ES2531634T3 - Procedimiento de comunicación en una red, dispositivo de comunicación y sistema asociado - Google Patents
Procedimiento de comunicación en una red, dispositivo de comunicación y sistema asociado Download PDFInfo
- Publication number
- ES2531634T3 ES2531634T3 ES09787132.1T ES09787132T ES2531634T3 ES 2531634 T3 ES2531634 T3 ES 2531634T3 ES 09787132 T ES09787132 T ES 09787132T ES 2531634 T3 ES2531634 T3 ES 2531634T3
- Authority
- ES
- Spain
- Prior art keywords
- node
- cryptographic
- network
- list
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Facsimile Transmission Control (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Un procedimiento de comunicación en una red entre un primer nodo y un segundo nodo, caracterizado porque: el primer nodo comprende una primera lista de elementos criptográficos que incluye una pluralidad de elementos criptográficos, donde el segundo nodo comprende una segunda lista de elementos criptográficos que incluye una pluralidad de elementos criptográficos, comprendiendo dicho procedimiento: a) que el primer nodo reciba desde el segundo nodo un identificador de segundo nodo, b) que el primer nodo determine a partir del identificador de segundo nodo la posición en la primera lista de al menos un elemento criptográfico en función de una raíz común con un elemento criptográfico de la segunda lista, c) que el primer nodo genere una clave de encriptación mediante el elemento criptográfico que tiene una raíz común.
Description
Claims (1)
-
imagen1 imagen2
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP08305561 | 2008-09-17 | ||
EP08305561 | 2008-09-17 | ||
PCT/IB2009/053918 WO2010032158A2 (en) | 2008-09-17 | 2009-09-08 | A method for communicating in a network, a communication device and a system therefor |
Publications (1)
Publication Number | Publication Date |
---|---|
ES2531634T3 true ES2531634T3 (es) | 2015-03-18 |
Family
ID=42039962
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ES09787132.1T Active ES2531634T3 (es) | 2008-09-17 | 2009-09-08 | Procedimiento de comunicación en una red, dispositivo de comunicación y sistema asociado |
Country Status (8)
Country | Link |
---|---|
US (1) | US9813903B2 (es) |
EP (1) | EP2338294B1 (es) |
JP (1) | JP5637990B2 (es) |
KR (1) | KR101595994B1 (es) |
CN (1) | CN102160406B (es) |
ES (1) | ES2531634T3 (es) |
TW (1) | TWI462557B (es) |
WO (1) | WO2010032158A2 (es) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8713317B2 (en) * | 2009-10-16 | 2014-04-29 | Samsung Electronics Co., Ltd. | Method and system for encrypting data in a wireless communication system |
EP2667539A1 (en) * | 2012-05-21 | 2013-11-27 | Koninklijke Philips N.V. | Key sharing methods, device and system for configuration thereof. |
WO2014016863A1 (ja) | 2012-07-23 | 2014-01-30 | 富士通株式会社 | ノードおよび通信方法 |
RU2636109C2 (ru) * | 2012-12-21 | 2017-11-20 | Конинклейке Филипс Н.В. | Использующее общий ключ сетевое устройство и его конфигурирование |
US9882713B1 (en) | 2013-01-30 | 2018-01-30 | vIPtela Inc. | Method and system for key generation, distribution and management |
EP3020158B1 (en) | 2013-07-12 | 2017-04-19 | Koninklijke Philips N.V. | Key agreement device and method |
US9467478B1 (en) | 2013-12-18 | 2016-10-11 | vIPtela Inc. | Overlay management protocol for secure routing based on an overlay network |
NL2013520B1 (en) * | 2014-09-24 | 2016-09-29 | Koninklijke Philips Nv | Public-key encryption system. |
CN104768149B (zh) * | 2015-03-17 | 2018-02-27 | 重庆邮电大学 | 一种WSN中基于Top‑k查询的数据隐私保护和完整性验证方法 |
US9980303B2 (en) | 2015-12-18 | 2018-05-22 | Cisco Technology, Inc. | Establishing a private network using multi-uplink capable network devices |
EP3373505A1 (en) * | 2017-03-06 | 2018-09-12 | Koninklijke Philips N.V. | Device and method for sharing a matrix for use in a cryptographic protocol |
TWI819873B (zh) * | 2022-11-01 | 2023-10-21 | 泰茂實業股份有限公司 | 儲能裝置中對逆變器間歇放電的方法、電腦程式、電腦可讀取媒體及其儲能裝置 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6918038B1 (en) | 1996-08-13 | 2005-07-12 | Angel Secure Networks, Inc. | System and method for installing an auditable secure network |
US6055432A (en) * | 1997-08-15 | 2000-04-25 | Lucent Technologies Inc. | Dynamic channel allocation in macrocells with random exclusion for allowing underlaying autonomous microcells |
US6047190A (en) * | 1997-08-15 | 2000-04-04 | Lucent Technologies Inc | Dynamic channel allocation in macrocells with deterministic exclusion for allowing underlaying autonomous microcells |
US6240188B1 (en) * | 1999-07-06 | 2001-05-29 | Matsushita Electric Industrial Co., Ltd. | Distributed group key management scheme for secure many-to-many communication |
US7089211B1 (en) * | 2000-01-12 | 2006-08-08 | Cisco Technology, Inc. | Directory enabled secure multicast group communications |
