IN2015DN01110A - - Google Patents

Download PDF

Info

Publication number
IN2015DN01110A
IN2015DN01110A IN1110DEN2015A IN2015DN01110A IN 2015DN01110 A IN2015DN01110 A IN 2015DN01110A IN 1110DEN2015 A IN1110DEN2015 A IN 1110DEN2015A IN 2015DN01110 A IN2015DN01110 A IN 2015DN01110A
Authority
IN
India
Prior art keywords
mtc
iwf
communication
root key
derived
Prior art date
Application number
Inventor
Xiaowei Zhang
Anand Raghawa Prasad
Original Assignee
Nec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to JP2012201693 priority Critical
Application filed by Nec Corp filed Critical Nec Corp
Priority to PCT/JP2013/005398 priority patent/WO2014041806A1/en
Publication of IN2015DN01110A publication Critical patent/IN2015DN01110A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Abstract

A MTC device (10) and a MTC interworking function MTC IWF (20) form a communication system and conduct communication with each other. In this communication system a root key (K iwf) is securely shared between the MTC device (10) and the MTC IWF (20). The MTC device (10) and the MTC IWF (20) use the root key (K iwf) to respectively derive temporary keys (K di (K di conf K di int)) for protecting the communication. The temporary keys provide integrity protection and confidentiality. The root key can be derived by the HSS or MME/SGSN/MSC and provided to the MTC IWF. The root key can also be derived by the MTC IWF based on received key derivation material. The described system is useful for the security of small data transmission in MTC system.
IN1110DEN2015 2012-09-13 2013-09-12 IN2015DN01110A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2012201693 2012-09-13
PCT/JP2013/005398 WO2014041806A1 (en) 2012-09-13 2013-09-12 Key management in machine type communication system

Publications (1)

Publication Number Publication Date
IN2015DN01110A true IN2015DN01110A (en) 2015-06-26

Family

ID=49354872

Family Applications (1)

Application Number Title Priority Date Filing Date
IN1110DEN2015 IN2015DN01110A (en) 2012-09-13 2013-09-12

Country Status (7)

Country Link
US (1) US20150229620A1 (en)
EP (1) EP2896180A1 (en)
JP (1) JP2015532791A (en)
CN (1) CN104704790A (en)
BR (1) BR112015004519A2 (en)
IN (1) IN2015DN01110A (en)
WO (1) WO2014041806A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2586549B (en) 2013-09-13 2021-05-26 Vodafone Ip Licensing Ltd Communicating with a machine to machine device
JP2016541175A (en) 2013-10-31 2016-12-28 日本電気株式会社 Apparatus, system, and method for MTC
WO2015196415A1 (en) * 2014-06-26 2015-12-30 华为技术有限公司 Data secure transmission method and device
US9992670B2 (en) * 2014-08-12 2018-06-05 Vodafone Ip Licensing Limited Machine-to-machine cellular communication security
WO2017059579A1 (en) * 2015-10-09 2017-04-13 Microsoft Technology Licensing, Llc Sim provisioning of a mobile device
US20170142587A1 (en) * 2015-11-17 2017-05-18 Qualcomm Incorporated Methods and apparatus for wireless communication using a security model to support multiple connectivity and service contexts
EP3451723A4 (en) * 2016-05-18 2019-05-01 Huawei Technologies Co., Ltd. Communication method, network equipment, and user equipment
JP6408536B2 (en) * 2016-11-17 2018-10-17 Kddi株式会社 Communication system, communication device, server device, communication method, and computer program
CN108616354A (en) * 2018-04-27 2018-10-02 北京信息科技大学 Cryptographic key negotiation method and equipment in a kind of mobile communication

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002247023A (en) * 2000-12-14 2002-08-30 Furukawa Electric Co Ltd:The Method for sharing session sharing key, method for certifying network terminal, network, terminal, and repeater
WO2005120007A1 (en) * 2004-05-31 2005-12-15 Telecom Italia S.P.A. Method and system for a secure connection in communication networks
US8116775B2 (en) * 2006-09-28 2012-02-14 Samsung Electronics Co., Ltd System and method of providing user equipment initiated and assisted backward handover in heterogeneous wireless networks
CN101400059B (en) * 2007-09-28 2010-12-08 华为技术有限公司 Cipher key updating method and device under active state
CN102143491B (en) * 2010-01-29 2013-10-09 华为技术有限公司 MTC (machine type communication) equipment authentication method, MTC gateway and relevant equipment
JP5778853B2 (en) * 2011-04-01 2015-09-16 インターデイジタル パテント ホールディングス インコーポレイテッド System and method for sharing a common PDP context
US9794772B2 (en) * 2012-06-22 2017-10-17 Nokia Solutions And Networks Oy Machine type communication interworking function
WO2014053797A1 (en) * 2012-10-02 2014-04-10 Qualcomm Incorporated Apparatus and method of group communications

Also Published As

Publication number Publication date
EP2896180A1 (en) 2015-07-22
JP2015532791A (en) 2015-11-12
WO2014041806A1 (en) 2014-03-20
CN104704790A (en) 2015-06-10
BR112015004519A2 (en) 2017-07-04
US20150229620A1 (en) 2015-08-13

Similar Documents

Publication Publication Date Title
IN2015DN01110A (en)
AU2015204470A1 (en) Efficient methods for protecting identity in authenticated transmissions
MX351237B (en) Security key generation for dual connectivity.
WO2013022647A3 (en) System and method for wireless data protection
WO2014116956A3 (en) System and method for differential encryption
WO2015050719A3 (en) Sequence generation for shared spectrum
WO2011149765A3 (en) Rfid security and mobility architecture
IN2015KN00455A (en)
NZ746653A (en) Access control for encrypted data in machine-readable identifiers
MX2016009066A (en) Systems and methods with cryptography and tamper resistance software security.
WO2015023332A3 (en) Incorruptible public key using quantum cryptography for secure wired and wireless communications
GB2493683A (en) Time-key hopping
WO2013003238A3 (en) Privacy protected interactions with third parties
WO2014059136A3 (en) Techniqued for secure data exchange
MX363294B (en) Apparatus, system and method for sce.
EP2813029A4 (en) System and method for generating and protecting cryptographic keys
RU2698742C9 (en) Protective device for protective helmet
EP2884690A4 (en) Re-encryption key generation device, re-encryption device, encryption device, decryption device, and program
EP2947810A4 (en) Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program
WO2013182103A3 (en) Encryption and decryption terminal and encryption and decryption method applied to same
CL2018000562A1 (en) Provide security related to contextual information in a personal protective equipment system
PH12014502633B1 (en) Network based management of protected data sets
IN2013CH00917A (en)
IN2014CN03607A (en)
EP3057262A4 (en) Cipher system, encryption device, re-encryption key generation device, re-encryption device, and cipher program