HK1095950A1 - Deploying and provisioning wireless handheld devices - Google Patents
Deploying and provisioning wireless handheld devicesInfo
- Publication number
- HK1095950A1 HK1095950A1 HK07103611.6A HK07103611A HK1095950A1 HK 1095950 A1 HK1095950 A1 HK 1095950A1 HK 07103611 A HK07103611 A HK 07103611A HK 1095950 A1 HK1095950 A1 HK 1095950A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- key
- long
- term
- public key
- agreement method
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US55909204P | 2004-04-02 | 2004-04-02 | |
US55964604P | 2004-04-05 | 2004-04-05 | |
PCT/CA2005/000466 WO2005096542A1 (en) | 2004-04-02 | 2005-03-30 | Deploying and provisioning wireless handheld devices |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1095950A1 true HK1095950A1 (en) | 2007-05-18 |
Family
ID=35064141
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK07103611.6A HK1095950A1 (en) | 2004-04-02 | 2007-04-03 | Deploying and provisioning wireless handheld devices |
Country Status (12)
Country | Link |
---|---|
US (4) | US7885411B2 (ko) |
EP (1) | EP1735945B1 (ko) |
JP (1) | JP4701238B2 (ko) |
KR (1) | KR20060132026A (ko) |
CN (1) | CN101023622B (ko) |
AT (1) | ATE438973T1 (ko) |
AU (2) | AU2005228061A1 (ko) |
BR (1) | BRPI0509538B1 (ko) |
CA (1) | CA2561796C (ko) |
DE (1) | DE602005015831D1 (ko) |
HK (1) | HK1095950A1 (ko) |
WO (1) | WO2005096542A1 (ko) |
Families Citing this family (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1408669A1 (en) * | 1998-07-03 | 2004-04-14 | Nokia Corporation | Secure session set up based on the wireless application protocol |
CA2277633C (en) | 1999-07-19 | 2009-10-20 | Certicom Corp. | Split-key key-agreement protocol |
US7370350B1 (en) * | 2002-06-27 | 2008-05-06 | Cisco Technology, Inc. | Method and apparatus for re-authenticating computing devices |
US7861078B2 (en) * | 2005-10-14 | 2010-12-28 | Juniper Networks, Inc. | Password-authenticated asymmetric key exchange |
KR100772180B1 (ko) | 2005-12-08 | 2007-11-01 | 한국전자통신연구원 | 이더넷 기반의 수동형 광네트워크에서 광종단장치와광가입자장치들 간에 보안 채널 설정 방법 및 이를 위한프레임 전송 제어용 다중점 제어 프로토콜 메시지 구조 |
US8086872B2 (en) | 2005-12-08 | 2011-12-27 | Electronics And Telecommunications Research Institute | Method for setting security channel based on MPCP between OLT and ONUs in EPON, and MPCP message structure for controlling frame transmission |
CN101554011A (zh) * | 2006-09-21 | 2009-10-07 | 交互数字技术公司 | 群组式密钥的生成 |
US7870255B2 (en) * | 2006-10-03 | 2011-01-11 | Research In Motion Limited | Access control system and method for wireless application provisioning |
US8050403B2 (en) * | 2007-03-06 | 2011-11-01 | Research In Motion Limited | Method and apparatus for generating a public key in a manner that counters power analysis attacks |
US8131994B2 (en) | 2007-06-01 | 2012-03-06 | Cisco Technology, Inc. | Dual cryptographic keying |
US8838953B2 (en) * | 2007-06-05 | 2014-09-16 | Stmicroelectronics, Inc. | System and method for using an out-of-band device to program security keys |
US8228902B2 (en) * | 2007-07-20 | 2012-07-24 | Cisco Technology, Inc. | Separation of validation services in VoIP address discovery system |
US8228903B2 (en) * | 2007-07-20 | 2012-07-24 | Cisco Technology, Inc. | Integration of VoIP address discovery with PBXs |
US8121114B2 (en) | 2009-02-12 | 2012-02-21 | Cisco Technology, Inc. | Prevention of voice over IP spam |
US8204047B2 (en) * | 2007-07-20 | 2012-06-19 | Cisco Technology, Inc. | Using PSTN reachability to verify caller ID information in received VoIP calls |
