IN2014DN09206A - - Google Patents

Download PDF

Info

Publication number
IN2014DN09206A
IN2014DN09206A IN9206DEN2014A IN2014DN09206A IN 2014DN09206 A IN2014DN09206 A IN 2014DN09206A IN 9206DEN2014 A IN9206DEN2014 A IN 9206DEN2014A IN 2014DN09206 A IN2014DN09206 A IN 2014DN09206A
Authority
IN
India
Prior art keywords
message
information
paging
sequence
network
Prior art date
Application number
Inventor
Jari Arkko
Bengt Sahlin
Anna Larmo
Kristian Slavov
Karl Norrman
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Publication of IN2014DN09206A publication Critical patent/IN2014DN09206A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like
    • H04W68/02Arrangements for increasing efficiency of notification or paging channel
    • H04W68/025Indirect paging

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

There is described a device for communicating with a network. The device receives a series of paging messages from a serving node in the network where each paging message includes identification and authentication information sufficient to identify at least one device and authenticate the message at least some of the information having been protected according to a sequence such that it varies between successive paging messages. The device verifies the protected part of the information using a cryptographic function and knowledge of the sequence and identifies whether the information indicates that message is an authentic message intended for that device. The device may act in response to the received paging message.
IN9206DEN2014 2012-05-15 2012-05-15 IN2014DN09206A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SE2012/050517 WO2013172750A1 (en) 2012-05-15 2012-05-15 Secure paging

Publications (1)

Publication Number Publication Date
IN2014DN09206A true IN2014DN09206A (en) 2015-07-10

Family

ID=46880766

Family Applications (1)

Application Number Title Priority Date Filing Date
IN9206DEN2014 IN2014DN09206A (en) 2012-05-15 2012-05-15

Country Status (4)

Country Link
US (1) US20150079941A1 (en)
EP (1) EP2850862B1 (en)
IN (1) IN2014DN09206A (en)
WO (1) WO2013172750A1 (en)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9585009B2 (en) * 2013-03-14 2017-02-28 University Of Maryland Enhancing privacy in cellular paging system using physical layer identification
US9654571B2 (en) * 2014-01-21 2017-05-16 Time Warner Cable Enterprises Llc Publish-subscribe messaging in a content network
EP3111613B1 (en) 2014-02-28 2018-04-11 British Telecommunications public limited company Malicious encrypted traffic inhibitor
EP3169021B1 (en) * 2014-07-10 2021-06-23 Panasonic Intellectual Property Corporation of America Vehicle-mounted network system, electronic control unit, reception method, and transmission method
WO2016107754A1 (en) 2014-12-30 2016-07-07 British Telecommunications Public Limited Company Malware detection
EP3241140B1 (en) 2014-12-30 2021-08-18 British Telecommunications public limited company Malware detection in migrated virtual machines
US10891383B2 (en) 2015-02-11 2021-01-12 British Telecommunications Public Limited Company Validating computer resource usage
US11200549B2 (en) * 2015-06-25 2021-12-14 Diebold Nixdorf, Incorporated Automated banking machine firmware flow control
US10956614B2 (en) 2015-07-31 2021-03-23 British Telecommunications Public Limited Company Expendable access control
EP3329409A1 (en) 2015-07-31 2018-06-06 British Telecommunications public limited company Access control
EP3329440A1 (en) 2015-07-31 2018-06-06 British Telecommunications public limited company Controlled resource provisioning in distributed computing environments
US9801060B2 (en) * 2015-11-05 2017-10-24 Intel Corporation Secure wireless low-power wake-up
US10149168B2 (en) * 2015-12-16 2018-12-04 Qualcomm Incorporated Secured paging
EP3394784B1 (en) 2015-12-24 2020-10-07 British Telecommunications public limited company Malicious software identification
WO2017109129A1 (en) 2015-12-24 2017-06-29 British Telecommunications Public Limited Company Software security
EP3394783B1 (en) 2015-12-24 2020-09-30 British Telecommunications public limited company Malicious software identification
WO2017109128A1 (en) 2015-12-24 2017-06-29 British Telecommunications Public Limited Company Detecting malicious software
WO2017109135A1 (en) 2015-12-24 2017-06-29 British Telecommunications Public Limited Company Malicious network traffic identification
US11153091B2 (en) 2016-03-30 2021-10-19 British Telecommunications Public Limited Company Untrusted code distribution
US11159549B2 (en) 2016-03-30 2021-10-26 British Telecommunications Public Limited Company Network traffic threat identification
US11194901B2 (en) 2016-03-30 2021-12-07 British Telecommunications Public Limited Company Detecting computer security threats using communication characteristics of communication protocols
WO2017167547A1 (en) 2016-03-30 2017-10-05 British Telecommunications Public Limited Company Cryptocurrencies malware based detection
US11023248B2 (en) 2016-03-30 2021-06-01 British Telecommunications Public Limited Company Assured application services
US10534913B2 (en) 2016-03-30 2020-01-14 British Telecommunications Public Limited Company Blockchain state reliability determination
GB2554980B (en) 2016-08-16 2019-02-13 British Telecomm Mitigating security attacks in virtualised computing environments
EP3500969A1 (en) 2016-08-16 2019-06-26 British Telecommunications Public Limited Company Reconfigured virtual machine to mitigate attack
US9894080B1 (en) * 2016-10-04 2018-02-13 The Florida International University Board Of Trustees Sequence hopping algorithm for securing goose messages
US10771483B2 (en) 2016-12-30 2020-09-08 British Telecommunications Public Limited Company Identifying an attacked computing device
WO2018127454A1 (en) * 2017-01-04 2018-07-12 Telefonaktiebolaget Lm Ericsson (Publ) Method and network node for paging in a wireless communication system
US11677757B2 (en) 2017-03-28 2023-06-13 British Telecommunications Public Limited Company Initialization vector identification for encrypted malware traffic detection
US11696121B2 (en) * 2017-03-30 2023-07-04 Apple Inc. Security for paging messages
EP3382591B1 (en) 2017-03-30 2020-03-25 British Telecommunications public limited company Hierarchical temporal memory for expendable access control
EP3602380B1 (en) 2017-03-30 2022-02-23 British Telecommunications public limited company Hierarchical temporal memory for access control
US11341237B2 (en) 2017-03-30 2022-05-24 British Telecommunications Public Limited Company Anomaly detection for computer systems
WO2018182482A1 (en) * 2017-03-31 2018-10-04 Telefonaktiebolaget Lm Ericsson (Publ) A network node, a communications device and methods therein for secure paging
US11451398B2 (en) 2017-05-08 2022-09-20 British Telecommunications Public Limited Company Management of interoperating machine learning algorithms
WO2018206406A1 (en) 2017-05-08 2018-11-15 British Telecommunications Public Limited Company Adaptation of machine learning algorithms
WO2018206405A1 (en) 2017-05-08 2018-11-15 British Telecommunications Public Limited Company Interoperation of machine learning algorithms
CN108882235A (en) * 2017-05-09 2018-11-23 中兴通讯股份有限公司 A kind of network verification method and device
EP3623982B1 (en) 2018-09-12 2021-05-19 British Telecommunications public limited company Ransomware remediation
CN110896390B (en) * 2018-09-12 2021-05-11 华为技术有限公司 Message sending method, message verification method, device and communication system
EP3623980B1 (en) 2018-09-12 2021-04-28 British Telecommunications public limited company Ransomware encryption algorithm determination
EP3850514B1 (en) 2018-09-12 2023-09-20 British Telecommunications public limited company Encryption key seed determination

