IN2012DN01367A - - Google Patents

Download PDF

Info

Publication number
IN2012DN01367A
IN2012DN01367A IN1367DEN2012A IN2012DN01367A IN 2012DN01367 A IN2012DN01367 A IN 2012DN01367A IN 1367DEN2012 A IN1367DEN2012 A IN 1367DEN2012A IN 2012DN01367 A IN2012DN01367 A IN 2012DN01367A
Authority
IN
India
Prior art keywords
usim
cksn
key
disclosed
ciphering
Prior art date
Application number
Inventor
Veron Christian Herrero
Monica Wifvesson
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Publication of IN2012DN01367A publication Critical patent/IN2012DN01367A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

Techniques for handling ciphering keys in a mobile station comprising a mobile equipment (ME) and a Universal Subscriber Identity Module (USIM) are disclosed. An example method includes obtaining a UMTS cipher key (CK), integrity key (IK), and ciphering key sequence number (CKSN) from the USIM, deriving a 128-bit ciphering key (Kc-128) from the CK and the IK, and storing the Kc-128 and the CKSN on the mobile equipment, separate from the USIM. The stored CKSN is associated with the stored Kc-128, so that the Kc-128's correspondence to the most current UMTS security context can be tracked. This example method applies to the generation and storage of a 128-bit ciphering key for either the packet-switched or circuit- switched domains. A corresponding user equipment apparatus is also disclosed.
IN1367DEN2012 2009-08-17 2010-08-17 IN2012DN01367A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US23448909P 2009-08-17 2009-08-17
US33100310P 2010-05-04 2010-05-04
PCT/IB2010/002038 WO2011021091A1 (en) 2009-08-17 2010-08-17 Method for handling ciphering keys in a mobile station

Publications (1)

Publication Number Publication Date
IN2012DN01367A true IN2012DN01367A (en) 2015-06-05

Family

ID=43348519

Family Applications (1)

Application Number Title Priority Date Filing Date
IN1367DEN2012 IN2012DN01367A (en) 2009-08-17 2010-08-17

Country Status (10)

Country Link
US (1) US9681292B2 (en)
EP (1) EP2468024B1 (en)
JP (2) JP5636050B2 (en)
KR (1) KR101723701B1 (en)
CN (1) CN102668609B (en)
AU (1) AU2010286125B2 (en)
CA (1) CA2769938C (en)
IN (1) IN2012DN01367A (en)
MY (1) MY159193A (en)
WO (1) WO2011021091A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9167424B2 (en) * 2010-01-18 2015-10-20 Htc Corporation Method of handling security in SRVCC handover and related communication device
US9131412B2 (en) * 2010-05-07 2015-09-08 Nokia Technologies Oy Signaling radio bearer security handling for single radio voice call continuity operation
EP3328136B1 (en) * 2010-08-18 2020-04-08 BlackBerry Limited Method to maintain call continuity
US20120198227A1 (en) * 2010-09-30 2012-08-02 Alec Brusilovsky Cipher key generation in communication system
CN102413467B (en) * 2011-11-29 2017-10-27 中兴通讯股份有限公司 A kind of SRVCC switching handling methods, device and its terminal
KR101790586B1 (en) * 2014-04-28 2017-10-26 인텔 아이피 코포레이션 Solution to skip authentication procedure during circuit- switched fallback (csfb) to shorten call setup time
GB2527518A (en) * 2014-06-23 2015-12-30 Nec Corp Communication system
JP6548348B2 (en) * 2015-08-13 2019-07-24 ホアウェイ・テクノロジーズ・カンパニー・リミテッド Message protection method and related device and system
US10312747B2 (en) * 2015-09-10 2019-06-04 Cpg Technologies, Llc Authentication to enable/disable guided surface wave receive equipment
US11832107B2 (en) * 2020-07-30 2023-11-28 Apple Inc. Recovering devices from limited service due to mis-configuration