US8223755B2 (en) * | 2007-07-20 | 2012-07-17 | Cisco Technology, Inc. | Node reputation based on knowledge of PSTN calls |
US8274968B2 (en) * | 2007-07-20 | 2012-09-25 | Cisco Technology, Inc. | Restriction of communication in VoIP address discovery system |
US8199746B2 (en) | 2007-07-20 | 2012-06-12 | Cisco Technology, Inc. | Using PSTN reachability to verify VoIP call routing information |
US8072967B2 (en) * | 2007-07-20 | 2011-12-06 | Cisco Technology, Inc. | VoIP call routing information registry including hash access mechanism |
US8228904B2 (en) * | 2007-07-20 | 2012-07-24 | Cisco Technology, Inc. | Using PSTN reachability in anonymous verification of VoIP call routing information |
US8208635B2 (en) | 2007-11-13 | 2012-06-26 | Rosemount Inc. | Wireless mesh network with secure automatic key loads to wireless devices |
US7522723B1 (en) * | 2008-05-29 | 2009-04-21 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
DE102009032465B4 (de) * | 2008-07-16 | 2016-10-13 | Infineon Technologies Ag | Sicherheit in Netzwerken |
US20100042841A1 (en) * | 2008-08-15 | 2010-02-18 | Neal King | Updating and Distributing Encryption Keys |
US8223754B2 (en) * | 2009-02-09 | 2012-07-17 | Cisco Technology, Inc. | Auto-configured voice over internet protocol |
US8296567B2 (en) * | 2009-07-15 | 2012-10-23 | Research In Motion Limited | System and method for exchanging key generation parameters for secure communications |
US8645695B2 (en) * | 2009-10-07 | 2014-02-04 | Blackberry Limited | System and method for managing security key architecture in multiple security contexts of a network environment |
US8886935B2 (en) * | 2010-04-30 | 2014-11-11 | Kabushiki Kaisha Toshiba | Key management device, system and method having a rekey mechanism |
EP2509276B1 (de) * | 2011-04-05 | 2013-11-20 | F. Hoffmann-La Roche AG | Verfahren zum sicheren Übertragen von elektronischen Daten über eine Datenkommunikationsverbindung zwischen einem Gerät und einem weiteren Gerät |
US9093395B2 (en) * | 2011-09-02 | 2015-07-28 | Avogy, Inc. | Method and system for local control of defect density in gallium nitride based electronics |
JP5367039B2 (ja) * | 2011-09-30 | 2013-12-11 | 株式会社東芝 | サーバ装置及びプログラム |
JP5643741B2 (ja) * | 2011-12-02 | 2014-12-17 | 株式会社東芝 | 認証装置、認証方法および認証プログラム |
US10148438B2 (en) * | 2012-04-03 | 2018-12-04 | Rally Health, Inc. | Methods and apparatus for protecting sensitive data in distributed applications |
KR101301609B1 (ko) * | 2012-05-31 | 2013-08-29 | 서울대학교산학협력단 | 비밀키 생성 장치 및 방법, 그리고 그 방법을 컴퓨터에서 실행시키기 위한 프로그램을 기록한 기록매체 |
US9716589B2 (en) * | 2013-04-22 | 2017-07-25 | Unisys Corporation | Secured communications arrangement applying internet protocol security |
SI3033102T2 (sl) | 2013-08-13 | 2024-03-29 | Northwestern University | Peptid konjugirani delci |
EP3089091B1 (en) * | 2014-05-02 | 2020-03-11 | Barclays Execution Services Limited | Transaction authentication |
WO2015188151A1 (en) * | 2014-06-06 | 2015-12-10 | Bittorrent, Inc. | Securely sharing information via a public key- value data store |
US20160065374A1 (en) * | 2014-09-02 | 2016-03-03 | Apple Inc. | Method of using one device to unlock another device |
US20170091887A1 (en) * | 2015-09-24 | 2017-03-30 | Yahoo! Inc. | Method for accessing an online account after the owner's death |
EP3363175A1 (en) * | 2015-10-15 | 2018-08-22 | Otis Elevator Company | Software updating device |
SG10202109555WA (en) | 2016-02-23 | 2021-09-29 | Nchain Holdings Ltd | Agent-based turing complete transactions integrating feedback within a blockchain system |