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3271460B2 (en) * 1995-01-12 2002-04-02 ケイディーディーアイ株式会社 Identifier concealment method in wireless communication
US20030061480A1 (en) * 2001-09-14 2003-03-27 Franck Le Method of authenticating IP paging requests as security mechanism, device and system therefor
US7711377B2 (en) * 2004-06-10 2010-05-04 Qualcomm Incorporated Efficient paging in a wireless communication system
JP4447977B2 (en) * 2004-06-30 2010-04-07 富士通マイクロエレクトロニクス株式会社 Secure processor and program for secure processor.
WO2011087826A1 (en) * 2009-12-22 2011-07-21 Interdigital Patent Holdings, Inc. Group-based machine to machine communication
CN104025475B (en) * 2011-10-03 2018-04-13 英特尔公司 Device is to device (D2D) communication mechanism

Also Published As

Publication number Publication date
WO2013172750A1 (en) 2013-11-21
US20150079941A1 (en) 2015-03-19
EP2850862A1 (en) 2015-03-25
EP2850862B1 (en) 2018-10-03

Similar Documents

Publication Publication Date Title
IN2014DN09206A (en)
IL261263A (en) Method and system for detecting malicious and soliciting electronic messages
MX2013001347A (en) Email mailbox management.
MX340495B (en) Social hotspot.
EA201591116A1 (en) SYSTEM AND METHOD FOR IMPROVED COMMUNICATION IN A WIRELESS NETWORK
PE20170739A1 (en) AUTHENTICATION OF THE SERVICE NETWORK ON DEMAND
PH12015501768A1 (en) Systems and methods for discovering devices in a neighborhood aware network
GB2509278A (en) Network user identification and authentication
WO2013066513A3 (en) Systems and methods to secure user identification
WO2011152665A3 (en) Method and system of securing group communication in a machine-to-machine communication environment
IN2014CN04994A (en)
MX340024B (en) Role-based content rendering.
MX2017001172A (en) Consumer authentication systems and methods.
WO2013189176A3 (en) Multi-synchronization-domain time synchronization system, method and cross-domain device
MX2013007174A (en) Unauthorized location detection and countermeasures.
MX2014015223A (en) Rfid detection system.
UA116441C2 (en) SYSTEMS AND METHODS OF TRANSMISSION OF CONFIGURATION NOTIFICATION BETWEEN APP AND STATION
PH12016501866B1 (en) Systems and methods for identity validation and verification
PH12020500111A1 (en) Prioritized random access procedure
GB201211875D0 (en) Social network protection system
MX356541B (en) Pre-configuration of devices supporting national security and public safety communications.
EP2879421A4 (en) Terminal identity verification and service authentication method, system, and terminal
BR112017009372A2 (en) message authentication in wireless communication
EP3319268A4 (en) Identity information authentication method, user terminal, service terminal, authentication server, and service system
IN2015DN02848A (en)