IN2012DN01367A - - Google Patents

Download PDF

Info

Publication number
IN2012DN01367A
IN2012DN01367A IN1367DEN2012A IN2012DN01367A IN 2012DN01367 A IN2012DN01367 A IN 2012DN01367A IN 1367DEN2012 A IN1367DEN2012 A IN 1367DEN2012A IN 2012DN01367 A IN2012DN01367 A IN 2012DN01367A
Authority
IN
India
Prior art keywords
usim
cksn
key
disclosed
ciphering
Prior art date
Application number
Other languages
English (en)
Inventor
Veron Christian Herrero
Monica Wifvesson
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Publication of IN2012DN01367A publication Critical patent/IN2012DN01367A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
IN1367DEN2012 2009-08-17 2010-08-17 IN2012DN01367A (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US23448909P 2009-08-17 2009-08-17
US33100310P 2010-05-04 2010-05-04
PCT/IB2010/002038 WO2011021091A1 (en) 2009-08-17 2010-08-17 Method for handling ciphering keys in a mobile station

Publications (1)

Publication Number Publication Date
IN2012DN01367A true IN2012DN01367A (de) 2015-06-05

Family

ID=43348519

Family Applications (1)

Application Number Title Priority Date Filing Date
IN1367DEN2012 IN2012DN01367A (de) 2009-08-17 2010-08-17

Country Status (10)

Country Link
US (1) US9681292B2 (de)
EP (1) EP2468024B1 (de)
JP (2) JP5636050B2 (de)
KR (1) KR101723701B1 (de)
CN (1) CN102668609B (de)
AU (1) AU2010286125B2 (de)
CA (1) CA2769938C (de)
IN (1) IN2012DN01367A (de)
MY (1) MY159193A (de)
WO (1) WO2011021091A1 (de)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9167424B2 (en) * 2010-01-18 2015-10-20 Htc Corporation Method of handling security in SRVCC handover and related communication device
US9131412B2 (en) 2010-05-07 2015-09-08 Nokia Technologies Oy Signaling radio bearer security handling for single radio voice call continuity operation
WO2012024486A1 (en) 2010-08-18 2012-02-23 Research In Motion Limited Methods to maintain call continuity
US20120198227A1 (en) * 2010-09-30 2012-08-02 Alec Brusilovsky Cipher key generation in communication system
CN102413467B (zh) * 2011-11-29 2017-10-27 中兴通讯股份有限公司 一种srvcc切换处理方法、装置及其终端
AU2015253709B2 (en) * 2014-04-28 2018-07-05 Intel IP Corporation Solution to skip authentication procedure during Circuit- Switched Fallback (CSFB) to shorten call setup time
GB2527518A (en) * 2014-06-23 2015-12-30 Nec Corp Communication system
JP6548348B2 (ja) * 2015-08-13 2019-07-24 ホアウェイ・テクノロジーズ・カンパニー・リミテッド メッセージ保護方法、ならびに関連デバイスおよびシステム
US10312747B2 (en) * 2015-09-10 2019-06-04 Cpg Technologies, Llc Authentication to enable/disable guided surface wave receive equipment
US11832107B2 (en) * 2020-07-30 2023-11-28 Apple Inc. Recovering devices from limited service due to mis-configuration

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5586185A (en) * 1994-03-15 1996-12-17 Mita Industrial Co., Ltd. Communications system capable of communicating encrypted information
US6857075B2 (en) * 2000-12-11 2005-02-15 Lucent Technologies Inc. Key conversion system and method
US20050176431A1 (en) * 2004-02-11 2005-08-11 Telefonaktiebolaget L M Ericsson (Publ) Method for handling key sets during handover
US7623658B2 (en) * 2004-08-23 2009-11-24 Broadcom Corporation Method and system for implementing the A5/3 encryption algorithm for GSM and EDGE compliant handsets
WO2006128481A2 (en) * 2005-05-31 2006-12-07 Telecom Italia S.P.A. Method for auto-configuration of a network terminal address
CN100550725C (zh) * 2005-06-17 2009-10-14 中兴通讯股份有限公司 一种用户与应用服务器协商共享密钥的方法
CN100596084C (zh) * 2006-04-20 2010-03-24 华为技术有限公司 移动电路域用户接入ims网络的系统及其接入的注册方法
CN101080051B (zh) * 2006-05-24 2010-05-12 联芯科技有限公司 终端指示业务状态的方法
CN101299884B (zh) * 2008-06-16 2012-10-10 中兴通讯股份有限公司 用户设备转移时密钥身份标识符的生成方法和生成系统
US9344924B2 (en) * 2008-11-27 2016-05-17 Htc Corporation Method of handling handover security configuration and related communication device
US20120198227A1 (en) * 2010-09-30 2012-08-02 Alec Brusilovsky Cipher key generation in communication system

Also Published As

Publication number Publication date
WO2011021091A1 (en) 2011-02-24
KR20120054017A (ko) 2012-05-29
CN102668609B (zh) 2015-08-19
JP2015015754A (ja) 2015-01-22
CA2769938A1 (en) 2011-02-24
US9681292B2 (en) 2017-06-13
EP2468024B1 (de) 2018-08-15
US20120163601A1 (en) 2012-06-28
KR101723701B1 (ko) 2017-04-05
JP5636050B2 (ja) 2014-12-03
AU2010286125A1 (en) 2012-03-08
JP2013502795A (ja) 2013-01-24
MY159193A (en) 2016-12-30
CN102668609A (zh) 2012-09-12
CA2769938C (en) 2017-09-05
AU2010286125B2 (en) 2015-01-22
EP2468024A1 (de) 2012-06-27

Similar Documents

Publication Publication Date Title
IN2012DN01367A (de)
WO2010025280A3 (en) Integrity protection and/or ciphering for ue registration with a wireless network
PH12018502160A1 (en) Systems and methods for secure storage of user information in a user profile
MX2019007036A (es) Sistemas y metodos para la obtencion de un registro medico almacenado en una cadena de bloques de un dispositivo portatil.
HK1259297A1 (zh) 公/私钥生物特徵认证系统
TN2015000274A1 (en) Method and apparatus for marking manufactured items using physical characteristic
NZ709755A (en) Security key generation for dual connectivity
WO2012104771A3 (en) Secure access to personal health records in emergency situations
GB2496354B (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
GB2484207A (en) Method and apparatus for medical information encryption
EP2034780A3 (de) System, Verfahren und Vorrichtung für eingeschränkte Sicherheitsnachweise auf Abruf in drahtlosen und anderen Kommunikationsnetzwerken
WO2013114125A3 (en) A method and database system for secure storage and communication of information
GB2481161A (en) System and method for securely storing data in an electronic device
GB2489292B (en) Data transfer device
TW200633457A (en) Method for generating data for detection of tampering, and method and apparatus for detection of tampering
WO2010044937A3 (en) System and method for electronic data security
MX2016007818A (es) Aparato, sistema y metodo para sce (mejora de celdas pequeñas).
MY171059A (en) Apparatus and method for signaling enhanced security context for session encryption and integrity keys
MX354234B (es) Sistema y método para proteger datos de incidentes de tren.
MX2021008680A (es) Tecnicas para autenticacion de llamadas.
WO2015023368A3 (en) Apparatus and method for key update for use in a block cipher algorithm
WO2012051076A3 (en) A method for securing credentials in a remote repository
Santhi et al. A novel cryptographic key generation method using image features
WO2011030352A3 (en) System and method for mobile phone resident digital signing and encryption/decryption of sms
CN105282738A (zh) 移动终端安全认证方法