IN2015DN01110A - - Google Patents
Download PDFInfo
- Publication number
- IN2015DN01110A IN2015DN01110A IN1110DEN2015A IN2015DN01110A IN 2015DN01110 A IN2015DN01110 A IN 2015DN01110A IN 1110DEN2015 A IN1110DEN2015 A IN 1110DEN2015A IN 2015DN01110 A IN2015DN01110 A IN 2015DN01110A
- Authority
- IN
- India
- Prior art keywords
- mtc
- iwf
- root key
- communication
- derived
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
A MTC device (10) and a MTC interworking function MTC IWF (20) form a communication system and conduct communication with each other. In this communication system a root key (K iwf) is securely shared between the MTC device (10) and the MTC IWF (20). The MTC device (10) and the MTC IWF (20) use the root key (K iwf) to respectively derive temporary keys (K di (K di conf K di int)) for protecting the communication. The temporary keys provide integrity protection and confidentiality. The root key can be derived by the HSS or MME/SGSN/MSC and provided to the MTC IWF. The root key can also be derived by the MTC IWF based on received key derivation material. The described system is useful for the security of small data transmission in MTC system.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2012201693 | 2012-09-13 | ||
PCT/JP2013/005398 WO2014041806A1 (en) | 2012-09-13 | 2013-09-12 | Key management in machine type communication system |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2015DN01110A true IN2015DN01110A (en) | 2015-06-26 |
Family
ID=49354872
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN1110DEN2015 IN2015DN01110A (en) | 2012-09-13 | 2013-09-12 |
Country Status (7)
Country | Link |
---|---|
US (1) | US20150229620A1 (en) |
EP (1) | EP2896180A1 (en) |
JP (1) | JP2015532791A (en) |
CN (1) | CN104704790A (en) |
BR (1) | BR112015004519A2 (en) |
IN (1) | IN2015DN01110A (en) |
WO (1) | WO2014041806A1 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2586549B (en) | 2013-09-13 | 2021-05-26 | Vodafone Ip Licensing Ltd | Communicating with a machine to machine device |
CN105684469A (en) * | 2013-10-31 | 2016-06-15 | 日本电气株式会社 | Apparatus, system and method for mtc |
WO2015196415A1 (en) * | 2014-06-26 | 2015-12-30 | 华为技术有限公司 | Data secure transmission method and device |
US9992670B2 (en) * | 2014-08-12 | 2018-06-05 | Vodafone Ip Licensing Limited | Machine-to-machine cellular communication security |
WO2017059579A1 (en) | 2015-10-09 | 2017-04-13 | Microsoft Technology Licensing, Llc | Sim provisioning of a mobile device |
US11234126B2 (en) | 2015-11-17 | 2022-01-25 | Qualcomm Incorporated | Methods and apparatus for wireless communication using a security model to support multiple connectivity and service contexts |
WO2017197596A1 (en) * | 2016-05-18 | 2017-11-23 | 华为技术有限公司 | Communication method, network equipment, and user equipment |
CN108377495B (en) | 2016-10-31 | 2021-10-15 | 华为技术有限公司 | Data transmission method, related equipment and system |
JP6408536B2 (en) * | 2016-11-17 | 2018-10-17 | Kddi株式会社 | COMMUNICATION SYSTEM, COMMUNICATION DEVICE, SERVER DEVICE, COMMUNICATION METHOD, AND COMPUTER PROGRAM |
CN108616354B (en) * | 2018-04-27 | 2021-10-26 | 北京信息科技大学 | Key negotiation method and device in mobile communication |
WO2022174419A1 (en) * | 2021-02-20 | 2022-08-25 | 华为技术有限公司 | Root key protection method and system |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002247023A (en) * | 2000-12-14 | 2002-08-30 | Furukawa Electric Co Ltd:The | Method for sharing session sharing key, method for certifying network terminal, network, terminal, and repeater |
US8296825B2 (en) * | 2004-05-31 | 2012-10-23 | Telecom Italia S.P.A. | Method and system for a secure connection in communication networks |
