19 | Beamtrust A/S | A method of distributing a public key |
GB2384403B (en) * | 2002-01-17 | 2004-04-28 | Toshiba Res Europ Ltd | Data transmission links |
JP2003264888A (ja) * | 2002-03-07 | 2003-09-19 | Pioneer Electronic Corp | スピーカ制御装置及びスピーカシステム |
-
2004
- 2004-02-11 FR FR0401347A patent/FR2866168A1/fr active Pending
-
2005
- 2005-02-11 JP JP2006552667A patent/JP2007525125A/ja not_active Withdrawn
- 2005-02-11 WO PCT/FR2005/000328 patent/WO2005079090A1/fr not_active Application Discontinuation
- 2005-02-11 CN CNA2005800043576A patent/CN1918931A/zh active Pending
- 2005-02-11 EP EP05717618A patent/EP1714510A1/fr not_active Withdrawn
- 2005-02-11 US US10/588,949 patent/US20070186097A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO2005079090A1 * |
Also Published As
Publication number | Publication date |
---|---|
FR2866168A1 (fr) | 2005-08-12 |
CN1918931A (zh) | 2007-02-21 |
WO2005079090A1 (fr) | 2005-08-25 |
US20070186097A1 (en) | 2007-08-09 |
JP2007525125A (ja) | 2007-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1714510A1 (fr) | Emission de cle publique par un terminal mobile | |
EP1022922B1 (fr) | Procédé d'authentification, avec établissement d'un canal sécurise, entre un abonné et un fournisseur de services accessible via un opérateur de télécommunications | |
WO2015135063A1 (en) | System and method for secure deposit and recovery of secret data | |
EP1427231A1 (fr) | Procédé d'établissement et de gestion d'un modèle de confiance entre une carte à puce et un terminal radio | |
EP2166728A1 (fr) | Procédé d'échange de données, telles que des clés cryptographiques, entre un système informatique et une entité électronique, telle qu'une carte à microcircuit | |
FR2825869A1 (fr) | Procede d'authentification entre un objet de telecommunication portable et une borne d'acces public | |
EP3375133B1 (fr) | Procede de securisation et d'authentification d'une telecommunication | |
EP3965361B1 (fr) | Echange de données entre un client et un dispositif distant, par exemple un module sécurisé | |
WO2003107587A1 (fr) | Procede et dispositif d’interface pour echanger de maniere protegee des donnees de contenu en ligne | |
WO2019228853A1 (fr) | Methode d'etablissement de cles pour le controle d'acces a un service ou une ressource | |
EP2215800A1 (fr) | Procede d'authentification d'un utilisateur accedant a un serveur distant a partir d'un ordinateur | |
EP1587238A1 (fr) | Procédé de vérification dans un terminal radio de l'authenticité de certificats numériques et système d'authentification | |
FR3118226A1 (fr) | Procédé et dispositif de contrôle de l’accès à un service utilisant une chaîne de blocs | |
WO2006072746A1 (fr) | Procede de securisation d’une communication entre une carte sim et un terminal mobile | |
FR2813151A1 (fr) | Communication securisee dans un equipement d'automatisme | |
FR2846819A1 (fr) | Procede d'echange securise entre deux unites de communication, systeme de controle et serveur pour la mise en oeuvre du procede | |
EP4156606A1 (fr) | Procédé de gestion d'un utilisateur intervenant dans une communication de groupe | |
EP4380100A1 (fr) | Système intégrant une délégation de gestion de clés publiques en mode dégradé fondé sur un mécanisme de confiance | |
WO2022153005A1 (fr) | Procede et systeme de controle d'acces | |
EP4160987A1 (fr) | Procédé pour générer une signature électronique au moyen du protocole fido | |
FR3116978A1 (fr) | Contrôle d’accès à un réseau de communication local, et passerelle d’accès mettant en œuvre un tel contrôle | |
EP1992104B1 (fr) | Authentification d'un dispositif informatique au niveau utilisateur | |
FR3049088A1 (fr) | Procede permettant de gerer des identites digitales associees a un individu, un objet, une organisation, un service, une application a travers un reseau informatique decentralise | |
FR2897488A1 (fr) | Procede de certification de cle publique par un prestataire non accredite | |
EP2317691A1 (fr) | Système et procédé de sécurisation contextuelle et dynamique des échanges de données au travers d'un réseau |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20060710 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20080307 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20100901 |