US7948951B2 (en) * | 2002-06-12 | 2011-05-24 | Xocyst Transfer Ag L.L.C. | Automatic peer discovery |
US7234063B1 (en) * | 2002-08-27 | 2007-06-19 | Cisco Technology, Inc. | Method and apparatus for generating pairwise cryptographic transforms based on group keys |
US7558388B2 (en) * | 2004-10-15 | 2009-07-07 | Broadcom Corporation | Derivation method for cached keys in wireless communication system |
JP5255436B2 (ja) * | 2005-06-08 | 2013-08-07 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 人体センサネットワーク用の決定論的鍵事前配布及び運用鍵管理 |
US8099495B2 (en) | 2005-12-29 | 2012-01-17 | Intel Corporation | Method, apparatus and system for platform identity binding in a network node |
US7774837B2 (en) * | 2006-06-14 | 2010-08-10 | Cipheroptics, Inc. | Securing network traffic by distributing policies in a hierarchy over secure tunnels |
CN101473626B (zh) * | 2006-06-22 | 2013-09-18 | 皇家飞利浦电子股份有限公司 | 分级确定性成对密钥预分发方案 |
-
2009
- 2009-09-08 ES ES09787132.1T patent/ES2531634T3/es active Active
- 2009-09-08 US US13/063,216 patent/US9813903B2/en active Active
- 2009-09-08 EP EP09787132.1A patent/EP2338294B1/en active Active
- 2009-09-08 JP JP2011526606A patent/JP5637990B2/ja active Active
- 2009-09-08 CN CN200980136433.7A patent/CN102160406B/zh active Active
- 2009-09-08 KR KR1020117008486A patent/KR101595994B1/ko active IP Right Grant
- 2009-09-08 WO PCT/IB2009/053918 patent/WO2010032158A2/en active Application Filing
- 2009-09-14 TW TW098130962A patent/TWI462557B/zh active
Also Published As
Publication number | Publication date |
---|---|
WO2010032158A2 (en) | 2010-03-25 |
KR101595994B1 (ko) | 2016-02-22 |
WO2010032158A3 (en) | 2010-07-29 |
US20110164750A1 (en) | 2011-07-07 |
KR20110079650A (ko) | 2011-07-07 |
US9813903B2 (en) | 2017-11-07 |
CN102160406B (zh) | 2014-05-28 |
TWI462557B (zh) | 2014-11-21 |
TW201018167A (en) | 2010-05-01 |
EP2338294A2 (en) | 2011-06-29 |
EP2338294B1 (en) | 2014-12-24 |
CN102160406A (zh) | 2011-08-17 |
JP5637990B2 (ja) | 2014-12-10 |
JP2012503356A (ja) | 2012-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ES2531634T3 (es) | Procedimiento de comunicación en una red, dispositivo de comunicación y sistema asociado | |
ES2524242T3 (es) | Sistema y procedimiento para utilizar con total seguridad múltiples perfiles de abonados con un componente de seguridad y un dispositivo de telecomunicación móvil | |
CL2018002362A1 (es) | Almacenamiento y transferencia seguros resistentes a pérdida de múltiples partes de claves criptográficas para sistemas a base de cadena de bloques en conjunto con un sistema de administración de billetera. | |
ES2628462T3 (es) | Método y aparato para el control de un sistema inalámbrico doméstico | |
AR086967A1 (es) | Sistema y metodo de autenticacion para el acceso a servicios | |
AR110816A1 (es) | Gestión de información dedicada y común de un sistema | |
MX2020003689A (es) | Dispositivo criptografico con matriz compartida actualizable. | |
CO2019013129A2 (es) | Indicadores de privacidad para controlar peticiones de autenticación | |
CL2014002082A1 (es) | Sistema de integración de servicios de terceros remotos comprende un sistema gestor, una base de datos, un sistema de introducción y reconocimiento de mensajes, un sistema de salida, un sistema de dialogo conectado al sistema gestor, y un sistema de intercambio de información con los servicios de terceros remotos; método de integración de servicios. | |
ES2546992T3 (es) | Método para desintonizar los álabes de un motor de turbina de gas | |
AR101574A1 (es) | Métodos y nodos para la correspondencia del abono con la identidad de usuario del servicio | |
CL2017002525A1 (es) | Método y equipo de usuario para compactar la retroalimentación de harq | |
WO2014179145A3 (en) | Drive level encryption key management in a distributed storage system | |
TR201910624T4 (tr) | Bir hedef blok şifreyi hesaplamak üzere düzenlenmiş bir kriptografik cihaz. | |
CL2016001946A1 (es) | Prensa de impresión de tipografía, en particular prensa de numeración. | |
AR108378A1 (es) | Secuencia de detección para comunicación d2d | |
AR112647A1 (es) | Dispositivo de red, dispositivo terminal, y métodos asociados | |
AR114899A1 (es) | Gestión del identificador 5g-s-tmsi ampliado de lte conectado a 5gc | |
JP2019046670A5 (es) | ||
AR111135A1 (es) | Reanudación de conexión segura de red | |
JP2017163470A5 (es) | ||
CO2022003900A2 (es) | Sistema de monitorización de seguridad | |
AR100213A1 (es) | Sistema y método para otorgar crédito | |
CL2018000787A1 (es) | Sistema de entrega segura, módulo de registro y contenedor de acceso controlado | |
WO2015157131A3 (en) | System and method for boot sequence modification using chip-restricted instructions residing on an external memory device |