AU2017223138B2 (en) | 2016-02-23 | 2022-02-10 | nChain Holdings Limited | Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts |
EP3420669B1 (en) | 2016-02-23 | 2021-03-24 | Nchain Holdings Limited | Cryptographic method and system for secure extraction of data from a blockchain |
HUE040631T2 (hu) | 2016-02-23 | 2019-03-28 | Nchain Holdings Ltd | Közös titok meghatározása biztonsági információcseréhez, és hierarchikus, determinisztikus rejtjel kulcsok |
WO2017145003A1 (en) | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Blockchain-based exchange with tokenisation |
GB2561729A (en) | 2016-02-23 | 2018-10-24 | Nchain Holdings Ltd | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
GB2562621A (en) | 2016-02-23 | 2018-11-21 | Nchain Holdings Ltd | System and method for controlling asset-related actions via a blockchain |
SG10202007904SA (en) | 2016-02-23 | 2020-10-29 | Nchain Holdings Ltd | A method and system for securing computer software using a distributed hash table and a blockchain |
EP3420517B1 (en) | 2016-02-23 | 2022-07-06 | nChain Holdings Limited | A method and system for the secure transfer of entities on a blockchain |
EP3257006B1 (en) | 2016-02-23 | 2018-10-03 | Nchain Holdings Limited | Personal device security using elliptic curve cryptography for secret sharing |
EP3257191B1 (en) | 2016-02-23 | 2018-04-11 | Nchain Holdings Limited | Registry and automated management method for blockchain-enforced smart contracts |
EP3420674B1 (en) | 2016-02-23 | 2021-03-24 | Nchain Holdings Limited | Blockchain-implemented method for control and distribution of digital content |
MX2018010048A (es) | 2016-02-23 | 2019-01-21 | Nchain Holdings Ltd | Sistema universal de tokenizacion para criptomonedas basadas en cadena de bloques. |
AU2017222470B2 (en) | 2016-02-23 | 2023-01-12 | nChain Holdings Limited | Tokenisation method and system for implementing exchanges on a blockchain |
US11212276B2 (en) * | 2016-07-01 | 2021-12-28 | Intel Corporation | Single pairing for multiple technologies |
EP3364596A1 (en) * | 2017-02-15 | 2018-08-22 | Koninklijke Philips N.V. | Key exchange devices and method |
EP3402118A1 (en) * | 2017-05-10 | 2018-11-14 | Koninklijke Philips N.V. | Key agreement devices and method |
US10530581B2 (en) * | 2017-09-08 | 2020-01-07 | Fujitsu Limited | Authenticated broadcast encryption |
US10819689B2 (en) | 2018-05-03 | 2020-10-27 | Honeywell International Inc. | Systems and methods for encrypted vehicle data service exchanges |
US10715511B2 (en) * | 2018-05-03 | 2020-07-14 | Honeywell International Inc. | Systems and methods for a secure subscription based vehicle data service |
GB201815396D0 (en) * | 2018-09-21 | 2018-11-07 | Nchain Holdings Ltd | Computer implemented system and method |
US11063921B2 (en) | 2018-11-06 | 2021-07-13 | International Business Machines Corporation | Extracting data from passively captured web traffic that is encrypted in accordance with an anonymous key agreement protocol |
CN112118568B (zh) * | 2019-06-21 | 2022-02-25 | 华为技术有限公司 | 一种设备身份鉴权的方法及设备 |
TWI730355B (zh) * | 2019-07-23 | 2021-06-11 | 新加坡商優納比控股私人有限公司 | 無線通信的動態金鑰產生方法 |
JP7037705B2 (ja) | 2020-03-13 | 2022-03-16 | 株式会社ソリトンシステムズ | 機密データ管理装置、プログラム及び記録媒体 |
US11882215B2 (en) * | 2021-05-21 | 2024-01-23 | Zoom Video Communications, Inc. | Handling joining and leaving of participants in videoconferencing with end-to-end encryption |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5491749A (en) | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks |
US5491750A (en) * | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
