JP5080449B2 - 新しいセッション鍵の提供 - Google Patents
新しいセッション鍵の提供 Download PDFInfo
- Publication number
- JP5080449B2 JP5080449B2 JP2008507708A JP2008507708A JP5080449B2 JP 5080449 B2 JP5080449 B2 JP 5080449B2 JP 2008507708 A JP2008507708 A JP 2008507708A JP 2008507708 A JP2008507708 A JP 2008507708A JP 5080449 B2 JP5080449 B2 JP 5080449B2
- Authority
- JP
- Japan
- Prior art keywords
- key material
- random number
- user equipment
- network application
- application function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/108,610 | 2005-04-18 | ||
| US11/108,610 US7558957B2 (en) | 2005-04-18 | 2005-04-18 | Providing fresh session keys |
| PCT/US2006/013283 WO2006113206A1 (en) | 2005-04-18 | 2006-04-10 | Providing fresh session keys |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2008537445A JP2008537445A (ja) | 2008-09-11 |
| JP2008537445A5 JP2008537445A5 (enExample) | 2009-06-18 |
| JP5080449B2 true JP5080449B2 (ja) | 2012-11-21 |
Family
ID=36678567
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2008507708A Expired - Fee Related JP5080449B2 (ja) | 2005-04-18 | 2006-04-10 | 新しいセッション鍵の提供 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7558957B2 (enExample) |
| EP (1) | EP1872513B1 (enExample) |
| JP (1) | JP5080449B2 (enExample) |
| KR (1) | KR101240069B1 (enExample) |
| CN (1) | CN101160779B (enExample) |
| WO (1) | WO2006113206A1 (enExample) |
Families Citing this family (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8046824B2 (en) * | 2005-04-11 | 2011-10-25 | Nokia Corporation | Generic key-decision mechanism for GAA |
| CA2610947A1 (en) * | 2005-07-07 | 2007-01-18 | Telefonaktiebolaget L M Ericsson (Publ) | Method and arrangement for authentication and privacy |
| US7835528B2 (en) * | 2005-09-26 | 2010-11-16 | Nokia Corporation | Method and apparatus for refreshing keys within a bootstrapping architecture |
| CN101039181B (zh) * | 2006-03-14 | 2010-09-08 | 华为技术有限公司 | 防止通用鉴权框架中服务功能实体受攻击的方法 |
| US8407482B2 (en) * | 2006-03-31 | 2013-03-26 | Avaya Inc. | User session dependent URL masking |
| DE102006054091B4 (de) * | 2006-11-16 | 2008-09-11 | Siemens Ag | Bootstrapping-Verfahren |
| DE102007023206B4 (de) * | 2006-11-18 | 2008-10-09 | Dica Technologies Gmbh | Verfahren und Einrichtung zur sicheren Erzeugung und Verwaltung von Schlüsseln und deren Nutzung in Netzwerken zur sicheren Übertragung von Daten |
| KR101447726B1 (ko) * | 2006-12-08 | 2014-10-07 | 한국전자통신연구원 | 이동통신시스템에서의 인증키 생성 방법 및 갱신 방법 |
| US20100183152A1 (en) * | 2007-07-04 | 2010-07-22 | Koninklijke Philips Electronics N.V. | Network and method for initializing a trust center link key |
| CN101163010B (zh) * | 2007-11-14 | 2010-12-08 | 华为软件技术有限公司 | 对请求消息的鉴权方法和相关设备 |
| WO2009070075A1 (en) * | 2007-11-30 | 2009-06-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Key management for secure communication |
| ES2687238T3 (es) * | 2008-02-25 | 2018-10-24 | Nokia Solutions And Networks Oy | Método de arquitectura de arranque de seguro basado en autenticación de resumen basada en contraseña |
| US20090287929A1 (en) * | 2008-05-15 | 2009-11-19 | Lucent Technologies Inc. | Method and apparatus for two-factor key exchange protocol resilient to password mistyping |
| DK2291946T4 (da) * | 2008-06-06 | 2020-08-31 | Ericsson Telefon Ab L M | Generering af krypteringsnøgle |
| CN101784048B (zh) * | 2009-01-21 | 2014-01-01 | 中兴通讯股份有限公司 | 动态更新密钥的身份认证和密钥协商方法及系统 |
| US8943321B2 (en) | 2009-10-19 | 2015-01-27 | Nokia Corporation | User identity management for permitting interworking of a bootstrapping architecture and a shared identity service |
| CN107484163A (zh) | 2011-04-01 | 2017-12-15 | 瑞典爱立信有限公司 | 用于避免网络攻击的危害的方法和装置 |
| PH12014500964A1 (en) * | 2011-10-31 | 2014-06-30 | Nokia Technologies Oy | Security mechanism for external code |
| WO2015065063A1 (en) * | 2013-10-30 | 2015-05-07 | Samsung Electronics Co., Ltd. | Method and apparatus to identity verification using asymmetric keys in wireless direct communication network |
| JP6708626B2 (ja) * | 2014-05-02 | 2020-06-10 | コニンクリーケ・ケイピーエヌ・ナムローゼ・フェンノートシャップ | 無線アクセス・ネットワークからセキュリティを提供する方法およびシステム。 |
| US10678927B2 (en) * | 2017-08-31 | 2020-06-09 | Texas Instruments Incorporated | Randomized execution countermeasures against fault injection attacks during boot of an embedded device |
| WO2019108100A1 (en) * | 2017-11-29 | 2019-06-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Session key establishment |