CN101523765B (en) * | 2006-09-28 | 2013-06-12 | 三星电子株式会社 | System and method of providing user equipment initiated and assisted backward handover in heterogeneous wireless networks |
CN101400059B (en) * | 2007-09-28 | 2010-12-08 | 华为技术有限公司 | Cipher key updating method and device under active state |
CN102143491B (en) * | 2010-01-29 | 2013-10-09 | 华为技术有限公司 | MTC (machine type communication) equipment authentication method, MTC gateway and relevant equipment |
KR101929533B1 (en) * | 2011-04-01 | 2018-12-17 | 인터디지탈 패튼 홀딩스, 인크 | System and method for sharing a common pdp context |
US9794772B2 (en) * | 2012-06-22 | 2017-10-17 | Nokia Solutions And Networks Oy | Machine type communication interworking function |
WO2014053797A1 (en) * | 2012-10-02 | 2014-04-10 | Qualcomm Incorporated | Apparatus and method of group communications |
-
2013
- 2013-09-12 BR BR112015004519A patent/BR112015004519A2/en not_active IP Right Cessation
- 2013-09-12 CN CN201380046867.4A patent/CN104704790A/en active Pending
- 2013-09-12 EP EP13776586.3A patent/EP2896180A1/en not_active Withdrawn
- 2013-09-12 JP JP2015511539A patent/JP2015532791A/en active Pending
- 2013-09-12 WO PCT/JP2013/005398 patent/WO2014041806A1/en active Application Filing
- 2013-09-12 IN IN1110DEN2015 patent/IN2015DN01110A/en unknown
- 2013-09-12 US US14/426,942 patent/US20150229620A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
CN104704790A (en) | 2015-06-10 |
WO2014041806A1 (en) | 2014-03-20 |
BR112015004519A2 (en) | 2017-07-04 |
JP2015532791A (en) | 2015-11-12 |
EP2896180A1 (en) | 2015-07-22 |
US20150229620A1 (en) | 2015-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2015DN01110A (en) | ||
WO2013022647A3 (en) | System and method for wireless data protection | |
BR112016006445A2 (en) | method for securing transaction messages by transitioning between a mobile application on a mobile device and a gateway, and transaction processing system | |
NZ709755A (en) | Security key generation for dual connectivity | |
MX356293B (en) | Systems and methods with cryptography and tamper resistance software security. | |
WO2014116956A3 (en) | System and method for differential encryption | |
AU2018256568A1 (en) | Systems and methods for software based encryption | |
WO2011149765A3 (en) | Rfid security and mobility architecture | |
NZ746653A (en) | Access control for encrypted data in machine-readable identifiers | |
IN2015KN00455A (en) | ||
WO2015023332A3 (en) | Incorruptible public key using quantum cryptography for secure wired and wireless communications | |
WO2015050719A3 (en) | Sequence generation for shared spectrum | |
EP3079390A4 (en) | Security key context distribution method, mobile management entity, and base station | |
EP2884690A4 (en) | Re-encryption key generation device, re-encryption device, encryption device, decryption device, and program | |
GB2493683A (en) | Time-key hopping | |
CL2018000562A1 (en) | Provide security related to contextual information in a personal protective equipment system | |
IN2014DN09022A (en) | ||
PH12014502633A1 (en) | Network based management of protected data sets | |
WO2013182103A3 (en) | Encryption and decryption terminal and encryption and decryption method applied to same | |
EP3057262A4 (en) | Cipher system, encryption device, re-encryption key generation device, re-encryption device, and cipher program | |
WO2012061751A3 (en) | Beacon and management information elements with integrity protection | |
EP3618345A4 (en) | Re-encrypted key generation device, re-encryption device, re-encrypted cipher text decryption device and cryptosystem | |
WO2014145346A3 (en) | Compositions, systems and methods for protecting genetically modified organisms from unauthorized use or release into the environment | |
WO2015156622A3 (en) | Authentication apparatus and method | |
IN2013CH00917A (en) |