US6091820A (en) * | 1994-06-10 | 2000-07-18 | Sun Microsystems, Inc. | Method and apparatus for achieving perfect forward secrecy in closed user groups |
US5761305A (en) * | 1995-04-21 | 1998-06-02 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
US6487661B2 (en) | 1995-04-21 | 2002-11-26 | Certicom Corp. | Key agreement and transport protocol |
JPH1115373A (ja) * | 1997-06-20 | 1999-01-22 | Fuji Xerox Co Ltd | 公開鍵暗号方式 |
US6219421B1 (en) * | 1997-10-24 | 2001-04-17 | Shaul O. Backal | Virtual matrix encryption (VME) and virtual key cryptographic method and apparatus |
US6279110B1 (en) * | 1997-11-10 | 2001-08-21 | Certicom Corporation | Masked digital signatures |
US6336188B2 (en) * | 1998-05-01 | 2002-01-01 | Certicom Corp. | Authenticated key agreement protocol |
CA2241705C (en) | 1998-06-26 | 2006-06-20 | Certicom Corp. | A method for preventing key-share attacks |
EP1408669A1 (en) * | 1998-07-03 | 2004-04-14 | Nokia Corporation | Secure session set up based on the wireless application protocol |
CA2255285C (en) | 1998-12-04 | 2009-10-13 | Certicom Corp. | Enhanced subscriber authentication protocol |
JP4556277B2 (ja) | 1999-03-30 | 2010-10-06 | ソニー株式会社 | 情報処理装置および方法、情報処理システム、並びにプログラム格納媒体 |
CA2277633C (en) * | 1999-07-19 | 2009-10-20 | Certicom Corp. | Split-key key-agreement protocol |
US7181014B1 (en) * | 1999-09-10 | 2007-02-20 | Cisco Technology, Inc. | Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange |
US6718467B1 (en) * | 1999-10-28 | 2004-04-06 | Cisco Technology, Inc. | Password based protocol for secure communications |
US7711122B2 (en) * | 2001-03-09 | 2010-05-04 | Arcot Systems, Inc. | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys |
DE60236381D1 (de) * | 2001-04-12 | 2010-06-24 | Research In Motion Ltd | System und Verfahren zum dynamischen Schieben von Informationen auf drahtlose Datenübertragungsvorrichtungen |
EP1384126A2 (en) * | 2001-04-24 | 2004-01-28 | Hewlett-Packard Company | An information security system |
JP4255046B2 (ja) * | 2001-04-27 | 2009-04-15 | 日本電信電話株式会社 | 暗号通信路の確立方法、プログラム及びプログラム媒体、並びに、暗号通信システム |
US7181015B2 (en) * | 2001-07-31 | 2007-02-20 | Mcafee, Inc. | Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique |
US7127063B2 (en) * | 2001-12-31 | 2006-10-24 | Certicom Corp. | Method and apparatus for computing a shared secret key |
US7353382B2 (en) * | 2002-08-08 | 2008-04-01 | Fujitsu Limited | Security framework and protocol for universal pervasive transactions |
US7784684B2 (en) * | 2002-08-08 | 2010-08-31 | Fujitsu Limited | Wireless computer wallet for physical point of sale (POS) transactions |
US20040073795A1 (en) * | 2002-10-10 | 2004-04-15 | Jablon David P. | Systems and methods for password-based connection |
US7328282B2 (en) * | 2003-10-23 | 2008-02-05 | International Business Machines Corporation | Aspect oriented web service invocation |
-
2005
- 2005-03-30 BR BRPI0509538A patent/BRPI0509538B1/pt active IP Right Grant
- 2005-03-30 AU AU2005228061A patent/AU2005228061A1/en not_active Abandoned
- 2005-03-30 DE DE602005015831T patent/DE602005015831D1/de active Active
- 2005-03-30 WO PCT/CA2005/000466 patent/WO2005096542A1/en active Application Filing
- 2005-03-30 US US11/093,954 patent/US7885411B2/en active Active
- 2005-03-30 JP JP2007505347A patent/JP4701238B2/ja active Active
- 2005-03-30 EP EP05729970A patent/EP1735945B1/en active Active
- 2005-03-30 CN CN2005800175522A patent/CN101023622B/zh active Active
- 2005-03-30 AT AT05729970T patent/ATE438973T1/de not_active IP Right Cessation
- 2005-03-30 CA CA2561796A patent/CA2561796C/en active Active