| US11089480B2 (en) * | 2018-11-30 | 2021-08-10 | Apple Inc. | Provisioning electronic subscriber identity modules to mobile wireless devices |
| WO2020146974A1 (en) * | 2019-01-14 | 2020-07-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for security |
| CN112054906B (zh) * | 2020-08-21 | 2022-02-11 | 郑州信大捷安信息技术股份有限公司 | 一种密钥协商方法及系统 |
| KR20240056515A (ko) * | 2021-09-17 | 2024-04-30 | 퀄컴 인코포레이티드 | 애플리케이션 통신 보안 |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0722596A4 (en) * | 1991-11-12 | 1997-03-05 | Security Domain Pty Ltd | METHOD AND SYSTEM FOR SECURE, DECENTRALIZED PERSONALIZATION OF CHIP CARDS |
| US6151676A (en) * | 1997-12-24 | 2000-11-21 | Philips Electronics North America Corporation | Administration and utilization of secret fresh random numbers in a networked environment |
| GB2359227B (en) * | 1998-10-30 | 2004-04-07 | Certco Inc | Incorporating shared randomness into distributed cryptography |
| SE517116C2 (sv) * | 2000-08-11 | 2002-04-16 | Ericsson Telefon Ab L M | Metod och anordning för säkra kommunikationstjänster |
| JP2002344438A (ja) * | 2001-05-14 | 2002-11-29 | Nippon Telegr & Teleph Corp <Ntt> | 鍵共有システム及び装置並びにプログラム |
| US8140845B2 (en) * | 2001-09-13 | 2012-03-20 | Alcatel Lucent | Scheme for authentication and dynamic key exchange |
| US20030093663A1 (en) * | 2001-11-09 | 2003-05-15 | Walker Jesse R. | Technique to bootstrap cryptographic keys between devices |
| US7607015B2 (en) | 2002-10-08 | 2009-10-20 | Koolspan, Inc. | Shared network access using different access keys |
| US7715822B2 (en) * | 2005-02-04 | 2010-05-11 | Qualcomm Incorporated | Secure bootstrapping for wireless communications |
-
2005
- 2005-04-18 US US11/108,610 patent/US7558957B2/en active Active
-
2006
- 2006-04-10 KR KR1020077023862A patent/KR101240069B1/ko not_active Expired - Fee Related
- 2006-04-10 JP JP2008507708A patent/JP5080449B2/ja not_active Expired - Fee Related
- 2006-04-10 EP EP06740801.3A patent/EP1872513B1/en not_active Not-in-force
- 2006-04-10 WO PCT/US2006/013283 patent/WO2006113206A1/en not_active Ceased
- 2006-04-10 CN CN2006800127472A patent/CN101160779B/zh not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| JP2008537445A (ja) | 2008-09-11 |
| EP1872513B1 (en) | 2018-01-10 |
| KR20070122491A (ko) | 2007-12-31 |
| US7558957B2 (en) | 2009-07-07 |
| WO2006113206A1 (en) | 2006-10-26 |
| CN101160779A (zh) | 2008-04-09 |
| WO2006113206B1 (en) | 2007-01-18 |
| EP1872513A1 (en) | 2008-01-02 |
| CN101160779B (zh) | 2013-04-03 |
| US20060236106A1 (en) | 2006-10-19 |
| KR101240069B1 (ko) | 2013-03-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5080449B2 (ja) | 新しいセッション鍵の提供 | |
| JP4865791B2 (ja) | ペアワイズ・マスタ・キーを更新する方法 | |
| JP2008538482A (ja) | ルート鍵の提供 | |
| KR101195278B1 (ko) | 무선 통신 방법 | |
| CN108040048A (zh) | 一种基于http协议的移动客户端用户动态秘钥加密通讯方法 | |
| CN110868294A (zh) | 一种密钥更新方法、装置及设备 | |
| CN117395001B (zh) | 一种基于量子密钥芯片的车联网安全通信方法及系统 | |
| CN111740985A (zh) | 一种tcp长连接安全验证加密方法 | |
| CN118101340B (zh) | 数据安全传输方法、装置和电子设备 | |
| WO2022252845A1 (zh) | 一种用户数据管理方法以及相关设备 | |
| CN120128912A (zh) | 用户入网安全保护方法、装置及相关设备 | |
| CN114567452A (zh) | 数据传输方法、装置及系统、计算机存储介质 | |
| CN113316138B (zh) | 一种应用层加密实现方法及其实现装置 | |
| CN117034309A (zh) | 用户密码管理方法、计算机装置及存储介质 | |
| CN116545720A (zh) | 第三方小程序的服务提供方法和装置 | |
| CN111404669B (zh) | 一种密钥生成方法、终端设备及网络设备 | |
| CN109391938A (zh) | 密钥协商方法、装置及系统 | |
| Schonwalder et al. | Session resumption for the secure shell protocol | |
| CN113935736B (zh) | 一种移动端区块链安全交易系统 | |
| CN119728082B (zh) | 信息处理方法、装置、用户终端及存储介质 | |
| CN116208949B (zh) | 通信报文的加密传输方法、系统及发送终端、接收终端 | |
| CN120378180A (zh) | 跨域通信场景下异构工控协议安全增强方法、终端与系统 | |
| CN118803752A (zh) | 认证鉴权方法、装置及网络设备 | |
| CN106888451A (zh) | 可信执行环境tee初始化方法及设备 | |
| CN118803751A (zh) | 认证鉴权方法、装置、网络设备及存储介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20090410 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20090427 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20111019 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20120119 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120126 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20120419 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20120802 |
|
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20120830 |
|
| FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20150907 Year of fee payment: 3 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 5080449 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| LAPS | Cancellation because of no payment of annual fees |