IN2015DN01110A - - Google Patents

Download PDF

Info

Publication number
IN2015DN01110A
IN2015DN01110A IN1110DEN2015A IN2015DN01110A IN 2015DN01110 A IN2015DN01110 A IN 2015DN01110A IN 1110DEN2015 A IN1110DEN2015 A IN 1110DEN2015A IN 2015DN01110 A IN2015DN01110 A IN 2015DN01110A
Authority
IN
India
Prior art keywords
mtc
iwf
root key
communication
derived
Prior art date
Application number
Inventor
Xiaowei Zhang
Anand Raghawa Prasad
Original Assignee
Nec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nec Corp filed Critical Nec Corp
Publication of IN2015DN01110A publication Critical patent/IN2015DN01110A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A MTC device (10) and a MTC interworking function MTC IWF (20) form a communication system and conduct communication with each other. In this communication system a root key (K iwf) is securely shared between the MTC device (10) and the MTC IWF (20). The MTC device (10) and the MTC IWF (20) use the root key (K iwf) to respectively derive temporary keys (K di (K di conf K di int)) for protecting the communication. The temporary keys provide integrity protection and confidentiality. The root key can be derived by the HSS or MME/SGSN/MSC and provided to the MTC IWF. The root key can also be derived by the MTC IWF based on received key derivation material. The described system is useful for the security of small data transmission in MTC system.
IN1110DEN2015 2012-09-13 2013-09-12 IN2015DN01110A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2012201693 2012-09-13
PCT/JP2013/005398 WO2014041806A1 (en) 2012-09-13 2013-09-12 Key management in machine type communication system

Publications (1)

Publication Number Publication Date
IN2015DN01110A true IN2015DN01110A (en) 2015-06-26

Family

ID=49354872

Family Applications (1)

Application Number Title Priority Date Filing Date
IN1110DEN2015 IN2015DN01110A (en) 2012-09-13 2013-09-12

Country Status (7)

Country Link
US (1) US20150229620A1 (en)
EP (1) EP2896180A1 (en)
JP (1) JP2015532791A (en)
CN (1) CN104704790A (en)
BR (1) BR112015004519A2 (en)
IN (1) IN2015DN01110A (en)
WO (1) WO2014041806A1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2586549B (en) 2013-09-13 2021-05-26 Vodafone Ip Licensing Ltd Communicating with a machine to machine device
CN105684469A (en) * 2013-10-31 2016-06-15 日本电气株式会社 Apparatus, system and method for mtc
WO2015196415A1 (en) * 2014-06-26 2015-12-30 华为技术有限公司 Data secure transmission method and device
US9992670B2 (en) * 2014-08-12 2018-06-05 Vodafone Ip Licensing Limited Machine-to-machine cellular communication security
WO2017059579A1 (en) 2015-10-09 2017-04-13 Microsoft Technology Licensing, Llc Sim provisioning of a mobile device
US11234126B2 (en) 2015-11-17 2022-01-25 Qualcomm Incorporated Methods and apparatus for wireless communication using a security model to support multiple connectivity and service contexts
WO2017197596A1 (en) * 2016-05-18 2017-11-23 华为技术有限公司 Communication method, network equipment, and user equipment
CN108377495B (en) 2016-10-31 2021-10-15 华为技术有限公司 Data transmission method, related equipment and system
JP6408536B2 (en) * 2016-11-17 2018-10-17 Kddi株式会社 COMMUNICATION SYSTEM, COMMUNICATION DEVICE, SERVER DEVICE, COMMUNICATION METHOD, AND COMPUTER PROGRAM
CN108616354B (en) * 2018-04-27 2021-10-26 北京信息科技大学 Key negotiation method and device in mobile communication
WO2022174419A1 (en) * 2021-02-20 2022-08-25 华为技术有限公司 Root key protection method and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002247023A (en) * 2000-12-14 2002-08-30 Furukawa Electric Co Ltd:The Method for sharing session sharing key, method for certifying network terminal, network, terminal, and repeater
US8296825B2 (en) * 2004-05-31 2012-10-23 Telecom Italia S.P.A. Method and system for a secure connection in communication networks
CN101523765B (en) * 2006-09-28 2013-06-12 三星电子株式会社 System and method of providing user equipment initiated and assisted backward handover in heterogeneous wireless networks
CN101400059B (en) * 2007-09-28 2010-12-08 华为技术有限公司 Cipher key updating method and device under active state
CN102143491B (en) * 2010-01-29 2013-10-09 华为技术有限公司 MTC (machine type communication) equipment authentication method, MTC gateway and relevant equipment
KR101929533B1 (en) * 2011-04-01 2018-12-17 인터디지탈 패튼 홀딩스, 인크 System and method for sharing a common pdp context
US9794772B2 (en) * 2012-06-22 2017-10-17 Nokia Solutions And Networks Oy Machine type communication interworking function
WO2014053797A1 (en) * 2012-10-02 2014-04-10 Qualcomm Incorporated Apparatus and method of group communications

Also Published As

Publication number Publication date
CN104704790A (en) 2015-06-10
WO2014041806A1 (en) 2014-03-20
BR112015004519A2 (en) 2017-07-04
JP2015532791A (en) 2015-11-12
EP2896180A1 (en) 2015-07-22
US20150229620A1 (en) 2015-08-13

Similar Documents

Publication Publication Date Title
IN2015DN01110A (en)
WO2013022647A3 (en) System and method for wireless data protection
BR112016006445A2 (en) method for securing transaction messages by transitioning between a mobile application on a mobile device and a gateway, and transaction processing system
NZ709755A (en) Security key generation for dual connectivity
MX356293B (en) Systems and methods with cryptography and tamper resistance software security.
WO2014116956A3 (en) System and method for differential encryption
AU2018256568A1 (en) Systems and methods for software based encryption
WO2011149765A3 (en) Rfid security and mobility architecture
NZ746653A (en) Access control for encrypted data in machine-readable identifiers
IN2015KN00455A (en)
WO2015023332A3 (en) Incorruptible public key using quantum cryptography for secure wired and wireless communications
WO2015050719A3 (en) Sequence generation for shared spectrum
EP3079390A4 (en) Security key context distribution method, mobile management entity, and base station
EP2884690A4 (en) Re-encryption key generation device, re-encryption device, encryption device, decryption device, and program
GB2493683A (en) Time-key hopping
CL2018000562A1 (en) Provide security related to contextual information in a personal protective equipment system
IN2014DN09022A (en)
PH12014502633A1 (en) Network based management of protected data sets
WO2013182103A3 (en) Encryption and decryption terminal and encryption and decryption method applied to same
EP3057262A4 (en) Cipher system, encryption device, re-encryption key generation device, re-encryption device, and cipher program
WO2012061751A3 (en) Beacon and management information elements with integrity protection
EP3618345A4 (en) Re-encrypted key generation device, re-encryption device, re-encrypted cipher text decryption device and cryptosystem
WO2014145346A3 (en) Compositions, systems and methods for protecting genetically modified organisms from unauthorized use or release into the environment
WO2015156622A3 (en) Authentication apparatus and method
IN2013CH00917A (en)