- 2005-03-30 KR KR1020067022804A patent/KR20060132026A/ko active Search and Examination
-
2007
- 2007-04-03 HK HK07103611.6A patent/HK1095950A1/xx unknown
-
2009
- 2009-12-14 AU AU2009248475A patent/AU2009248475B2/en active Active
-
2010
- 2010-12-20 US US12/973,485 patent/US8090107B2/en active Active
-
2011
- 2011-11-24 US US13/304,382 patent/US8238558B2/en active Active
-
2012
- 2012-08-03 US US13/566,653 patent/US8615086B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20120063599A1 (en) | 2012-03-15 |
US8090107B2 (en) | 2012-01-03 |
BRPI0509538A (pt) | 2007-09-18 |
BRPI0509538B1 (pt) | 2019-01-15 |
CA2561796A1 (en) | 2005-10-13 |
WO2005096542A1 (en) | 2005-10-13 |
US8615086B2 (en) | 2013-12-24 |
AU2005228061A1 (en) | 2005-10-13 |
CA2561796C (en) | 2012-04-17 |
ATE438973T1 (de) | 2009-08-15 |
AU2009248475A1 (en) | 2010-01-07 |
EP1735945A1 (en) | 2006-12-27 |
EP1735945B1 (en) | 2009-08-05 |
US20120294440A1 (en) | 2012-11-22 |
JP2007531422A (ja) | 2007-11-01 |
AU2009248475B2 (en) | 2012-06-14 |
US8238558B2 (en) | 2012-08-07 |
CN101023622B (zh) | 2010-12-08 |
JP4701238B2 (ja) | 2011-06-15 |
KR20060132026A (ko) | 2006-12-20 |
DE602005015831D1 (de) | 2009-09-17 |
US7885411B2 (en) | 2011-02-08 |
EP1735945A4 (en) | 2007-06-20 |
CN101023622A (zh) | 2007-08-22 |
US20050232428A1 (en) | 2005-10-20 |
US20110103588A1 (en) | 2011-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1095950A1 (en) | Deploying and provisioning wireless handheld devices | |
MY142729A (en) | Bootstrapping authentication using distinguished random challenges | |
MX2010003677A (es) | Comunicacion inalambrica segura. | |
WO2006050152A3 (en) | Secure collaborative terminal identity authentication between a wireless communication device and a wireless operator | |
PL1889503T3 (pl) | Sposób uzgodnienia klucza zabezpieczającego między co najmniej jednym pierwszym i jednym drugim uczestnikiem komunikacji w celu zabezpieczenia połączenia komunikacyjnego | |
DE60310437D1 (de) | Sichere kommunikation | |
WO2007011991A3 (en) | Hybrid symmetric/asymmetric cryptography with user authentication | |
DE602004026787D1 (de) | Sicherer datentransfer | |
EP2120389A4 (en) | METHOD, SYSTEM, AND COMMUNICATION DEVICE CAPABLE OF GENERATING A CRYPTOGRAPHIC SESSION | |
MY169634A (en) | Wireless communication using concurrent re-authentication and connection setup | |
WO2007011990A3 (en) | Asymmetric cryptography with user authentication | |
ATE357107T1 (de) | Sichere synchronistion mittels zweier mitteilungen in drahtlosen netzwerken | |
WO2014176046A3 (en) | Community of interest-based secured communications over ipsec | |
MY169151A (en) | Security key generation for dual connectivity | |
DE60326092D1 (de) | Speichern und authentifizierung von datentransaktionen | |
WO2003032126A3 (en) | Multi-factor authentication system | |
WO2003039094A3 (en) | Methods and apparatus for securely communicating a message | |
IN2014DN10973A (ko) | ||
FI20070095A0 (fi) | Turva-avainten luominen langatonta viestintää varten | |
SG143152A1 (en) | System and method for secure record protocol using shared knowledge of mobile user credentials | |
WO2016144257A3 (en) | Method and system for facilitating authentication | |
MY166025A (en) | Pseudo-secret key generation in a communications system | |
WO2012087572A8 (en) | Wireless communication system and method | |
WO2008078101A3 (en) | Method and device for mutual authentication | |
WO2008153284A3 (en) | Method for providing confidentiality protection of control signaling using certificate |