IN2014DN09206A - - Google Patents
Download PDFInfo
- Publication number
- IN2014DN09206A IN2014DN09206A IN9206DEN2014A IN2014DN09206A IN 2014DN09206 A IN2014DN09206 A IN 2014DN09206A IN 9206DEN2014 A IN9206DEN2014 A IN 9206DEN2014A IN 2014DN09206 A IN2014DN09206 A IN 2014DN09206A
- Authority
- IN
- India
- Prior art keywords
- message
- information
- paging
- sequence
- network
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
- H04W68/02—Arrangements for increasing efficiency of notification or paging channel
- H04W68/025—Indirect paging
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
There is described a device for communicating with a network. The device receives a series of paging messages from a serving node in the network where each paging message includes identification and authentication information sufficient to identify at least one device and authenticate the message at least some of the information having been protected according to a sequence such that it varies between successive paging messages. The device verifies the protected part of the information using a cryptographic function and knowledge of the sequence and identifies whether the information indicates that message is an authentic message intended for that device. The device may act in response to the received paging message.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SE2012/050517 WO2013172750A1 (en) | 2012-05-15 | 2012-05-15 | Secure paging |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014DN09206A true IN2014DN09206A (en) | 2015-07-10 |
Family
ID=46880766
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN9206DEN2014 IN2014DN09206A (en) | 2012-05-15 | 2012-05-15 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20150079941A1 (en) |
EP (1) | EP2850862B1 (en) |
IN (1) | IN2014DN09206A (en) |
WO (1) | WO2013172750A1 (en) |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9585009B2 (en) * | 2013-03-14 | 2017-02-28 | University Of Maryland | Enhancing privacy in cellular paging system using physical layer identification |
US9654571B2 (en) * | 2014-01-21 | 2017-05-16 | Time Warner Cable Enterprises Llc | Publish-subscribe messaging in a content network |
EP3111613B1 (en) | 2014-02-28 | 2018-04-11 | British Telecommunications public limited company | Malicious encrypted traffic inhibitor |
EP3169021B1 (en) * | 2014-07-10 | 2021-06-23 | Panasonic Intellectual Property Corporation of America | Vehicle-mounted network system, electronic control unit, reception method, and transmission method |
WO2016107754A1 (en) | 2014-12-30 | 2016-07-07 | British Telecommunications Public Limited Company | Malware detection |
EP3241140B1 (en) | 2014-12-30 | 2021-08-18 | British Telecommunications public limited company | Malware detection in migrated virtual machines |
US10891383B2 (en) | 2015-02-11 | 2021-01-12 | British Telecommunications Public Limited Company | Validating computer resource usage |
US11200549B2 (en) * | 2015-06-25 | 2021-12-14 | Diebold Nixdorf, Incorporated | Automated banking machine firmware flow control |
US10956614B2 (en) | 2015-07-31 | 2021-03-23 | British Telecommunications Public Limited Company | Expendable access control |
EP3329409A1 (en) | 2015-07-31 | 2018-06-06 | British Telecommunications public limited company | Access control |
EP3329440A1 (en) | 2015-07-31 | 2018-06-06 | British Telecommunications public limited company | Controlled resource provisioning in distributed computing environments |
US9801060B2 (en) * | 2015-11-05 | 2017-10-24 | Intel Corporation | Secure wireless low-power wake-up |
US10149168B2 (en) * | 2015-12-16 | 2018-12-04 | Qualcomm Incorporated | Secured paging |
EP3394784B1 (en) | 2015-12-24 | 2020-10-07 | British Telecommunications public limited company | Malicious software identification |
WO2017109129A1 (en) | 2015-12-24 | 2017-06-29 | British Telecommunications Public Limited Company | Software security |
EP3394783B1 (en) | 2015-12-24 | 2020-09-30 | British Telecommunications public limited company | Malicious software identification |
WO2017109128A1 (en) | 2015-12-24 | 2017-06-29 | British Telecommunications Public Limited Company | Detecting malicious software |
WO2017109135A1 (en) | 2015-12-24 | 2017-06-29 | British Telecommunications Public Limited Company | Malicious network traffic identification |
US11153091B2 (en) | 2016-03-30 | 2021-10-19 | British Telecommunications Public Limited Company | Untrusted code distribution |
US11159549B2 (en) | 2016-03-30 | 2021-10-26 | British Telecommunications Public Limited Company | Network traffic threat identification |
US11194901B2 (en) | 2016-03-30 | 2021-12-07 | British Telecommunications Public Limited Company | Detecting computer security threats using communication characteristics of communication protocols |
WO2017167547A1 (en) | 2016-03-30 | 2017-10-05 | British Telecommunications Public Limited Company | Cryptocurrencies malware based detection |
US11023248B2 (en) | 2016-03-30 | 2021-06-01 | British Telecommunications Public Limited Company | Assured application services |
US10534913B2 (en) | 2016-03-30 | 2020-01-14 | British Telecommunications Public Limited Company | Blockchain state reliability determination |
GB2554980B (en) | 2016-08-16 | 2019-02-13 | British Telecomm | Mitigating security attacks in virtualised computing environments |
EP3500969A1 (en) | 2016-08-16 | 2019-06-26 | British Telecommunications Public Limited Company | Reconfigured virtual machine to mitigate attack |
US9894080B1 (en) * | 2016-10-04 | 2018-02-13 | The Florida International University Board Of Trustees | Sequence hopping algorithm for securing goose messages |