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5586185A (en) * 1994-03-15 1996-12-17 Mita Industrial Co., Ltd. Communications system capable of communicating encrypted information
US6857075B2 (en) * 2000-12-11 2005-02-15 Lucent Technologies Inc. Key conversion system and method
US20050176431A1 (en) * 2004-02-11 2005-08-11 Telefonaktiebolaget L M Ericsson (Publ) Method for handling key sets during handover
US7623658B2 (en) * 2004-08-23 2009-11-24 Broadcom Corporation Method and system for implementing the A5/3 encryption algorithm for GSM and EDGE compliant handsets
US8630420B2 (en) * 2005-05-31 2014-01-14 Telecom Italia S.P.A. Method for auto-configuration of a network terminal address
CN100550725C (en) * 2005-06-17 2009-10-14 中兴通讯股份有限公司 A method for negotiating a shared key between a user and an application server
CN100596084C (en) * 2006-04-20 2010-03-24 华为技术有限公司 System for mobile circuit domain user to access IMS network and registration method for access
CN101080051B (en) * 2006-05-24 2010-05-12 联芯科技有限公司 Method for service station indication of terminal
CN101299884B (en) * 2008-06-16 2012-10-10 中兴通讯股份有限公司 Method and system for generating cryptographic-key identification identifier when transferring user equipment
US9344924B2 (en) * 2008-11-27 2016-05-17 Htc Corporation Method of handling handover security configuration and related communication device
US20120198227A1 (en) * 2010-09-30 2012-08-02 Alec Brusilovsky Cipher key generation in communication system

Also Published As

Publication number Publication date
KR101723701B1 (en) 2017-04-05
JP5636050B2 (en) 2014-12-03
JP2013502795A (en) 2013-01-24
CN102668609A (en) 2012-09-12
CN102668609B (en) 2015-08-19
US9681292B2 (en) 2017-06-13
AU2010286125B2 (en) 2015-01-22
US20120163601A1 (en) 2012-06-28
CA2769938C (en) 2017-09-05
EP2468024A1 (en) 2012-06-27
JP2015015754A (en) 2015-01-22
AU2010286125A1 (en) 2012-03-08
CA2769938A1 (en) 2011-02-24
KR20120054017A (en) 2012-05-29
EP2468024B1 (en) 2018-08-15
WO2011021091A1 (en) 2011-02-24
MY159193A (en) 2016-12-30

Similar Documents

Publication Publication Date Title
IN2012DN01367A (en)
Banerjee et al. The effects of environmental sustainability and R&D on corporate risk-taking: International evidence
MY176966A (en) Biometric template security and key generation
GB201304448D0 (en) Scrambling an address and encrypting write data for storing in a storage device
PH12015501051B1 (en) Method and apparatus for marking manufactured items using physical characteristic
MY169151A (en) Security key generation for dual connectivity
WO2012104771A3 (en) Secure access to personal health records in emergency situations
EA201891822A1 (en) SECURITY OF PERSONAL DEVICES USING CRYPTOGRAPHY BASED ON ELLIPTIC CURVES TO SEPARATE A SECRET
CN105656621A (en) Safety management method for cryptographic device
GB201307397D0 (en) Systems and methods for caching security information
GB2484207A (en) Method and apparatus for medical information encryption
GB201221433D0 (en) A method and system of providing authentication of user access to a computer resource on a mobile device
WO2013114125A3 (en) A method and database system for secure storage and communication of information
GB2481161A (en) System and method for securely storing data in an electronic device
CN102647712B (en) A kind of mobile phone data encryption method and decryption method
GB2489292B (en) Data transfer device
TW200633457A (en) Method for generating data for detection of tampering, and method and apparatus for detection of tampering
MX2016007818A (en) Apparatus, system and method for sce.
MY171059A (en) Apparatus and method for signaling enhanced security context for session encryption and integrity keys
MX354234B (en) System and method for protecting train event data.
WO2008114540A1 (en) Key providing system, key providing apparatus, terminal apparatus, key providing method, and key generating method
MX2021008680A (en) TECHNIQUES FOR AUTHENTICATION OF CALLS.
CN102368850A (en) Method for carrying out encryption and decryption on video file on mobile phone
CN104363087A (en) Encryption and decryption method and device
WO2007106566A3 (en) A method and apparatus to provide authentication using an authentication card