US10771483B2 (en) | 2016-12-30 | 2020-09-08 | British Telecommunications Public Limited Company | Identifying an attacked computing device |
WO2018127454A1 (en) * | 2017-01-04 | 2018-07-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and network node for paging in a wireless communication system |
US11677757B2 (en) | 2017-03-28 | 2023-06-13 | British Telecommunications Public Limited Company | Initialization vector identification for encrypted malware traffic detection |
US11696121B2 (en) * | 2017-03-30 | 2023-07-04 | Apple Inc. | Security for paging messages |
EP3382591B1 (en) | 2017-03-30 | 2020-03-25 | British Telecommunications public limited company | Hierarchical temporal memory for expendable access control |
EP3602380B1 (en) | 2017-03-30 | 2022-02-23 | British Telecommunications public limited company | Hierarchical temporal memory for access control |
US11341237B2 (en) | 2017-03-30 | 2022-05-24 | British Telecommunications Public Limited Company | Anomaly detection for computer systems |
WO2018182482A1 (en) * | 2017-03-31 | 2018-10-04 | Telefonaktiebolaget Lm Ericsson (Publ) | A network node, a communications device and methods therein for secure paging |
US11451398B2 (en) | 2017-05-08 | 2022-09-20 | British Telecommunications Public Limited Company | Management of interoperating machine learning algorithms |
WO2018206406A1 (en) | 2017-05-08 | 2018-11-15 | British Telecommunications Public Limited Company | Adaptation of machine learning algorithms |
WO2018206405A1 (en) | 2017-05-08 | 2018-11-15 | British Telecommunications Public Limited Company | Interoperation of machine learning algorithms |
CN108882235A (en) * | 2017-05-09 | 2018-11-23 | 中兴通讯股份有限公司 | A kind of network verification method and device |
EP3623982B1 (en) | 2018-09-12 | 2021-05-19 | British Telecommunications public limited company | Ransomware remediation |
CN110896390B (en) * | 2018-09-12 | 2021-05-11 | 华为技术有限公司 | Message sending method, message verification method, device and communication system |
EP3623980B1 (en) | 2018-09-12 | 2021-04-28 | British Telecommunications public limited company | Ransomware encryption algorithm determination |
EP3850514B1 (en) | 2018-09-12 | 2023-09-20 | British Telecommunications public limited company | Encryption key seed determination |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3271460B2 (en) * | 1995-01-12 | 2002-04-02 | ケイディーディーアイ株式会社 | Identifier concealment method in wireless communication |
US20030061480A1 (en) * | 2001-09-14 | 2003-03-27 | Franck Le | Method of authenticating IP paging requests as security mechanism, device and system therefor |
US7711377B2 (en) * | 2004-06-10 | 2010-05-04 | Qualcomm Incorporated | Efficient paging in a wireless communication system |
JP4447977B2 (en) * | 2004-06-30 | 2010-04-07 | 富士通マイクロエレクトロニクス株式会社 | Secure processor and program for secure processor. |
WO2011087826A1 (en) * | 2009-12-22 | 2011-07-21 | Interdigital Patent Holdings, Inc. | Group-based machine to machine communication |
CN104025475B (en) * | 2011-10-03 | 2018-04-13 | 英特尔公司 | Device is to device (D2D) communication mechanism |
-
2012
- 2012-05-15 US US14/400,228 patent/US20150079941A1/en not_active Abandoned
- 2012-05-15 EP EP12761685.2A patent/EP2850862B1/en active Active
- 2012-05-15 IN IN9206DEN2014 patent/IN2014DN09206A/en unknown
- 2012-05-15 WO PCT/SE2012/050517 patent/WO2013172750A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2013172750A1 (en) | 2013-11-21 |
US20150079941A1 (en) | 2015-03-19 |
EP2850862A1 (en) | 2015-03-25 |
EP2850862B1 (en) | 2018-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014DN09206A (en) | ||
IL261263A (en) | Method and system for detecting malicious and soliciting electronic messages | |
MX2013001347A (en) | Email mailbox management. | |
MX340495B (en) | Social hotspot. | |
EA201591116A1 (en) | SYSTEM AND METHOD FOR IMPROVED COMMUNICATION IN A WIRELESS NETWORK | |
PE20170739A1 (en) | AUTHENTICATION OF THE SERVICE NETWORK ON DEMAND | |
PH12015501768A1 (en) | Systems and methods for discovering devices in a neighborhood aware network | |
GB2509278A (en) | Network user identification and authentication | |
WO2013066513A3 (en) | Systems and methods to secure user identification | |
WO2011152665A3 (en) | Method and system of securing group communication in a machine-to-machine communication environment | |
IN2014CN04994A (en) | ||
MX340024B (en) | Role-based content rendering. | |
MX2017001172A (en) | Consumer authentication systems and methods. | |
WO2013189176A3 (en) | Multi-synchronization-domain time synchronization system, method and cross-domain device | |
MX2013007174A (en) | Unauthorized location detection and countermeasures. | |
MX2014015223A (en) | Rfid detection system. | |
UA116441C2 (en) | SYSTEMS AND METHODS OF TRANSMISSION OF CONFIGURATION NOTIFICATION BETWEEN APP AND STATION | |
PH12016501866B1 (en) | Systems and methods for identity validation and verification | |
PH12020500111A1 (en) | Prioritized random access procedure | |
GB201211875D0 (en) | Social network protection system | |
MX356541B (en) | Pre-configuration of devices supporting national security and public safety communications. | |
EP2879421A4 (en) | Terminal identity verification and service authentication method, system, and terminal | |
BR112017009372A2 (en) | message authentication in wireless communication | |
EP3319268A4 (en) | Identity information authentication method, user terminal, service terminal, authentication server, and service system | |
IN2015DN02848A (en) |